Privilege logging is one of the most time-consuming, expensive, and contentious components of discovery. Federal Rule of Civil Procedure 26(b)(5)(A), which governs the withholding of privileged ...
If resource permits, definitely use the DB. A plain text file is hard to "use" (unless writing a shit load of perl or whatever just to digest the file is within your definition of easy); a DB, OTOH, ...
Like a triage nurse, security professionals have to prioritize the data that will help them best identify problems and keep the organization, its data, and devices safe from intruders and cyberattacks ...