Deriving System Vulnerabilities Using Log Analytics