Differences Between Logs and Debugs on Adaptive Security Appliances