The software logs too much information, making log files hard to process and possibly hindering recovery efforts or forensic analysis after an attack.