Weekend learning - SIEM Log Sources
Where is the log files come from?
What is the basic anatomy of log files we look for?
Typical personas and their focuses
How to identify the required log sources for your SIEM operation?
A note before we go deeper: #SIEM logging focuses on detecting threat from the beginning. Log management provides data but it's up to the security analyst to interpret it and determine whether or not the security incident is real.
There is a very common approach to determine what logs should be sent to your SIEM, is to firstly consider both of the ‘easy-to-understand’ types of log:
Technology-specific logs refer to logs generated by specific technologies or components within an IT infrastructure. These logs provide insights into the behavior, performance, and security of those technologies. Here are some examples of technology-specific logs:
2. Domain-specific logs [aka. Logs from Contextual Insight]
Domain-specific logs refer to different types of logs that are generated by systems or applications within a specific domain or area of interest. By capturing relevant events and activities within that domain, these logs offer valuable context and understanding of the system or application's behavior within its specific context. It helps to enable #SecurityAnalysts to monitor, #investigate, and analyze activities within that specific context. Some common examples of domain-specific logs include authentication logs, access logs, and audit logs. Here's a brief explanation of each:
领英推荐
Why you don’t need All-the-things to be sent to your SIEM?
Note: You can have a look at this article before moving to the questions Best practices for data collection in Microsoft Sentinel | Microsoft Learn
1st Key question: Why should I look into the second approach?
2nd Key question: If I go with the second approach, how would I start?
3rd Key question: What if you need to have all SIEM and LMS primary features? What is the solution you can consider?
Refer to these articles for more details about leveraging #MicrosoftSentinel and #ADX
Cloud Solution Architect at Velrada | Fintech | Mobile Money | Payments | SAFe Agilist
1 年Great initiative Ryan N. nicely explained
Great initiative Ryan, wonder if this can be co-shared in a GitHub docs or a easily shared resource like: aka.ms/gsd
Head of Security Platforms at BPER Banca
1 年Hi Ryan N., interesting overview. In the "basic anatomy" section, I'd add "log source" between "Timestamp" and "Event Info". It could be an IP address, a hostname, maybe in combination with agent name. I think it's important because in my experience it can be the root cause of different issues (i.e. the agent sending the logs is not the one you'd expect)
Head of Solution Consulting - @ John Keells IT | Cloud Strategy, Consulting Services
1 年Great Start, Ryan N. Everyone has significant concerns about the cost. On the other hand, get a complete correlation from all the log sources. That's the challenge. However, we can use many things in Sentinel for optimization. I hope we have those in upcoming blogs.
That's a great initiative, I'm in!