4.3 Data Sources to Support Investigation

SIEM Dashboards

Security Information and Event Management (SIEM) = logging of security events and information - real-time security alerts - log aggregation, data correlation, forensics analysis - sensors and logs - viewing trends and identifying changes over time


Log Files

Network log files - network changes, authentication issues, network security issues, routing updates

System log files - OS information, file system information, monitor apps, brute force, file changes

Application log file - application specific logs, event viewers, /var/log

Security log file - blocked/allowed traffic flows, exploit attempts, blocked URL categories, DNS sinkhole traffic

Firewall logs - traffic flows allowed or blocked, server access deny

Web log file - web server access, IP address/web page URL, access errors

DNS log file - view lookup requests, identify queries to known bad URLs

Authentication log files - know who logged in, identify failure logins

Dump files - store all contents of memory into a diagnostic file

VoIP and call manager logs - view inbound and outbound call information, endpoint details


Log Management

syslog - protocol that computer systems use to send event data logs to a central location for storage - each log entry is labeled

journalctl - Linux logs for OS, daemons, applications - logs are stored in binary format - can only be seen with "journalctl" command

NetFlow - gather traffic statistics from all traffic flows - shared communication between devices

IPFIX - IP flow information export

sFlow - sampled flow

Last updated

Was this helpful?