Security
📅
10.10.2024 00:00 • 👁️
1 görüntülenme
SIEM Basics: Log Analysis & Correlation
Logs are useless if nobody looks at them. A SIEM (Security Information and Event Management) system centralizes and correlates logs.
Log Sources
Ingest logs from Firewalls, Active Directory, Endpoint Anti-Virus, and critical Application servers.
Correlation Rules
Write rules to detect patterns. Example: "5 Failed Logins followed by 1 Successful Login from the same IP within 1 minute" might indicate a successful brute-force attack.