Deploy Splunk, ELK Stack, QRadar. Log aggregation. Correlation rules. Real-time threat detection.
SIEM (Security Information and Event Management) aggregates logs from across your infrastructure (firewalls, servers, endpoints, applications), correlates events, detects threats, and provides centralized visibility. Think of it as the "brain" of your security operations center.
Industry leader, powerful search (SPL)
Open-source, Elasticsearch backend
Enterprise SIEM with advanced analytics
Cloud-native SIEM (Azure)
Firewall allow/deny logs, IDS/IPS alerts (Suricata, Snort), VPN connections, proxy logs (Squid)
Windows Event Logs (Security, System, Application), Sysmon, EDR alerts (CrowdStrike, Carbon Black)
Authentication events (4624, 4625), privilege escalation (4672), account creation/deletion
Apache/Nginx access logs, error logs, ModSecurity WAF logs, application logs (PHP, Node.js)
AWS CloudTrail, Azure Activity Logs, GCP Cloud Logging, O365 audit logs
Email gateway logs (Proofpoint, Mimecast), phishing attempts, spam filters
Trigger: More than 10 failed login attempts from single IP within 5 minutes
Trigger: Non-admin user assigned admin privileges (possible lateral movement)
Trigger: Large outbound transfer to untrusted IP (potential data theft)
Trigger: DNS query to known command-and-control domain (threat intel match)
Lightweight agents on endpoints/servers collect logs
Central database stores and indexes logs
Frontend for analysts to query and investigate
Target had FireEye SIEM that detected the malware and alerted SOC team. Alerts were ignored.
Connect log sources, enable detection rules, and monitor security alerts in real-time.