A Beginner’s Guide to SIEM

 

πŸ” A Beginner’s Guide to SIEM: How It Works, Why It’s Important, and Key Concepts

SIEM (Security Information and Event Management) is like a security control room πŸ–₯️πŸ”’ for your network.
It:

  • πŸ—‚️ Collects logs from different devices

  • 🏦 Stores them in one place

  • πŸ•΅️ Analyses them to detect suspicious activity

In short: SIEM helps security teams see everything happening in the network in real time ⏳ and respond quickly to threats ⚡.


A network might have:
πŸ’» Windows & Linux computers
πŸ—„️ Data servers
🌍 A company website
πŸ“‘ A router connecting everything

Each device generates logs πŸ“ when something happens — logins, file transfers, web visits.
By seeing all logs in one place, you can spot threats faster 🚨.


Logs from inside a device:

  • Windows Event Logs πŸͺŸ

  • Sysmon ⚙️

  • Osquery πŸ”Ž

Examples:
πŸ“ File access
πŸ”‘ Login attempts
⚡ Program execution
πŸ› ️ Registry changes
πŸ’» PowerShell commands

Logs from communication between devices or internet:

  • SSH πŸ”‘

  • FTP πŸ“€πŸ“₯

  • HTTP/HTTPS 🌍

  • VPN πŸ”’

  • Network file sharing πŸ“‚


  • Uses Event Viewer to record events.

  • Each activity has a unique Event ID.

  • Example: 104 → Event logs removed πŸ—‘️.

Stores logs in:

  • /var/log/httpd → 🌐 Web requests & errors

  • /var/log/cron → ⏲️ Scheduled tasks

  • /var/log/auth.log → πŸ” Authentication logs

  • /var/log/kern → ⚙️ Kernel events

Apache logs stored in /var/log/apache or /var/log/httpd track requests/responses — useful for detecting attacks πŸ›‘️.


  1. Agent / Forwarder πŸ“¦ – Installed on devices to send logs to SIEM.

  2. Syslog πŸ“‘ – Protocol for sending logs in real time.

  3. Manual Upload πŸ“€ – Import offline logs for analysis.

  4. Port-Forwarding πŸ”Œ – SIEM listens on a port for incoming logs.


  • πŸ”— Correlates events from multiple sources.

  • 🚨 Sends alerts on suspicious activity.

  • πŸ–₯️ Gives complete visibility of the network.

  • ⏱️ Helps respond quickly to incidents.


  • πŸ” Event Correlation – Linking related events.

  • πŸ‘€ Visibility – Host + Network monitoring.

  • πŸ•΅️ Threat Investigation – Digging deeper into alerts.

  • 🏹 Threat Hunting – Finding hidden threats.


SOC Analysts use SIEM for:

  • πŸ“Š Monitoring & investigating alerts

  • 🚫 Finding false positives

  • πŸŽ›️ Tuning noisy rules

  • πŸ“‘ Reporting & compliance checks

  • πŸ”¦ Identifying visibility gaps


  1. Logs ingested πŸ“₯

  2. Rules applied πŸ“œ

  3. Condition met ✅ → Alert raised πŸš¨


Dashboards give a quick overview:

  • 🚨 Alert highlights

  • πŸ“’ System notifications

  • 🩺 Health alerts

  • ❌ Failed logins

  • πŸ”’ Event counts

  • πŸ“œ Rules triggered

  • 🌍 Top visited domains


  • ❌ Multiple Failed Logins → More than 5 in 10 seconds

  • πŸ”“ Login After Failures → Possible brute-force

  • πŸ’½ USB Insertion → Alert if restricted

  • πŸ“€ Large Data Transfer → Above company limits

Event Examples:

  • 104 πŸ—‘️ → Event logs cleared

  • 4688 + whoami πŸ’» → WHOAMI command detected


  1. Review events & conditions

  2. Decide if False Positive πŸš« or True Positive ✅

If False Positive:

  • πŸ”§ Tune rules to reduce noise

If True Positive:

  • πŸ” Investigate further

  • πŸ“ž Contact asset owner

  • πŸ”’ Isolate device

  • 🚫 Block malicious IP


  • πŸ—‘️ Event ID for logs removed → 104

  • 🚫 Alerts that may need tuning → False Positives

Comments

Popular Posts