Day4 labs Log monitoring Flashcards
Two Main Log Sources:
Host-Centric Logs
Network-Centric Logs
Logs that originate from inside a system (the host). Examples:
File access
Login attempts
Processes running
Registry modifications
Host-Centric Logs
Logs that show interaction between systems. Examples:
SSH connections
FTP file access
Web traffic
VPN connections
Network-Centric Logs
Is Registry Activity host- or network-centric?
host-Centric
Is VPN activity host- or network-centric?
Network-Centric
……………..Adding extra information to logs (e.g., resolving IPs to locations, tagging users, identifying threat intel indicators).
Enrichment
Logs can be stored in
Local Systems: Where the logs are generated.
Centralized Repositories: Like internal servers or SIEM tools.
Cloud Storage: Services like AWS S3, Azure Blob, etc.
Log Retention
Hot Storage 0–6 months Fast access, real-time queries, often used in daily ops.
Warm Storage 6 months–2 years Slightly slower, used for historical analysis.
Cold Storage 2–5 years Archived, compressed, not easily accessible, long-term use.
Log Deletion
Why deletion must be controlled:
You don’t want to delete logs that might still be useful.
Deletion must follow retention and backup policies.
Always back up critical logs before deletion.
📏 Why organizations delete logs:
Keep logs manageable for analysis.
Comply with regulations like GDPR (don’t keep unnecessary user data).
Reduce storage and processing costs.
YARA and Sigma
YARA: Used for identifying and classifying malware samples based on textual or binary patterns.
Sigma: A generic signature format for SIEM systems, allowing the creation of rules to detect suspicious log events.