type of Log Monitoring in SOC
type of Log Monitoring in SOC
Logs to
Monitor: A
Guide for
SOC
Analysts
Table of Contents
1. Introduction ......................................................................... 3
1. Importance of Log Monitoring in SOC............................................................................ 3
2. Scope and Purpose of the Guide................................................................................... 4
Pa ge 2|36
1.Introduction
Logs are the footprints of every digital activity, serving as a chronological record of events within
systems, networks, and applications. In a modern Security Operations Center (SOC), analysts
rely on these logs to detect threats, investigate security incidents, and maintain an
organization’s overall security posture. Without structured and well-monitored logs, even the
most advanced security solutions can miss critical indicators of compromise (IoCs) or fail to
correlate suspicious behaviors across multiple systems. The goal of this guide is to highlight
which logs matter most, why they are essential, and how to approach their monitoring in a way
that benefits both junior and mid-level SOC analysts.
4. Threat Hunting
Beyond detection, logs form the basis for proactive threat hunting. Analysts look for
unusual patterns—like the execution of a PowerShell script in an environment where
PowerShell usage is rare—to uncover stealthy attacks. By analyzing logs over time,
threat hunters can identify trends and adversary tactics that might be missed by
automated systems alone.
5. Forensic Investigations
When an incident does occur, well-structured logs are the key to forensic investigations.
They help recreate the timeline of an attack, show which systems were accessed, and
highlight the data that was exfiltrated. Detailed logs of user actions, network
Pa ge 3|36
connections, and system calls can be the difference between accurately attributing an
incident and letting attackers remain undetected.
Real-World Example
Consider a scenario where a SOC analyst notices unusual outbound traffic from a critical
server. By reviewing firewall logs correlated with Windows Event Logs, the analyst uncovers a
malicious process communicating with an external IP address. Ǫuick analysis shows that the
communication began right after a suspicious privilege escalation event. This correlation can
guide incident response teams to isolate the server, contain the threat, and remediate the
vulnerability before data is compromised.
Practical Tip
On Linux systems, commands like journalctl -p warning -r can help you quickly locate higher-
priority events in reverse chronological order, allowing faster triage of potential security issues.
On Windows, tools such as wevtutil qe Security /rd:true /f:text /q:"*" | findstr /i "4624 4625 4634
4672" can filter the security event log for specific Event IDs related to logons.
Pa ge 4|36
• Encourage Continuous Learning
Cyber threats evolve rapidly, and so do best practices in logging and monitoring. With
references to resources like NIST SP 800-92 (Guide to Computer Security Log
Management) and official vendor documentation (e.g., Microsoft’s Windows Event Log
documentation), this guide points readers to reliable sources for ongoing education.
By focusing on these areas, the guide aims to equip analysts with the knowledge and skills to
prioritize logs effectively and detect potential breaches before they escalate. Through a mix of
theoretical explanation and practical examples, readers will gain confidence in setting up
logging strategies, tuning alerts, and conducting thorough investigations.
Pa ge 5|36
2. Key Types of Logs
1. System Logs (Windows, Linux, macOS
System logs form the backbone of incident detection and response efforts, providing analysts
with the essential baseline data needed to investigate abnormal events, track user activities,
and diagnose security threats. Across Windows, Linux, and macOS, these logs share the
common goal of recording key operating system (OS) events, though each platform organizes
and structures logs in its own way. Understanding how they work, what they log, and how to
interpret them is crucial for SOC analysts.
Windows Logs
Common Log Sources
• System Log: Captures events generated by the Windows operating system and its built-
in services. It records driver issues, service startups and shutdowns, and kernel-level
messages.
• Application Log: Stores application-specific events, such as errors, warnings, or
informational messages from software installed on the system (e.g., database clients,
productivity tools).
• Other Logs: Windows also creates dedicated logs for specialized services, like DFS
Replication and PowerShell, which can be viewed under the Applications and
Services Logs in the Event Viewer.
Pa ge 6|36
Example: Filtering Security Events via PowerShell
Get-WinEvent -LogName Security | Where-Object {
$_.Id -in 4624, 4625
}
This command pulls Security Log events for successful and failed logins, enabling quick
detection of abnormal activity.
Linux Logs
Syslog and Journald
Most Linux distributions rely on syslog or systemd-journald to collect and manage log
messages:
4. Service Logs: For services like Apache, Nginx, or SSH, monitor dedicated logs (e.g.,
/var/log/apache2/access.log, /var/log/nginx/access.log, /var/log/secure) for unexpected
traffic or repeated authentication failures.
This approach helps analysts quickly search for anomalies within a particular service or
timeframe.
Pa ge 7|36
macOS Logs
Unified Logging System
Since macOS Sierra (10.12), Apple introduced a unified logging system that stores log messages
in a structured format:
• Console App: The built-in Console allows viewing of system logs, diagnostic reports,
and crash logs.
• Log Commands: The log utility in the terminal offers extensive filtering, streaming, and
searching capabilities. For example:
Security-Specific Logs
• /var/log/system.log: Retains many core system messages and is often the first stop
when troubleshooting.
• Apple System Log (ASL): Legacy logging that coexists with the unified logging system,
accessible via command-line tools for older macOS versions.
• Authentication Logs: Attempts to log in via SSH or local accounts can appear in
/var/log/asl/ or through the unified logging interface.
3. Leverage Built-in Tools: Use the Console to filter logs by Process or Message Type.
Apple’s Developer documentation on Unified Logging provides details on advanced
usage.
Cross-Platform Considerations
Aspect Windows Linux macOS
Pa ge 8|36
Aspect Windows Linux macOS
• macOS: Use third-party agents (e.g., Osquery for query-based logging, or Splunk,
Datadog agents) to unify logs under a single pane.
1. Firewall Logs
Firewalls are often the first line of defense, filtering traffic based on predefined rules. Monitoring
firewall logs provides insights into both permitted and denied network connections.
Pa ge 9|36
• Rule or Policy Name: Identifies which firewall rule triggered the log entry.
Firewalls may also log additional details like interface names (e.g., eth0, WAN, LAN), packet
size, or the reason for a deny or reject action. Modern firewalls, especially Next-Generation
Firewalls (NGFWs), can log application-level data and user information if integrated with identity
management systems.
This query helps highlight any source IPs that are repeatedly trying to reach RDP services but are
being denied, which might indicate an attempted intrusion.
2. Router Logs
Routers primarily forward packets between networks and maintain routing tables. Logs
generated by routers often focus on system messages, routing updates, and interface errors
rather than application-specific data. However, they are still critical for overall visibility,
especially in environments with distributed architectures.
P a g e 10 | 36
1. Types of Router Logs
• System or Event Logs: Includes messages about device reboots, software crashes, or
configuration changes.
• Routing Protocol Logs: Information related to BGP, OSPF, EIGRP, or other routing
protocols.
• Interface Logs: Status changes on interfaces (up/down), packet errors (CRC errors,
collisions), and bandwidth usage.
• Authentication Logs: Successful or failed logins via SSH, Telnet, or console access to
the router.
Router logs often follow the standard Syslog format (e.g., Cisco routers with severity levels 0–7).
Integrating these logs into a SIEM allows analysts to correlate network topology changes with
security events (for instance, if a router interface goes down just before a security incident on
that segment).
3. IDS/IPS Logs
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) monitor network
traffic for signs of malicious behavior, policy violations, or known attack signatures. While
firewalls typically operate at the transport or network layer, IDS/IPS solutions can inspect
packets in more depth (Layer 7), providing richer context about application-level threats.
• IPS (Intrusion Prevention System): Detects threats and can take preventive actions,
such as dropping malicious packets or blocking IP addresses in real-time.
Pa ge 11|36
• Event or Alert Message: The name or description of the suspicious activity (e.g., “ET
TROJAN Zeus Tracker”).
"signature_id": 2010935,
"rev": 3,
"signature": "ET TROJAN Known Malicious Domain",
"category": "Trojan Activity",
"severity": 2
}
}
Pa ge 12|36
3.4. Real-Life Attack Scenarios
• SǪL Injection Attempts: IDS/IPS solutions look for patterns in HTTP requests that
match known SǪL injection techniques.
• Exploit Kits: If a host attempts to download or connect to an exploit kit domain, IDS/IPS
logs can reveal the suspicious domain name and signature match.
• Lateral Movement: Attackers may try to move horizontally within a network. IDS/IPS
can detect unusual SMB or RDP traffic patterns.
Pa ge 13|36
This configuration reads Suricata’s eve.json file, filters for alert events, and then tags them as
suricata_alert before sending them to Elasticsearch.
3. Router Interface Down +IDS Alerts: If a critical interface goes down and multiple IDS
alerts are detected on adjacent network segments, investigate potential sabotage or
widespread compromise.
By creating correlation rules that combine different log types, SOC analysts can detect
coordinated attacks and reduce the volume of false positives.
• Encryption and Secure Transport: Ensure that log data is transmitted securely, for
instance using TLS for Syslog (Syslog over TLS). Unencrypted logs can be intercepted
and manipulated by adversaries.
• Regular Tuning: IDS/IPS rulesets need regular updates to reflect new threats. Similarly,
firewall policies should be reviewed to ensure they align with the evolving network
environment.
• Time Synchronization: NTP (Network Time Protocol) should be enabled and correctly
configured on all devices to maintain consistent timestamps. Accurate timestamps are
critical for event correlation.
These sources provide authoritative insights into configuration, logging standards, and threat
detection patterns for network devices and security solutions.
Pa ge 14|36
2.3.Application and Database Logs
Application logs capture events and behaviors tied directly to an application’s functionality.
They may include user interactions, system operations, exceptions, debug details, and custom
events defined by developers. Database logs, on the other hand, record all actions related to
data transactions, schema changes, authentication, and potential errors or performance
bottlenecks in a database system. Together, these logs provide a holistic view of how software is
functioning and how data is being accessed or manipulated. This is crucial for detecting
unauthorized activities, performance issues, and other anomalies. Below are the key
considerations, best practices, and real-world examples to help you effectively monitor and
analyze both application and database logs.
4. Audit Logs
Some applications produce audit logs for compliance or security reasons. These logs
track user access, role changes, or critical configuration updates, helping you see who
did what and when.
Pa ge 15|36
Example Configuration (Log4j2 in Java)
<Configuration status="warn">
<Appenders>
<File name="FileLogger" fileName="logs/application.log">
<PatternLayout pattern="%d{ISO8601} [%t] %-5level %logger{36}
- %msg%n" />
</File>
</Appenders>
<Loggers>
<Logger name="com.example.app" level="info" additivity="false">
<AppenderRef ref="FileLogger"/>
</Logger>
<Root level="error">
<AppenderRef ref="FileLogger"/>
</Root>
</Loggers>
</Configuration>
This snippet specifies an application.log file, using a pattern to log timestamps, thread names,
log levels, and the actual message. By setting the root level to error and the application logger to
info, you can avoid unnecessary noise.
Pa ge 16|36
can catch incidents early. Machine learning-driven anomaly detection in tools such as
Azure Sentinel or AWS Security Hub can further refine alerts by identifying patterns not
captured by static rules.
5. RetentionPolicies
Due to volume, application logs can grow quickly. You need to define retention policies
balancing security requirements and storage costs. Compliance frameworks (e.g., PCI
DSS, HIPAA) sometimes dictate minimum retention periods for specific log types.
2. Error Logs
These highlight critical events, such as server startup issues or serious errors that affect
database availability. Examples include MySǪL’s error.log or Oracle’s alert logs.
4. Performance Data
Logs that point to high resource usage or timeouts can be an early warning of a brute-
force or denial-of-service attack at the database layer.
Pa ge 17|36
Example Configurations and Ǫueries
MySǪL
To enable the general query log:
SET GLOBAL general_log = 'ON';
SET GLOBAL general_log_file = '/var/log/mysql/general.log';
To enable the slow query log:
Note: Logging all queries can significantly impact performance, so only enable it temporarily for
diagnostics or funnel logs to a centralized system where you can parse and analyze them
efficiently.
PostgreSǪL
PostgreSǪL has extensive logging configurations in postgresql.conf. For instance:
logging_collector = on
log_directory = 'pg_log'
log_filename = 'postgresql-%a.log'
log_statement = 'all'
log_min_duration_statement = 2000 # logs queries over 2ms
By setting log_statement to all, you can see every statement, though this is typically too verbose
for production.
Real-World Scenarios
• Detection of Data Exfiltration
A SOC analyst notices an application log showing unusual parameter values in a REST
API call. By cross-referencing the database logs, the analyst confirms multiple large
SELECT statements retrieving sensitive customer data. Additional correlation with
network logs shows a large data transfer to an external IP. The logs collectively point to
an ongoing data exfiltration attempt.
Pa ge 18|36
Additional Resources
• OWASP Cheat Sheet Series: https://cheatsheetseries.owasp.org/
Offers guidelines on secure logging practices, specifically around sanitizing logs and
preventing log forging.
When collecting and analyzing these logs, consider normalizing fields (timestamps, user IDs,
hostnames) so different log sources can be correlated effectively. Some SIEM platforms or
centralized logging solutions (e.g., the ELK Stack) allow you to define common field mappings
and dashboards that unify application and database insights.
Pa ge 19|36
Understanding the Components
Antivirus (AV) Logs
Antivirus solutions focus primarily on detecting known malware signatures and blocking
suspicious files. Their logs typically include:
• Malware Detections: Alerts triggered when a file matches a known signature or exhibits
malicious behavior.
• Ǫuarantine and Remediation Actions: Logs showing which files were quarantined,
deleted, or otherwise neutralized.
• Update and Scan Events: Records of signature updates, scheduled scans, and on-
demand scan results.
Real-World Example
A traditional AV tool like Microsoft Defender Antivirus (part of Windows Security) generates
logs under the Windows Event Log:
• Isolation and Response Actions: Logs showing when and why an endpoint was
isolated, network connections were blocked, or an automated script was run for
containment.
EDR logs often present a sequence of correlated events, making it easier for SOC analysts to
reconstruct the timeline of an attack. Tools like CrowdStrike Falcon, SentinelOne, or Carbon
Black offer dashboards that display triggered detection rules (e.g., MITRE ATTCCK techniques)
alongside automated remediation actions.
P a g e 20 | 36
This query looks for any child process spawned by PowerShell and flags any repeated
occurrences, which might indicate malicious scripts or living-off-the-land techniques.
• Cloud and Hybrid Integrations: Telemetry from cloud platforms and containerized
workloads often merges with endpoint data, offering a complete view of complex
attacks.
• Adaptive Response: Based on machine learning and correlation rules, XDR can trigger
automated playbooks that respond to threats in real time (e.g., disabling compromised
user accounts, isolating infected hosts, or blocking suspicious domains at the firewall).
Reference Architectures
• Microsoft 365 Defender integrates data from endpoints (Defender for Endpoint), email
(Defender for Office 365), identities (Azure Active Directory), and cloud apps (Defender
for Cloud Apps).
• Palo Alto Cortex XDR processes data from endpoints and integrates with network
sensors or firewalls to provide enhanced correlation.
2. Use Consistent Log Formatting: Where possible, standardize the format (e.g., JSON,
Syslog) to streamline parsing, correlation, and long-term storage.
6. Leverage Threat Intelligence: Enrich detection events with threat intelligence feeds
(e.g., VirusTotal, AlienVault OTX). This helps validate suspicious activity, especially when
an alert references a known malicious domain or file hash.
Pa ge 21|36
Common Security Events to Watch For
Event Type Key Indicators Example Tools
Monitoring these events in near-real time allows SOC analysts to prioritize the highest-risk alerts
and initiate containment actions quickly.
• Monitor EDR Agent Health: Regularly ensure that EDR agents are running on all
endpoints. Unexpected agent downtime may be an early indicator of an attacker’s
attempt to disable security controls.
• Review Automated Playbook Outcomes: XDR platforms often run automated
responses. Confirm that these responses are both effective and aligned with your
organization’s incident response procedures.
• Engage With Vendor Documentation: Each AV, EDR, or XDR vendor has specific best
practices for log collection and interpretation. For instance, Microsoft Defender for
Endpoint publishes detailed logging guidelines at Microsoft Docs.
5. SOC Analyst Action: Investigates the entire chain of events, verifies threat removal, and
updates detection rules to prevent similar attacks.
Pa ge 22|36
By combining the strengths of AV, EDR, and XDR logs in a well-structured monitoring strategy,
SOC analysts can respond swiftly to a wide range of threats—from commodity malware to
sophisticated, persistent attacks.
2.5. Cloud Logs (AWS, Azure, GCP) and Container Logs (Docker,
Kubernetes)
Cloud platforms and container orchestration systems have become an essential part of many
organizations. In a SOC environment, monitoring logs from these platforms is critical for threat
detection, compliance, and troubleshooting. Below is an overview of the most important log
sources and practical considerations for AWS, Azure, GCP, Docker, and Kubernetes.
AWS Logs
Common Log Types
1. CloudTrail Logs
o Purpose: Track API calls and account activity across AWS services.
o Key Fields: eventName, eventSource, awsRegion, sourceIPAddress, userAgent,
requestParameters, responseElements.
o Use in Security: Identifies suspicious or unauthorized actions, such as
unexpected changes to IAM policies, creation or deletion of critical resources, or
unusual console logins.
2. CloudWatch Logs
o Purpose: Centralized logging for AWS services (EC2 system logs, Lambda
function logs, etc.).
Practical Example
A typical workflow for ingestion involves forwarding CloudTrail and VPC Flow Logs to an S3
bucket, then using Amazon Kinesis or a third-party tool (e.g., Logstash) to parse and send events
to a SIEM. For example, with AWS CLI you can enable CloudTrail logging:
Pa ge 23|36
aws cloudtrail create-trail \
--name MySecurityTrail \
--s3-bucket-name my-security-logs \
--include-global-service-events
Azure Logs
Common Log Types
1. Azure Activity Logs
o Purpose: Provide insights into management operations (e.g., resource creation,
modification, or deletion).
o Purpose: Collect logs from Azure resources, containers, VMs, and applications.
o Key Fields: Vary based on the resource type; commonly include timestamps,
operation IDs, user details, and other contextual data.
o Use in Security: Offers extensive querying and correlation capabilities. SOC
teams can detect anomalies by combining signals from multiple sources
(Activity Logs, VM logs, etc.).
3. Diagnostics Logs
o Purpose: Detailed insights from specific Azure services, such as Key Vault
access logs, Azure App Service logs, or Azure Storage logs.
o Key Fields: Depend on the service but often include request endpoints,
authentication details, and result codes.
o Use in Security: Detects potential credential misuse, suspicious activity in data
storage, or unusual application behavior.
Practical Example
Sending logs to Azure Monitor can be done by configuring a Diagnostic Setting for each
resource. For instance, to route Activity Logs to Azure Monitor and a storage account:
Set-AzDiagnosticSetting -ResourceId
/subscriptions/<SUBSCRIPTION_ID>/resourceGroups/<RESOURCE_GROUP>/pro
viders/Microsoft.Web/sites/<APP_NAME> `
-WorkspaceId <AZURE_MONITOR_WORKSPACE_ID> `
-StorageAccountId
/subscriptions/<SUBSCRIPTION_ID>/resourceGroups/<RESOURCE_GROUP>/pro
viders/Microsoft.Storage/storageAccounts/<STORAGE_ACCOUNT_NAME> `
Pa ge 24|36
-Enabled $true
GCP Logs
Common Log Types
1. Cloud Audit Logs
o Purpose: Record admin and data access events for GCP services (similar to
AWS CloudTrail).
3. Cloud Logging
o Purpose: Central logging service for events from GCP services, containers,
custom applications.
Practical Example
To export GCP logs to a SIEM, you can create a sink that routes logs to a Pub/Sub topic, which a
custom or third-party collector can then forward. An example using the gcloud CLI:
gcloud logging sinks create my-security-sink \
storage.googleapis.com/<BUCKET_NAME> \
--log-filter="resource.type=gce_instance AND severity>=WARNING"
Pa ge 25|36
Docker Logs
1. Docker Engine Logs
o Location: Typically stored in /var/log/docker.log on Linux hosts.
o Key Fields: Daemon-level events, such as container starts/stops, image pulls,
errors from container runtime.
Docker Example
Using the syslog logging driver, you can direct container logs to a remote syslog server:
docker run --log-driver=syslog --log-opt syslog-
address=tcp://192.168.1.10:514 \
--log-opt tag="{{.ImageName}}/{{.Name}}/{{.ID}}" \
my_secure_image
Kubernetes Logs
1. Container Logs
o Collection: Typically gathered via kubectl logs <pod_name> or via a logging
agent (Fluentd, Logstash, or a sidecar pattern).
2. Kubelet Logs
Pa ge 26|36
3. Control Plane Logs (APIServer, Scheduler, Controller Manager)
o Location: Often under /var/log/ on the control plane node or aggregated using a
centralized logging solution.
o Use in Security: Identify unauthorized API calls, suspicious pod creations, or
attempts to escalate privileges via Kubernetes role bindings.
4. Audit Logs
o Purpose: Record every request to the Kubernetes API server.
o Configuration: Enable auditing by modifying the --audit-log-path and --audit-
policy-file flags on the API Server.
Kubernetes Example
A simple audit policy file (audit-policy.yaml) might look like:
apiVersion: audit.k8s.io/v1
kind: Policy
rules:
- level: Metadata
resources:
- group: ""
resources: ["secrets"]
- level: RequestResponse
resources:
- group: ""
resources: ["pods/exec"]
You can reference the Kubernetes Auditing Documentation for more advanced configurations.
• Access Controls: Make sure that logs, especially those containing sensitive information
(credentials, personal data), are stored in restricted areas. Configure IAM roles or
equivalent to control who can read or export logs.
• Alerting and Dashboards: Build targeted alerts. For example, create an alert if a new
Kubernetes cluster role binding is created that grants cluster admin privileges.
Pa ge 27|36
• Retention Policies: Align with regulatory requirements. Some industries require keeping
logs for extended periods, whereas others may prioritize cost optimization.
• Log Volume vs. Relevance: Filtering out excessive “noise” helps avoid data overload.
Set up granular logging only where necessary, or implement log sampling for high-
volume events like container debug logs.
• Cross-Platform Correlation: When investigating an incident, cross-reference container
logs with the underlying cloud infrastructure logs. For instance, if a malicious container
is identified, reviewing AWS CloudTrail or GCP Cloud Audit logs can show who deployed
it and from where.
By covering these areas, SOC analysts gain better visibility into cloud-based and containerized
environments. Each platform offers different types of logs and various ways to configure them,
but the overarching principle remains the same: you need complete, centralized, and reliable
logging to effectively detect and respond to security incidents.
• Legacy components that might not support current cybersecurity standards or modern
logging frameworks.
Pa ge 28|36
Types of Logs to Monitor
1. System Logs: Embedded operating systems or specialized OS variations used by
industrial controllers (PLCs, RTUs, HMIs) might produce kernel messages or standard
syslog entries when available.
2. Network Traffic Logs: Many industrial protocols can be captured by network sensors or
specialized gateways. Anomalies in traffic—like unexpected Modbus function codes—
may indicate malicious activity or misconfiguration.
3. Application Logs: SCADA software logs events such as operator actions, process
thresholds, alarm states, and device connectivity issues. These logs can reveal
unauthorized changes to critical setpoints.
4. Firmware/Device Logs: IoT and OT devices often generate messages related to
firmware integrity checks or patch updates. Monitoring these can help detect suspicious
attempts to install unauthorized firmware.
5. Security Appliance Logs: When perimeter security is present in industrial networks,
firewalls, IDS/IPS, and dedicated OT security appliances produce logs regarding
intrusion attempts, blocked traffic, and detected threats.
Pa ge 29|36
# Configure /etc/rsyslog.conf to forward logs
*.* @192.168.100.10:514
Real-World Examples
Example 1: Power Grid Manipulation Attempt
An attacker gains access to a SCADA workstation used to manage a regional power grid. Review
of the logs shows:
P a g e 30 | 36
2. Successful login under an admin account (possibly via stolen credentials).
3. Sudden changes in circuit breaker open/close commands issued at unusual times.
Cross-referencing logs from the SCADA software with firewall logs reveals inbound connections
bypassed normal VPN channels, indicating a compromise on the perimeter. The timely
correlation of these logs prevented a large-scale outage.
Comparative Overview
Aspect IoT SCADA /OT
Logging Formats Often proprietary or minimal Syslog, proprietary (e.g., PLC logs)
2. Establish Secure Log Forwarding: Use encrypted channels (e.g., TLS, SSH tunnels)
when sending logs across network boundaries.
Pa ge 31|36
5. Review Vendor Guidance: Major industrial vendors like Siemens, Rockwell Automation,
and Schneider Electric publish documentation on best practices for logging and
security. Stay up to date with vendor patches and advisories.
Pa ge 32|36
3. Key Monitoring Practice
Effective log monitoring hinges on sound processes, properly configured tools, and clear
objectives. SOC analysts should focus on strategies that help distinguish normal from
suspicious behaviors, preserve and protect relevant data, and leverage automation where
possible. The following practices outline core considerations for detecting anomalies, retaining
logs securely, and employing supporting technologies.
Finding the right balance often requires iterative tuning based on historical data, environment
specifics, and known business processes.
Real-World Example
Consider a situation where a user account is suddenly accessing hundreds of files on a file
server at unusual hours. Anomaly detection rules might flag this behavior if it deviates from the
normal usage pattern of that user. Meanwhile, a signature-based rule might detect that some of
these files match known malicious toolkits (e.g., Mimikatz or similar). Correlating both alerts
enables SOC analysts to identify a potential account compromise and data theft incident much
faster.
Pa ge 33|36
| stats count by Account_Name, EventCode
| where count > 20
In this example, the query checks for successful logons (4624) or failed logons (4625) and looks
for any account logging multiple times beyond a threshold, which could indicate brute force or
lateral movement attempts.
Pa ge 34|36
3.3. Supporting Tools (SIEM, SOAR)
SIEM (Security Information and Event Management)
SIEM solutions collect, parse, and normalize logs from various sources, allowing analysts to
search, correlate, and generate alerts in near real time. Common SIEM platforms include
Splunk Enterprise Security, IBM ǪRadar, and Microsoft Sentinel. Key features:
Data Aggregation and analysis of large Integration with multiple security/IT tools
Processing volumes of log data to enrich and act on alerts
Pa ge 35|36
Feature SIEM SOAR
In many cases, SOCs integrate both SIEM and SOAR for comprehensive coverage. The SIEM
handles large-scale ingestion and correlation, while the SOAR platform automates investigation
and response steps. This integration reduces mean time to detect (MTTD) and mean time to
respond (MTTR), ultimately strengthening the organization’s security posture.
Pa ge 36|36