Introduction_to_SIEM.pdf
Introduction_to_SIEM.pdf
com
OZUBK5LZN6
Security Information and Event
Management
• Implementations
• Tool Selection
• SIEM solutions primarily offer log collection and management capabilities such as analysis and
reporting in a centralized location.
• Perform data correlation and data aggregation across the enterprise network.
• Security monitoring that involves user activity/behavior monitoring
and compliance conformance.
– Tactical
OZUBK5LZN6
[email protected]
OZUBK5LZN6
in just 3 minutes would be flagged as suspicious, but its priority won't be set that high since it could
have been possible that the user might have forgotten his/her password.
• However, if there were over 50 failed login attempts in just 2 minutes, then that would be flagged
with higher priority since it is a blatant indication of a brute-force attack.