Presentation 1.7
Presentation 1.7
management tools
Log Analysis, Log Management, SIEM
• Logs are your richest source for understanding what’s going on in your
network, but you’ll need an IR tool that makes sense of all of those logs,
and that’s what log analysis is all about.
• OSSIM (open source security information management)
Intrusion Detection Systems (IDS) —
Network & Host-based
• IDS’es (HIDS and NIDS) monitor server and network activity in real-
time, and typically use attack signatures or baselines to identify and
issue an alert when known attacks or suspicious activities occur on a
server (HIDS) or on a network (NIDS).
• Snort
• Suricata
• BroIDS
• OSSEC
NETWORK
• Availability Monitoring
• The whole point of incident response is to avoid downtime as much
as possible. So make sure that you have availability monitoring in
place, because an application or service outage could be the first sign
of an incident in progress.
• Nagios
Web Proxies
• Web Proxies are thought of as being purely for controlling access to
websites, but their ability to log what is being connected to is vital. So
many modern threats operate over HTTP – being able to log not only
the remote IP address, but the nature of the HTTP connection itself
can be vital for forensics and threat tracking.
• Squid Proxy
• IPFire
Asset Inventory