Skip to content

Commit 3b0105c

Browse files
Update module3.md
1 parent e15d6ca commit 3b0105c

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

module3.md

+5
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,13 @@
11

22
# Module 3: Log Management and Event Correlation
33

4+
5+
46
![SOC Analyst](https://drive.google.com/uc?export=view&id=1jaGAv6XW1xCj1GgNjvEN1c-Ii2lzaE1R)
57

8+
9+
10+
611
## Log Management
712

813
Log Management is a process that helps capture all data that goes through an information System. In relation to SIEM Log Management is a way to investigate suspicious activity and mitigate risk when it pertains to system breaches. Logs contain valuable information about events , activities and errors that occur within your system. Making logs essential when it comes to security monitoring, Incident response and compliance. As it pertains to cybersecurity, log managing is essential in identifying and investigating security incidents. Log managing offers improve security by reducing its attack surface by using centralized logging. This essentially means that log managing is able offer a holistic view of your network, systems or application this makes it easier for system administrators to troubleshoot issues. When you think of Log managing you can think of these 6 core components of log managing collection, monitoring, analysis, retention, index/searching and reporting. Collection is pretty self explanatory: it's the collection of data that passes through the given operating system the logging is taking place on. Monitoring tracks events and activities all in real time. Analysis is the process of viewing the log collection as a whole to identify security threats or other issues. Retention is the process in which helps decide how long data should be kept within a log file. Index or searching is the ability to sort through logs by simply searching for them. Lastly we have reporting which is a

0 commit comments

Comments
 (0)