Log Monitor Guide
Log Monitor Guide
Monitor: A
Guide for SOC
Analysts
Wojciech Ciemski
https://www.linkedin.com/in/wojciech-ciemski/
Table of Contents
1. Introduction ......................................................................... 3
1.1. Importance of Log Monitoring in SOC ............................................................................ 3
1.2. Scope and Purpose of the Guide ................................................................................... 4
P a g e 2 | 36
1. Introduction
Logs are the footprints of every digital activity, serving as a chronological record of events within
systems, networks, and applications. In a modern Security Operations Center (SOC), analysts
rely on these logs to detect threats, investigate security incidents, and maintain an
organization’s overall security posture. Without structured and well-monitored logs, even the
most advanced security solutions can miss critical indicators of compromise (IoCs) or fail to
correlate suspicious behaviors across multiple systems. The goal of this guide is to highlight
which logs matter most, why they are essential, and how to approach their monitoring in a way
that benefits both junior and mid-level SOC analysts.
4. Threat Hunting
Beyond detection, logs form the basis for proactive threat hunting. Analysts look for
unusual patterns—like the execution of a PowerShell script in an environment where
PowerShell usage is rare—to uncover stealthy attacks. By analyzing logs over time,
threat hunters can identify trends and adversary tactics that might be missed by
automated systems alone.
5. Forensic Investigations
When an incident does occur, well-structured logs are the key to forensic investigations.
They help recreate the timeline of an attack, show which systems were accessed, and
highlight the data that was exfiltrated. Detailed logs of user actions, network
P a g e 3 | 36
connections, and system calls can be the di erence between accurately attributing an
incident and letting attackers remain undetected.
Real-World Example
Consider a scenario where a SOC analyst notices unusual outbound tra ic from a critical
server. By reviewing firewall logs correlated with Windows Event Logs, the analyst uncovers a
malicious process communicating with an external IP address. Quick analysis shows that the
communication began right after a suspicious privilege escalation event. This correlation can
guide incident response teams to isolate the server, contain the threat, and remediate the
vulnerability before data is compromised.
Practical Tip
On Linux systems, commands like journalctl -p warning -r can help you quickly locate higher-
priority events in reverse chronological order, allowing faster triage of potential security issues.
On Windows, tools such as wevtutil qe Security /rd:true /f:text /q:"*" | findstr /i "4624 4625 4634
4672" can filter the security event log for specific Event IDs related to logons.
P a g e 4 | 36
Encourage Continuous Learning
Cyber threats evolve rapidly, and so do best practices in logging and monitoring. With
references to resources like NIST SP 800-92 (Guide to Computer Security Log
Management) and o icial vendor documentation (e.g., Microsoft’s Windows Event Log
documentation), this guide points readers to reliable sources for ongoing education.
By focusing on these areas, the guide aims to equip analysts with the knowledge and skills to
prioritize logs e ectively and detect potential breaches before they escalate. Through a mix of
theoretical explanation and practical examples, readers will gain confidence in setting up
logging strategies, tuning alerts, and conducting thorough investigations.
P a g e 5 | 36
2. Key Types of Logs
2.1. System Logs (Windows, Linux, macOS
System logs form the backbone of incident detection and response e orts, providing analysts
with the essential baseline data needed to investigate abnormal events, track user activities,
and diagnose security threats. Across Windows, Linux, and macOS, these logs share the
common goal of recording key operating system (OS) events, though each platform organizes
and structures logs in its own way. Understanding how they work, what they log, and how to
interpret them is crucial for SOC analysts.
Windows Logs
Common Log Sources
System Log: Captures events generated by the Windows operating system and its built-
in services. It records driver issues, service startups and shutdowns, and kernel-level
messages.
Other Logs: Windows also creates dedicated logs for specialized services, like DFS
Replication and PowerShell, which can be viewed under the Applications and
Services Logs in the Event Viewer.
1. Event Viewer: Built into Windows, Event Viewer o ers a quick way to view and filter
events. Analysts can group events by severity (Critical, Error, Warning, Information) or by
Event ID.
2. Filtering and Searching: Use XML filtering in Event Viewer or PowerShell commands to
hunt for specific event IDs (e.g., 4624 for successful logins, 4625 for failed logins).
4. PowerShell Logging: By enabling Module Logging and Script Block Logging, analysts
can track suspicious or obfuscated commands. Refer to Microsoft Docs (PowerShell
Logging) for guidelines.
P a g e 6 | 36
Example: Filtering Security Events via PowerShell
Get-WinEvent -LogName Security | Where-Object {
$_.Id -in 4624, 4625
}
This command pulls Security Log events for successful and failed logins, enabling quick
detection of abnormal activity.
Linux Logs
Syslog and Journald
Most Linux distributions rely on syslog or systemd-journald to collect and manage log
messages:
1. Authentication: Watch for repeated failed login attempts, new user additions in
/etc/passwd, or sudden changes in sudo usage.
2. Cron Jobs: Check /var/log/cron or associated logs for unauthorized scheduled tasks.
Cron jobs can be used by adversaries for persistence.
3. Kernel Messages: Investigate repeated kernel warnings or errors that could indicate
hardware issues or potential rootkit activity.
4. Service Logs: For services like Apache, Nginx, or SSH, monitor dedicated logs (e.g.,
/var/log/apache2/access.log, /var/log/nginx/access.log, /var/log/secure) for unexpected
tra ic or repeated authentication failures.
This approach helps analysts quickly search for anomalies within a particular service or
timeframe.
P a g e 7 | 36
macOS Logs
Unified Logging System
Since macOS Sierra (10.12), Apple introduced a unified logging system that stores log messages
in a structured format:
Console App: The built-in Console allows viewing of system logs, diagnostic reports,
and crash logs.
Log Commands: The log utility in the terminal o ers extensive filtering, streaming, and
searching capabilities. For example:
Security-Specific Logs
/var/log/system.log: Retains many core system messages and is often the first stop
when troubleshooting.
Apple System Log (ASL): Legacy logging that coexists with the unified logging system,
accessible via command-line tools for older macOS versions.
Authentication Logs: Attempts to log in via SSH or local accounts can appear in
/var/log/asl/ or through the unified logging interface.
1. Focus on Repeated Failures: Like Linux, repeated failed SSH attempts or unexpected
process launches warrant attention.
2. Check Crash Reports: Attackers sometimes induce crashes of security tooling. Crash
logs in macOS can provide early indicators of tampering.
3. Leverage Built-in Tools: Use the Console to filter logs by Process or Message Type.
Apple’s Developer documentation on Unified Logging provides details on advanced
usage.
Cross-Platform Considerations
Aspect Windows Linux macOS
P a g e 8 | 36
Aspect Windows Linux macOS
Windows: Windows Event Forwarding (WEF), Sysmon for detailed process-level logging,
or third-party agents like NXLog or Splunk Universal Forwarder.
macOS: Use third-party agents (e.g., Osquery for query-based logging, or Splunk,
Datadog agents) to unify logs under a single pane.
1. Firewall Logs
Firewalls are often the first line of defense, filtering tra ic based on predefined rules. Monitoring
firewall logs provides insights into both permitted and denied network connections.
Action: Indicates whether the tra ic was allowed, denied, dropped, or rejected.
P a g e 9 | 36
Rule or Policy Name: Identifies which firewall rule triggered the log entry.
Firewalls may also log additional details like interface names (e.g., eth0, WAN, LAN), packet
size, or the reason for a deny or reject action. Modern firewalls, especially Next-Generation
Firewalls (NGFWs), can log application-level data and user information if integrated with identity
management systems.
Unusual Tra ic Volumes: A sudden spike in tra ic from a single IP or subnet might
indicate a DoS or DDoS attempt.
This query helps highlight any source IPs that are repeatedly trying to reach RDP services but are
being denied, which might indicate an attempted intrusion.
2. Router Logs
Routers primarily forward packets between networks and maintain routing tables. Logs
generated by routers often focus on system messages, routing updates, and interface errors
rather than application-specific data. However, they are still critical for overall visibility,
especially in environments with distributed architectures.
P a g e 10 | 36
2.1. Types of Router Logs
System or Event Logs: Includes messages about device reboots, software crashes, or
configuration changes.
Routing Protocol Logs: Information related to BGP, OSPF, EIGRP, or other routing
protocols.
Interface Logs: Status changes on interfaces (up/down), packet errors (CRC errors,
collisions), and bandwidth usage.
Authentication Logs: Successful or failed logins via SSH, Telnet, or console access to
the router.
Router logs often follow the standard Syslog format (e.g., Cisco routers with severity levels 0–7).
Integrating these logs into a SIEM allows analysts to correlate network topology changes with
security events (for instance, if a router interface goes down just before a security incident on
that segment).
In a SIEM, you might filter for %LINK-3-UPDOWN events to track unexpected interface state
changes. If an interface goes down suddenly, it may indicate a physical issue, misconfiguration,
or malicious activity aiming to disrupt network segments.
3. IDS/IPS Logs
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) monitor network
tra ic for signs of malicious behavior, policy violations, or known attack signatures. While
firewalls typically operate at the transport or network layer, IDS/IPS solutions can inspect
packets in more depth (Layer 7), providing richer context about application-level threats.
IPS (Intrusion Prevention System): Detects threats and can take preventive actions,
such as dropping malicious packets or blocking IP addresses in real-time.
P a g e 11 | 36
Event or Alert Message: The name or description of the suspicious activity (e.g., “ET
TROJAN Zeus Tracker”).
P a g e 12 | 36
3.4. Real-Life Attack Scenarios
SQL Injection Attempts: IDS/IPS solutions look for patterns in HTTP requests that
match known SQL injection techniques.
Exploit Kits: If a host attempts to download or connect to an exploit kit domain, IDS/IPS
logs can reveal the suspicious domain name and signature match.
Lateral Movement: Attackers may try to move horizontally within a network. IDS/IPS
can detect unusual SMB or RDP tra ic patterns.
P a g e 13 | 36
This configuration reads Suricata’s eve.json file, filters for alert events, and then tags them as
suricata_alert before sending them to Elasticsearch.
1. High Volume of Denied Connections: If more than 100 firewall denies occur from the
same source IP in 5 minutes, generate an alert.
2. Multiple IDS Alerts for the Same Host: If a host triggers more than 3 di erent IDS
signatures within a short period, raise the priority of the incident.
3. Router Interface Down + IDS Alerts: If a critical interface goes down and multiple IDS
alerts are detected on adjacent network segments, investigate potential sabotage or
widespread compromise.
By creating correlation rules that combine di erent log types, SOC analysts can detect
coordinated attacks and reduce the volume of false positives.
Normalization: Di erent vendors (Cisco, Palo Alto, Fortinet, etc.) often have unique log
formats. Normalizing fields (e.g., ensuring consistent naming of src_ip, dest_ip) is
crucial for e ective correlation.
Encryption and Secure Transport: Ensure that log data is transmitted securely, for
instance using TLS for Syslog (Syslog over TLS). Unencrypted logs can be intercepted
and manipulated by adversaries.
Regular Tuning: IDS/IPS rulesets need regular updates to reflect new threats. Similarly,
firewall policies should be reviewed to ensure they align with the evolving network
environment.
Time Synchronization: NTP (Network Time Protocol) should be enabled and correctly
configured on all devices to maintain consistent timestamps. Accurate timestamps are
critical for event correlation.
These sources provide authoritative insights into configuration, logging standards, and threat
detection patterns for network devices and security solutions.
P a g e 14 | 36
2.3. Application and Database Logs
Application logs capture events and behaviors tied directly to an application’s functionality.
They may include user interactions, system operations, exceptions, debug details, and custom
events defined by developers. Database logs, on the other hand, record all actions related to
data transactions, schema changes, authentication, and potential errors or performance
bottlenecks in a database system. Together, these logs provide a holistic view of how software is
functioning and how data is being accessed or manipulated. This is crucial for detecting
unauthorized activities, performance issues, and other anomalies. Below are the key
considerations, best practices, and real-world examples to help you e ectively monitor and
analyze both application and database logs.
4. Audit Logs
Some applications produce audit logs for compliance or security reasons. These logs
track user access, role changes, or critical configuration updates, helping you see who
did what and when.
Python (logging)
These frameworks allow developers to configure log levels, structure log messages (for
example, in JSON), and specify output targets like console, files, or external aggregation
services. Consistency in format is important for parsing and correlation within a SIEM.
P a g e 15 | 36
Example Configuration (Log4j2 in Java)
<Configuration status="warn">
<Appenders>
<File name="FileLogger" fileName="logs/application.log">
<PatternLayout pattern="%d{ISO8601} [%t] %-5level %logger{36}
- %msg%n" />
</File>
</Appenders>
<Loggers>
<Logger name="com.example.app" level="info" additivity="false">
<AppenderRef ref="FileLogger"/>
</Logger>
<Root level="error">
<AppenderRef ref="FileLogger"/>
</Root>
</Loggers>
</Configuration>
This snippet specifies an application.log file, using a pattern to log timestamps, thread names,
log levels, and the actual message. By setting the root level to error and the application logger to
info, you can avoid unnecessary noise.
P a g e 16 | 36
can catch incidents early. Machine learning-driven anomaly detection in tools such as
Azure Sentinel or AWS Security Hub can further refine alerts by identifying patterns not
captured by static rules.
5. Retention Policies
Due to volume, application logs can grow quickly. You need to define retention policies
balancing security requirements and storage costs. Compliance frameworks (e.g., PCI
DSS, HIPAA) sometimes dictate minimum retention periods for specific log types.
1. Transaction Logs
Capture every change to the database’s data. They’re critical for recovery and forensic
analysis. For instance, in Microsoft SQL Server, the transaction log tracks every
modification in the order they occur, enabling point-in-time recovery.
2. Error Logs
These highlight critical events, such as server startup issues or serious errors that a ect
database availability. Examples include MySQL’s error.log or Oracle’s alert logs.
4. Performance Data
Logs that point to high resource usage or timeouts can be an early warning of a brute-
force or denial-of-service attack at the database layer.
P a g e 17 | 36
Example Configurations and Queries
MySQL
To enable the general query log:
SET GLOBAL general_log = 'ON';
SET GLOBAL general_log_file = '/var/log/mysql/general.log';
To enable the slow query log:
SET GLOBAL slow_query_log = 'ON';
SET GLOBAL long_query_time = 2; -- Queries taking longer than 2
seconds will be logged
Note: Logging all queries can significantly impact performance, so only enable it temporarily for
diagnostics or funnel logs to a centralized system where you can parse and analyze them
e iciently.
PostgreSQL
PostgreSQL has extensive logging configurations in postgresql.conf. For instance:
logging_collector = on
log_directory = 'pg_log'
log_filename = 'postgresql-%a.log'
log_statement = 'all'
log_min_duration_statement = 2000 # logs queries over 2ms
By setting log_statement to all, you can see every statement, though this is typically too verbose
for production.
Real-World Scenarios
Detection of Data Exfiltration
A SOC analyst notices an application log showing unusual parameter values in a REST
API call. By cross-referencing the database logs, the analyst confirms multiple large
SELECT statements retrieving sensitive customer data. Additional correlation with
network logs shows a large data transfer to an external IP. The logs collectively point to
an ongoing data exfiltration attempt.
When collecting and analyzing these logs, consider normalizing fields (timestamps, user IDs,
hostnames) so di erent log sources can be correlated e ectively. Some SIEM platforms or
centralized logging solutions (e.g., the ELK Stack) allow you to define common field mappings
and dashboards that unify application and database insights.
P a g e 19 | 36
Understanding the Components
Antivirus (AV) Logs
Antivirus solutions focus primarily on detecting known malware signatures and blocking
suspicious files. Their logs typically include:
Malware Detections: Alerts triggered when a file matches a known signature or exhibits
malicious behavior.
Quarantine and Remediation Actions: Logs showing which files were quarantined,
deleted, or otherwise neutralized.
Update and Scan Events: Records of signature updates, scheduled scans, and on-
demand scan results.
Real-World Example
A traditional AV tool like Microsoft Defender Antivirus (part of Windows Security) generates
logs under the Windows Event Log:
Isolation and Response Actions: Logs showing when and why an endpoint was
isolated, network connections were blocked, or an automated script was run for
containment.
EDR logs often present a sequence of correlated events, making it easier for SOC analysts to
reconstruct the timeline of an attack. Tools like CrowdStrike Falcon, SentinelOne, or Carbon
Black o er dashboards that display triggered detection rules (e.g., MITRE ATT&CK techniques)
alongside automated remediation actions.
P a g e 20 | 36
This query looks for any child process spawned by PowerShell and flags any repeated
occurrences, which might indicate malicious scripts or living-o -the-land techniques.
Cloud and Hybrid Integrations: Telemetry from cloud platforms and containerized
workloads often merges with endpoint data, o ering a complete view of complex
attacks.
Adaptive Response: Based on machine learning and correlation rules, XDR can trigger
automated playbooks that respond to threats in real time (e.g., disabling compromised
user accounts, isolating infected hosts, or blocking suspicious domains at the firewall).
Reference Architectures
Microsoft 365 Defender integrates data from endpoints (Defender for Endpoint), email
(Defender for O ice 365), identities (Azure Active Directory), and cloud apps (Defender
for Cloud Apps).
Palo Alto Cortex XDR processes data from endpoints and integrates with network
sensors or firewalls to provide enhanced correlation.
2. Use Consistent Log Formatting: Where possible, standardize the format (e.g., JSON,
Syslog) to streamline parsing, correlation, and long-term storage.
4. Correlate Across Multiple Sources: Antivirus alerts alone may provide minimal
context. When cross-referenced with endpoint telemetry and user login patterns, they
reveal the bigger picture—especially relevant for advanced or multi-stage attacks.
6. Leverage Threat Intelligence: Enrich detection events with threat intelligence feeds
(e.g., VirusTotal, AlienVault OTX). This helps validate suspicious activity, especially when
an alert references a known malicious domain or file hash.
P a g e 21 | 36
Common Security Events to Watch For
Event Type Key Indicators Example Tools
Monitoring these events in near-real time allows SOC analysts to prioritize the highest-risk alerts
and initiate containment actions quickly.
Monitor EDR Agent Health: Regularly ensure that EDR agents are running on all
endpoints. Unexpected agent downtime may be an early indicator of an attacker’s
attempt to disable security controls.
Engage With Vendor Documentation: Each AV, EDR, or XDR vendor has specific best
practices for log collection and interpretation. For instance, Microsoft Defender for
Endpoint publishes detailed logging guidelines at Microsoft Docs.
2. EDR Correlation: Maps the suspicious executable back to a process tree, showing it
was launched by an unusual script.
3. XDR Visibility: Confirms the script was downloaded from an unrecognized domain and
ties this domain to a known threat actor via threat intelligence feeds.
4. Automated Response: XDR or a SOAR platform quarantines the endpoint, blocks the
domain at the firewall, and opens a ticket in the incident management system.
5. SOC Analyst Action: Investigates the entire chain of events, verifies threat removal, and
updates detection rules to prevent similar attacks.
P a g e 22 | 36
By combining the strengths of AV, EDR, and XDR logs in a well-structured monitoring strategy,
SOC analysts can respond swiftly to a wide range of threats—from commodity malware to
sophisticated, persistent attacks.
2.5. Cloud Logs (AWS, Azure, GCP) and Container Logs (Docker,
Kubernetes)
Cloud platforms and container orchestration systems have become an essential part of many
organizations. In a SOC environment, monitoring logs from these platforms is critical for threat
detection, compliance, and troubleshooting. Below is an overview of the most important log
sources and practical considerations for AWS, Azure, GCP, Docker, and Kubernetes.
AWS Logs
Common Log Types
1. CloudTrail Logs
o Purpose: Track API calls and account activity across AWS services.
2. CloudWatch Logs
o Purpose: Centralized logging for AWS services (EC2 system logs, Lambda
function logs, etc.).
Practical Example
A typical workflow for ingestion involves forwarding CloudTrail and VPC Flow Logs to an S3
bucket, then using Amazon Kinesis or a third-party tool (e.g., Logstash) to parse and send events
to a SIEM. For example, with AWS CLI you can enable CloudTrail logging:
P a g e 23 | 36
aws cloudtrail create-trail \
--name MySecurityTrail \
--s3-bucket-name my-security-logs \
--include-global-service-events
Azure Logs
Common Log Types
1. Azure Activity Logs
o Purpose: Collect logs from Azure resources, containers, VMs, and applications.
o Key Fields: Vary based on the resource type; commonly include timestamps,
operation IDs, user details, and other contextual data.
3. Diagnostics Logs
o Purpose: Detailed insights from specific Azure services, such as Key Vault
access logs, Azure App Service logs, or Azure Storage logs.
o Key Fields: Depend on the service but often include request endpoints,
authentication details, and result codes.
Practical Example
Sending logs to Azure Monitor can be done by configuring a Diagnostic Setting for each
resource. For instance, to route Activity Logs to Azure Monitor and a storage account:
Set-AzDiagnosticSetting -ResourceId
/subscriptions/<SUBSCRIPTION_ID>/resourceGroups/<RESOURCE_GROUP>/pro
viders/Microsoft.Web/sites/<APP_NAME> `
-WorkspaceId <AZURE_MONITOR_WORKSPACE_ID> `
-StorageAccountId
/subscriptions/<SUBSCRIPTION_ID>/resourceGroups/<RESOURCE_GROUP>/pro
viders/Microsoft.Storage/storageAccounts/<STORAGE_ACCOUNT_NAME> `
P a g e 24 | 36
-Enabled $true
GCP Logs
Common Log Types
1. Cloud Audit Logs
o Purpose: Record admin and data access events for GCP services (similar to
AWS CloudTrail).
3. Cloud Logging
o Purpose: Central logging service for events from GCP services, containers,
custom applications.
Practical Example
To export GCP logs to a SIEM, you can create a sink that routes logs to a Pub/Sub topic, which a
custom or third-party collector can then forward. An example using the gcloud CLI:
gcloud logging sinks create my-security-sink \
storage.googleapis.com/<BUCKET_NAME> \
--log-filter="resource.type=gce_instance AND severity>=WARNING"
P a g e 25 | 36
Docker Logs
1. Docker Engine Logs
o Use in Security: Can integrate with centralized logging solutions, reducing the
chance of log tampering if the container is compromised.
Docker Example
Using the syslog logging driver, you can direct container logs to a remote syslog server:
docker run --log-driver=syslog --log-opt syslog-
address=tcp://192.168.1.10:514 \
--log-opt tag="{{.ImageName}}/{{.Name}}/{{.ID}}" \
my_secure_image
Kubernetes Logs
1. Container Logs
2. Kubelet Logs
P a g e 26 | 36
3. Control Plane Logs (API Server, Scheduler, Controller Manager)
o Location: Often under /var/log/ on the control plane node or aggregated using a
centralized logging solution.
4. Audit Logs
Kubernetes Example
A simple audit policy file (audit-policy.yaml) might look like:
apiVersion: audit.k8s.io/v1
kind: Policy
rules:
- level: Metadata
resources:
- group: ""
resources: ["secrets"]
- level: RequestResponse
resources:
- group: ""
resources: ["pods/exec"]
You can reference the Kubernetes Auditing Documentation for more advanced configurations.
Access Controls: Make sure that logs, especially those containing sensitive information
(credentials, personal data), are stored in restricted areas. Configure IAM roles or
equivalent to control who can read or export logs.
Alerting and Dashboards: Build targeted alerts. For example, create an alert if a new
Kubernetes cluster role binding is created that grants cluster admin privileges.
P a g e 27 | 36
Retention Policies: Align with regulatory requirements. Some industries require keeping
logs for extended periods, whereas others may prioritize cost optimization.
Log Volume vs. Relevance: Filtering out excessive “noise” helps avoid data overload.
Set up granular logging only where necessary, or implement log sampling for high-
volume events like container debug logs.
By covering these areas, SOC analysts gain better visibility into cloud-based and containerized
environments. Each platform o ers di erent types of logs and various ways to configure them,
but the overarching principle remains the same: you need complete, centralized, and reliable
logging to e ectively detect and respond to security incidents.
Use of specialized protocols (e.g., Modbus, DNP3, OPC-UA) where logging capabilities
can di er from those found in IT environments.
Legacy components that might not support current cybersecurity standards or modern
logging frameworks.
P a g e 28 | 36
Types of Logs to Monitor
1. System Logs: Embedded operating systems or specialized OS variations used by
industrial controllers (PLCs, RTUs, HMIs) might produce kernel messages or standard
syslog entries when available.
2. Network Tra ic Logs: Many industrial protocols can be captured by network sensors or
specialized gateways. Anomalies in tra ic—like unexpected Modbus function codes—
may indicate malicious activity or misconfiguration.
3. Application Logs: SCADA software logs events such as operator actions, process
thresholds, alarm states, and device connectivity issues. These logs can reveal
unauthorized changes to critical setpoints.
P a g e 29 | 36
# Configure /etc/rsyslog.conf to forward logs
*.* @192.168.100.10:514
Unauthorized user accounts created just before critical equipment is taken o line.
Many industrial device vendors provide integrity-check features. Leverage these and forward
related events to the SOC for review.
Real-World Examples
Example 1: Power Grid Manipulation Attempt
An attacker gains access to a SCADA workstation used to manage a regional power grid. Review
of the logs shows:
P a g e 30 | 36
2. Successful login under an admin account (possibly via stolen credentials).
Cross-referencing logs from the SCADA software with firewall logs reveals inbound connections
bypassed normal VPN channels, indicating a compromise on the perimeter. The timely
correlation of these logs prevented a large-scale outage.
Investigation finds that the sensors had outdated firmware with a known vulnerability. Patching
them quickly and blocking the malicious IP addresses at the firewall mitigated further data
exfiltration and potential system damage.
Comparative Overview
Aspect IoT SCADA / OT
Logging Formats Often proprietary or minimal Syslog, proprietary (e.g., PLC logs)
2. Establish Secure Log Forwarding: Use encrypted channels (e.g., TLS, SSH tunnels)
when sending logs across network boundaries.
P a g e 31 | 36
5. Review Vendor Guidance: Major industrial vendors like Siemens, Rockwell Automation,
and Schneider Electric publish documentation on best practices for logging and
security. Stay up to date with vendor patches and advisories.
P a g e 32 | 36
3. Key Monitoring Practice
E ective log monitoring hinges on sound processes, properly configured tools, and clear
objectives. SOC analysts should focus on strategies that help distinguish normal from
suspicious behaviors, preserve and protect relevant data, and leverage automation where
possible. The following practices outline core considerations for detecting anomalies, retaining
logs securely, and employing supporting technologies.
Too strict: Risk flooding the SOC with false positives, causing alert fatigue and missed
real threats.
Finding the right balance often requires iterative tuning based on historical data, environment
specifics, and known business processes.
Real-World Example
Consider a situation where a user account is suddenly accessing hundreds of files on a file
server at unusual hours. Anomaly detection rules might flag this behavior if it deviates from the
normal usage pattern of that user. Meanwhile, a signature-based rule might detect that some of
these files match known malicious toolkits (e.g., Mimikatz or similar). Correlating both alerts
enables SOC analysts to identify a potential account compromise and data theft incident much
faster.
P a g e 33 | 36
| stats count by Account_Name, EventCode
| where count > 20
In this example, the query checks for successful logons (4624) or failed logons (4625) and looks
for any account logging multiple times beyond a threshold, which could indicate brute force or
lateral movement attempts.
Encryption: Encrypting logs at rest (e.g., using disk-level encryption) and in transit (e.g.,
TLS for log forwarding) prevents unauthorized access.
1. Hashing: Generating hashes (e.g., using SHA-256) for log files and storing them
separately helps detect unauthorized modifications.
3. Audit Trails: Keep track of who accessed the log repository, when they accessed it, and
what changes (if any) were made.
P a g e 34 | 36
3.3. Supporting Tools (SIEM, SOAR)
SIEM (Security Information and Event Management)
SIEM solutions collect, parse, and normalize logs from various sources, allowing analysts to
search, correlate, and generate alerts in near real time. Common SIEM platforms include
Splunk Enterprise Security, IBM QRadar, and Microsoft Sentinel. Key features:
Dashboarding and Reporting: O ers visual interfaces for monitoring security posture
and presenting metrics to management.
1. Enrich Alerts: Automatically gather host or network information from threat intelligence
sources.
Data Aggregation and analysis of large Integration with multiple security/IT tools
Processing volumes of log data to enrich and act on alerts
P a g e 35 | 36
Feature SIEM SOAR
In many cases, SOCs integrate both SIEM and SOAR for comprehensive coverage. The SIEM
handles large-scale ingestion and correlation, while the SOAR platform automates investigation
and response steps. This integration reduces mean time to detect (MTTD) and mean time to
respond (MTTR), ultimately strengthening the organization’s security posture.
P a g e 36 | 36