๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ฏ๐๐ง๐ญ ๐๐จ๐ ๐ฌ: ๐๐ก๐ ๐๐๐๐ค๐๐จ๐ง๐ ๐จ๐ ๐๐ฒ๐๐๐ซ ๐๐๐๐๐ง๐ฌ๐
๐๐ข๐ฌ๐ข๐๐ข๐ฅ๐ข๐ญ๐ฒ is the first step in the cyber security process you need ๐ฅ๐จ๐ ๐ฌ to see
The logs from security, directory services, DNS, applications, and systems are not merely documentsbut they are ๐ฌ๐ข๐ ๐ง๐๐ฅ๐ฌ ๐จ๐ ๐๐๐ซ๐ฅ๐ฒ ๐ฐ๐๐ซ๐ง๐ข๐ง๐ ๐ฌ that your security measures are (or aren’t) working.
Consider ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ฏ๐๐ง๐ญ ๐๐จ๐ ๐ฌ to be your ๐๐ ๐ฐ๐จ๐ซ๐ฅ๐’๐ฌ ๐๐ฅ๐๐๐ค ๐๐จ๐ฑ.
If an incident happens, logging is the only source that narrates the incidentno assumptions at all.
๐๐จ๐ ๐ฌ ๐ญ๐ฎ๐ซ๐ง ๐๐ฏ๐๐ซ๐ฒ๐๐๐ฒ ๐ฌ๐ฒ๐ฌ๐ญ๐๐ฆ ๐๐๐ญ๐ข๐ฏ๐ข๐ญ๐ฒ ๐ข๐ง๐ญ๐จ ๐๐๐ญ๐ข๐จ๐ง๐๐๐ฅ๐ ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ข๐ง๐ญ๐๐ฅ๐ฅ๐ข๐ ๐๐ง๐๐.
๐๐๐๐ ๐ฆ๐จ๐ซ๐ ๐๐จ๐ฉ ๐ ๐๐จ๐ ๐๐จ๐ฎ๐ซ๐๐๐ฌ ๐๐ฏ๐๐ซ๐ฒ ๐๐๐ ๐๐ง๐๐ฅ๐ฒ๐ฌ๐ญ ๐๐ก๐จ๐ฎ๐ฅ๐ ๐๐ง๐จ๐ฐ: https://www.infosectrain.com/blog/top-7-log-sources-every-soc-analyst-should-know
๐๐ง๐๐จ๐ ๐ซ๐๐ฉ๐ก๐ข๐ ๐๐ซ๐๐๐ข๐ญ: Infosec Train (Empowering professionals with practical cybersecurity knowledge & real-world insights)
#CyberSecurity #SecurityLogs #SIEM #ThreatDetection #BlueTeam #IncidentResponse #SecurityMonitoring #Infosec #SOC #InfoSecTrain
๐๐ข๐ฌ๐ข๐๐ข๐ฅ๐ข๐ญ๐ฒ is the first step in the cyber security process you need ๐ฅ๐จ๐ ๐ฌ to see
The logs from security, directory services, DNS, applications, and systems are not merely documentsbut they are ๐ฌ๐ข๐ ๐ง๐๐ฅ๐ฌ ๐จ๐ ๐๐๐ซ๐ฅ๐ฒ ๐ฐ๐๐ซ๐ง๐ข๐ง๐ ๐ฌ that your security measures are (or aren’t) working.
Consider ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ฏ๐๐ง๐ญ ๐๐จ๐ ๐ฌ to be your ๐๐ ๐ฐ๐จ๐ซ๐ฅ๐’๐ฌ ๐๐ฅ๐๐๐ค ๐๐จ๐ฑ.
If an incident happens, logging is the only source that narrates the incidentno assumptions at all.
๐๐จ๐ ๐ฌ ๐ญ๐ฎ๐ซ๐ง ๐๐ฏ๐๐ซ๐ฒ๐๐๐ฒ ๐ฌ๐ฒ๐ฌ๐ญ๐๐ฆ ๐๐๐ญ๐ข๐ฏ๐ข๐ญ๐ฒ ๐ข๐ง๐ญ๐จ ๐๐๐ญ๐ข๐จ๐ง๐๐๐ฅ๐ ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ข๐ง๐ญ๐๐ฅ๐ฅ๐ข๐ ๐๐ง๐๐.
๐๐๐๐ ๐ฆ๐จ๐ซ๐ ๐๐จ๐ฉ ๐ ๐๐จ๐ ๐๐จ๐ฎ๐ซ๐๐๐ฌ ๐๐ฏ๐๐ซ๐ฒ ๐๐๐ ๐๐ง๐๐ฅ๐ฒ๐ฌ๐ญ ๐๐ก๐จ๐ฎ๐ฅ๐ ๐๐ง๐จ๐ฐ: https://www.infosectrain.com/blog/top-7-log-sources-every-soc-analyst-should-know
๐๐ง๐๐จ๐ ๐ซ๐๐ฉ๐ก๐ข๐ ๐๐ซ๐๐๐ข๐ญ: Infosec Train (Empowering professionals with practical cybersecurity knowledge & real-world insights)
#CyberSecurity #SecurityLogs #SIEM #ThreatDetection #BlueTeam #IncidentResponse #SecurityMonitoring #Infosec #SOC #InfoSecTrain
๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ฏ๐๐ง๐ญ ๐๐จ๐ ๐ฌ: ๐๐ก๐ ๐๐๐๐ค๐๐จ๐ง๐ ๐จ๐ ๐๐ฒ๐๐๐ซ ๐๐๐๐๐ง๐ฌ๐
๐๐ข๐ฌ๐ข๐๐ข๐ฅ๐ข๐ญ๐ฒ is the first step in the cyber security process โก๏ธyou need ๐ฅ๐จ๐ ๐ฌ to see ๐๐
โ
The logs from security, directory services, DNS, applications, and systems are not merely documentsโก๏ธbut they are ๐ฌ๐ข๐ ๐ง๐๐ฅ๐ฌ ๐จ๐ ๐๐๐ซ๐ฅ๐ฒ ๐ฐ๐๐ซ๐ง๐ข๐ง๐ ๐ฌ that your security measures are (or aren’t) working.
Consider ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ฏ๐๐ง๐ญ ๐๐จ๐ ๐ฌ to be your ๐๐ ๐ฐ๐จ๐ซ๐ฅ๐’๐ฌ ๐๐ฅ๐๐๐ค ๐๐จ๐ฑ.
โ
If an incident happens, logging is the only source that narrates the incidentโก๏ธno assumptions at all.
โ
๐๐จ๐ ๐ฌ ๐ญ๐ฎ๐ซ๐ง ๐๐ฏ๐๐ซ๐ฒ๐๐๐ฒ ๐ฌ๐ฒ๐ฌ๐ญ๐๐ฆ ๐๐๐ญ๐ข๐ฏ๐ข๐ญ๐ฒ ๐ข๐ง๐ญ๐จ ๐๐๐ญ๐ข๐จ๐ง๐๐๐ฅ๐ ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ข๐ง๐ญ๐๐ฅ๐ฅ๐ข๐ ๐๐ง๐๐.
๐ ๐๐๐๐ ๐ฆ๐จ๐ซ๐ โก๏ธ ๐๐จ๐ฉ ๐ ๐๐จ๐ ๐๐จ๐ฎ๐ซ๐๐๐ฌ ๐๐ฏ๐๐ซ๐ฒ ๐๐๐ ๐๐ง๐๐ฅ๐ฒ๐ฌ๐ญ ๐๐ก๐จ๐ฎ๐ฅ๐ ๐๐ง๐จ๐ฐ: https://www.infosectrain.com/blog/top-7-log-sources-every-soc-analyst-should-know
๐ ๐๐ง๐๐จ๐ ๐ซ๐๐ฉ๐ก๐ข๐ ๐๐ซ๐๐๐ข๐ญ: Infosec Train (Empowering professionals with practical cybersecurity knowledge & real-world insights)
#CyberSecurity #SecurityLogs #SIEM #ThreatDetection #BlueTeam #IncidentResponse #SecurityMonitoring #Infosec #SOC #InfoSecTrain
0 Commenti
0 condivisioni
101 Views
0 Anteprima