SIEM

Log Priority

The following is a prioritized list of recommended event logs to collect into your SIEM (ordering should be customized per organization and is subject to change here).

The priority here takes into consideration

Requirements

Considerations

Event Reduction

Reduction of ingested events to only those with a security concern is highly recommended. This may require a separate ‘data lake’ from logs maintained for regulatory compliance. Reduced logs saves money, analyst time, and improves system performance.

Common tune-outs at the ingest level include

Some logs can be significantly reduced by eliminating one or more fields, like Windows Event Logs often multi-paragraph long descriptions included in the log.

Logs that do not provide basic security context should be considered for tuning out:

Note: This does not immply that non-security focused logs are of no value/use.

Detection Layering

This approach allows a high-level understanding of interactions between log collection, detections, and monitoring.

Tiers

Log Setup

PowerShell Transcription

https://devblogs.microsoft.com/powershell/powershell-the-blue-team/

Windows Event Forwarding and Collector

https://docs.microsoft.com/en-us/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection https://docs.microsoft.com/en-us/windows/win32/wec/windows-event-collector https://medium.com/palantir/windows-event-forwarding-for-network-defense-cb208d5ff86f https://hackernoon.com/the-windows-event-forwarding-survival-guide-2010db7a68c4 http://zenshaze.com/wp/?p=57