SlideShare a Scribd company logo
6
Most read
8
Most read
10
Most read
Best Practices for Log Monitoring
Introduction What are logs? Why are logs important? The Challenges Recommended Best Practises Further Reading 20/06/11 Copyright © 2005 BH IT Consulting Ltd
What Are Logs? Historical Record of events that happened. Records events and status of systems in a time sequential format. Record of activity on the system/network. Provide an Audit trail of who done what, where, when and why (5 Ws) 20/06/11 Copyright © 2005 BH IT Consulting Ltd
Why are Logs Important? Logs can assist us in; Determining what happened - Audit Trail Intrusion Detection Incident Containment Forensic Analysis  Proactive Protection Real Time Alerts Providing a Network Baseline Determining the Health of the Network Troubleshooting issues  Proactive maintenance 20/06/11 Copyright © 2005 BH IT Consulting Ltd
Monitoring as Part of Security Process 20/06/11 Copyright © 2005 BH IT Consulting Ltd Develop Security Policy Secure The Network Improve Based on Feedback Test  Security Monitor
Why are Logs Important? Logs are everywhere; Operating Systems Applications Device logs Routers Firewalls IDS Switches All this information should be making our jobs easier. Right? 20/06/11 Copyright © 2005 BH IT Consulting Ltd
Typical Network 20/06/11 Copyright © 2005 BH IT Consulting Ltd
The Challenges Different vendors different log formats. Regulatory Requirements. Logs were written by developers Format is not easy to read Messages can be obscure Logs contain enormous amount of information. Identifying anomalies can be difficult Probes over time 20/06/11 Copyright © 2005 BH IT Consulting Ltd
The Challenges Managing Logs can be Expensive; Log analysis is a unique skill. Looking at all events takes time. Logs can consume a lot of disk space. Volume of information is huge No one size fits all. Each network is unique 20/06/11 Copyright © 2005 BH IT Consulting Ltd
20/06/11 Copyright © 2005 BH IT Consulting Ltd Too Much Information !!!
Best Practices Develop logging Policy Determine what information is relevant to you. What devices are important? What events are important? Don’t forget to turn on logging! Timing of events, e.g. user logons in morning. What reports you and the business want/need? Group servers into zones based on their function or criticality and prioritise events accordingly. Baseline your systems & network. Determine how your network normally behaves. Repeat at regular intervals Secure log files on all devices. Encrypt logs Ensure all devices use same time source. If using more than one time zone use UTC . Use NTP protocol from a secure source to synchronise time. 20/06/11 Copyright © 2005 BH IT Consulting Ltd
Best Practices Centralise log collection Dedicated server to collect all logs. Be careful of network traffic volumes. Be aware of limitations of server to process number of events. Configure all devices send logs to central log server. Make sure central server is secure. Secure transmission of logs. e.g. Syslog uses UDP by default.  Consider using IPSec or next generation Syslog (Syslog-NG) 20/06/11 Copyright © 2005 BH IT Consulting Ltd
Best Practices Normalise the data All events such as Windows, Syslog, SNMP etc. should be normalised into same format. Review the Logs Ensure logs are regularly reviewed Manually Automatically Scripts Commercial Tools Freeware Tools 20/06/11 Copyright © 2005 BH IT Consulting Ltd
Best Practices Log Rotation Determine time schedule  Based on volume of data Develop meaningful naming convention. Move data to rotated file Log Retention Based on disk space. May be regulatory requirements. Archive onto WORM type devices and store in secure area. 20/06/11 Copyright © 2005 BH IT Consulting Ltd
Important Windows Events Local Logon Attempt Failures Event IDs 529, 530, 531, 532, 533, 534 & 537. Domain Logon Account Failures Event IDs 675, 677 Account Misuse Event IDs 530, 531, 532, 533 Account lockout Event ID 539 Terminal Services Event IDs 682, 683 Creation of a User Account Event IDs 624, 626 User Account password Change Event IDs 627, 628 User Account Status Change Event IDs 626, 629, 630 Modification of Security Groups Event IDs 632, 633, 636, 637 Modification of Security Log Event IDs 612, 517  Policy Change Event IDs 608, 609 Process Tracking Event IDs 592, 593  (note due to volume of log entries only monitor process tracking during an investigation.) 20/06/11 Copyright © 2005 BH IT Consulting Ltd
Tools Convert Windows Events to Syslog WinSyslog  http://winsyslog.com/en/ EventReporter  http://www.eventreporter.com/en/ Commercial Monitoring tools GFI LANguard (Windows Only) -  http://www.gfi.com/lanselm/ Symantec -  http://www.symantec.com HP Openview -  http://www.managementsoftware.hp.com/products/a-z.html IBM Tivoli -  http://www-306.ibm.com/software/tivoli/ CA Unicentre -  http://www3.ca.com/solutions/product.asp?id=2869 Intellitactics Security Manager -  http://www.intellitactics.com/blue.asp?PageID=26 Netforensics -  http://www.netforensics.com/ ArchSight -  http://www.arcsight.com/ Open Source Nagios (Open Source) -  http://www.nagios.org/ 20/06/11 Copyright © 2005 BH IT Consulting Ltd
Links Log Analysis website  - Tina Bird & Marcus Ranum http://loganalysis.org/ Counterpane's website http://www.counterpane.com/literature.html CERT Coordination Centre Establish a policy and procedures that prepare your organization to detect signs of intrusion http://www.cert.org/security-improvement/practices/p090.html Detecting signs of suspicious behavior http://www.cert.org/security-improvement/practices/p091.html http://www.cert.org/security-improvement/practices/p092.html Monitor for unexpected behavior http://www.cert.org/security-improvement/practices/p095.html The SANS reading room http://www.sans.org/rr/whitepapers/logging/ Event ID website given explanations to MS events http://www.eventid.net/ 20/06/11 Copyright © 2005 BH IT Consulting Ltd
Questions ? 20/06/11 Copyright © 2005 BH IT Consulting Ltd

More Related Content

PPTX
Log management principle and usage
PPT
NIST 800-92 Log Management Guide in the Real World
PPTX
Splunk Enterprise Security
PPTX
SIEM : Security Information and Event Management
PPT
Application Logging Good Bad Ugly ... Beautiful?
PPTX
Splunk Architecture
PPTX
Splunk Overview
PPTX
Security Information and Event Management (SIEM)
Log management principle and usage
NIST 800-92 Log Management Guide in the Real World
Splunk Enterprise Security
SIEM : Security Information and Event Management
Application Logging Good Bad Ugly ... Beautiful?
Splunk Architecture
Splunk Overview
Security Information and Event Management (SIEM)

What's hot (20)

PPTX
VAPT PRESENTATION full.pptx
PDF
Splunk-Presentation
PPTX
Getting Started with Splunk (Hands-On)
PPTX
Siem ppt
PPTX
Putting MITRE ATT&CK into Action with What You Have, Where You Are
PDF
Empower Your Security Practitioners with Elastic SIEM
PDF
How MITRE ATT&CK helps security operations
PDF
Log4j in 8 slides
PPTX
Vapt life cycle
PDF
Api security-testing
PPTX
Splunk Tutorial for Beginners - What is Splunk | Edureka
PDF
Windows Threat Hunting
PPT
Application Security
PPTX
Threat Hunting with Splunk Hands-on
PDF
Understanding Cyber Attack - Cyber Kill Chain.pdf
PPTX
Logging, monitoring and auditing
PPTX
Threat hunting - Every day is hunting season
PPTX
SOAR and SIEM.pptx
PPTX
HBase in Practice
PDF
Splunk 101
VAPT PRESENTATION full.pptx
Splunk-Presentation
Getting Started with Splunk (Hands-On)
Siem ppt
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Empower Your Security Practitioners with Elastic SIEM
How MITRE ATT&CK helps security operations
Log4j in 8 slides
Vapt life cycle
Api security-testing
Splunk Tutorial for Beginners - What is Splunk | Edureka
Windows Threat Hunting
Application Security
Threat Hunting with Splunk Hands-on
Understanding Cyber Attack - Cyber Kill Chain.pdf
Logging, monitoring and auditing
Threat hunting - Every day is hunting season
SOAR and SIEM.pptx
HBase in Practice
Splunk 101
Ad

Similar to Best practises for log management (20)

PDF
File000138
PDF
Log Analytics for Distributed Microservices
PDF
Logicalis Security Conference
PPTX
Event log analyzer by me
PDF
Leveraging Log Management to provide business value
PDF
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
PPTX
CSE3069 - FLUENTD real time analytics.pptx
PPTX
Cutting-Edge Network Behavior Audit Technology from BMST
PDF
Cso 4any ram rev 2.6 management summary
PDF
Oracle Management Cloud
PDF
Oracle Management Cloud
PDF
Session Auditor - Transparent Network Behavior Recorder
PPTX
ObserveIT Remote Access Monitoring Software - Corporate Presentation
PPT
Six Mistakes of Log Management 2008
PPTX
How to Use OWASP Security Logging
PPTX
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
PPT
Cloud computingpptx
PPTX
Security Information Event Management Security Information Event Management
PPTX
EventLog Analyzer - Product overview
PDF
Securing your IT infrastructure with SOC-NOC collaboration TWP
File000138
Log Analytics for Distributed Microservices
Logicalis Security Conference
Event log analyzer by me
Leveraging Log Management to provide business value
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
CSE3069 - FLUENTD real time analytics.pptx
Cutting-Edge Network Behavior Audit Technology from BMST
Cso 4any ram rev 2.6 management summary
Oracle Management Cloud
Oracle Management Cloud
Session Auditor - Transparent Network Behavior Recorder
ObserveIT Remote Access Monitoring Software - Corporate Presentation
Six Mistakes of Log Management 2008
How to Use OWASP Security Logging
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Cloud computingpptx
Security Information Event Management Security Information Event Management
EventLog Analyzer - Product overview
Securing your IT infrastructure with SOC-NOC collaboration TWP
Ad

More from Brian Honan (20)

PPTX
Brian honan ipexpo keynote
PPTX
GDPR & Brexit - What Does the Future Hold?
PDF
Ransomware Prevention Guide
PPTX
Brian honan
PPTX
The dark side of the internet
PPTX
Data security brian honan
PPTX
Presentation on EU Directives Impacting Cyber Security for Information Securi...
PPTX
Incident Response in the Cloud
PPTX
How to Like Social Media Network Security
PDF
Bridging the air gap
PDF
Proactive incident response
PPTX
Learning from History
PPTX
Incident response cloud
PPTX
Preparing for Failure - Best Practise for Incident Response
PPT
Cloud security
PPTX
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
PPTX
Creating a CERT at WARP Speed
PDF
The Case for Mandatory Data Breach Disclosure Laws
PPTX
Ic Sconf2010presentation Dp Bh
PPT
Knowing Me Knowing You
Brian honan ipexpo keynote
GDPR & Brexit - What Does the Future Hold?
Ransomware Prevention Guide
Brian honan
The dark side of the internet
Data security brian honan
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Incident Response in the Cloud
How to Like Social Media Network Security
Bridging the air gap
Proactive incident response
Learning from History
Incident response cloud
Preparing for Failure - Best Practise for Incident Response
Cloud security
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
Creating a CERT at WARP Speed
The Case for Mandatory Data Breach Disclosure Laws
Ic Sconf2010presentation Dp Bh
Knowing Me Knowing You

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Tartificialntelligence_presentation.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
1. Introduction to Computer Programming.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
Getting Started with Data Integration: FME Form 101
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
A Presentation on Touch Screen Technology
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Approach and Philosophy of On baking technology
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
Unlocking AI with Model Context Protocol (MCP)
Tartificialntelligence_presentation.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
1. Introduction to Computer Programming.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Hybrid model detection and classification of lung cancer
Getting Started with Data Integration: FME Form 101
A novel scalable deep ensemble learning framework for big data classification...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
OMC Textile Division Presentation 2021.pptx
MIND Revenue Release Quarter 2 2025 Press Release
A Presentation on Touch Screen Technology
WOOl fibre morphology and structure.pdf for textiles
A comparative study of natural language inference in Swahili using monolingua...
Group 1 Presentation -Planning and Decision Making .pptx
Approach and Philosophy of On baking technology
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Hindi spoken digit analysis for native and non-native speakers

Best practises for log management

  • 1. Best Practices for Log Monitoring
  • 2. Introduction What are logs? Why are logs important? The Challenges Recommended Best Practises Further Reading 20/06/11 Copyright © 2005 BH IT Consulting Ltd
  • 3. What Are Logs? Historical Record of events that happened. Records events and status of systems in a time sequential format. Record of activity on the system/network. Provide an Audit trail of who done what, where, when and why (5 Ws) 20/06/11 Copyright © 2005 BH IT Consulting Ltd
  • 4. Why are Logs Important? Logs can assist us in; Determining what happened - Audit Trail Intrusion Detection Incident Containment Forensic Analysis Proactive Protection Real Time Alerts Providing a Network Baseline Determining the Health of the Network Troubleshooting issues Proactive maintenance 20/06/11 Copyright © 2005 BH IT Consulting Ltd
  • 5. Monitoring as Part of Security Process 20/06/11 Copyright © 2005 BH IT Consulting Ltd Develop Security Policy Secure The Network Improve Based on Feedback Test Security Monitor
  • 6. Why are Logs Important? Logs are everywhere; Operating Systems Applications Device logs Routers Firewalls IDS Switches All this information should be making our jobs easier. Right? 20/06/11 Copyright © 2005 BH IT Consulting Ltd
  • 7. Typical Network 20/06/11 Copyright © 2005 BH IT Consulting Ltd
  • 8. The Challenges Different vendors different log formats. Regulatory Requirements. Logs were written by developers Format is not easy to read Messages can be obscure Logs contain enormous amount of information. Identifying anomalies can be difficult Probes over time 20/06/11 Copyright © 2005 BH IT Consulting Ltd
  • 9. The Challenges Managing Logs can be Expensive; Log analysis is a unique skill. Looking at all events takes time. Logs can consume a lot of disk space. Volume of information is huge No one size fits all. Each network is unique 20/06/11 Copyright © 2005 BH IT Consulting Ltd
  • 10. 20/06/11 Copyright © 2005 BH IT Consulting Ltd Too Much Information !!!
  • 11. Best Practices Develop logging Policy Determine what information is relevant to you. What devices are important? What events are important? Don’t forget to turn on logging! Timing of events, e.g. user logons in morning. What reports you and the business want/need? Group servers into zones based on their function or criticality and prioritise events accordingly. Baseline your systems & network. Determine how your network normally behaves. Repeat at regular intervals Secure log files on all devices. Encrypt logs Ensure all devices use same time source. If using more than one time zone use UTC . Use NTP protocol from a secure source to synchronise time. 20/06/11 Copyright © 2005 BH IT Consulting Ltd
  • 12. Best Practices Centralise log collection Dedicated server to collect all logs. Be careful of network traffic volumes. Be aware of limitations of server to process number of events. Configure all devices send logs to central log server. Make sure central server is secure. Secure transmission of logs. e.g. Syslog uses UDP by default. Consider using IPSec or next generation Syslog (Syslog-NG) 20/06/11 Copyright © 2005 BH IT Consulting Ltd
  • 13. Best Practices Normalise the data All events such as Windows, Syslog, SNMP etc. should be normalised into same format. Review the Logs Ensure logs are regularly reviewed Manually Automatically Scripts Commercial Tools Freeware Tools 20/06/11 Copyright © 2005 BH IT Consulting Ltd
  • 14. Best Practices Log Rotation Determine time schedule Based on volume of data Develop meaningful naming convention. Move data to rotated file Log Retention Based on disk space. May be regulatory requirements. Archive onto WORM type devices and store in secure area. 20/06/11 Copyright © 2005 BH IT Consulting Ltd
  • 15. Important Windows Events Local Logon Attempt Failures Event IDs 529, 530, 531, 532, 533, 534 & 537. Domain Logon Account Failures Event IDs 675, 677 Account Misuse Event IDs 530, 531, 532, 533 Account lockout Event ID 539 Terminal Services Event IDs 682, 683 Creation of a User Account Event IDs 624, 626 User Account password Change Event IDs 627, 628 User Account Status Change Event IDs 626, 629, 630 Modification of Security Groups Event IDs 632, 633, 636, 637 Modification of Security Log Event IDs 612, 517 Policy Change Event IDs 608, 609 Process Tracking Event IDs 592, 593 (note due to volume of log entries only monitor process tracking during an investigation.) 20/06/11 Copyright © 2005 BH IT Consulting Ltd
  • 16. Tools Convert Windows Events to Syslog WinSyslog http://winsyslog.com/en/ EventReporter http://www.eventreporter.com/en/ Commercial Monitoring tools GFI LANguard (Windows Only) - http://www.gfi.com/lanselm/ Symantec - http://www.symantec.com HP Openview - http://www.managementsoftware.hp.com/products/a-z.html IBM Tivoli - http://www-306.ibm.com/software/tivoli/ CA Unicentre - http://www3.ca.com/solutions/product.asp?id=2869 Intellitactics Security Manager - http://www.intellitactics.com/blue.asp?PageID=26 Netforensics - http://www.netforensics.com/ ArchSight - http://www.arcsight.com/ Open Source Nagios (Open Source) - http://www.nagios.org/ 20/06/11 Copyright © 2005 BH IT Consulting Ltd
  • 17. Links Log Analysis website - Tina Bird & Marcus Ranum http://loganalysis.org/ Counterpane's website http://www.counterpane.com/literature.html CERT Coordination Centre Establish a policy and procedures that prepare your organization to detect signs of intrusion http://www.cert.org/security-improvement/practices/p090.html Detecting signs of suspicious behavior http://www.cert.org/security-improvement/practices/p091.html http://www.cert.org/security-improvement/practices/p092.html Monitor for unexpected behavior http://www.cert.org/security-improvement/practices/p095.html The SANS reading room http://www.sans.org/rr/whitepapers/logging/ Event ID website given explanations to MS events http://www.eventid.net/ 20/06/11 Copyright © 2005 BH IT Consulting Ltd
  • 18. Questions ? 20/06/11 Copyright © 2005 BH IT Consulting Ltd