SlideShare a Scribd company logo
9
Most read
17
Most read
18
Most read
Log Management
Principle and Usage
Bikrant Gautam, MSIA Fall, SCSU
Log Sources:
What is log?
records of events.
?
But why Log Management?
● Numeros computers
● Numerous logs
● Hard to pinpoint a single log
Log Management Operation
Log Collecting/Archiving
Log Normalization
Log Intelligence/Forensics
and Monitoring
Log Archiving
● Collect numerous logs in raw from from different
sources.
● Includes system event logs, SNMP traps, Flow data etc.
● Different tools deployed to collect logs, fetchers or
collectors,
Log Normalization
Raw Windows 2003 log
<13>Apr 02 10:10:31 LPDC22.logpoint.net MSWinEventLog 1 Security 34796279 Thu Apr
02 10:10:31 2015 4634 Microsoft-Windows-Security-Auditing St.CloudCQ899$ N/A
Success Audit scsu.test.net Logoff An account was logged off. Subject: Security ID: S-
1-5-21-1078081533-1303643608-682003330-14083 Account Name: SCSU11$ Account Domain: Husky
Logon ID: 0x8764a6ab Logon Type: 3 This event is generated when a logon session is destroyed. It
may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between
reboots on the same computer. 34790802
Normalized logs
LogTime=2015/04/02 10:10:31
object=account
Action=logged off |
EventLog=Security |
User= CQ899$ |
Domain=St.Cloud
EventCategory=Logoff |
EventId=4634
EventSource=Microsoft-Windows-Security
EventType=Success
Application Fields
✘Threat protection and discovery
✘Incidence response and forensics
✘Regulatory compliance and audit
✘It system and network troubleshooting
✘System performance and management
Ref: Anton Chuvakin ; http://www.slideshare.net/anton_chuvakin/log-management-and-compliance-whats-the-real-story-b
dr-anton-chuvakin
Plain old log investigation method
✘ collect logs from all associated
computers ( will not be few)
✘ Go through each logs searching for
evidence (might take years to
complete)
✘ finally give up, as the information was
stored in a binary value not readable
to human eyes.
A curious case of auditing with logs
Using log management tool
✘ point all your devices to a central log
collection server.
✘ all cryptic logs are normalized to
human readable format
✘ Search for particular keyword, or
event on a specific time.
✘ Complete the forensic in no time.
Use Case: Monitoring Users logging to eros server
✘user smmsp has
logged into eros
server for almost
6000 times.
✘user charles.kangas
have logged into the
system for almost
2500 times
Use case: Continued, Drilling down
✘further investigation
for charles.Kangas
was done.
✘the originating source
ips were searched on
arin-whois and the
further information
were collected
Use case: Continued, User Information
✘The result of whois
lookup for user
Charles.
✘Origin of request
seems fair enough.
What if the originating IP was
from North Korea?
AdvanceD Operation
Lookup
Log
Correlation
Reporting
● 10 logins on last 5 second ● connect to external
databases
● present the finding on a
neat report that can be
send to BOSSes
Advantages of Log Management Tool
✘cool dashboard to visualize queries
✘deployed in your private server so the integrity of data is
maintained
✘can be configured to generate alerts and triggers according to
your business requirement
✘supports your compliance requirement
Challenges of Log Management
✘Lack of common log format
✘Not all activities generate logs
✘Not all activities are logged
✘Requires user to learn new script for every log management
tool
✘High volume of irrelevant data
The future?
Required by Compliances
1.3 billion
Projected revenue of Log management softwares in 2015
Conclusion
✘ A versatile tool to approach various challenges.
✘ Provides IT security with forensics and investigative
platform
✘ Quicker and faster alternative to plain old auditing
system
Questions?

More Related Content

PPSX
Next-Gen security operation center
PPTX
Siem solutions R&E
PDF
How MITRE ATT&CK helps security operations
PPTX
Threat hunting in cyber world
PDF
IBM Qradar & resilient
PPTX
SIEM : Security Information and Event Management
PDF
QRadar Architecture.pdf
PDF
Microsoft Office 365 Advanced Threat Protection
Next-Gen security operation center
Siem solutions R&E
How MITRE ATT&CK helps security operations
Threat hunting in cyber world
IBM Qradar & resilient
SIEM : Security Information and Event Management
QRadar Architecture.pdf
Microsoft Office 365 Advanced Threat Protection

What's hot (20)

PPTX
Beginner's Guide to SIEM
PPTX
Data Acquisition
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PPTX
McAfee SIEM solution
PDF
Wired and Wireless Network Forensics
PPTX
Splunk Phantom SOAR Roundtable
PPTX
Continuous Automated Red Teaming (CART) - Bikash Barai
PPTX
Endpoint Protection
PDF
Threat Hunting with Splunk Hands-on
PDF
Cybersecurity Roadmap Development for Executives
PPTX
SIEM presentation final
PPTX
Cyber security fundamentals
PPTX
Security operation center
PPTX
Logging, monitoring and auditing
PPTX
Threat hunting for Beginners
PPTX
Security Information and Event Management (SIEM)
PPTX
Security Information and Event Managemen
PPTX
Cyber Security 101
PPTX
WHY SOC Services needed?
PPTX
Security Information and Event Management (SIEM)
Beginner's Guide to SIEM
Data Acquisition
From SIEM to SOC: Crossing the Cybersecurity Chasm
McAfee SIEM solution
Wired and Wireless Network Forensics
Splunk Phantom SOAR Roundtable
Continuous Automated Red Teaming (CART) - Bikash Barai
Endpoint Protection
Threat Hunting with Splunk Hands-on
Cybersecurity Roadmap Development for Executives
SIEM presentation final
Cyber security fundamentals
Security operation center
Logging, monitoring and auditing
Threat hunting for Beginners
Security Information and Event Management (SIEM)
Security Information and Event Managemen
Cyber Security 101
WHY SOC Services needed?
Security Information and Event Management (SIEM)
Ad

Similar to Log management principle and usage (20)

DOC
Logging "BrainBox" Short Article
PPTX
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
PPTX
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
PPTX
Log maintenance network securiy
PPT
NIST 800-92 Log Management Guide in the Real World
PPT
Log Forensics from CEIC 2007
PPTX
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
PPT
FIRST 2006 Full-day Tutorial on Logs for Incident Response
PPT
Logs for Information Assurance and Forensics @ USMA
PDF
UNIT -III SIEM aur baato kaise hai aap log.pdf
PPT
Six Mistakes of Log Management 2008
PPTX
How to Leverage Log Data for Effective Threat Detection
PPT
O'Reilly Webinar Five Mistakes Log Analysis
PPT
CSI NetSec 2007 Six MIstakes of Log Management by Anton Chuvakin
PDF
PPTX
Log management
PPT
What Every Organization Should Log And Monitor
PPT
Log Management For e-Discovery, Database Monitoring and Other Unusual Uses
DOC
Audit logs for Security and Compliance
PPTX
EventLog Analyzer - Product overview
Logging "BrainBox" Short Article
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log maintenance network securiy
NIST 800-92 Log Management Guide in the Real World
Log Forensics from CEIC 2007
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
FIRST 2006 Full-day Tutorial on Logs for Incident Response
Logs for Information Assurance and Forensics @ USMA
UNIT -III SIEM aur baato kaise hai aap log.pdf
Six Mistakes of Log Management 2008
How to Leverage Log Data for Effective Threat Detection
O'Reilly Webinar Five Mistakes Log Analysis
CSI NetSec 2007 Six MIstakes of Log Management by Anton Chuvakin
Log management
What Every Organization Should Log And Monitor
Log Management For e-Discovery, Database Monitoring and Other Unusual Uses
Audit logs for Security and Compliance
EventLog Analyzer - Product overview
Ad

Recently uploaded (20)

PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Geodesy 1.pptx...............................................
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
DOCX
573137875-Attendance-Management-System-original
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
web development for engineering and engineering
PPTX
Sustainable Sites - Green Building Construction
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Strings in CPP - Strings in C++ are sequences of characters used to store and...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Geodesy 1.pptx...............................................
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
OOP with Java - Java Introduction (Basics)
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Foundation to blockchain - A guide to Blockchain Tech
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
573137875-Attendance-Management-System-original
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Lecture Notes Electrical Wiring System Components
bas. eng. economics group 4 presentation 1.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Model Code of Practice - Construction Work - 21102022 .pdf
web development for engineering and engineering
Sustainable Sites - Green Building Construction

Log management principle and usage

  • 1. Log Management Principle and Usage Bikrant Gautam, MSIA Fall, SCSU
  • 2. Log Sources: What is log? records of events.
  • 3. ? But why Log Management? ● Numeros computers ● Numerous logs ● Hard to pinpoint a single log
  • 4. Log Management Operation Log Collecting/Archiving Log Normalization Log Intelligence/Forensics and Monitoring
  • 5. Log Archiving ● Collect numerous logs in raw from from different sources. ● Includes system event logs, SNMP traps, Flow data etc. ● Different tools deployed to collect logs, fetchers or collectors,
  • 6. Log Normalization Raw Windows 2003 log <13>Apr 02 10:10:31 LPDC22.logpoint.net MSWinEventLog 1 Security 34796279 Thu Apr 02 10:10:31 2015 4634 Microsoft-Windows-Security-Auditing St.CloudCQ899$ N/A Success Audit scsu.test.net Logoff An account was logged off. Subject: Security ID: S- 1-5-21-1078081533-1303643608-682003330-14083 Account Name: SCSU11$ Account Domain: Husky Logon ID: 0x8764a6ab Logon Type: 3 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. 34790802 Normalized logs LogTime=2015/04/02 10:10:31 object=account Action=logged off | EventLog=Security | User= CQ899$ | Domain=St.Cloud EventCategory=Logoff | EventId=4634 EventSource=Microsoft-Windows-Security EventType=Success
  • 7. Application Fields ✘Threat protection and discovery ✘Incidence response and forensics ✘Regulatory compliance and audit ✘It system and network troubleshooting ✘System performance and management Ref: Anton Chuvakin ; http://www.slideshare.net/anton_chuvakin/log-management-and-compliance-whats-the-real-story-b dr-anton-chuvakin
  • 8. Plain old log investigation method ✘ collect logs from all associated computers ( will not be few) ✘ Go through each logs searching for evidence (might take years to complete) ✘ finally give up, as the information was stored in a binary value not readable to human eyes. A curious case of auditing with logs Using log management tool ✘ point all your devices to a central log collection server. ✘ all cryptic logs are normalized to human readable format ✘ Search for particular keyword, or event on a specific time. ✘ Complete the forensic in no time.
  • 9. Use Case: Monitoring Users logging to eros server ✘user smmsp has logged into eros server for almost 6000 times. ✘user charles.kangas have logged into the system for almost 2500 times
  • 10. Use case: Continued, Drilling down ✘further investigation for charles.Kangas was done. ✘the originating source ips were searched on arin-whois and the further information were collected
  • 11. Use case: Continued, User Information ✘The result of whois lookup for user Charles. ✘Origin of request seems fair enough. What if the originating IP was from North Korea?
  • 12. AdvanceD Operation Lookup Log Correlation Reporting ● 10 logins on last 5 second ● connect to external databases ● present the finding on a neat report that can be send to BOSSes
  • 13. Advantages of Log Management Tool ✘cool dashboard to visualize queries ✘deployed in your private server so the integrity of data is maintained ✘can be configured to generate alerts and triggers according to your business requirement ✘supports your compliance requirement
  • 14. Challenges of Log Management ✘Lack of common log format ✘Not all activities generate logs ✘Not all activities are logged ✘Requires user to learn new script for every log management tool ✘High volume of irrelevant data
  • 17. 1.3 billion Projected revenue of Log management softwares in 2015
  • 18. Conclusion ✘ A versatile tool to approach various challenges. ✘ Provides IT security with forensics and investigative platform ✘ Quicker and faster alternative to plain old auditing system