SlideShare a Scribd company logo
Why is taxonomy important? And Extensive SureLog SIEM Taxonomy
Features
How come SureLog detects things like a failed login from all brands and types of
devices. The answer is in the taxonomy it uses.
A taxonomy aids in pattern recognition and also improves the scope and stability of
correlation rules. When events from heterogeneous sources are normalized they can
be analyzed by a smaller number of correlation rules, which reduces deployment and
support labor. In addition, normalized events are easier to work with when developing
reports and dashboards
Using normalized events and taxonomy categories is highly recommended in
correlation because they make the rule easier to modify, maintain and apply to
additional log sources.
With the ability to translates all log types into a single taxonomy, Sureog provides
immediate time-to-value in the application of SIEM, meaning customers are
empowered to build, manage and effectively transform their businesses through a
unified cybersecurity solution
Taxonomy or event categorization is common in SIEM solution. The question is how
strong, deep and powerful is your SIEM taxonomy capability?
Almost all SIEM solutions have taxonomies for
 Successful Login
 Failed Login
 UserLogoff
 File Access
 Firewall Drop
 Firewall Accept
 ProcessStart
 ProcessStop
 SystemReboot
 SystemScanStart
 SystemScanStop
 SystemShutdown
 WebAccess
 Session Start
 Session Stop
 User Created
 User Deleted
 DeleteGroup
 DeleteDomainMember
 Password changed
 Account Modified
 Account Expired
 Attack
 Malicious
 VPN connected
 VPN Disconnected
But SureLog has thousands of more taxonomies like :
 MailServiceAccess
 MailServiceDenial
 MailSpamDenial
 ICMP CODE Destination Network
Unknown
 UnusualICMPTraffic->ICMP Echo
Reply
 UnusualICMPTraffic->ICMP
Unassigned
 UnusualICMPTraffic->ICMP Host
Unreachable
 UnusualICMPTraffic->ICMP Source
Quench
 UnusualICMPTraffic->ICMP Redirect
 UnusualICMPTraffic->ICMP Alternate
Host Address
 UnusualICMPTraffic->ICMP Echo
Request
 UnusualICMPTraffic->ICMP Router
Advertisement
 UnusualICMPTraffic->ICMP Router
Selection
 UnusualICMPTraffic->ICMP Time
Exceeded
 UnusualICMPTraffic->ICMP
Parameter Problem
 MachineAuthTicket
 MachineLogoff
 MachineLogon
 ICMP CODE Alternate Address for
Host
 Multicast Router Advertisement
 ICMP CODE Destination Unreachable
for Service
 ICMP CODE Destination is
Administratively Prohibited
 WebTrafficAudit->Adware
 VirusTrafficAccess->Web Content
 VirusTrafficAccess->Adware
 FileTransferTrafficAudit->Adware
 NamingTrafficAudit->Zone Transfer
 UnusualUDPTraffic->ICMP IPv6
Where-are-you
 UnusualUDPTraffic
 UnusualTCPTraffic
 ApplicationTrafficAudit->Access
Denied
 WebTrafficAudit->Header Malformed
 PingOfDeathDenial
 LandAttackDenial
 LinkControlAccess
 LinkControlDenial
 LinkControlTrafficAudit
 MachineAuthAudit
 MachineLogonFailure
 MachineModifyAttribute
 MachineModifyPrivileges
SureLog has more than 1000 taxonomies.
Why taxonomy is critical

More Related Content

DOCX
Surelog Intelligence
DOCX
Which generation of siem?
DOCX
ANET SureLog SIEM IntelligentResponse
PDF
The correlation advantages of ANET SURELOG International Edition SIEM product
PDF
Why SureLog?
DOCX
Siem tools
PDF
Log correlation SIEM rule examples and correlation engine performance data
PDF
SureLog SIEM
Surelog Intelligence
Which generation of siem?
ANET SureLog SIEM IntelligentResponse
The correlation advantages of ANET SURELOG International Edition SIEM product
Why SureLog?
Siem tools
Log correlation SIEM rule examples and correlation engine performance data
SureLog SIEM

What's hot (20)

DOCX
SIEM Surelog Arcsight Qradar LogRhythm Alienvault Solarwinds LEM Performance...
PDF
Epas - Enterprise Password Assessment Solution
PDF
Need Of Security Operations Over SIEM
PDF
Operacionalize com alerta, dashboards customizados e linhas do tempo
PPTX
IT security : Keep calm and monitor PowerShell
PDF
Open service risk correlation
PPTX
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...
PPTX
Teri_Radichel_Top_5_Priorities_for_Cloud_Security
PPTX
MSSP - Security Orchestration & Automation
PDF
8 Reasons to Choose Logrhythm
PPTX
Security Orchestration, Automation & Incident Response
PDF
Security automation system
PPTX
Detecting and Blocking Suspicious Internal Network Traffic
DOCX
Manage sap audits & compliance risks
PPTX
Azure Sentinel Jan 2021 overview deck
PDF
5 Steps to Privilege Readiness (infographic)
PDF
Cap gemini pitch
PDF
Azure Information Protection
PPTX
Using m365 defender to protect against solorigate
PPTX
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
SIEM Surelog Arcsight Qradar LogRhythm Alienvault Solarwinds LEM Performance...
Epas - Enterprise Password Assessment Solution
Need Of Security Operations Over SIEM
Operacionalize com alerta, dashboards customizados e linhas do tempo
IT security : Keep calm and monitor PowerShell
Open service risk correlation
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...
Teri_Radichel_Top_5_Priorities_for_Cloud_Security
MSSP - Security Orchestration & Automation
8 Reasons to Choose Logrhythm
Security Orchestration, Automation & Incident Response
Security automation system
Detecting and Blocking Suspicious Internal Network Traffic
Manage sap audits & compliance risks
Azure Sentinel Jan 2021 overview deck
5 Steps to Privilege Readiness (infographic)
Cap gemini pitch
Azure Information Protection
Using m365 defender to protect against solorigate
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Ad

Similar to Why taxonomy is critical (20)

PDF
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
PDF
Tips to Remediate your Vulnerability Management Program
PPTX
What is SSO? An introduction to Single Sign On
PPTX
ISACA-presentation-Aug-18-2016- Onion ID
PPTX
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online
PDF
Logicalis Security Conference
PPTX
How to Use OWASP Security Logging
PPTX
Dell Quest TPAM Privileged Access Control
PPTX
Threat Modeling a Batch Job System - AWS Security Community Day
PPTX
SIEM - Activating Defense through Response by Ankur Vats
PPTX
Securing Your Enterprise Web Apps with MongoDB Enterprise
PPTX
Setting Up Sumo Logic - Apr 2017
PPTX
Correlog Overview Presentation
PDF
Why PAM Security Services Are Essential for Modern Cybersecurity.pdf
PPTX
Intor new May 2024 v2 with container.pptx
PPTX
ManageEngine_SIEM_Log360_SOC.pptx
PDF
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
PDF
rsa-usa-2019-keynote-paula-januszkiewicz
DOCX
SureLog Large-scale SIEM Implementation in a Distributed It Security World
PDF
Annual OktCyberfest 2019
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
Tips to Remediate your Vulnerability Management Program
What is SSO? An introduction to Single Sign On
ISACA-presentation-Aug-18-2016- Onion ID
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online
Logicalis Security Conference
How to Use OWASP Security Logging
Dell Quest TPAM Privileged Access Control
Threat Modeling a Batch Job System - AWS Security Community Day
SIEM - Activating Defense through Response by Ankur Vats
Securing Your Enterprise Web Apps with MongoDB Enterprise
Setting Up Sumo Logic - Apr 2017
Correlog Overview Presentation
Why PAM Security Services Are Essential for Modern Cybersecurity.pdf
Intor new May 2024 v2 with container.pptx
ManageEngine_SIEM_Log360_SOC.pptx
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
rsa-usa-2019-keynote-paula-januszkiewicz
SureLog Large-scale SIEM Implementation in a Distributed It Security World
Annual OktCyberfest 2019
Ad

More from Ertugrul Akbas (20)

PDF
BDDK, SPK, TCMB, Cumhurbaşkanlığı Dijital Dönüşüm Ofisi ve ISO27001 Denetiml...
PDF
Olay Müdahale İçin Canlı Kayıtların Saklanmasının Önemi
PDF
SOC ve SIEM Çözümlerinde Korelasyon
PDF
SIEM den Maksimum Fayda Almak
PDF
SureLog SIEM Fast Edition Özellikleri ve Fiyatı
PDF
Neden SureLog?
PDF
SureLog SIEM
PDF
SureLog SIEM Fast Edition
PDF
SureLog SIEM
PDF
SureLog SIEM
PDF
SureLog SIEM
PDF
SureLog SIEM
PDF
SureLog SIEM
PDF
SureLog intelligent response
PDF
SureLog SIEM Has The Best On-Line Log Retention Time (Hot Storage).
PDF
Detecting attacks with SureLog SIEM
PDF
SureLog SIEM
DOCX
PPTX
SIEM ve KVKK Teknik Tedbirlerinin ANET SureLog SIEM ile uygulanması
PDF
KVKK Siperium Data Analyzer & Data Discovery
BDDK, SPK, TCMB, Cumhurbaşkanlığı Dijital Dönüşüm Ofisi ve ISO27001 Denetiml...
Olay Müdahale İçin Canlı Kayıtların Saklanmasının Önemi
SOC ve SIEM Çözümlerinde Korelasyon
SIEM den Maksimum Fayda Almak
SureLog SIEM Fast Edition Özellikleri ve Fiyatı
Neden SureLog?
SureLog SIEM
SureLog SIEM Fast Edition
SureLog SIEM
SureLog SIEM
SureLog SIEM
SureLog SIEM
SureLog SIEM
SureLog intelligent response
SureLog SIEM Has The Best On-Line Log Retention Time (Hot Storage).
Detecting attacks with SureLog SIEM
SureLog SIEM
SIEM ve KVKK Teknik Tedbirlerinin ANET SureLog SIEM ile uygulanması
KVKK Siperium Data Analyzer & Data Discovery

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
A Presentation on Artificial Intelligence
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Getting Started with Data Integration: FME Form 101
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Machine learning based COVID-19 study performance prediction
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Big Data Technologies - Introduction.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
A Presentation on Artificial Intelligence
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
MIND Revenue Release Quarter 2 2025 Press Release
Unlocking AI with Model Context Protocol (MCP)
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A comparative analysis of optical character recognition models for extracting...
Getting Started with Data Integration: FME Form 101
SOPHOS-XG Firewall Administrator PPT.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Encapsulation_ Review paper, used for researhc scholars
Programs and apps: productivity, graphics, security and other tools
Machine learning based COVID-19 study performance prediction
NewMind AI Weekly Chronicles - August'25-Week II
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Building Integrated photovoltaic BIPV_UPV.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf

Why taxonomy is critical

  • 1. Why is taxonomy important? And Extensive SureLog SIEM Taxonomy Features How come SureLog detects things like a failed login from all brands and types of devices. The answer is in the taxonomy it uses. A taxonomy aids in pattern recognition and also improves the scope and stability of correlation rules. When events from heterogeneous sources are normalized they can be analyzed by a smaller number of correlation rules, which reduces deployment and support labor. In addition, normalized events are easier to work with when developing reports and dashboards Using normalized events and taxonomy categories is highly recommended in correlation because they make the rule easier to modify, maintain and apply to additional log sources. With the ability to translates all log types into a single taxonomy, Sureog provides immediate time-to-value in the application of SIEM, meaning customers are empowered to build, manage and effectively transform their businesses through a unified cybersecurity solution Taxonomy or event categorization is common in SIEM solution. The question is how strong, deep and powerful is your SIEM taxonomy capability? Almost all SIEM solutions have taxonomies for  Successful Login  Failed Login  UserLogoff  File Access  Firewall Drop  Firewall Accept  ProcessStart  ProcessStop  SystemReboot  SystemScanStart  SystemScanStop  SystemShutdown  WebAccess  Session Start  Session Stop  User Created  User Deleted  DeleteGroup  DeleteDomainMember  Password changed  Account Modified  Account Expired  Attack  Malicious  VPN connected  VPN Disconnected
  • 2. But SureLog has thousands of more taxonomies like :  MailServiceAccess  MailServiceDenial  MailSpamDenial  ICMP CODE Destination Network Unknown  UnusualICMPTraffic->ICMP Echo Reply  UnusualICMPTraffic->ICMP Unassigned  UnusualICMPTraffic->ICMP Host Unreachable  UnusualICMPTraffic->ICMP Source Quench  UnusualICMPTraffic->ICMP Redirect  UnusualICMPTraffic->ICMP Alternate Host Address  UnusualICMPTraffic->ICMP Echo Request  UnusualICMPTraffic->ICMP Router Advertisement  UnusualICMPTraffic->ICMP Router Selection  UnusualICMPTraffic->ICMP Time Exceeded  UnusualICMPTraffic->ICMP Parameter Problem  MachineAuthTicket  MachineLogoff  MachineLogon  ICMP CODE Alternate Address for Host  Multicast Router Advertisement  ICMP CODE Destination Unreachable for Service  ICMP CODE Destination is Administratively Prohibited  WebTrafficAudit->Adware  VirusTrafficAccess->Web Content  VirusTrafficAccess->Adware  FileTransferTrafficAudit->Adware  NamingTrafficAudit->Zone Transfer  UnusualUDPTraffic->ICMP IPv6 Where-are-you  UnusualUDPTraffic  UnusualTCPTraffic  ApplicationTrafficAudit->Access Denied  WebTrafficAudit->Header Malformed  PingOfDeathDenial  LandAttackDenial  LinkControlAccess  LinkControlDenial  LinkControlTrafficAudit  MachineAuthAudit  MachineLogonFailure  MachineModifyAttribute  MachineModifyPrivileges SureLog has more than 1000 taxonomies.