#log-analysis — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #log-analysis, aggregated by home.social.
-
Agentic workflows are now enabled by new interoperability standards, such as the Model Context Protocol (MCP), which means that an #LLM can query a #SIEM, gather logs, analyze trends and propose next steps—all within a single interface. This collaboration enables #security teams to streamline repetitive tasks, and so much more. 🤝 🙌
In this SecurityInfoWatch article, #Graylog's Robert Rea explains the benefits of this for analysts and leadership alike, how agentic workflows are designed to enhance (not override) human judgment, why this is more accessible now than ever, and how it's a major strategic shift for modern #security teams.
https://www.securityinfowatch.com/cybersecurity/article/55327720/automating-the-soc-without-losing-the-human-in-the-loop #CyberSecurity #LogAnalysis #InfoSec
-
Look up in the sky! It's a bird! It's a plane! It's... Logs by Day, Justice by Night: The Double Life of Data Hero Tony Reinke! 💥 🦸♂️ 💬
Follow Tony's transformation from curious log sleuth to community data hero in a captivating comic book–style session at #GraylogGO, and see how the principles of log management and analytics can power passions far beyond the workplace. 💪⚡
You know you wanna go to GO. So, what are you waiting for?
Sign up to GO: https://graylog.info/4fHf4OF #Graylog #cybersecurity #logmanagement #loganalysis #dataanalytics
-
Getting your data from GitLab’s audit logs into #Graylog for centralized analysis is easier than you might think! 🤔 😃 Take a look at this two-part guide to learn how. 👁️ 👇
This guide covers:
👉 Prerequisites for setting up the raw HTTP input for GitLab
👉 Configuring GitLab to stream logs
👉 Configuring the raw HTTP input
👉 Requirements for enriching GitLab logs with Illuminate
👉 Setup Instructions
And more...Ready to centralize GitLab Logs? Check out the guide to get started with wiring up GitLab’s Audit Event Streaming, and you'll be on your way to visualizing enriched events in a purpose-built dashboard! Let's go...
https://graylog.org/post/bringing-gitlab-logs-into-focus-with-graylog/ #cybersecurity #logmanagement #loganalysis #GraylogLabs
-
This hands-on guide shows how to build secure, scalable data pipelines using open source tools like Filebeat, Logstash, Kafka, and Ansible.
Learn to collect, transform, enrich, and centralize security telemetry from Windows, Linux, and network sources. A practical resource for anyone supporting detection, forensics, or incident response.
-
Alert fatigue persists... and of course we are not happy about it. 🥴 #Security teams now process more log data than ever, but legacy tools cannot keep pace. Plus, attackers are more stealthy. And, when threat signals get buried in noise, orgs don’t just lose time—they lose ground. 😱
So what can SOC teams do about this? 🤔 Let's talk about campaign-centric detection. Say what? 👀 Why yes! There IS a way to make things better. 😃
Campaign-centric detection connects isolated events to uncover a full attack narrative—which means fewer alerts, but each one is more meaningful. So, analysts spend less time chasing dead ends and more time stopping real threats. 💯 Woot! Everyone wins!
Learn more about why you need a modern #SIEM. It's time to ditch that legacy thing and find out what a new SIEM can do for you! 🫵
https://graylog.org/post/threat-campaign-detection-helps-cut-through-alert-fatigue/ #logdata #loganalysis #cybersecurity #securityoperations #alertfatigue
-
Hot off the press, and just in time for your leisurely weekend reading we have our latest #GraylogLabs post! 🕺 🎉 So let's dive in and discuss regex patterns. Regex is a well-known syntax across various programming languages and having an understanding of what it is and how to use it can help you be more efficient when trying to match patterns or manipulate strings of #data.
Learn about:
🤔 What regex means
❓ What a regex function is used for
🖊️ Writing a regular expression
✔️ Using regular expressions
💪 Getting the most from your logshttps://graylog.org/post/getting-ready-with-regex-101/ #loganalysis #cybersecurity #infosec
-
Let's take a look at extracting data from #Graylog. Follow along as Tony Reinke shows you step-by-step how to transform your raw data from unstructured to structured.
We can find logs with raw text searches, but to gain insights in to the data we need to extract the different fields and their values, which will in turn make search easier and assist you in the creation of dashboards and alerts. 👍
Ready to dive in? 🪂
https://medium.com/@coachreinke/graylog-extracting-data-5733a8416c81 #logmanagement #loganalysis #logdata #cybersecurity
-
⏰ It's time to talk about #Kubernetes + logging. Need a primer on the topic? Drop on in for this Kubernetes 101 overview! 👩🏫 👇
Find out about:
❓ What Kubernetes is and why it's used
🗣️ The Kubernetes vocabulary
⚙️ How Kubernetes works
📈 The benefits of Kubernetes
💯 Best practices for Kubernetes loggingPlus, learn how you can integrate Kubernetes monitoring and security into your overarching monitoring strategy.
https://graylog.org/post/kubernetes-101/ #APIsecurity #loganalysis
-
Need a reference guide for the Syslog protocol? 📑 #Graylog's Jeff Darrington's got you covered! 🙌
Check out this guide which covers:
▪️ RFC 3164 (BSD Syslog Protocol)
▪️ RFC 5424 (Structured Syslog Protocol)
▪️ RFC 3195 (Reliable Delivery for Syslog)
▪️ RFC 6587 (Syslog over TCP)
▪️ Syslog Kafka (formatted as per RFC 3164 or RFC 5424)
▪️ Syslog AMQP (Advanced Message Queuing Protocol)
▪️ Syslog TCP/UDP (Multiline format)#Syslog is a logging protocol that is supported across many applications as well as hardware, and despite having been developed in the 1980s is still a very common format in use today. Many newer logging formats have come out over the years, but Syslog will still be with us for quite some time.
https://graylog.org/post/syslog-protocol-a-reference-guide/ #logmanagement #loganalysis #cybersecurity
-
The topic of the day today is: data normalization.💥 What is data normalization ❓ We're glad you asked! Data normalization organizes log information into a structured format, making it easier to analyze and interpret. And, if you understand how to apply these principles to log data, then you can more effectively and efficiently monitor your environment for abnormal activity. 🔍 🙌
Learn about the 5 rules of data normalization, what the normalization process looks like for log data, challenges that can come up when normalizing log file data, the benefits to doing this, and more. 👇
https://graylog.org/post/the-importance-of-data-normalization-for-log-files/ #logmanagement #loganalysis #SIEM #cybersecurity
-
Proper log management is all about managing your log reports in the most efficient manner possible. 👍 To do this right, you'll want to make sure that your log management software has some specific features. So, when shopping around for the right tool look for:
☑️ A comprehensive log management and collection function
☑️ Centralized log monitoring and analysis
☑️ Data pipeline management
☑️ Alerts and notificationsLearn more about each of these different log management features, and why they are so important. 💡 ⤵️
https://graylog.org/post/must-have-features-for-your-log-management-software/ #logmanagement #loganalysis #cybersecurity #SIEM
-
Happy New Year! 🎇 Start the year of right by joining Tony Reinke for a look at extracting your data from #Graylog. 👀
In this blog, Tony shows you how to transform your data from unstructured to structured — taking the raw data and making fields and values out of it to make it easier to search and to assist with making dashboards and alerts.
Ready to dive in? 🪂
https://medium.com/@coachreinke/graylog-extracting-data-5733a8416c81 #logmanagement #logdata #loganalysis #cybersecurity #happynewyear
-
For highly sensitive logs, on-premises or isolated deployments ensure data remains under complete control.
Read more 👉 https://lttr.ai/AZyUt
-
:hacker_z: :hacker_o: :hacker_d: :hacker_s: :hacker_e: :hacker_c: 0xD :verified: @[email protected] ·Day 17 of #AdventOfCyber. Splunk is a nifty lil app and very powerful for analyzing logs. #loganalysis #blueteam #socanalysis #cybersecurity
-
@todd_a_jacobs This is insightful. #Cybersecurity isn't just about buying cool new enterprise software or (re-)designing new processes or #technicalcontrols. Sometimes it's just about understanding the tools you already have, and understanding how to access the data you need for #loganalysis, to correlate multi-system logs, or perform other core security functions.
-
This blog post discusses strategies and methodologies for analyzing logs in Azure subscriptions to enhance threat hunting in cybersecurity. It explores a hypothetical attack scenario involving a breached administrator account and emphasizes the importance of understanding how threat actors maneuver within Azure to... https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/hunting-in-azure-subscription/ba-p/4125875 #AzureSecurity #ThreatHunting #LogAnalysis #softcorpremium
-
Virtual private networks (#VPNs) help secure data, but they are also challenging to bring into your log monitoring and management strategy. 😫
Let's talk about how VPN and firewall log management gives real-time visibility into #security risks—as many VPN and firewall log monitoring problems are similar to log management in general. 🔓 👀
In this article you will learn about:
▪ Different log formats
▪ Importing logs
▪ Getting started with VPN and firewall log management
▪ Normalizing and parsing data
▪ Setting up indexes
▪ Using pre-built dashboards
▪ Unusual logins
▪ VPN licensing limits
...and more!Read on. ⤵
https://graylog.org/post/vpn-and-firewall-log-management/ #logmanagment #loganalysis #cybersecurity #security -
Is your organization in the #health, #finance, or #education industry? 🏥 💰 🏫 If the answer is "yes", then there are certain conditions you must meet in order to do business with particular clients or in a particular market—and this is called IT compliance. ✅
And, having a combination of #SIEM and a log management solution at your disposal is the first step in being able to comply with IT compliance rules and regulations. 📋 Need an IT compliance checklist to help you get started? Read this article learn about:
☑ The minimum IT compliance requirements
☑ Regulations that require organizational IT compliance
☑ How you can ensure your #data and #analytics are available for compliance📖 Read up on SOX, FISMA, PCI DSS, HIPAA, and more... 👇
https://graylog.org/post/meeting-compliance-regulations-with-siem-and-logging/ #ITcompliance #cybersecurity #loganalysis -
:hacker_z: :hacker_o: :hacker_d: :hacker_s: :hacker_e: :hacker_c: 0xD :verified: @[email protected] ·Incident handling with Splunk - I have just completed this room! Check it out: https://tryhackme.com/room/splunk201 #tryhackme #security #splunk #incidenthandling #SIEM #OSINT #LogAnalysis #CyberKillChain #Investigation #Forensics #splunk201 via @RealTryHackMe
-
:hacker_z: :hacker_o: :hacker_d: :hacker_s: :hacker_e: :hacker_c: 0xD :verified: @[email protected] ·Wazuh - I have just completed this room! Check it out: https://tryhackme.com/room/wazuhct #tryhackme #wazuh #security #edr #elk #analysis #log #agent #loganalysis #blueteam #wazuhct via @RealTryHackMe
-
Log analysis of suspicious activity [closed]
https://security.stackexchange.com/questions/269163/log-analysis-of-suspicious-activity
#incidentanalysis #loganalysis #forensics #malware -
Is someone accessing my win10 computer?
https://security.stackexchange.com/questions/267801/is-someone-accessing-my-win10-computer
#attackprevention #incidentresponse #incidentanalysis #loganalysis #ports -
Hey #blueteam friends, anyone know of any good online classes/tutorials, free or paid, for analyzing compromised cpanel/whm instances?
-
#spoileralert
Can McSkidy track down the Bandit Yeti APT group? Find out in -->
@RealTryHackMe#AdventOfCyber Series: Challenge 2 - Santa's Naughty & Nice Log #LogAnalysis #cybersecurityeducation #cybersecuritytutorial #TisTheSeasonForHacking
-
CW: education
Nice, finished the lecture plan for the short course SIEM and Logging 5ECTS starting tomorrow at KEA.dk
You can browse it at:
https://github.com/kramse/kea-it-sikkerhed/blob/master/siem-og-loganalyse/lektionsplan.mdand it contains names and links of books and some papers I use, and find useful in the area of #ThreatIntel #IncidentResponse
#LogAnalysis #educationSlides and exercise booklet is at:
https://github.com/kramse/security-courses/tree/master/courses/system-and-software/siem-log-analysisYou can re-use and re-mix almost anything I write, thank you to #OpenSource I use and have used over the years!
-
Update to my #blueteam assignment. Found a few suspicious files, but have yet to find out how they got there, or how they keep getting back in. Anyone have any tips on #loganalysis and other #forensics measures?
#cybersecurity #infosec #ioc