LOGS
Last updated
Last updated
zeek generates log files according to traffic data. the generated logs will be for every connection in the wire including the application level protocols and fields.
the table below can be used during threat hunting and describes a sample investigation procedure
OVERALL INFO: the first step of the investigation is to review the overall connections, shared files, loaded scripts & indicators
PROTOCOL BASED: conduct a more in-depth investigation by focusing on a specific protocol
DETECTION: use the prebuilt/custom detection scripts & signature outcomes to support findings
OBSERVATION: use the logs in this category to discover possible missing points