LOGS

zeek generates log files according to traffic data. the generated logs will be for every connection in the wire including the application level protocols and fields.

LOG CATEGORIES

COMMON LOGS

THREAT HUNTING: ANOMALY DETECTION & LOG CORRELATION

the table below can be used during threat hunting and describes a sample investigation procedure

  1. OVERALL INFO: the first step of the investigation is to review the overall connections, shared files, loaded scripts & indicators

  2. PROTOCOL BASED: conduct a more in-depth investigation by focusing on a specific protocol

  3. DETECTION: use the prebuilt/custom detection scripts & signature outcomes to support findings

  4. OBSERVATION: use the logs in this category to discover possible missing points

Last updated