LOGS
zeek generates log files according to traffic data. the generated logs will be for every connection in the wire including the application level protocols and fields.
LOG CATEGORIES

COMMON LOGS

THREAT HUNTING: ANOMALY DETECTION & LOG CORRELATION
the table below can be used during threat hunting and describes a sample investigation procedure
OVERALL INFO: the first step of the investigation is to review the overall connections, shared files, loaded scripts & indicators
PROTOCOL BASED: conduct a more in-depth investigation by focusing on a specific protocol
DETECTION: use the prebuilt/custom detection scripts & signature outcomes to support findings
OBSERVATION: use the logs in this category to discover possible missing points

Last updated