SlideShare a Scribd company logo
Top 10 Things Logs
                                                    Can Do For You, Today
                                                Presented by: Nicole Pauls, Director, Product Management




COPYRIGHT © 2012, SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.

                                                                    1
Agenda

 » Background
         Why Collect Logs?
         Collection, aggregation, and analysis methods


 » Get to the Top 10 Already!

 » Implementing the Top 10 with SolarWinds®




© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
                                                         2
Background: Why Collect Logs?

 » For boring reasons
         Compliance mandates, internal or external - PCI, HIPAA, GLBA, FISMA,
          etc
 » For security reasons
         Use log data to identify security issues
         Use log data to investigate security issues
 » For operations reasons
         Use log data to identify outages and issues
         Use log data to troubleshoot
 » All of the above, and more!




© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
                                                         3
Background: Collection, Aggregation, and
 Analysis Methods
 » Collection
         Syslog, SNMP traps, text log files, databases, APIs
 » Aggregation
         Syslog server, log management platform, SIEM (Security Information &
          Event Management)
 » Analysis
            Search
            Reporting
            Alerting
            Correlation




© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
                                                         4
#1: Users Are The Gateway To The Network

 » Detect Changes to Users & Groups
         New users being added at domain or local level
         New machines being joined to the domain
         Users being added to/removed from groups, especially Domain and
          Local Admins
         User password changes (and failures)




© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
                                                         5
#2: No, Devices Are The Gateway To The
 Network
» Detect changes to Devices and Device Policy
          Commands being ran
          Changes to device settings (interface speeds, down/up, VLANs)
          Changes to ACLs
          Policy save/restore




© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
                                                         6
#3: Normal Authentication Activity That’s Not
 So Normal
 » Successful logon activity
         Any authentication to accounts with administrative
          privileges, especially domain admin
         Remote authentication to servers and systems
          with sensitive data
         Access to accounts reserved for services, especially
          “interactive” logons of ANY kind
         Use of regular user accounts, especially
          administrators, to run scheduled tasks or services
         Local physical logons to servers and systems with
          sensitive data
         Logons to network devices for management



© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
                                                         7
#4: Find Clues In Authentication Failures

 » Failed logon activity
         Excessive logon failures to normal user accounts (everything from
          brute force to a stupid phone)
         Failed logons to administrative accounts, especially from unexpected
          sources
         Failed logon activity to network devices
         Account lockouts




© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
                                                         8
#5: Watch The Weird Wide Web

 » Proxy data – not just for HR
            Excessive hits to blocked categories or URLs (okay, this one is for HR)
            Attempts to download malware (by name, domain, or category)
            Outbound web traffic from servers or limited admins
            “Watch List” certain users and look for more key behavior




© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
                                                         9
#6: Track Service Availability

 » Service activity
         Services that failed to start on
        boot (or otherwise)
         Repeat failures to start services
         Services stopping unexpectedly
         Informational messages about
        status of services




© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
                                                         10
#7: Identify System-Level Changes

 » System activity
         System restarts or shutdowns – and
          who initiated them
         Software installation and removal
         Device updates
         Event log full or cleared (events lost
          or no longer being logged!)
         Audit policy or logging
          configuration changes




© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
                                                         11
#8: Find The Needle In The Network Traffic
 Haystack
 » Suspicious Network Traffic
         Outgoing traffic from servers directly
         Any outbound web traffic requests not going through your proxy
          server
         Remote access ports to IPs you don’t expect (RDP, SSH®/Telnet™, VPN,
          FTP, etc)
         Excessive hits to perimeter egress filters (from the same IP, to the
          same IP)
         Triggers from IDS/IPS systems




© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
                                                         12
#9: Things Specific To YOUR Organization

 »      Do you have core systems (banking, records, etc) that should have
        limited access?
         Most of these have audit trails, too.
         Some of these systems are not trivial and will require third party agents.
 »      Do you have external systems, systems in the cloud, DMZ?
         More carefully monitor remote access and unexpected changes
         Consider how connected these systems are to your core network and
          monitor those points
 »      Do you have custom or third-party applications that interface with
        your data or systems?
         These apps SHOULD generate basic audit trail data – who is accessing,
          from where, and what changes are being made.
         After the audit trail, logs should help you solve a problem, not just
          generate more noise for you.



© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
                                                         13
#10: Make Auditors Happy (or At Least
 Happier)
 »      Compliance…
         Any changes, expected or otherwise, to devices, servers, and accounts
               • YOU are especially looking for unauthorized or unexpected changes.
               • THEY want to know what was changed, where, and why.
         Access to critical system resources (anywhere high value data is stored)
               • YOU are looking to make sure only people who should have access have access, and you
                 know why.
               • THEY want to know you’re looking at critical systems and ensuring limited access.
         Access to high value data itself
               • YOU are looking for unexpected access, deletes, moves, copies.
               • THEY want to know you’re looking at the right files and what changes you’re auditing.
         Remote access, approved or otherwise
               • YOU are looking for activity from outside the network that could leak data.
               • THEY want to know who is accessing your data from where.
         All administrative access
               • YOU want to make sure your administrators are only doing what they should be.
               • THEY want to track all the activity your administrators have done.



© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
                                                         14
Implementing The Top 10 With SolarWinds

 » Event Log Consolidator
         Free tool! View events from 5 Windows® systems in one place.
         Basic search, basic export
 » Kiwi Syslog®
         Free and paid versions; basic features (no reporting, basic alerting)
         Windows Event Log Forwarder (paid) can be used to aggregate Event
          Log data
 » Orion® Products (Server & Application Monitor, Network
   Performance Monitor)
         Can aggregate syslog and SNMP Traps, and do some basic searching
          and alerting
 » Log & Event Manager
         Full-on SIEM for everyone – real-time aggregation of all types of
          logs, extensive searching, reporting, alerting, correlation

© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
                                                         15
Thanks for your attention!




                    » Q&A

                    Q&A



                       16
Continue the Conversation…

» Chat with product experts in the thwackCamp Product
  Showcase

» Join us in the thwackCamp group on thwack® to continue
  Q&A for this session

» Discover additional information in the SolarWinds® Resource
  Center




                              17

More Related Content

What's hot

SolarWinds Freeware Philosophy Blogger Event
SolarWinds Freeware Philosophy Blogger EventSolarWinds Freeware Philosophy Blogger Event
SolarWinds Freeware Philosophy Blogger Event
SolarWinds
 
New Window of Opportunity
New Window of OpportunityNew Window of Opportunity
New Window of Opportunity
CASCouncil
 
Second Slide%20 %20 Slide%20 Sharing%20 Made%20 Easy%20with%20the%20 Innovati...
Second Slide%20 %20 Slide%20 Sharing%20 Made%20 Easy%20with%20the%20 Innovati...Second Slide%20 %20 Slide%20 Sharing%20 Made%20 Easy%20with%20the%20 Innovati...
Second Slide%20 %20 Slide%20 Sharing%20 Made%20 Easy%20with%20the%20 Innovati...
Chrystalmae
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
SolarWinds
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
centralohioissa
 
Dbdes mnn cloud_oct2012
Dbdes mnn cloud_oct2012Dbdes mnn cloud_oct2012
Dbdes mnn cloud_oct2012
Steven Backman
 
Getting Your System to Production and Keeping it There
Getting Your System to Production and Keeping it ThereGetting Your System to Production and Keeping it There
Getting Your System to Production and Keeping it There
Eoin Woods
 
Big Events Cause Network Mayhem
Big Events Cause Network MayhemBig Events Cause Network Mayhem
Big Events Cause Network Mayhem
PacketTrap Msp
 
SolarWinds User Group - Hawaii November 2016
SolarWinds User Group - Hawaii November 2016SolarWinds User Group - Hawaii November 2016
SolarWinds User Group - Hawaii November 2016
SolarWinds
 
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...
SolarWinds
 
Secrets of SolarWinds SAM
Secrets of SolarWinds SAMSecrets of SolarWinds SAM
Secrets of SolarWinds SAM
SolarWinds
 
System Security Beyond the Libraries
System Security Beyond the LibrariesSystem Security Beyond the Libraries
System Security Beyond the Libraries
Eoin Woods
 
thwackCamp 2013: Cut the Alert Noise: Best Practices to Avoid Common Pitfalls...
thwackCamp 2013: Cut the Alert Noise: Best Practices to Avoid Common Pitfalls...thwackCamp 2013: Cut the Alert Noise: Best Practices to Avoid Common Pitfalls...
thwackCamp 2013: Cut the Alert Noise: Best Practices to Avoid Common Pitfalls...
SolarWinds
 
Getting the most from your virtual infrastructure
Getting the most from your virtual infrastructureGetting the most from your virtual infrastructure
Getting the most from your virtual infrastructure
SolarWinds
 
SolarWinds Scalability for the Enterprise
SolarWinds Scalability for the EnterpriseSolarWinds Scalability for the Enterprise
SolarWinds Scalability for the Enterprise
SolarWinds
 
Aaci & fac64 sales presentation v1
Aaci & fac64 sales presentation v1Aaci & fac64 sales presentation v1
Aaci & fac64 sales presentation v1
JAMES E. McDONALD, PSNA
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
Mike Spaulding
 
232 a7d01
232 a7d01232 a7d01
Site Reliability Engineering: Harnessing (and redefining) it for ITSM
Site Reliability Engineering: Harnessing (and redefining) it for ITSMSite Reliability Engineering: Harnessing (and redefining) it for ITSM
Site Reliability Engineering: Harnessing (and redefining) it for ITSM
Jon Stevens-Hall
 
Expanding our Understanding: Complex Adaptive Systems
Expanding our Understanding: Complex Adaptive SystemsExpanding our Understanding: Complex Adaptive Systems
Expanding our Understanding: Complex Adaptive Systems
Jon Stevens-Hall
 

What's hot (20)

SolarWinds Freeware Philosophy Blogger Event
SolarWinds Freeware Philosophy Blogger EventSolarWinds Freeware Philosophy Blogger Event
SolarWinds Freeware Philosophy Blogger Event
 
New Window of Opportunity
New Window of OpportunityNew Window of Opportunity
New Window of Opportunity
 
Second Slide%20 %20 Slide%20 Sharing%20 Made%20 Easy%20with%20the%20 Innovati...
Second Slide%20 %20 Slide%20 Sharing%20 Made%20 Easy%20with%20the%20 Innovati...Second Slide%20 %20 Slide%20 Sharing%20 Made%20 Easy%20with%20the%20 Innovati...
Second Slide%20 %20 Slide%20 Sharing%20 Made%20 Easy%20with%20the%20 Innovati...
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Dbdes mnn cloud_oct2012
Dbdes mnn cloud_oct2012Dbdes mnn cloud_oct2012
Dbdes mnn cloud_oct2012
 
Getting Your System to Production and Keeping it There
Getting Your System to Production and Keeping it ThereGetting Your System to Production and Keeping it There
Getting Your System to Production and Keeping it There
 
Big Events Cause Network Mayhem
Big Events Cause Network MayhemBig Events Cause Network Mayhem
Big Events Cause Network Mayhem
 
SolarWinds User Group - Hawaii November 2016
SolarWinds User Group - Hawaii November 2016SolarWinds User Group - Hawaii November 2016
SolarWinds User Group - Hawaii November 2016
 
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...
 
Secrets of SolarWinds SAM
Secrets of SolarWinds SAMSecrets of SolarWinds SAM
Secrets of SolarWinds SAM
 
System Security Beyond the Libraries
System Security Beyond the LibrariesSystem Security Beyond the Libraries
System Security Beyond the Libraries
 
thwackCamp 2013: Cut the Alert Noise: Best Practices to Avoid Common Pitfalls...
thwackCamp 2013: Cut the Alert Noise: Best Practices to Avoid Common Pitfalls...thwackCamp 2013: Cut the Alert Noise: Best Practices to Avoid Common Pitfalls...
thwackCamp 2013: Cut the Alert Noise: Best Practices to Avoid Common Pitfalls...
 
Getting the most from your virtual infrastructure
Getting the most from your virtual infrastructureGetting the most from your virtual infrastructure
Getting the most from your virtual infrastructure
 
SolarWinds Scalability for the Enterprise
SolarWinds Scalability for the EnterpriseSolarWinds Scalability for the Enterprise
SolarWinds Scalability for the Enterprise
 
Aaci & fac64 sales presentation v1
Aaci & fac64 sales presentation v1Aaci & fac64 sales presentation v1
Aaci & fac64 sales presentation v1
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
232 a7d01
232 a7d01232 a7d01
232 a7d01
 
Site Reliability Engineering: Harnessing (and redefining) it for ITSM
Site Reliability Engineering: Harnessing (and redefining) it for ITSMSite Reliability Engineering: Harnessing (and redefining) it for ITSM
Site Reliability Engineering: Harnessing (and redefining) it for ITSM
 
Expanding our Understanding: Complex Adaptive Systems
Expanding our Understanding: Complex Adaptive SystemsExpanding our Understanding: Complex Adaptive Systems
Expanding our Understanding: Complex Adaptive Systems
 

Viewers also liked

Log parser lizard
Log parser lizardLog parser lizard
Log parser lizard
Joey Chen
 
Using NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application PerformanceUsing NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application Performance
Emulex Corporation
 
How to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco RoutersHow to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco Routers
SolarWinds
 
Git & G
Git & GGit & G
Git & G
SangJung Woo
 
Centralized Logging with syslog
Centralized Logging with syslogCentralized Logging with syslog
Centralized Logging with syslog
amiable_indian
 
Cloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow AnalysisCloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow Analysis
Alex Henthorn-Iwane
 
Syslog
SyslogSyslog
Syslog
SangJung Woo
 
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
SolarWinds
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlow
Lancope, Inc.
 
AWS Monitoring & Logging
AWS Monitoring & LoggingAWS Monitoring & Logging
AWS Monitoring & Logging
Jason Poley
 

Viewers also liked (10)

Log parser lizard
Log parser lizardLog parser lizard
Log parser lizard
 
Using NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application PerformanceUsing NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application Performance
 
How to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco RoutersHow to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco Routers
 
Git & G
Git & GGit & G
Git & G
 
Centralized Logging with syslog
Centralized Logging with syslogCentralized Logging with syslog
Centralized Logging with syslog
 
Cloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow AnalysisCloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow Analysis
 
Syslog
SyslogSyslog
Syslog
 
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlow
 
AWS Monitoring & Logging
AWS Monitoring & LoggingAWS Monitoring & Logging
AWS Monitoring & Logging
 

Similar to Top 10 Things Logs Can Do for You, Today

Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Edgar Alejandro Villegas
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
Novell
 
SolarWinds Mobile Admin: A Powerful Productivity Tool for Your Whole Team
SolarWinds Mobile Admin: A Powerful Productivity Tool for Your Whole TeamSolarWinds Mobile Admin: A Powerful Productivity Tool for Your Whole Team
SolarWinds Mobile Admin: A Powerful Productivity Tool for Your Whole Team
SolarWinds
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
 
SolarWinds Online Federal User Group
SolarWinds Online Federal User GroupSolarWinds Online Federal User Group
SolarWinds Online Federal User Group
SolarWinds
 
APAC Partner Update: SolarWinds Network Complexity
APAC Partner Update:  SolarWinds Network ComplexityAPAC Partner Update:  SolarWinds Network Complexity
APAC Partner Update: SolarWinds Network Complexity
SolarWinds
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds Security
SolarWinds
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
Denim Group
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Glen Roberts, CISSP
 
Why advanced monitoring is key for healthy
Why advanced monitoring is key for healthyWhy advanced monitoring is key for healthy
Why advanced monitoring is key for healthy
Denodo
 
Server and Application Monitor for the US Air Force
Server and Application Monitor for the US Air ForceServer and Application Monitor for the US Air Force
Server and Application Monitor for the US Air Force
SolarWinds
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Emulex Corporation
 
Getting the most from Application Security in your SOC by Leigh Collett
Getting the most from Application Security in your SOC by Leigh CollettGetting the most from Application Security in your SOC by Leigh Collett
Getting the most from Application Security in your SOC by Leigh Collett
Jorge Carrillo, Ph.D
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
SolarWinds
 
SplunkLive! Splunk App for VMware
SplunkLive! Splunk App for VMwareSplunkLive! Splunk App for VMware
SplunkLive! Splunk App for VMware
Splunk
 
Database Performance Problems: Emergency Remediation and Proactive Alerting
Database Performance Problems: Emergency Remediation and Proactive AlertingDatabase Performance Problems: Emergency Remediation and Proactive Alerting
Database Performance Problems: Emergency Remediation and Proactive Alerting
SolarWinds
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
NetIQ
 
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
Liming Zhu
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
DBmaestro - Database DevOps
 
Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008
Anton Chuvakin
 

Similar to Top 10 Things Logs Can Do for You, Today (20)

Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
SolarWinds Mobile Admin: A Powerful Productivity Tool for Your Whole Team
SolarWinds Mobile Admin: A Powerful Productivity Tool for Your Whole TeamSolarWinds Mobile Admin: A Powerful Productivity Tool for Your Whole Team
SolarWinds Mobile Admin: A Powerful Productivity Tool for Your Whole Team
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
SolarWinds Online Federal User Group
SolarWinds Online Federal User GroupSolarWinds Online Federal User Group
SolarWinds Online Federal User Group
 
APAC Partner Update: SolarWinds Network Complexity
APAC Partner Update:  SolarWinds Network ComplexityAPAC Partner Update:  SolarWinds Network Complexity
APAC Partner Update: SolarWinds Network Complexity
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds Security
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
 
Why advanced monitoring is key for healthy
Why advanced monitoring is key for healthyWhy advanced monitoring is key for healthy
Why advanced monitoring is key for healthy
 
Server and Application Monitor for the US Air Force
Server and Application Monitor for the US Air ForceServer and Application Monitor for the US Air Force
Server and Application Monitor for the US Air Force
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
Getting the most from Application Security in your SOC by Leigh Collett
Getting the most from Application Security in your SOC by Leigh CollettGetting the most from Application Security in your SOC by Leigh Collett
Getting the most from Application Security in your SOC by Leigh Collett
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 
SplunkLive! Splunk App for VMware
SplunkLive! Splunk App for VMwareSplunkLive! Splunk App for VMware
SplunkLive! Splunk App for VMware
 
Database Performance Problems: Emergency Remediation and Proactive Alerting
Database Performance Problems: Emergency Remediation and Proactive AlertingDatabase Performance Problems: Emergency Remediation and Proactive Alerting
Database Performance Problems: Emergency Remediation and Proactive Alerting
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008
 

More from SolarWinds

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
SolarWinds
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
SolarWinds
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
SolarWinds
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
SolarWinds
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
SolarWinds
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
SolarWinds
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
SolarWinds
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
SolarWinds
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
SolarWinds
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
SolarWinds
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
SolarWinds
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
SolarWinds
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
SolarWinds
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
SolarWinds
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
SolarWinds
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
SolarWinds
 
Government and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for PerformanceGovernment and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for Performance
SolarWinds
 

More from SolarWinds (20)

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 
Government and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for PerformanceGovernment and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for Performance
 

Recently uploaded

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 

Recently uploaded (20)

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 

Top 10 Things Logs Can Do for You, Today

  • 1. Top 10 Things Logs Can Do For You, Today Presented by: Nicole Pauls, Director, Product Management COPYRIGHT © 2012, SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 1
  • 2. Agenda » Background  Why Collect Logs?  Collection, aggregation, and analysis methods » Get to the Top 10 Already! » Implementing the Top 10 with SolarWinds® © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 2
  • 3. Background: Why Collect Logs? » For boring reasons  Compliance mandates, internal or external - PCI, HIPAA, GLBA, FISMA, etc » For security reasons  Use log data to identify security issues  Use log data to investigate security issues » For operations reasons  Use log data to identify outages and issues  Use log data to troubleshoot » All of the above, and more! © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 3
  • 4. Background: Collection, Aggregation, and Analysis Methods » Collection  Syslog, SNMP traps, text log files, databases, APIs » Aggregation  Syslog server, log management platform, SIEM (Security Information & Event Management) » Analysis  Search  Reporting  Alerting  Correlation © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 4
  • 5. #1: Users Are The Gateway To The Network » Detect Changes to Users & Groups  New users being added at domain or local level  New machines being joined to the domain  Users being added to/removed from groups, especially Domain and Local Admins  User password changes (and failures) © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 5
  • 6. #2: No, Devices Are The Gateway To The Network » Detect changes to Devices and Device Policy  Commands being ran  Changes to device settings (interface speeds, down/up, VLANs)  Changes to ACLs  Policy save/restore © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 6
  • 7. #3: Normal Authentication Activity That’s Not So Normal » Successful logon activity  Any authentication to accounts with administrative privileges, especially domain admin  Remote authentication to servers and systems with sensitive data  Access to accounts reserved for services, especially “interactive” logons of ANY kind  Use of regular user accounts, especially administrators, to run scheduled tasks or services  Local physical logons to servers and systems with sensitive data  Logons to network devices for management © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 7
  • 8. #4: Find Clues In Authentication Failures » Failed logon activity  Excessive logon failures to normal user accounts (everything from brute force to a stupid phone)  Failed logons to administrative accounts, especially from unexpected sources  Failed logon activity to network devices  Account lockouts © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 8
  • 9. #5: Watch The Weird Wide Web » Proxy data – not just for HR  Excessive hits to blocked categories or URLs (okay, this one is for HR)  Attempts to download malware (by name, domain, or category)  Outbound web traffic from servers or limited admins  “Watch List” certain users and look for more key behavior © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 9
  • 10. #6: Track Service Availability » Service activity  Services that failed to start on boot (or otherwise)  Repeat failures to start services  Services stopping unexpectedly  Informational messages about status of services © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 10
  • 11. #7: Identify System-Level Changes » System activity  System restarts or shutdowns – and who initiated them  Software installation and removal  Device updates  Event log full or cleared (events lost or no longer being logged!)  Audit policy or logging configuration changes © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 11
  • 12. #8: Find The Needle In The Network Traffic Haystack » Suspicious Network Traffic  Outgoing traffic from servers directly  Any outbound web traffic requests not going through your proxy server  Remote access ports to IPs you don’t expect (RDP, SSH®/Telnet™, VPN, FTP, etc)  Excessive hits to perimeter egress filters (from the same IP, to the same IP)  Triggers from IDS/IPS systems © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 12
  • 13. #9: Things Specific To YOUR Organization » Do you have core systems (banking, records, etc) that should have limited access?  Most of these have audit trails, too.  Some of these systems are not trivial and will require third party agents. » Do you have external systems, systems in the cloud, DMZ?  More carefully monitor remote access and unexpected changes  Consider how connected these systems are to your core network and monitor those points » Do you have custom or third-party applications that interface with your data or systems?  These apps SHOULD generate basic audit trail data – who is accessing, from where, and what changes are being made.  After the audit trail, logs should help you solve a problem, not just generate more noise for you. © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 13
  • 14. #10: Make Auditors Happy (or At Least Happier) » Compliance…  Any changes, expected or otherwise, to devices, servers, and accounts • YOU are especially looking for unauthorized or unexpected changes. • THEY want to know what was changed, where, and why.  Access to critical system resources (anywhere high value data is stored) • YOU are looking to make sure only people who should have access have access, and you know why. • THEY want to know you’re looking at critical systems and ensuring limited access.  Access to high value data itself • YOU are looking for unexpected access, deletes, moves, copies. • THEY want to know you’re looking at the right files and what changes you’re auditing.  Remote access, approved or otherwise • YOU are looking for activity from outside the network that could leak data. • THEY want to know who is accessing your data from where.  All administrative access • YOU want to make sure your administrators are only doing what they should be. • THEY want to track all the activity your administrators have done. © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 14
  • 15. Implementing The Top 10 With SolarWinds » Event Log Consolidator  Free tool! View events from 5 Windows® systems in one place.  Basic search, basic export » Kiwi Syslog®  Free and paid versions; basic features (no reporting, basic alerting)  Windows Event Log Forwarder (paid) can be used to aggregate Event Log data » Orion® Products (Server & Application Monitor, Network Performance Monitor)  Can aggregate syslog and SNMP Traps, and do some basic searching and alerting » Log & Event Manager  Full-on SIEM for everyone – real-time aggregation of all types of logs, extensive searching, reporting, alerting, correlation © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 15
  • 16. Thanks for your attention! » Q&A Q&A 16
  • 17. Continue the Conversation… » Chat with product experts in the thwackCamp Product Showcase » Join us in the thwackCamp group on thwack® to continue Q&A for this session » Discover additional information in the SolarWinds® Resource Center 17