Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Targeted Event Monitoring Report

by Megan Daudelin
September 22, 2015

Log monitoring is a daunting task that many organizations have difficulty tackling efficiently. For most organizations, the rate of log generation far exceeds the ability to of a security team adequately monitor it. Quickly identifying events of value through the noise is crucial to maintaining the integrity of a network. By leveraging the capabilities of SecurityCenter and the Log Correlation Engine (LCE), security teams can identify and communicate events of interest more efficiently.

The Targeted Event Monitoring report assists security teams in identifying important events in their logs so that faster remediation is possible. The report relies on normalized logs from LCE, which provide a tailored view of the events on the network related to potential concerns. Events are filtered by type in order to provide the most accurate view of potential security issues. This report cuts through the gigabytes of logs and focuses on events closely related to the integrity and function of a network.

The chapters in this report provide several views into the status of the network over the past 7 and 30 days to help security teams monitor important events generated from log analysis and ensure that necessary remediation or hardening measures can be implemented. Tables are filtered by event type to enable monitoring and timely remediation. Analysts can monitor and communicate the activity that has been detected in the past 7 or 30 days. Together, the chapters in this report provide a platform from which analysts can efficiently monitor and communicate events crucial to the function of a network.

The report is available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the SecurityCenter Feed under the category Monitoring. The report requirements are:

  • SecurityCenter 4.8.2
  • LCE 4.6.0

SecurityCenter Continuous View (CV) provides continuous network monitoring, vulnerability identification, risk reduction, and compliance monitoring. The Log Correlation Engine (LCE) performs deep log analysis and correlation to continuously discover and track users, applications, cloud infrastructure, trust relationships, and vulnerabilities. By integrating with LCE, SecurityCenter CV provides the most comprehensive view of network security data.

This report contains the following chapters:

  • Executive Summary: This chapter provides an overview of the most common events and event types on the network. The tables show which normalized events or event types have been detected the most during the past thirty days.
  • Targeted Event Monitoring: Monthly Overview: This chapter depicts the top events seen over the past 30 or 7 days by count. Each pair of tables describes a different event type. The columns note the normalized event, count, and trend. Security teams can use these tables to effectively monitor the most common events in the network and communicate their impact to management. Mitigation, remediation, and patching processes can be tailored to address the most common events on the network.
Try for Free Buy Now

Try Tenable.io Vulnerability Management

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.