Log monitoring is a daunting task that many organizations have difficulty tackling efficiently. For most organizations, the rate of log generation far exceeds the ability to of a security team adequately monitor it. Quickly identifying events of value through the noise is crucial to maintaining the integrity of a network. By leveraging the capabilities of SecurityCenter and the Log Correlation Engine (LCE), security teams can identify and communicate events of interest more efficiently.
The Targeted Event Monitoring report assists security teams in identifying important events in their logs so that faster remediation is possible. The report relies on normalized logs from LCE, which provide a tailored view of the events on the network related to potential concerns. Events are filtered by type in order to provide the most accurate view of potential security issues. This report cuts through the gigabytes of logs and focuses on events closely related to the integrity and function of a network.
The chapters in this report provide several views into the status of the network over the past 7 and 30 days to help security teams monitor important events generated from log analysis and ensure that necessary remediation or hardening measures can be implemented. Tables are filtered by event type to enable monitoring and timely remediation. Analysts can monitor and communicate the activity that has been detected in the past 7 or 30 days. Together, the chapters in this report provide a platform from which analysts can efficiently monitor and communicate events crucial to the function of a network.
The report is available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the SecurityCenter Feed under the category Monitoring. The report requirements are:
- SecurityCenter 4.8.2
- LCE 4.6.0
SecurityCenter Continuous View (CV) provides continuous network monitoring, vulnerability identification, risk reduction, and compliance monitoring. The Log Correlation Engine (LCE) performs deep log analysis and correlation to continuously discover and track users, applications, cloud infrastructure, trust relationships, and vulnerabilities. By integrating with LCE, SecurityCenter CV provides the most comprehensive view of network security data.
This report contains the following chapters:
- Executive Summary: This chapter provides an overview of the most common events and event types on the network. The tables show which normalized events or event types have been detected the most during the past thirty days.
- Targeted Event Monitoring: Monthly Overview: This chapter depicts the top events seen over the past 30 or 7 days by count. Each pair of tables describes a different event type. The columns note the normalized event, count, and trend. Security teams can use these tables to effectively monitor the most common events in the network and communicate their impact to management. Mitigation, remediation, and patching processes can be tailored to address the most common events on the network.