Operate and Maintain Monitoring Systems

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

35 hours 10 minutes
Video Transcription
Hello and welcome back the Cup. Tia Certified Van Security Practitioners Certification Preparation course.
This is Marge number nine and its title. Scanning the monitoring
here again are the objectives which encompasses this particular module.
What we can do now is turned out to tour, discussion off, operate and maintain monitoring systems.
Now let's take a look and learn objectives and the order would you be covered. Doing this particular presentation will begin by first discussing events of interest marking and lastly source systems.
Perhaps the best place. Begin this presentation by taking a look at a pre assessment question, and the question is as follows.
What is a predefined criteria? A threshold that says often, event entry call is a clipping. Levels
be source system.
See, trends are long management.
If you say like that, eh? Which stands for clipping Love was, you're absolutely correct because clipping levels are predefined cracked here, or thresholds that set often entry. For example, a security operation center does not want to be notified on every failed longer attempt because everyone miss type their passwords occasionally.
The first top of our agenda is events of interest, and you may ask why they're important first are taking a look at a dedication authorization.
The dedication is the main barrier and means of controlling access to today's systems, from simple passwords to tokens and cryptographic, aled mechanism
review and authentication actives across your organization, one of the key security activities,
the next Adamis systems and data change reports
information systems can lead to cause it crashes, and the loss of data may also indicate security incidents. On top of this attack offer modified your systems in order to enable the access in the future. Being diligent with track and changes will also improve your overall i t operations.
Then we look at network activity reports.
The network is a main vector for threats to arrive at an information assets. Obviously, the net was also remain with a steel. Infamous assets from today's organizations
then become to resource excess reports. Track and resource assets access can be used to reveal insider abuse and even fraud. They are valuable doing instant response for the Termini, which resourced attacker has access and possibly corrupted or modified.
Then we have the mayor where activity report
malicious software in various forms remains one of the key
threat vectors for today's organizations. Larger, small and embarrass tools have been losing efficiency for the technique and stopping there with over the last few years. Then we have failure and criteria error reports,
error and failure logs.
Mrs often present valuable early indications security threats, including advanced threats not captured by security specific devices such as your I. D. S and chooses the Texas system and intrusion prevention systems.
So we accept, begs the question we look at Log Man, but why is it important? Because we think about logs. They're very in purpose of I t. Security isn't being proactive,
and the bug measures make it much more difficult for someone to attempt to compromise the network. This might not be enough, and you need to be able to take the actual breaches as their attempted. This is what Log data really matters There. Other words we have our long generation storage locker protection as well as analysis
to expose an attacker identified the damage cause you need to analyze the log events on your network in real time by collecting. Analyze the logs. You can understand what transpired within your network. Each log file contains
very many pieces of information that could be invaluable, especially if you don't know how to read them. And and as, um, we're proper analysis of this actual data, you could identify and choosing attempts miss configuration equipment, many more
items as well.
This brings us to the topic of law generation when you look at love generation, some things that we have to consider, for example, be law configuration,
and what that sentence means is we need determine what we need to log.
We have these whole space activities. We look at changes to the system
in terms of access. Request performance. Start up a nice well, it's a shutdown network activities encompasses access traffic types, traffic patterns, male work, performance as well.
Clipping levels on hand are a predefined criteria. Ah, thrust hold that set off an event entry. For example, a security operation center does not want to be notified on every fill logging and Tim, because everyone miss type that passwords occasionally.
Thus set the clipping level two Onley create a log entry
after two failed password attempts. Tipping levels usedto have a time proper associate with them for the Logan process to not to have to keep track of every single failed password attempt, an off chance that the next time that that account is locked in the path was Miss Type sets the limit to reasonable amount of time.
For example,
30 minutes not assist. One only has to keep track off and embedded long attempt on a particular count for, for example, 30 minutes. If another invalid attempt attempts to try to come in on that account, the system can disregard the 1st 1
Clipping levels are great for reducing the amount of doubt accumulate and log files care must be taken to ensure important data is not skip.
And like everything else, the clipping level needs to be documented and protected because an attacker would gain an advantage knowing them.
We also had a look at what we call time synchronization, which is another important aspect. When we talk about the importance of having all the logs time synchronized. We wanna utilize network time protocol, which should have derive this time from a threshold or trust the time. In other words, they're trusted time sources out there on the Internet.
But the best trusted source is a GPS global positioning satellite
issue. Have yourself connected to the time server as well.
Next, they wanna take a look again. It's called log Storage.
We might want to consider having centralized storage. We have excessive log, and we want to make sure we look at stop blogging and we wanna make sure to be overwrite. The oldest long entries. Those are things we must consider, characteristically speaking, and also we must stop the law generator. Also, look at retention.
I see it. So it's important for you to have a policy for your long that well. It works for your particular organization
and also taken consideration the risk that your organization faces not ever owns. This has the same risk. Associate whips the security. There's some legal requirements for retention of logs based on industry that you work in. And there's some other reason as well. You might also see See you're out, then see, for example, you have an incident.
It had occurred six months later.
You might want to also mention you have that because it may be required that you met. Have a public records request you to make sure you have that information available
Law protection here. Some things that we need to look at. We want unlimited access to the log files would avoid recording unneeded. Since that data, we want to protect our archive log files security processes that generate the log interests. Critical systems should log to another system.
You need also configure each log source to behave appropriately when Logan errors occur.
Then we come to log analysis
some of the things we look at in terms that we look. Att event correlation
Again we made to consider status automation context. We might also want to also it engage what we call privatization in terms of entry type. We look at the newness of the Intertype, the long source, the source or destination. I p. Address the time of day or the day of the week and the frequency of the industry.
This brings us to our security information. An event management system was defined as a complex set of technology brought together to provide holistic view into the technical infrastructure.
What this device does, it looks at advance in law collection. It looks at a layer centric view,
also looks at normalization correlation. It has adaptability reporting in the loading as well as law management.
Modern information system state is one of the most important activity that a security practice I can't engage in to ensure that the infrastructure under their particular care is optimized cure in a proactive manner.
This brings us to our post assessment course in,
and the course of is as follows what is in our insides that seeks to make sense out of computer generated records. Call. Is it a long analysis?
Be trends see no protection or clipping levels?
The correct response Have been log analysis. During this particular presentation, we briefed the highlighted events of interests discussing Log in as well a source systems
in the upcoming presentation. We moving on and the terms are discussing, analyzing more entering results. Look forward to seeing your very next video.
Up Next