SlideShare uma empresa Scribd logo
1 de 16
1
Creating Rules and Understanding
Event Log Correlation with
SolarWinds® Log & Event Manager
© 2013, SolarWinds Worldwide, LLC. All rights reserved.
2
Agenda
» Rules in Log & Event Manager
» Correlation Rule Builder
» Rule Categories and Tags
» Real-time Event Correlation
» How does Event Correlation work?
» Result of Correlation
SOLARWINDS LOG & EVENT MANAGER
3
SolarWinds Log & Event Manager
» SolarWinds Log & Event Manager (LEM) offers real-time log
analysis and event correlation by giving you the control you
need to overcome everyday IT challenges.
» SolarWinds LEM correlates with the help of built-in and user
defined rules.
» Learn how to build to rules and how SolarWinds LEM
performs correlation.
SOLARWINDS LOG & EVENT MANAGER
4
Correlation Rule Builder
SOLARWINDS LOG & EVENT MANAGER
5
Rules in Log & Event Manager
» LEM rules offer the ability to use simple and advanced thresholds such as
time/frequency and same/distinct to add complexity and helps you
significantly reduce false positives.
» They track events in real time even when the LEM console is not
monitored.
» LEM rules allow you to:
• Correlate multiple events from different sources
• Automatically trigger alerts or email notifications
• Respond to security events in real time
SOLARWINDS LOG & EVENT MANAGER
6
Correlation Rule Builder
» SolarWinds LEM has a built-in Rule Builder that helps you to:
• Build new rules easily
• Clone existing rules
• Customize and edit existing rules
» The rule builder interface incorporates easy-to-use techniques such as drag
and drop, an icon-based tool panel, and a graphical object selection panel.
» The rule builder uses a logical ‘AND’ or ‘OR’ Boolean logic for rule creation.
» SolarWinds LEM offers more than 700 pre-built correlation rules that cover
critical network infrastructure, change management and network security
functions.
SOLARWINDS LOG & EVENT MANAGER
7
Correlation Rule Builder (Contd…)
SOLARWINDS LOG & EVENT MANAGER
» For easy rule
creation, there
are additional
events and fields
on the left-side of
the rule builder
window that can
be added to the
correlation rule.
8
Rule Categories and Tags
» LEM rules are organized into pre-built categories like
security, IT operations, compliance and change
management.
» SolarWinds LEM also allows you to add tags making rule
search easier.
SOLARWINDS LOG & EVENT MANAGER
9
Real-Time Event Correlation
SOLARWINDS LOG & EVENT MANAGER
10
Real-time Event Correlation
SOLARWINDS LOG & EVENT MANAGER
11
How does Event Correlation work?
» SolarWinds Log & Event Manager (LEM) is a full-function SIEM solution
that offers an intelligent correlation engine to understand operational,
security and policy-driven events.
» Log Collection: LEM captures real-time event streams from network
devices and utilizes agent technology to capture host-based events in
real time. Here is a list of data sources from which LEM can receive log
data for correlation and analysis.
» Normalization: This is a key step before events are correlated. LEM
parses the raw log data from agent nodes (workstations, servers, VMs,
OS, etc.) and maps events from disparate sources to a consistent
framework. This helps structure the data into identified categories and
fields.
SOLARWINDS LOG & EVENT MANAGER
12
How does Event Correlation work?
» In-Memory Correlation: LEM correlates event logs in-memory thus
avoiding performance bottlenecks associated with database insertion
and query speeds.
» Multiple-Event Correlation: LEM has comprehensive support for
multiple-device, multiple-event correlation, including the unique ability
to set independent thresholds of activity per event, or group of events.
» Non-Linear Correlation: After mapping events in-memory, LEM applies a
completely non-linear, multi-vector, correlation algorithm. This reduces
the number of correlation rules and eliminates the need to build distinct
rules for all possible combination of events.
SOLARWINDS LOG & EVENT MANAGER
13
How does Event Correlation work?
» Field-Level Comparison: LEM combines field-level data with user-defined
groups and variables, making it possible to build rules that minimize false
positives and focus your attention where and when it’s needed.
» Environmental Awareness: LEM’s correlation rules factor in details about
the organization, such as critical assets, applications, time of day or day
of week, etc. to bring focus on the environmental parameters associated
with the events and maximize the value of the data that’s being captured
and analyzed.
SOLARWINDS LOG & EVENT MANAGER
14
Result of Event Correlation
» Using the correlated event data, you can:
• Set up alerts to trigger when a specific security condition
is encountered
• Program active responses to counter threats,
troubleshoot issues and react to policy violations
• Perform event forensics and root cause analysis to
identify suspicious behavior patterns and anomalies
• Generate compliance reports for network and security
audits
SOLARWINDS LOG & EVENT MANAGER
15
SolarWinds Log & Event Manager
» SolarWinds Log & Event Manager (LEM) is a full-function SIEM solution
that extends comprehensive log collection, correlation, analysis, and
incident response to both servers and workstations.
» Watch this short video to learn how to easily create and customize
correlation rules using SolarWinds LEM.
15
SOLARWINDS LOG & EVENT MANAGER
16
Thank You!
SOLARWINDS LOG & EVENT MANAGER

Mais conteúdo relacionado

Destaque

SplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunkLive! Splunk for Security
SplunkLive! Splunk for Security
Splunk
 

Destaque (7)

SolarWinds Log & Event Manager vs Splunk. What's the Difference?
SolarWinds Log & Event Manager vs Splunk. What's the Difference?SolarWinds Log & Event Manager vs Splunk. What's the Difference?
SolarWinds Log & Event Manager vs Splunk. What's the Difference?
 
Log siem korelasyon
Log siem korelasyonLog siem korelasyon
Log siem korelasyon
 
Log Korelasyon/SIEM Kural Örnekleri ve Korelasyon Motoru Performans Verileri
Log Korelasyon/SIEM Kural Örnekleri ve Korelasyon Motoru Performans VerileriLog Korelasyon/SIEM Kural Örnekleri ve Korelasyon Motoru Performans Verileri
Log Korelasyon/SIEM Kural Örnekleri ve Korelasyon Motoru Performans Verileri
 
Advanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source SecurityAdvanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source Security
 
Improve Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation DirectivesImprove Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation Directives
 
SplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunkLive! Splunk for Security
SplunkLive! Splunk for Security
 
SolarWinds User Group - Hawaii November 2016
SolarWinds User Group - Hawaii November 2016SolarWinds User Group - Hawaii November 2016
SolarWinds User Group - Hawaii November 2016
 

Mais de SolarWinds

Mais de SolarWinds (20)

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Creating Rules & Understanding Event Log Correlation

  • 1. 1 Creating Rules and Understanding Event Log Correlation with SolarWinds® Log & Event Manager © 2013, SolarWinds Worldwide, LLC. All rights reserved.
  • 2. 2 Agenda » Rules in Log & Event Manager » Correlation Rule Builder » Rule Categories and Tags » Real-time Event Correlation » How does Event Correlation work? » Result of Correlation SOLARWINDS LOG & EVENT MANAGER
  • 3. 3 SolarWinds Log & Event Manager » SolarWinds Log & Event Manager (LEM) offers real-time log analysis and event correlation by giving you the control you need to overcome everyday IT challenges. » SolarWinds LEM correlates with the help of built-in and user defined rules. » Learn how to build to rules and how SolarWinds LEM performs correlation. SOLARWINDS LOG & EVENT MANAGER
  • 5. 5 Rules in Log & Event Manager » LEM rules offer the ability to use simple and advanced thresholds such as time/frequency and same/distinct to add complexity and helps you significantly reduce false positives. » They track events in real time even when the LEM console is not monitored. » LEM rules allow you to: • Correlate multiple events from different sources • Automatically trigger alerts or email notifications • Respond to security events in real time SOLARWINDS LOG & EVENT MANAGER
  • 6. 6 Correlation Rule Builder » SolarWinds LEM has a built-in Rule Builder that helps you to: • Build new rules easily • Clone existing rules • Customize and edit existing rules » The rule builder interface incorporates easy-to-use techniques such as drag and drop, an icon-based tool panel, and a graphical object selection panel. » The rule builder uses a logical ‘AND’ or ‘OR’ Boolean logic for rule creation. » SolarWinds LEM offers more than 700 pre-built correlation rules that cover critical network infrastructure, change management and network security functions. SOLARWINDS LOG & EVENT MANAGER
  • 7. 7 Correlation Rule Builder (Contd…) SOLARWINDS LOG & EVENT MANAGER » For easy rule creation, there are additional events and fields on the left-side of the rule builder window that can be added to the correlation rule.
  • 8. 8 Rule Categories and Tags » LEM rules are organized into pre-built categories like security, IT operations, compliance and change management. » SolarWinds LEM also allows you to add tags making rule search easier. SOLARWINDS LOG & EVENT MANAGER
  • 11. 11 How does Event Correlation work? » SolarWinds Log & Event Manager (LEM) is a full-function SIEM solution that offers an intelligent correlation engine to understand operational, security and policy-driven events. » Log Collection: LEM captures real-time event streams from network devices and utilizes agent technology to capture host-based events in real time. Here is a list of data sources from which LEM can receive log data for correlation and analysis. » Normalization: This is a key step before events are correlated. LEM parses the raw log data from agent nodes (workstations, servers, VMs, OS, etc.) and maps events from disparate sources to a consistent framework. This helps structure the data into identified categories and fields. SOLARWINDS LOG & EVENT MANAGER
  • 12. 12 How does Event Correlation work? » In-Memory Correlation: LEM correlates event logs in-memory thus avoiding performance bottlenecks associated with database insertion and query speeds. » Multiple-Event Correlation: LEM has comprehensive support for multiple-device, multiple-event correlation, including the unique ability to set independent thresholds of activity per event, or group of events. » Non-Linear Correlation: After mapping events in-memory, LEM applies a completely non-linear, multi-vector, correlation algorithm. This reduces the number of correlation rules and eliminates the need to build distinct rules for all possible combination of events. SOLARWINDS LOG & EVENT MANAGER
  • 13. 13 How does Event Correlation work? » Field-Level Comparison: LEM combines field-level data with user-defined groups and variables, making it possible to build rules that minimize false positives and focus your attention where and when it’s needed. » Environmental Awareness: LEM’s correlation rules factor in details about the organization, such as critical assets, applications, time of day or day of week, etc. to bring focus on the environmental parameters associated with the events and maximize the value of the data that’s being captured and analyzed. SOLARWINDS LOG & EVENT MANAGER
  • 14. 14 Result of Event Correlation » Using the correlated event data, you can: • Set up alerts to trigger when a specific security condition is encountered • Program active responses to counter threats, troubleshoot issues and react to policy violations • Perform event forensics and root cause analysis to identify suspicious behavior patterns and anomalies • Generate compliance reports for network and security audits SOLARWINDS LOG & EVENT MANAGER
  • 15. 15 SolarWinds Log & Event Manager » SolarWinds Log & Event Manager (LEM) is a full-function SIEM solution that extends comprehensive log collection, correlation, analysis, and incident response to both servers and workstations. » Watch this short video to learn how to easily create and customize correlation rules using SolarWinds LEM. 15 SOLARWINDS LOG & EVENT MANAGER
  • 16. 16 Thank You! SOLARWINDS LOG & EVENT MANAGER