, 11 tweets, 3 min read
My Authors
Read all threads
Log Sources Top 5
(ordered by cost-benefit ratio / volume > detectable threats)

1. Antivirus
2. Windows Eventlog (+Sysmon)
3. Proxy
4. Firewall
5. DNS
1/ I‘ll give some short comments to help you understand the order

In general: I included only those logs that can already be collected in most organizations, when you start a SecMon project.
Bro/Zeek, Suricata, Netflow, etc. would be somewhere between 2 and 4 if available. ..
2/ Some logs are more difficult (cost/effort) to tap into.
e.g. Antivirus logs can often be collected from a single console, while NSM requires high speed network Taps on mirroring ports in central locations (💵). If you have the budget and time, NSM is worth the effort.
3/
1. Antivirus logs often contain indicators for threat groups‘ activity that aren’t noticed b/c no one pays attention to events with status „successfully removed“.
(see my cheat sheet as guide to improve visibility)
4/
2. All main Windows Eventlogs matter:
‚System‘ contains service installs,
‚Application‘ App Crashes & AV events,
‘Security’ logins, group mgmt & proc starts

Sysmon adds: Parent>Child rel, Hashes, Registry, Nwrk cons, WMI, NamedPipes, Image/Driver loads => a goldmine
5/ You should tap into PowerShell, Scheduled Tasks log channels as well.
With the right Windows audit policy and Sysmon config the log volume can be reduced to a reasonable size.
6/
3. Proxy logs are often available and allow you to look for known:
- C2 addresses (get a good feed)
- known malicious UserAgents (see our Sigma rules)
- known malicious URL patterns
- suspicious TLDs (McAfee, EuroDNS & others have lists)
- Proxy logs contain stage2 downloads
7/
Firewall logs are much less useful than people believe. We split them into:
1. Out blocked <- most relevant
2. Out allowed
3. In allowed
4. In blocked <- least relevant

They contain C2 IPs & help in reconstruction of an incident.
Volume is very high.
8/
5. The volume of DNS logs is also pretty high. And in many orgs you have problems to get access to them. 🤷‍♂️
They contain C2 domain lookups, indicators for DNS tunnels, and can also be used to reconstruct events of an incident / malware outbreak.
9/
Some of you recommended email logs.
I admit that I’ve never worked with them. Colleagues had, but only in DFIR. Maybe that is caused by the strict data protection & strong works councils here in Germany (Europe) that wouldn’t allow tapping into email logs for daily monitoring
10/
I hope that these comments gave you more insight into the reasons for the order of my Top5.
Each one has been shortened and there are always other aspects to consider.

Please excuse the brevity, after all, this is Twitter 🐥
Missing some Tweet in this thread? You can try to force a refresh.

Enjoying this thread?

Keep Current with Florian Roth

Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!