| Introduction
Threat Hunting 101 Leveraging the Right
Log Data for Threat HuntingA SIEM is only as good as the data it uses, and proper threat hunting requires contextual data from a wide range of log sources . It’s important to collect log data from every security-related aspect of the environment your network including network devices and externally facing systems, endpoints,
servers both Windows and Linux, internal applications and services, and security and authentication solutions . The following list provides an example of the specific log data sources you should consider Once you are centrally collecting the proper log data in your SIEM, you can begin the process of threat hunting . Start with one of the easiest and more telling indicators of threat activity suspicious software .
Share with your friends: