Главная
Study mode:
on
1
Intro
2
Introduction - What is Security Onion?
3
Introduction - What can I do with Security Onion?
4
Tools: Backend
5
Tools: Analysis
6
Data: Alert Data
7
Data: Host Data
8
Data: Metadata
9
Metadata: Example Bro HTTP Log
10
Data: Full Content Data
11
Data: Raw Files
12
Interfaces: Sguil
13
Interfaces: Squert
14
Interfaces: Kibana
15
Academia
16
Forensics
17
Enterprise Security Monitoring
18
Standalone Deployment
19
Distributed Deployment
20
Analyst VM
21
Event Conduit
22
Elastic Stack
23
Event Enrichment
24
Alerting
25
Hybrid Hunter
26
Stenographer
27
Investigating an Alert: Sguil - Kibana
Description:
Explore enterprise security monitoring techniques using Security Onion in this 38-minute conference talk from BSides Tampa 2019. Learn about the capabilities and tools of Security Onion, including backend components, analysis interfaces, and various data types such as alerts, host data, metadata, and full content. Discover how to leverage Sguil, Squert, and Kibana interfaces for effective threat hunting and investigation. Gain insights into deployment options, event enrichment, alerting mechanisms, and the Elastic Stack integration. Follow along as the speaker demonstrates investigating an alert using Sguil and Kibana, providing practical knowledge for security professionals seeking to enhance their monitoring and incident response capabilities.

Enterprise Security Monitoring - Seeing Clearly with Security Onion - Wes Lambert

Add to list
0:00 / 0:00