Главная
Study mode:
on
1
Intro
2
Who am I
3
Agenda
4
Log data is underutilized
5
Practical strategies
6
Importance of normal
7
Hunting
8
Baselines
9
Logging Log Management
10
Normal Distribution
11
NonNormal Distribution
12
Windows Event Rate
13
Example
14
Obtaining Data
15
Questions to Ask
16
Visualizing Data
17
Outliers
18
Weekend
19
Handling Outliers
20
QQ Plot
21
Three Sigma Rule
22
Use Cases
23
RDP
24
RDP Access
25
Use Case Primer
26
Requirements
27
Event Sources
28
Validation
29
Histogram
30
ShapiroWilkes
31
Recap
32
What can you create
33
References
34
Questions
35
Log Reduction
36
Weekends
37
Friday
Description:
Explore practical strategies for baselining security log and event data in this BSidesLV conference talk. Delve into the importance of establishing normal patterns, hunting for anomalies, and effectively managing log data. Learn about normal and non-normal distributions, Windows event rates, and techniques for visualizing data. Discover how to identify and handle outliers using methods like QQ plots and the Three Sigma Rule. Examine real-world use cases, including RDP access analysis, and understand the requirements and event sources for effective baselining. Gain insights into log reduction techniques and weekend data patterns. Equip yourself with the knowledge to create meaningful baselines and enhance your security monitoring capabilities.

Determining Normal - Baselining with Security Log and Event Data

BSidesLV
Add to list