Security Operations

SIEM Implementation

Build Effective Security Monitoring

18 min read

Table of Contents
  1. What is a SIEM?
  2. Choosing a SIEM
  3. Log Collection Strategy
  4. Detection Rules
  5. Dashboards & Reporting
  6. Alert Tuning

What is a SIEM?

Security Information and Event Management (SIEM) aggregates logs from across your environment, correlates events, and generates alerts for potential security incidents.

Core SIEM Functions

Choosing a SIEM

SplunkMost powerful, expensive, enterprise-grade
Microsoft SentinelCloud-native, Azure integration, pay-per-use
Elastic SIEMOpen-source friendly, scalable
IBM QRadarEnterprise, strong analytics
Sumo LogicCloud-native, modern UI

Log Collection Strategy

Priority Log Sources

  1. Authentication: AD, Azure AD, VPN, SSO
  2. Endpoints: Sysmon, EDR, Windows Security
  3. Network: Firewall, proxy, DNS, IDS/IPS
  4. Cloud: AWS CloudTrail, Azure Activity, GCP Audit
  5. Applications: Web servers, databases, custom apps

Windows Sysmon Configuration

<!-- Key Sysmon events to collect -->
Event ID 1: Process creation
Event ID 3: Network connection
Event ID 7: Image loaded (DLLs)
Event ID 10: Process access
Event ID 11: File creation
Event ID 22: DNS query

Detection Rules

Splunk Detection Example

# Brute Force Detection
index=windows EventCode=4625 
| stats count by src_ip, user
| where count > 10
| table _time, src_ip, user, count

Sigma Rule (Platform-Agnostic)

title: Suspicious PowerShell Download
status: experimental
logsource:
  category: process_creation
  product: windows
detection:
  selection:
    CommandLine|contains|all:
      - 'powershell'
      - 'downloadstring'
  condition: selection
level: high
Sigma Advantage

Write rules once in Sigma format, then convert to Splunk, Elastic, Sentinel, or any SIEM using sigmac converter.

Dashboards & Reporting

Essential Dashboards

Alert Tuning

Out-of-the-box rules generate too many false positives. Tuning is critical:

  1. Baseline normal behavior first (30-60 days)
  2. Whitelist known good (service accounts, monitoring tools)
  3. Add context (is user an admin? is it business hours?)
  4. Prioritize by asset criticality
  5. Review and refine weekly

Updated: December 2024