Security log files
Firewall logs
Traffic flows through the firewall
–Source/destination IP, port numbers, disposition
* Next Generation Firewalls (NGFW)
–Logs the application used,
–URL filtering categories, anomalies and suspicious data
Application logs
Endpoint logs
OS-specific security logs
IPS/IDS logs
Network logs
Metadata
Vulnerability scans
Automated reports
Most SIEMs include a report generator
–Automate common security reports
* May be easy or complex to create
–The SIEM may have its own report generator
–Third-party report generators may be able to
access the database
* Requires human intervention
–Someone has to read the reports
* These can be involved to create
–Huge data storage and extensive processing time
Dashboards
Packet captures