Skip to main content

Security Monitoring & Alerting

What to Monitor

CategoryExamples
ApplicationsWeb apps, databases, APIs — errors, auth failures, anomalies
SystemsOS events, CPU/memory spikes, unauthorized changes
InfrastructureNetwork devices, cloud resources, storage, firewalls

Key Metrics

MetricPurpose
Performance metricsDetect compromise via unexpected resource use; establish baseline
Anomaly detectionSpot unusual processes, requests, or traffic patterns in real time
Availability metricsMonitor uptime, latency, and stability of critical systems
EDR telemetryEndpoint-level process, file, network, and registry events

Monitoring Tools

ToolDescription
SIEMAggregates, correlates, and alerts on logs from all sources. Automates alerting, reporting, quarantine, and response.
SCAPStandardized framework for security compliance checking and vulnerability management
Antivirus / EDRReal-time detection, alerting, quarantine, and logging of threats at the endpoint
DLPMonitors and prevents unauthorized access or exfiltration of sensitive data
SNMP TrapsReal-time network device alerts sent to a central management system
NetFlowNetwork traffic flow data — useful for anomaly detection and threat hunting
Vulnerability scannersActively scan hosts for security weaknesses
BenchmarksCompare system state against known-good performance and security standards

Agent vs Agentless Monitoring

TypeProsCons
Agent-basedVerbose real-time data, deep visibilityResource overhead, agent management complexity
AgentlessEasy deployment, no installed softwareLess granular, relies on existing protocols (WMI, SSH, SNMP)

SIEM Key Functions

Log aggregation      → Collect from all sources (endpoints, network, cloud)
Normalization        → Common format across different log types
Correlation          → Link related events across systems
Alerting             → Notify on rule matches or anomalies
Dashboards           → Visual security posture overview
Reporting            → Compliance and post-incident documentation
Response automation  → Quarantine, block, or escalate automatically

Common SIEM Use Cases

# Brute-force detection
Multiple failed logins (EventID 4625) from same IP in short window

# Lateral movement
New admin login from unexpected host or at unusual time

# Malware C2 beacon
Periodic outbound connection to unknown IP at regular intervals

# Data exfiltration
Large outbound data transfer to external IP / cloud storage

# Privilege escalation
User account added to admin group (EventID 4728/4732)