Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Determining Normal - Baselining with Security Log and Event Data

BSidesLV via YouTube

Overview

Explore practical strategies for baselining security log and event data in this BSidesLV conference talk. Delve into the importance of establishing normal patterns, hunting for anomalies, and effectively managing log data. Learn about normal and non-normal distributions, Windows event rates, and techniques for visualizing data. Discover how to identify and handle outliers using methods like QQ plots and the Three Sigma Rule. Examine real-world use cases, including RDP access analysis, and understand the requirements and event sources for effective baselining. Gain insights into log reduction techniques and weekend data patterns. Equip yourself with the knowledge to create meaningful baselines and enhance your security monitoring capabilities.

Syllabus

Intro
Who am I
Agenda
Log data is underutilized
Practical strategies
Importance of normal
Hunting
Baselines
Logging Log Management
Normal Distribution
NonNormal Distribution
Windows Event Rate
Example
Obtaining Data
Questions to Ask
Visualizing Data
Outliers
Weekend
Handling Outliers
QQ Plot
Three Sigma Rule
Use Cases
RDP
RDP Access
Use Case Primer
Requirements
Event Sources
Validation
Histogram
ShapiroWilkes
Recap
What can you create
References
Questions
Log Reduction
Weekends
Friday

Taught by

BSidesLV

Reviews

Start your review of Determining Normal - Baselining with Security Log and Event Data

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.