Where Do SOC Analysts Normally Monitor Alerts and Logs in Distributed Deployments? #14567
-
I have a few questions about best practices for monitoring and log storage when using Security Onion, especially in a distributed deployment setup:
In a typical SOC workflow, where do analysts usually monitor alerts most of the time?
In a distributed deployment (with separate manager and search nodes):
Any clarification or suggestions would be really helpful for our team to improve our monitoring process and log management. Thanks in advance! |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
The alerts tab is going to be for your active rules whether that is suricata / sigma / yara. All configurable via the Detections tab. This is where you'll get an overview of triggered rules and can begin your investigation and potentially escalate to a Case. If you didn't know Security Onion Solutions has a YouTube channel. Here is a video that will help answer some of your questions on how the workflow might look for you. For the log storage:
Logs ingested by the Elastic Agent end up in Elasticsearch. Which runs on your manager & searchnodes.
If you have tiered storage configured then the latest (hot) data would end up on your searchnodes assigned the 'data_hot' role. |
Beta Was this translation helpful? Give feedback.
The alerts tab is going to be for your active rules whether that is suricata / sigma / yara. All configurable via the Detections tab. This is where you'll get an overview of triggered rules and can begin your investigation and potentially escalate to a Case.
If you didn't know Security Onion Solutions has a YouTube channel. Here is a video that will help answer some of your questions on how the workflow might look for you.
For the log storage:
Logs ingested by the Elastic Agent end up in Elasticsearch. Which runs on your manager & searchnodes.
If you have tiered storag…