Determine which logs to monitor with SEM
Before you begin monitoring logs with Security Event Manager, SolarWinds recommends that you decide which logs to monitor. You should avoid an everything, all at once approach as it is easy to become overwhelmed when all log data is sent to SEM. This section outlines strategies to determine which logs to monitor.
- Identify your goals by listing what you want to accomplish with your log data. Consider the business drivers that require you to monitor logs. If you have a compliance-related goal, you could focus on your data center and monitor security events. If your goal is to monitor logs for outages, you could verify that your servers are sending logs, and that you are receiving events from Microsoft Windows® Event Logs.
- Identify the systems that have the log data you want to monitor: If your goal is to monitor logs so you are PCI-compliant, identify the systems and network devices that are in scope for compliance. For each identified system and network device, identify which specific logs are in scope, and the level of logging, if applicable.
- Begin with what you know: Another strategy for determining which logs to monitor is to begin with what you know so that you can avoid learning about SEM and your logs at the same time. Monitor the logs with which you are familiar, and scale from there. For example, if you are most familiar with your Windows security, application, and system event logs, begin monitoring those logs first. SEM also provides connectors to read many other different types of logs.
Use the following table to identify the logs to collect:
If You Need To Track... | Collect These Kinds Of Logs |
---|---|
Changes |
User/Groups: Windows security logs Systems: Windows system and application logs Application-specific logs Network devices (firewalls, routers, switches, etc): syslogs |
Authentication failures and successes |
Windows security logs Application-specific logs Authentication logs on other platforms |
Internal and external unexpected network activity |
Proxy server logs Network device logs (syslog) |
Service and system activity |
Windows systems logs Application logs |
Compliance |
Core operating system logs Application logs |