Log Management & Security¶
Audit Log¶
Following the best practices, NetEye provides the ability to track users’ activity to verify system security, keep track of users and actions they take.
Users’ activity can be tracked with the Audit Log module, which collects and records changes to the configuration of NetEye itself, allowing administrators to track the changes and all their details.
SIEM¶
SIEM Module, Security Information and Event Management, helps to perform management and analysis of Logs by collecting them, processing them to detect anomalies and threats, and finally visualise them.
Machine Learning and a multinode architecture were implemented for scalability, that helps to complete the functionalities.
The SIEM module is based on the Elastic stack and is intended to provide various means to manage - collect, process, and sign - log files produced by NetEye, various services running on it and the logs collected from external systems with the help of Beats and Elastic Agents.
Typical components of a SIEM solution include:
a log collector, which can be multiple software that concur to receive log files and convert them to a given format
a storage facility, typically a (distributed) database
a visualisation engine, to create dashboards and reports
some kind of time-stamping solution, to provide data unchangeability, useful for log auditing and compliance to laws and regulations
Beats and Elastic Agents
Beats and Elastic Agents are used to collect logs and send them to NetEye.
In order to enhance the monitoring of different hosts, using available integrations given by the Elastic environment, Elastic Agent can be used to collect data from local and external sources with a single unified agent per host.
In the similar way NetEye can receive data from Beats installed on monitored hosts. The agent is to be installed on devices within an infrastructure (mostly servers and workstations) and acts as a client to send data to a centralised server where they are processed in a suitable way.
Logstash
Logstash is an open source server-side data processing pipeline that ingests data from multiple sources, transforms it, and then sends to a preferrable storage.
In the context of SIEM Module, Logstash is responsible for the collection of logs, (pre-)processing them, and forwarding them to Elasticsearch or El Proxy.
El Proxy
The purpose of the Elasticsearch Blockchain Proxy is to receive data from Logstash and process it. After the data are signed and hence integrated into a secure blockchain, they are sent to Elasticsearch.
Elasticsearch
Used mainly as a storage facility for all the log files that have been collected and processed in the context of SIEM Module, Elasticsearch can also be used for multiple purposes, such as serving as search engine over the data stored, or even for processing data.
Kibana software enables you to give shape to your data and serves as the GUI for Elasticsearch. With this you can visualise data stored in Elasticsearch, create dashboards for quick data access and define queries against the underlying Elasticsearch.
You can find more information on how to configure, collect and centralize your log data in the Elastic Stack feature module.