Network+ Exam
Understanding SIEMS
October 29, 2025
- #network+
Understanding SIEMS
SIEM - Security Information Event Managemt (SIEM) - Provides real-time or near-real-time analysis of security alerts generated by network hardward and applications.
Cybersecurity Analysts
System Administrators
Network Administrators
conducting log reviews should be something that’s done regurly and routienly
SIEM - combines
log collection - provides important forensic tools and helps address compliance reporting .
normalization - maps log messages into a common data model, enabling the orginizaton
coorelaiton - links the logs and events from different systems into a data fee
aggregration - reduces the volum by merging them
reporting - prevents the coorilated aggragated data in real-time monitirng in dashboards for analysts, or reports.
Software
Hardwar
managed service
1 log all relevent events and filter out
2 establish and document the scope of events
3 develop use cases to devine a threat.
4 plan incident responces for given scenarios or events
5 establish a tickiting process to track all the flagged events
6 schedule regular threat hunting with cybersecurity aynalists
7 provide auditors and analysts an evidence trail.
SIEM (Security Information & Event Management)
Purpose
- Collects, normalizes, correlates, and aggregates logs/events from multiple network devices, servers, and applications.
- Provides real-time or near real-time analysis of security alerts.
- Helps with incident response, compliance, and forensic analysis.
Exam Tip: SIEM is both reactive (alerts) and proactive (threat hunting, log review).
Functions
- Log Collection – Pulls logs from devices/services (via Syslog UDP 514 by default, can also use TCP for reliability).
- Normalization – Converts logs into a common data model for easier comparison.
- Correlation – Links related events from multiple systems (e.g., same IP failing multiple logins across devices).
- Aggregation – Reduces event volume by merging duplicates/similar events.
- Reporting & Dashboards – Presents alerts, KPIs, and compliance reports.
Deployment Models
- Software-based (installed on servers)
- Hardware appliances (turnkey SIEM boxes)
- Managed services (outsourced SIEM/SOC providers)
Use Cases
- Detect brute force attacks, malware infections, insider threats.
- Compliance (HIPAA, PCI DSS, SOX, etc.).
- Forensics (audit trails for investigators).
- Threat hunting by analysts.
Best Practices
- Log all relevant events (firewalls, IDS/IPS, servers, endpoints).
- Document scope – Decide which events matter (not everything).
- Develop use cases – Define what “suspicious” looks like (e.g., multiple failed logins, data exfiltration).
- Plan incident responses – Predefine actions for common alerts.
- Ticketing system – Track alerts until resolved.
- Routine log reviews – Analysts should regularly review and tune rules.
- Auditor trail – Ensure logs are stored, timestamped, and tamper-proof.
Common Ports
- Syslog → UDP 514 (default), TCP 514 (reliable)
- Alternative syslog port → TCP 1468 (secure/optional)
Example Workflow
- Firewall sends logs → Syslog server.
- SIEM collects & normalizes.
- SIEM correlates events (e.g., login from Russia + data download = alert).
- Analyst sees alert on dashboard → opens a ticket → begins incident response.
✅ Must Know for Exam
- SIEM = Log collection + Normalization + Correlation + Aggregation + Reporting.
- Syslog default port UDP 514 (but can be TCP).
- SIEM is used by Cybersecurity Analysts, System Admins, and Network Admins.
- Key feature: real-time monitoring and compliance evidence.
⚡ Quick Flashcards:
Q: Default Syslog port?
A: UDP 514
Q: SIEM’s 4 core functions?
A: Collection, Normalization, Correlation, Aggregation
Q: Who uses SIEM?
A: Cybersecurity Analysts, System Admins, Network Admins
Q: What’s correlation in SIEM?
A: Linking related events across different sources