Network Logs
Explanation
Network logs capture network-level activity such as source/destination IP, ports, protocol, and whether traffic was allowed or blocked. They are used to answer “what happened on the wire” when investigating exfiltration, scanning, or policy violations, even if you do not have full packet payloads.
Examples
Example 1 --- Core Scenario A SOC analyst sees a workstation sending unusually large outbound traffic to an unfamiliar IP. Firewall logs show repeated outbound connections to TCP 443 with high byte counts from that host, confirming suspicious egress behavior. Example 2 --- Exam Scenario An auditor asks for evidence that inbound RDP attempts are blocked. The team pulls firewall deny logs showing repeated TCP 3389 blocks to public-facing IPs over the last 30 days.
Enterprise Use Case
Industry: Healthcare Problem: Security must detect unauthorized data transfer events and retain evidence for compliance and incident response. Configuration: - Forward firewall/router logs (syslog) and flow logs (NetFlow/sFlow) into a central SIEM - Standardize fields (src/dst IP, port, action, bytes) and retain logs per policy - Alert on unusual egress volume, repeated denies, and unexpected destinations Outcome: Analysts can rapidly confirm traffic patterns, prove policy enforcement, and investigate suspected exfiltration.
Diagram
🌐 Traffic → 🧾 Firewall/Flow logs (src/dst, port, allow/deny, bytes) → 🔎 SIEM search/correlation → 🚨 Alert + investigation