<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Logging practices for security logging. in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31837#M5594</link>
    <description>&lt;P&gt;Lets say if i want to monitor the traffic of the network as in detecting Denial of service attacks, the log message should contain the fields under the network protection category of the Common Information Model. Is that true?&lt;/P&gt;</description>
    <pubDate>Fri, 20 Apr 2012 06:41:01 GMT</pubDate>
    <dc:creator>misteryuku</dc:creator>
    <dc:date>2012-04-20T06:41:01Z</dc:date>
    <item>
      <title>Logging practices for security logging.</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31835#M5592</link>
      <description>&lt;P&gt;I would like to create log messages that would be used for log analysis using Splunk such as checking for occurence of Denial of Service attacks. What would be the best logging practices for that as in what are the most important information that i should be displaying in the log messages???&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2012 02:24:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31835#M5592</guid>
      <dc:creator>misteryuku</dc:creator>
      <dc:date>2012-04-20T02:24:58Z</dc:date>
    </item>
    <item>
      <title>Re: Logging practices for security logging.</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31836#M5593</link>
      <description>&lt;P&gt;This is a good place for getting started:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;&lt;A href="http://dev.splunk.com/view/logging-with-splunk/SP-CAAADP5"&gt;http://dev.splunk.com/view/logging-with-splunk/SP-CAAADP5&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="http://dev.splunk.com/view/logging-best-practices/SP-CAAADP6"&gt;http://dev.splunk.com/view/logging-best-practices/SP-CAAADP6&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;In addition, naming field according to the CIM (Common Information Model) would be a good idea:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;&lt;A href="http://docs.splunk.com/Documentation/ES/latest/CreateTA/CommonInformationModelFieldReference"&gt;http://docs.splunk.com/Documentation/ES/latest/CreateTA/CommonInformationModelFieldReference&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 20 Apr 2012 06:00:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31836#M5593</guid>
      <dc:creator>ziegfried</dc:creator>
      <dc:date>2012-04-20T06:00:15Z</dc:date>
    </item>
    <item>
      <title>Re: Logging practices for security logging.</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31837#M5594</link>
      <description>&lt;P&gt;Lets say if i want to monitor the traffic of the network as in detecting Denial of service attacks, the log message should contain the fields under the network protection category of the Common Information Model. Is that true?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2012 06:41:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31837#M5594</guid>
      <dc:creator>misteryuku</dc:creator>
      <dc:date>2012-04-20T06:41:01Z</dc:date>
    </item>
    <item>
      <title>Re: Logging practices for security logging.</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31838#M5595</link>
      <description>&lt;P&gt;Yup. Network Protection/Traffic might be the best choice.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2012 06:42:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31838#M5595</guid>
      <dc:creator>ziegfried</dc:creator>
      <dc:date>2012-04-20T06:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: Logging practices for security logging.</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31839#M5596</link>
      <description>&lt;P&gt;What does the action field for the network protection/traffic represent? Does it represent the action of the packet??&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2012 07:04:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31839#M5596</guid>
      <dc:creator>misteryuku</dc:creator>
      <dc:date>2012-04-20T07:04:59Z</dc:date>
    </item>
    <item>
      <title>Re: Logging practices for security logging.</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31840#M5597</link>
      <description>&lt;P&gt;something like allowed/blocked or success/failure. whatever is more reasonable.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2012 07:10:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31840#M5597</guid>
      <dc:creator>ziegfried</dc:creator>
      <dc:date>2012-04-20T07:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: Logging practices for security logging.</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31841#M5598</link>
      <description>&lt;P&gt;Okay. i see...&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2012 07:19:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31841#M5598</guid>
      <dc:creator>misteryuku</dc:creator>
      <dc:date>2012-04-20T07:19:59Z</dc:date>
    </item>
    <item>
      <title>Re: Logging practices for security logging.</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31842#M5599</link>
      <description>&lt;P&gt;Hi.  The link you have provided above does not work anymore.  It seems like the pages has changed.  Can you provide the link again?  thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2017 04:47:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31842#M5599</guid>
      <dc:creator>elusive</dc:creator>
      <dc:date>2017-02-14T04:47:38Z</dc:date>
    </item>
    <item>
      <title>Re: Logging practices for security logging.</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31843#M5600</link>
      <description>&lt;P&gt;The common information model has it's &lt;A href="http://docs.splunk.com/Documentation/CIM/latest/User/Overview"&gt;own manual&lt;/A&gt; in particular you may wish to refer to &lt;A href="http://docs.splunk.com/Documentation/CIM/latest/User/HowtouseCIM"&gt;using the CIM&lt;/A&gt; and the &lt;A href="http://docs.splunk.com/Documentation/CIM/4.7.0/User/UsetheCIMtonormalizeOSSECdata"&gt;examples of using the CIM&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2017 06:30:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Logging-practices-for-security-logging/m-p/31843#M5600</guid>
      <dc:creator>gjanders</dc:creator>
      <dc:date>2017-02-14T06:30:33Z</dc:date>
    </item>
  </channel>
</rss>

