11[[siem-overview]]
2- // [role="xpack"]
3- // == Overview
2+ [role="xpack"]
3+ == Overview
44
5-
6- == Coming soon
7-
8- Won't be long now!
9-
10- ////
115beta[]
126
13- {siem-soln-cap} gives you a comprehensive view into your security operations,
14- and helps make those insights actionable .
7+ {siem-soln} enables analysis of host-related and network-related security events
8+ as part of alert investigations or interactive threat hunting .
159
16- The UI in {kib} brings together data from a variety of sources, making it easier
17- for you to identify and resolve security issues .
10+ The {siem-app} in {kib} provides an interactive workspace for security teams to
11+ triage events and perform initial investigations .
1812
1913[float]
2014[[siem-components]]
21- === SIEM monitoring components
15+ === SIEM components
2216
23- Security monitoring requires the following {stack} components.
17+ SIEM requires the following {stack} components.
2418
2519image::images/siem-architecture.png[]
2620
27- *https://www.elastic.co/products/beats[{beats}]* are open source data
28- shippers that you install as agents on your servers to send operational data to
29- {es}.
21+ *https://www.elastic.co/products/beats[{beats}]* are open source data shippers
22+ that you install as agents on your systems. {beats} send security events and other
23+ data to {es}.
3024
3125*https://www.elastic.co/products/elasticsearch[{es}]* is a real-time,
32- distributed storage, search, and analytics engine. {es} excels is indexing
26+ distributed storage, search, and analytics engine. {es} excels at indexing
3327streams of semi-structured data, such as logs or metrics.
3428
3529*https://www.elastic.co/products/kibana[{kib}]* is an open source analytics and
@@ -38,5 +32,79 @@ view, and interact with data stored in {es} indices. You can easily perform
3832advanced data analysis and visualize your data in a variety of charts, tables,
3933and maps.
4034
41- {kib} {siem-ui} provides a dedicated user interface for visualizing host security.
42- ////
35+ The {siem-app} in {kib} provides a dedicated user interface for analyzing and
36+ investigating host and network security events.
37+
38+ [float]
39+ [[siem-integration]]
40+ ==== Additional Elastic components
41+
42+ You can use {siem-soln} with other Elastic products and features to help you
43+ identify and investigate suspicious activity:
44+
45+ * https://www.elastic.co/products/stack/machine-learning[{ml-cap}]
46+ * https://www.elastic.co/products/stack/alerting[Alerting]
47+ * https://www.elastic.co/products/stack/canvas[Canvas]
48+
49+ [float]
50+ [[data-sources]]
51+ === Data sources
52+
53+ SIEM can ingest and analyze data from a variety of sources, including Beats
54+ and Beats modules, and third-party collectors mapped to the {ecs-ref}[Elastic
55+ Common Schema (ECS)].
56+
57+ [float]
58+ [[hosts-data-sources]]
59+ ==== Hosts data sources
60+
61+ * https://www.elastic.co/products/beats/auditbeat[{auditbeat}]
62+ ** {auditbeat-ref}/auditbeat-module-system.html[System module - Linux, macOS, Win]
63+ *** packages
64+ *** processes
65+ *** logins
66+ *** sockets
67+ *** users and groups
68+ ** {auditbeat-ref}/auditbeat-module-auditd.html[Auditd module (Linux Kernel Audit info)]
69+ ** {auditbeat-ref}/auditbeat-module-file_integrity.html[File integrity module (FIM) - Linux, macOS, Win]
70+ * https://www.elastic.co/products/beats/filebeat[{filebeat}]
71+ ** system logs (auth logs) - Linux
72+ ** Santa - macOS
73+ * https://www.elastic.co/products/beats/winlogbeat[{winlogbeat}]
74+ ** Windows event logs - Windows
75+
76+ [float]
77+ [[network-data-sources]]
78+ ==== Network data sources
79+
80+ * https://www.elastic.co/products/beats/packetbeat[{packetbeat}]
81+ ** Flows
82+ ** DNS
83+ ** other protocols
84+ * https://www.elastic.co/products/beats/filebeat[{filebeat}]
85+ ** {filebeat-ref}/filebeat-module-zeek.html[Zeek NMS module]
86+ ** {filebeat-ref}/filebeat-module-suricata.html[Suricata IDS module]
87+ ** {filebeat-ref}/filebeat-module-iptables.html[Iptables/Ubiquiti module]
88+ ** {filebeat-ref}/filebeat-module-coredns.html[CoreDNS module]
89+ ** {filebeat-ref}/filebeat-module-envoyproxy.html[Envoy proxy module (Kubernetes)]
90+ ** {filebeat-ref}/filebeat-module-panw.html[Palo Alto Networks firewall module]
91+ ** {filebeat-ref}//filebeat-module-cisco.html[Cisco ASA firewall module]
92+
93+ [float]
94+ [[ecs]]
95+ ==== Elastic Common Schema (ECS) for normalizing data
96+
97+ The {ecs-ref}[Elastic Common Schema (ECS)] defines a common set of fields to be used for
98+ storing event data in Elasticsearch. ECS helps users normalize their event data
99+ to better analyze, visualize, and correlate the data represented in their
100+ events.
101+
102+ {siem-soln} can ingest and normalize events from ECS-compatible data sources.
103+
104+ [float]
105+ [[host_id]]
106+ ===== Host identification
107+ All Beats use the `add_host_metadata` processor to add the `host.name` field to
108+ events. The default value is `host.name`, but you can change it in Beats
109+ processor settings.
110+
0 commit comments