Network data
What visibility do you need in your network?
Sources of data
IDS/IPS
Email
Web logs
Firewalls
WAF
DLP
Additional network infrastructure devices
Packet captures
Proxy
IDS/IPS
IDS capabilities
Detection
Alerting
IPS capabilities
Detection
Alerting
Prevention
FIrewalls
Establish initial traffic rules to determine what you will be allowing, blocking and logging
Monitor traffic for suspicious activity
Fine-tune traffic rules in response
Additional network devices
Hubs
Switches
Routers
Email
Email logs contain detailed records of all email transactions, including sender and recipient addresses, subject lines, message content, timestamps and other metadata
Threat hunters can use email logs to detect and investigate a rane of email-related threats, such as phishing attacks, malware campaigns, spam and other suspicious activity
For example, by analyzing email logs, a threat hunter can identify patterns of suspicious email activity, such as large volumes of outbound emails from a single account or unusual attachments or links in messages
Email logs can also help trace the source of an attack or compromise, allowing investigators to identify the initial point of entry and follow the path of the attack to its endpoint
Web Application Firewall (WAF)
By analyzing web traffic and blocking potentially malicious requests, a WAF can help detect and prevent attacks against web applications
When using a WAF for threat hunting, it is important to configure it to capture and log all web traffic
This can provide valuable insights into web activity and help to identify potential threats
WAF logs can be analyzed to detect patterns of suspicious behavior, such as repeated failed login attempts, unusual user agent strings or requests for sensitive resources
A WAF can be used to perform active threat hunting by configuring it to block or log suspicious requests
Some WAFs also offer advanced features for threat hunting, such as machine learning algorithms that can detect and block unknown threats
Packet capture solutions
Packet capture solutions allow a threat hunter to capture and analyze network traffic in order to detect and investigate potential security incidents
By capturing packets of data traveling across the network, a threat hunter can analyze the traffic to identify anomalies, suspicious behavior or patterns of activity that may indicate a security threat
By analyzing packet data, a threat hunter can identify the source of the attack, the type of attack being used and the extent of the compromise
When using packet capture solutions for threat hunting, it is important to have a clear understanding of the network environment and the expected traffic patterns
Web logs
Web logs record every request made to a web server, including the source IP address, user agent, requested URL and other metadata
By analyzing web logs, a threat hunter can identify patterns of suspicious behavior and detect potential security threats
When using web logs for threat hunting, you can look for specific indicators of compromise (IOCs), such as IP addresses or user agents associated with known malicious activity
You can also look for patterns of behavior that may indicate a security threat, such as repeated failed login attempts or requests for unusual or sensitive resources
By analyzing web logs for request that contain suspicious parameters or payloads, a threat hunter can identify potential vulnerabilities and take steps to mitigate them before they are exploited
Data Loss Prevention (DLP)
DLP solutions are designed to prevent sensitive data from leaving an organization's network, and they typically monitor data in transit, at rest and in use
By analyzing DLP logs, a threat hunter can identify potential data exfiltration attempts and other security threats
You can also look for patterns of behavior that may indicate a security threat, such as multiple attempts to transfer large amounts of data out of the network
By analyzing DLP logs for incidents of sensitive data leakage or unauthorized access, threat hunters can identify potential gaps in their data protection policies and take steps to mitigate them
Proxy
Proxy provides valuable insights into web traffic, user behavior, and potential security incidents.
Here are some of the key elements to look for in proxy logs when conducting threat hunting:
Suspicious URLs
Unusual user behavior
Blocked requests
Unusual traffic patterns
Malicious user agents
IP addresses and domains
Last updated