in ArcSight by
How can the security information and event management process of SIEM can be broken down?

1 Answer

0 votes
by

Information assortment – All wellsprings of system security data, e.g., servers, working frameworks, firewalls, antivirus programming and interruption counteraction frameworks are designed to take care of occasion information into a SIEM tool.Most current SIEM instruments use operators to gather occasion logs from big business frameworks, which are then handled, sifted and sent them to the SIEM. Some SIEMs permit agentless information assortment. For instance, Splunk offers agentless information assortment in Windows utilizing WMI. 

Approaches – A profile is made by the SIEM director, which characterizes the conduct of big business frameworks, both under ordinary conditions and during pre-characterized security occurrences. SIEMs give default rules, cautions, reports, and dashboards that can be tuned and modified to fit explicit security needs. 

Information solidification and relationship – SIEM arrangements combine, parse and investigate log documents. Occasions are then classified dependent on the crude information and apply connection decides that consolidate singular information occasions into significant security issues. 

Notification – If an occasion or set of occasions triggers a SIEM rule, the framework advises security staff.

...