{"id":4807,"date":"2020-11-17T15:07:49","date_gmt":"2020-11-17T09:37:49","guid":{"rendered":"https:\/\/opstree.com\/blog\/\/?p=4807"},"modified":"2020-11-17T17:05:50","modified_gmt":"2020-11-17T11:35:50","slug":"elastic-siem-an-event-tracking-feature","status":"publish","type":"post","link":"https:\/\/opstree.com\/blog\/2020\/11\/17\/elastic-siem-an-event-tracking-feature\/","title":{"rendered":"Elastic SIEM &#8211; An Event Tracking Feature"},"content":{"rendered":"\r\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/san3ncrypt3d.com\/images\/2020-1-14-ELK\/s.png\" alt=\"SIEM with ELK \u2013 san3ncrypt3d \u2013 Making cybersecurity a habit &amp; Privacy a Goal\" \/><\/figure>\r\n\r\n\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n\r\n\r\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\r\n<p>Torture the data, and it will confess to anything.<\/p>\r\n<cite><strong>Ronald Coas<\/strong>e<\/cite><\/blockquote>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\">WHAT IS ELASTIC SIEM<\/h3>\r\n\r\n\r\n\r\n<p><strong>Elastic SIEM<\/strong> (<em>Security Information and Event Management<\/em>) is a new feature provided by Elastic NV. Using Elastic SIEM we can track and maintain important events that concern us.<\/p>\r\n\r\n\r\n\r\n<p>Events are actions that reflect something that has happened.<\/p>\r\n<p><!--more--><\/p>\r\n\r\n\r\n\r\n<p><strong>Examples <\/strong>&#8211; Let&#8217;s say we have an important instance that hosts a service. Now we want to know successful and failed login attempts made to this instance.<\/p>\r\n\r\n\r\n\r\n<p>Also, let&#8217;s say we have &#8220;\/etc\/nginx&#8221; directory and we want to track events, if any, in this directory. Simply put, changes that have been made in this directory i.e. file are created, deleted, or updated.<\/p>\r\n\r\n\r\n\r\n<p>All of this can be done. Since<strong> it&#8217;s better to show Visualization than just definitions, that&#8217;s what we&#8217;ll do.<\/strong><\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\">OBJECTIVE<\/h3>\r\n\r\n\r\n\r\n<p>Below are the objectives of this blog:<\/p>\r\n\r\n\r\n\r\n<ol>\r\n<li>We will install auditbeat on an important instance (Ubuntu) and configure auditbeat.yml in a secured way so that it will send events to elasticsearch.<\/li>\r\n<li>Visualise various events on Kibana<\/li>\r\n<li>File-Integrity Module<\/li>\r\n<li>System Module<\/li>\r\n<li>Auditd Module<\/li>\r\n<li>Data Exporters<\/li>\r\n<\/ol>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\">Install Auditbeat<\/h3>\r\n\r\n\r\n\r\n<p>Here, we are going to install auditbeat on an instance where events are important to us. Our OS is ubuntu.<\/p>\r\n\r\n\r\n\r\n<pre class=\"wp-block-syntaxhighlighter-code\">curl -L -O https:\/\/artifacts.elastic.co\/downloads\/beats\/auditbeat\/auditbeat-7.7.1-amd64.deb\r\nsudo dpkg -i auditbeat-7.7.1-amd64.deb<\/pre>\r\n\r\n\r\n\r\n<p>If your OS is different, you may download the package from the given link.<\/p>\r\n\r\n\r\n\r\n<p>https:\/\/www.elastic.co\/downloads\/beats\/auditbeat<\/p>\r\n\r\n\r\n\r\n<p>Now it is required to add elasticsearch host, username, and password in auditbeat.yml configuration file.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"675\" height=\"218\" class=\"wp-image-4822\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-1.png?w=675\" alt=\"\" \/>\r\n<figcaption>Figure 1:- Example of elasticsearch config we need to change<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>For password, we will be using auditbeat keystore. It is not recommended to enter a password in plain text format as shown in the above example.<\/p>\r\n\r\n\r\n\r\n<pre class=\"wp-block-syntaxhighlighter-code\">sudo auditbeat keystore create\r\nsudo auditbeat keystore add elasticsearch_password<\/pre>\r\n\r\n\r\n\r\n<p>A prompt will be shown asking for value.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"796\" height=\"60\" class=\"wp-image-4824\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-2.png?w=796\" alt=\"\" \/>\r\n<figcaption>Figure 2 Using Keystore which will store our credentials in key-value format.<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>Now our password is stored in elasticsearch_password variable. Let&#8217;s use this variable in the config file.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"677\" height=\"224\" class=\"wp-image-4826\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-3.png?w=677\" alt=\"\" \/>\r\n<figcaption>Figure 3 Here we are using key name and value will be retrieved with help of Keystore<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>Now add kibana host.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4828\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-4.png?w=437\" alt=\"\" width=\"410\" height=\"226\" \/>\r\n<figcaption>Figure 4: Kibana hostname<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>We have successfully set up our auditbeat. Let&#8217;s test it.<\/p>\r\n\r\n\r\n\r\n<pre class=\"wp-block-syntaxhighlighter-code\">sudo auditbeat setup\r\nsudo service auditbeat start<\/pre>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\">Visualise various events in Kibana<\/h3>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4831\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-5.png?w=1024\" alt=\"\" width=\"500\" height=\"112\" \/>\r\n<figcaption>Figure 5: Number of Hosts in which auditbeat has been installed and sending logs to SIEM<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>All hosts under the hosts section tell us the total number of hosts we have configured.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4833\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-6.png?w=407\" alt=\"\" width=\"442\" height=\"243\" \/>\r\n<figcaption>Figure 6: User login Authentication<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>Here we can see that there have been 5 success login attempts and 478 failed attempts made for both hosts.<\/p>\r\n\r\n\r\n\r\n<p>Since the most important part of SIEM is events, we can use KQL(Kibana query Language) and add filters to go through them.<\/p>\r\n\r\n\r\n\r\n<p>Example:- After audit beat, I installed Nodejs and tree using apt-get. Let&#8217;s see our relevant data.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"465\" height=\"391\" class=\"wp-image-4835\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-7.png?w=465\" alt=\"\" \/>\r\n<figcaption>Figure 7: Filter results to get the package installed<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>Below we can see relevant events.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4836\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-8.png?w=1024\" alt=\"\" width=\"500\" height=\"167\" \/>\r\n<figcaption><em>Figure 8: <\/em>Result of executed KQL query<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n\r\n\r\n<p>Let&#8217;s see various login attempts made on our instance. Use and set event.action to user_login.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"459\" height=\"385\" class=\"wp-image-4838\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-9.png?w=459\" alt=\"\" \/>\r\n<figcaption><em>Figure 9: Filter results to get user_login<\/em><\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4839\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-10.png?w=1024\" alt=\"\" width=\"759\" height=\"312\" \/>\r\n<figcaption>Figure 10:- Here we can see two users karol and query trying to access my instance and we also have their source IP.<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n\r\n\r\n<p>Event Action<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"292\" height=\"288\" class=\"wp-image-4842\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-11.png?w=292\" alt=\"\" \/>\r\n<figcaption>Figure 11:- This shows various available event actions. Also, zero value depicts that the respective event hasn&#8217;t happened in the last frame.<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\">File Integrity Module<\/h3>\r\n\r\n\r\n\r\n<p>The audit beat has three available modules. System, File Integrity, and auditd.<\/p>\r\n\r\n\r\n\r\n<p>File Integrity module handles file related events.<\/p>\r\n\r\n\r\n\r\n<p>It uses Linux kernel API, i.e. inotify \u00a0(An API that provides a mechanism for monitoring filesystem events). So, if anyone is using a lower version of Linux or if inotify is not supported in their version, then this module will not be available.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4844\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-12.png?w=300\" alt=\"\" width=\"404\" height=\"198\" \/>\r\n<figcaption>Figure 12:- Here paths represent the various path that has been entered for the event.<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>Let&#8217;s add some files in \/bin and check for the relevant events.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"472\" height=\"359\" class=\"wp-image-4846\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-13.png?w=472\" alt=\"\" \/>\r\n<figcaption><em>Figure 13: Filtering results to get results from module file_integrity<\/em><\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4847\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-14.png?w=1024\" alt=\"\" width=\"661\" height=\"233\" \/>\r\n<figcaption>Figure 14:- Here we can see opstree and opstree1 files have been created. We can also see a file named tree created from an earlier installation of tree utility<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<h5 class=\"wp-block-heading\">Custom Directory or File<\/h5>\r\n\r\n\r\n\r\n<p>Here, I have a sample nodejs application which is being served. So I want to know if any changes have been done to this directory.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"165\" class=\"wp-image-4851\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-15.png?w=377\" alt=\"\" \/>\r\n<figcaption>Figure 15:- I have added the custom path of my application<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4852\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-16.png?w=1020\" alt=\"\" width=\"684\" height=\"200\" \/>\r\n<figcaption>Figure 16:- Here we can see I have deleted my package.json file and created a directory opstree.<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\">System Module<\/h3>\r\n\r\n\r\n\r\n<p>The system Module collects important events related to a system.<\/p>\r\n\r\n\r\n\r\n<ul>\r\n<li><a href=\"https:\/\/www.elastic.co\/guide\/en\/beats\/auditbeat\/current\/auditbeat-dataset-system-host.html\" target=\"_blank\" rel=\"noopener\">host<\/a> ( Host Information like OS, Kernel Version)<\/li>\r\n<li><a href=\"https:\/\/www.elastic.co\/guide\/en\/beats\/auditbeat\/current\/auditbeat-dataset-system-login.html\" target=\"_blank\" rel=\"noopener\">login<\/a> ( Contain Login related Information like Failed Attempts)<\/li>\r\n<li><a href=\"https:\/\/www.elastic.co\/guide\/en\/beats\/auditbeat\/current\/auditbeat-dataset-system-package.html\" target=\"_blank\" rel=\"noopener\">package<\/a> ( Contain Information like package installed or deleted)<\/li>\r\n<li><a href=\"https:\/\/www.elastic.co\/guide\/en\/beats\/auditbeat\/current\/auditbeat-dataset-system-process.html\" target=\"_blank\" rel=\"noopener\">process<\/a> ( Process that has been started or stopped recently )<\/li>\r\n<li><a href=\"https:\/\/www.elastic.co\/guide\/en\/beats\/auditbeat\/current\/auditbeat-dataset-system-socket.html\" target=\"_blank\" rel=\"noopener\">socket<\/a> (Monitor network traffic to and from running processes)<\/li>\r\n<li><a href=\"https:\/\/www.elastic.co\/guide\/en\/beats\/auditbeat\/current\/auditbeat-dataset-system-user.html\" target=\"_blank\" rel=\"noopener\">user<\/a> (User-created or deleted)<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>Example:- Earlier we checked for login attempts made to our instance, the events displayed there were mainly because of this module.<\/p>\r\n\r\n\r\n\r\n<p>Now let&#8217;s say I want to know if a user has been added or deleted recently.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"473\" height=\"339\" class=\"wp-image-4856\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-17.png?w=473\" alt=\"\" \/>\r\n<figcaption><em>Figure 17: Filtering results to get user_added<\/em><\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4858\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-19.png?w=1024\" alt=\"\" width=\"660\" height=\"240\" \/>\r\n<figcaption><em>Figure 18: Here we can see user opstree and prashant have been added<\/em><\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<p><strong>It is better to remove the socket from system module as it creates a large noise ratio<\/strong>.<\/p>\r\n\r\n\r\n\r\n<p>If I want to check processes that have been executed with root privilege, I can do it with the help of this nested query<\/p>\r\n\r\n\r\n\r\n<div class=\"wp-block-jetpack-tiled-gallery aligncenter is-style-rectangular\">\r\n<div class=\"tiled-gallery__gallery\">\r\n<div class=\"tiled-gallery__row\">\r\n<div class=\"tiled-gallery__col\" style=\"flex-basis:50.379512645334%;\">\r\n<figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/screenshot-from-2020-11-13-03-07-01.png?strip=info&#038;w=420 420w\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/screenshot-from-2020-11-13-03-07-01.png\" alt=\"\" data-height=\"297\" data-id=\"4864\" data-link=\"https:\/\/opstree.com\/blog\/\/screenshot-from-2020-11-13-03-07-01\/\" data-url=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/screenshot-from-2020-11-13-03-07-01.png\" data-width=\"420\" \/><\/figure>\r\n<\/div>\r\n<div class=\"tiled-gallery__col\" style=\"flex-basis:49.620487354666%;\">\r\n<figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/screenshot-from-2020-11-13-03-07-09.png?strip=info&#038;w=422 422w\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/screenshot-from-2020-11-13-03-07-09.png\" alt=\"\" data-height=\"303\" data-id=\"4863\" data-link=\"https:\/\/opstree.com\/blog\/\/screenshot-from-2020-11-13-03-07-09\/\" data-url=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/screenshot-from-2020-11-13-03-07-09.png\" data-width=\"422\" \/><\/figure>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4865\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-22.png?w=1024\" alt=\"\" width=\"600\" height=\"241\" \/>\r\n<figcaption>Figure 19: We can see a process with sudo privileged has been executed updating auditbeat.yml file and overall 23 events related to it.<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\">Auditd Module<\/h3>\r\n\r\n\r\n\r\n<p>Auditd module receives events from the Linux Audit Framework which is a part of the Linux kernel.<\/p>\r\n\r\n\r\n\r\n<p>Using this module we can track specific syscalls that have been called e.g open, truncate, create. Also, files and directories that have been accessed.<\/p>\r\n\r\n\r\n\r\n<p>System call auditing lets you track your system&#8217;s behavior on a level even below the application level.<\/p>\r\n\r\n\r\n\r\n<p>Example rule:- <strong>-a always,exit -S mkdir<\/strong><\/p>\r\n\r\n\r\n\r\n<p>Here the -a option adds system call rules whereas -d option will delete. This rule triggers an event whenever the mkdir system call is exited (always,exit). Apart from exit one can use (always,entry). The -S option adds the name of the system call which in this case is mkdir.<\/p>\r\n\r\n\r\n\r\n<p>Another example:-<strong> -w \/etc\/passwd -p w<\/strong><\/p>\r\n\r\n\r\n\r\n<p>Here -w stands for to watch a file. All system calls requesting write permissions to this file are analyzed.<\/p>\r\n\r\n\r\n\r\n<p>Let&#8217;s add these rules to our auditbeat.yml<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4877\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-24.png?w=785\" alt=\"\" width=\"731\" height=\"159\" \/>\r\n<figcaption>Figure 20: Adding rules to monitor mkdir syscall and passwd file.<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>I have created a directory and using root privileges, changed \/etc\/passwd file. Let&#8217;s see if mkdir syscall is triggered or not and the same for \/etc\/passwd.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"421\" height=\"300\" class=\"wp-image-4879\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-25.png?w=421\" alt=\"\" \/>\r\n<figcaption><em>Figure 21: Filter results to get auditd module<\/em><\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4880\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-26.png?w=1024\" alt=\"\" width=\"709\" height=\"143\" \/>\r\n<figcaption>Figure 22: We can see event.module is auditd. As mkdir is called and exited it is being tracked.<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4882\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-27.png?w=1024\" alt=\"\" width=\"736\" height=\"139\" \/>\r\n<figcaption>Figure 23: Here we can see event.module is auditd. As I have changed this file using sudo, it is triggered<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>So we can check for any syscall being called and watch any file. We can also replace mkdir with other systemcall.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\">Data Exporters<\/h3>\r\n\r\n\r\n\r\n<p>Elastic SIEM also offers compatibility with other exporters.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4884\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2020\/11\/image-28.png?w=1024\" alt=\"\" width=\"600\" height=\"281\" \/>\r\n<figcaption>Figure 24: Different data sources apart from auditbeat.<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>Let&#8217;s say you have CISCO ASA Firewall, a security device that has \u00a0firewall, antivirus, intrusion prevention, and VPN capabilities. Select Cisco and configure it and then you will be able to centrally mange logs and events of Cisco ASA Firewall.<\/p>\r\n\r\n\r\n\r\n<p>You can use Elastic SIEM to centrally manage your events from other exporters as shown in Figure 24.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\r\n\r\n\r\n\r\n<p>Elastic SIEM is one of the top elite tools to see and centrally manage events.<\/p>\r\n\r\n\r\n\r\n<p>Here we have discussed Elastic SIEM, its events and how can we customize it. We also discussed different modules of auditbeat and showed, briefly, their purpose and use case.<\/p>\r\n<p><a href=\"https:\/\/www.comodo.com\/new-assets\/images\/what-is-siem-security.png\" target=\"_blank\" rel=\"noopener\">Image Source<\/a><\/p>\r\n<p>&nbsp;<\/p>\r\n<p>Opstree is an End to End DevOps solution provider<\/p>\r\n<p>\r\n\r\n<\/p>\r\n<p><a href=\"https:\/\/www.opstree.com\/contact-us\" target=\"_blank\" rel=\"noreferrer noopener\">CONTACT US<\/a><\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Torture the data, and it will confess to anything. Ronald Coase WHAT IS ELASTIC SIEM Elastic SIEM (Security Information and Event Management) is a new feature provided by Elastic NV. Using Elastic SIEM we can track and maintain important events that concern us. Events are actions that reflect something that has happened.<\/p>\n","protected":false},"author":194452061,"featured_media":29900,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[28070474],"tags":[768739308,1040049,768739310,707711500,99581934,768739293,1070272],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/opstree.com\/blog\/wp-content\/uploads\/2025\/11\/DevSecOps-1.jpg","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pfDBOm-1fx","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/posts\/4807"}],"collection":[{"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/users\/194452061"}],"replies":[{"embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/comments?post=4807"}],"version-history":[{"count":25,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/posts\/4807\/revisions"}],"predecessor-version":[{"id":5165,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/posts\/4807\/revisions\/5165"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/media\/29900"}],"wp:attachment":[{"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/media?parent=4807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/categories?post=4807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/tags?post=4807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}