Essential Log Source Categories

Explore the critical log sources that form the foundation of effective security monitoring

The Security Visibility Ecosystem
Modern security operations rely on a diverse ecosystem of log sources that, when properly integrated, provide comprehensive visibility across your organization's attack surface.
Log Source CategoryPrimary VisibilityCritical Detection Capabilities
Network DevicesNetwork boundaries and traffic flowInitial access, C2 communication, lateral movement, data exfiltration
Endpoint SecurityHost-level activity and file system changesMalware execution, persistence mechanisms, credential theft, user behavior
Identity & Access ManagementAuthentication and authorization eventsAccount compromise, privilege escalation, identity theft
Cloud InfrastructureCloud resource provisioning and accessResource hijacking, misconfiguration exploitation, serverless attacks
Email SecurityMessage flow and content analysisPhishing, business email compromise, malicious attachments
Packet InspectionDeep packet analysis and protocol decodingProtocol-based attacks, malware C2, data exfiltration
Operating System LogsSystem-level events and activitiesProcess execution, registry modifications, scheduled tasks
Application LogsWeb servers, databases, and business applicationsWeb attacks, database intrusions, application abuse
SaaS ApplicationsCloud-based productivity and business servicesAccount takeover, data exfiltration, third-party application risks
DNS InfrastructureName resolution services and DNS trafficCommand and control, data exfiltration via DNS, domain generation algorithms