OBJECTIVE 4.4 Explain

Explain security alerting and monitoring concepts and tools

Monitoring is how you see what’s happening. Alerting is how the system tells you something needs attention. Without both, attacks proceed undetected — and the average attacker dwell time in unmonitored environments is measured in months.

SIEM (Security Information and Event Management)

Centralized platform that collects, correlates, and analyzes log data from across the enterprise.

Core Functions

  • Log aggregation: Collect logs from firewalls, servers, endpoints, applications, cloud services
  • Normalization: Translate diverse log formats into a common schema
  • Correlation: Identify patterns across multiple data sources (e.g., failed login + privilege escalation + data transfer = potential breach)
  • Alerting: Generate alerts when correlation rules or thresholds are triggered
  • Dashboards: Real-time visualization of security posture
  • Retention: Store logs for forensic investigation and compliance

Correlation Rules

  • Failed login from Country X → successful login from Country X → file access on sensitive share → alert
  • Same source IPInternet Protocol — Network layer addressing and routing scanning multiple ports across subnet → alert
  • Service account authenticating from a workstation (instead of expected server) → alert

Challenges

  • Alert fatigue: Too many false positives bury real incidents. Tuning correlation rules is critical.
  • Data volume: Logging everything is expensive. Selective logging creates blind spots.
  • Garbage in, garbage out: SIEMSecurity Information and Event Management — Centralized log collection, correlation, and alerting is only as good as the data sources feeding it.

SOAR (Security Orchestration, Automation, and Response)

Automates repetitive security operations tasks and orchestrates multi-tool workflows.

Capabilities

  • Playbooks: Automated response workflows (phishing email received → extract URLs → check reputation → block domain → notify user → create ticket)
  • Orchestration: Coordinate actions across SIEMSecurity Information and Event Management — Centralized log collection, correlation, and alerting, firewall, EDREndpoint Detection and Response — Monitors endpoints for threats and enables response, ticketing systems
  • Automation: Eliminate manual steps for common incidents

Value

  • Reduces MTTRMean Time to Repair — Average time to restore after failure (Mean Time to Respond)
  • Frees analysts from repetitive tasks to focus on complex investigations
  • Ensures consistent response regardless of which analyst is on shift

Endpoint Detection and Response (EDR)

Agent on endpoints that monitors behavior, detects threats, and enables response.

Capabilities

  • Process execution monitoring, file system changes, network connections
  • Behavioral detection (not just signatures)
  • Threat hunting — proactive searching for indicators of compromise
  • Remote response: isolate endpoint, kill process, collect forensic data

XDR (Extended Detection and Response)

Extends EDREndpoint Detection and Response — Monitors endpoints for threats and enables response across multiple data sources: network, cloud, email, identity.

  • Correlated detection across the full attack chain, not just endpoints
  • Single console for cross-domain visibility

Network Monitoring

NetFlow/sFlow/IPFIX

Metadata about network conversations — source/dest IPs, ports, protocols, byte counts, timestamps.

  • Doesn’t capture packet content — just conversation records
  • Useful for identifying anomalous traffic patterns, C2Command and Control — Infrastructure attackers use to manage compromised systems beaconing, data exfiltration volumes

Full Packet Capture

Captures complete packet content for forensic analysis.

  • High storage requirements. Often limited to key network segments.
  • Used for incident investigation, not real-time monitoring at scale.

Protocol Analyzers

Tools for deep inspection of captured traffic (Wireshark, tcpdump).

  • Decode protocol structures, identify anomalies, extract artifacts

SNMP (Simple Network Management Protocol)

Monitoring network device health — uptime, CPUCentral Processing Unit — Main processor in a computer, memory, interface statistics.

  • Security concern: SNMPv1/v2c send community strings in plaintext. Use SNMPv3Simple Network Management Protocol version 3 — Port 161/162. SNMP with encryption and authentication (encrypted, authenticated).

Log Sources

SourceWhat it captures
Firewall logsAllowed/denied connections, NATNetwork Address Translation — Maps private IPs to public IPs translations
IDSIntrusion Detection System — Monitors and alerts on suspicious activity (passive)/IPSIntrusion Prevention System — Detects and blocks suspicious activity (inline) logsAlert details, signature matches, anomaly detections
Authentication logsLogin success/failure, source IPInternet Protocol — Network layer addressing and routing, account name
Application logsApplication errors, user actions, APIApplication Programming Interface — Interface for software-to-software communication calls
OSOperating System — System software managing hardware and applications logsSystem events, service starts/stops, security events
DNSDomain Name System — Port 53 (UDP/TCP). Resolves domain names to IP addresses logsQuery requests, resolution results — valuable for detecting C2Command and Control — Infrastructure attackers use to manage compromised systems and tunneling
DHCPDynamic Host Configuration Protocol — Port 67/68 (UDP). Automatically assigns IP addresses to devices logsIPInternet Protocol — Network layer addressing and routing address assignments — maps IPs to devices over time
Proxy/web filter logsURLs visited, categorization, blocks

Alerting Concepts

Thresholds

  • Static: Alert when metric exceeds a fixed value (>100 failed logins/hour)
  • Dynamic/adaptive: Alert based on deviation from learned baseline (200% above normal)

Alert Severity

  • Critical: Confirmed compromise, active data exfiltration, ransomware deployment
  • High: Strong indicators of compromise, active exploitation attempt
  • Medium: Suspicious activity warranting investigation
  • Low/Informational: Anomalies for awareness, potential policy violations

Tuning

  • Reduce false positives by refining rules, whitelisting known-good behavior
  • Danger of over-tuning: Too aggressive and you suppress real alerts
  • Regular review of suppressed/closed alerts to catch missed detections

Data Loss Prevention (DLP)

Prevents sensitive data from leaving the organization through unauthorized channels. CompTIA expects you to know both the concept and the deployment distinctions.

Network DLP vs. Endpoint DLP

TypeWhereWhat It Catches
Network DLPData Loss Prevention — Prevents unauthorized data exfiltrationPerimeter/inlineSensitive data in email, web uploads, file transfers leaving the network
Endpoint DLPData Loss Prevention — Prevents unauthorized data exfiltrationAgent on workstationUSBUniversal Serial Bus — Standard connector for peripherals copies, print jobs, clipboard paste, screen capture, local file moves
Cloud DLPData Loss Prevention — Prevents unauthorized data exfiltrationCASBCloud Access Security Broker — Enforces security policies for cloud services/SaaSSoftware as a Service — Cloud: provider manages everything, you configure integrationUploads to unauthorized cloud storage, SaaSSoftware as a Service — Cloud: provider manages everything, you configure data sharing
  • Network DLPData Loss Prevention — Prevents unauthorized data exfiltration is blind to encrypted traffic unless combined with SSLSecure Sockets Layer — Deprecated predecessor to TLS/TLSTransport Layer Security — Port 443 (HTTPS). Encryption protocol for data in transit inspection
  • Endpoint DLPData Loss Prevention — Prevents unauthorized data exfiltration catches data movement before it hits the network
  • Both require policy tuning — overly aggressive rules block legitimate business processes

Content Detection Methods

  • Pattern matching: Regex for SSNs, credit card numbers, policy numbers
  • Keyword matching: Classification labels, project names, “CONFIDENTIAL”
  • Document fingerprinting: Hash comparison against known sensitive documents
  • Machine learning: Context-aware classification beyond simple patterns

SCAP (Security Content Automation Protocol)

SCAPSecurity Content Automation Protocol — Standards for automated vulnerability management is a suite of specifications for automating vulnerability management, security measurement, and compliance checking. CompTIA expects you to know the components.

Key Components

ComponentPurpose
CVECommon Vulnerabilities and Exposures — Standard identifier for known vulnerabilities (Common Vulnerabilities and Exposures)Unique identifier for known vulnerabilities
CVSSCommon Vulnerability Scoring System — Standard severity rating 0.0-10.0 (Common Vulnerability Scoring System)Severity scoring (0-10)
CPECommon Platform Enumeration — Standard naming for IT products/platforms (Common Platform Enumeration)Standardized naming for hardware, OSOperating System — System software managing hardware and applications, applications
XCCDFExtensible Configuration Checklist Description Format — Language for security checklists (Extensible Configuration Checklist Description Format)Security checklist format — defines what to check
OVALOpen Vulnerability and Assessment Language — Language for describing system configuration states (Open Vulnerability and Assessment Language)How to check — machine-readable vulnerability test definitions
CCE (Common Configuration Enumeration)Unique identifier for configuration issues

SCAPSecurity Content Automation Protocol — Standards for automated vulnerability management enables automated compliance scanning: XCCDFExtensible Configuration Checklist Description Format — Language for security checklists defines the checklist, OVALOpen Vulnerability and Assessment Language — Language for describing system configuration states defines the tests, CPECommon Platform Enumeration — Standard naming for IT products/platforms identifies what’s in scope, and CVSSCommon Vulnerability Scoring System — Standard severity rating 0.0-10.0 scores the findings.

Antivirus and Endpoint Monitoring

Detection Methods

  • Signature-based: Pattern matching against known malware signatures. Fast, low false positives, blind to novel threats.
  • Behavioral/heuristic: Monitors what code does, not what it looks like. Catches zero-days but higher false positive rate.
  • Sandboxing: Detonates suspicious files in an isolated environment to observe behavior before allowing execution.

Monitoring Modes

  • Real-time (on-access): Scans files as they’re opened, downloaded, or executed. Always-on protection.
  • On-demand: Scheduled or manual full-system scans. Catches dormant threats.
  • SIEMSecurity Information and Event Management — Centralized log collection, correlation, and alerting integration: AV alerts feed into SIEMSecurity Information and Event Management — Centralized log collection, correlation, and alerting for correlation. AV detection + outbound connection to unknown IPInternet Protocol — Network layer addressing and routing = higher-priority alert than either alone.

Log Management Specifics

Protocols and Formats

Protocol/FormatDescription
SyslogStandard log forwarding. UDPUser Datagram Protocol — Fast, connectionless transport/514 (unreliable), TCPTransmission Control Protocol — Reliable, connection-oriented transport/514 (reliable), TLSTransport Layer Security — Port 443 (HTTPS). Encryption protocol for data in transit/6514 (encrypted). Nearly universal.
rsyslogEnhanced syslog daemon. Filtering, templating, database output, remote forwarding. Default on most Linux.
journalctlsystemd binary journal. Rich querying, structured fields. Can forward to syslog.
NXLogCross-platform agent. Converts Windows Event Log → syslog/JSON/CEF. Essential for heterogeneous environments.
CEF (Common Event Format)ArcSight-originated standard format. `CEF:Version
JSONIncreasingly common for modern logging. Human-readable, easily parsed, widely supported.

Forwarding Architecture

  • Sources → Log forwarder/agent (rsyslog, NXLog, Fluentd, Filebeat) → Log aggregator (SIEMSecurity Information and Event Management — Centralized log collection, correlation, and alerting, Elasticsearch, Splunk) → Storage (hot/cold tiers)
  • Why centralized forwarding matters: If logs only live on the source system, an attacker who compromises that system can delete them. Ship logs off-box immediately.

Retention Tiers

  • Hot: Searchable, queryable, fast. 30–90 days. SIEMSecurity Information and Event Management — Centralized log collection, correlation, and alerting or log platform.
  • Warm: Slower queries, still accessible. 90 days–1 year.
  • Cold: Archived, compressed, write-once. 1+ years. S3/GCS/tape. Compliance-driven retention.

Alert Response and Remediation

Triage Process

  1. Initial assessment: Is this a true positive? Check context, correlate with other data sources.
  2. Severity classification: Critical/High/Medium/Low based on asset value, data sensitivity, and threat actor capability.
  3. Assignment: Route to appropriate analyst or team based on severity and type.
  4. Investigation: Determine scope, affected systems, attack vector.
  5. Containment: Isolate affected systems, block IOCs, disable compromised accounts.

Quarantine Procedures

  • Network quarantine: Move affected endpoint to isolated VLANVirtual Local Area Network — Logical network segmentation at Layer 2. Maintains forensic access while preventing lateral movement.
  • Email quarantine: Suspicious emails held for review before delivery. Admin can release or delete.
  • File quarantine: Detected malware moved to protected storage. Not deleted — may be needed for investigation.

Escalation

  • Tier 1 → Tier 2: Confirmed incident beyond Tier 1 playbook. Typically within 15–30 minutes.
  • Tier 2 → Tier 3/IRIncident Response — Structured approach to handling security incidents: Complex incident requiring forensics, legal involvement, or executive notification.
  • External escalation: Law enforcement (FBI IC3), regulatory notification (breach notification requirements), third-party IRIncident Response — Structured approach to handling security incidents retainer.
  • SLAs matter: Escalation timelines should be defined in advance, not decided during an active incident.

Triage Playbooks

Documented procedures for common alert types:

  • Malware detection: Isolate endpoint → collect artifacts → scan related systems → remediate → restore
  • Phishing report: Extract IOCs → search for other recipients → block domain/sender → notify affected users
  • Brute force alert: Confirm source → block IPInternet Protocol — Network layer addressing and routing → check for successful auth → reset if compromised → review lockout policy
  • Data exfiltration indicator: Verify transfer → identify data scope → contain → preserve evidence → engage IRIncident Response — Structured approach to handling security incidents

Threat Intelligence Integration

Feeding external threat data into monitoring tools:

  • IOCIndicator of Compromise — Evidence that a security breach has occurred feeds: Known-bad IPs, domains, file hashes integrated into SIEMSecurity Information and Event Management — Centralized log collection, correlation, and alerting/firewall/EDREndpoint Detection and Response — Monitors endpoints for threats and enables response
  • STIXStructured Threat Information eXpression — Standard language for threat intelligence sharing/TAXIITrusted Automated eXchange of Indicator Information — Transport protocol for STIX threat intel: Standards for threat intelligence exchange
  • Threat intelligence platforms (TIP): Aggregate multiple feeds, score confidence, distribute to security tools

Offensive Context

Monitoring is the detective control that makes every other attack harder. An attacker operating in an environment with mature SIEMSecurity Information and Event Management — Centralized log collection, correlation, and alerting correlation, EDREndpoint Detection and Response — Monitors endpoints for threats and enables response on every endpoint, and tuned alerting has to move slowly, avoid known patterns, and clean up after themselves — all of which increases their cost and risk. An attacker in an unmonitored environment moves freely. The difference between “breach detected in 4 hours” and “breach detected in 200 days” is monitoring maturity. JA3JA3 TLS Fingerprint — Client TLS fingerprinting method for threat detection/JA4 TLSTransport Layer Security — Port 443 (HTTPS). Encryption protocol for data in transit fingerprinting as a detection technique catches malware that uses its own TLSTransport Layer Security — Port 443 (HTTPS). Encryption protocol for data in transit stack — and understanding how attackers evade detection informs how you tune your rules.

LABS FOR THIS OBJECTIVE