Alert Logic can detect and generate firewall security incidents and observations from log data collected from third-party firewall application resources. Alert Logic collects log data through passive syslog forwarding from the firewall application. Firewall security incidents and observations enhances your security content value for greater visibility into threats in your environment.
Firewall security incidents are generated when suspicious events are detected that require attention to maintain your security posture, achieve regulatory compliance, or both. Alert Logic organizes the incidents by threat level and classification type on your Incidents page. To learn more about the Incidents page, see Incidents.
Alert Logic also identifies relevant security information derived from one or multiple sources from the log data collected, which are referred to as observations. For more information, see Firewall observations.
For Managed Detection and Response customers, you can also view your firewall incident analytics in the two dashboards: Firewall Log Volume Analysis Dashboard and Firewall Log Security Analysis Dashboard.
Alert Logic specifically generates security incidents related to suspicious and malicious behavior, exposures, and new service resource discovery. Firewall security incidents that Alert Logic can generate include the following:
- Cisco Adaptive Security Appliance (ASA)
- Palo Alto
Firewall incident examples
Examples of security incidents that Alert Logic generates if detected from firewall application log data are the following:
- A new created service in the environment that is being used by a customer or external systems.
- Blacklisted IP addresses creating successful connections to most popularly exploited services in the network of a customer.
- A blacklisted IP address successfully probed a new internal resource.
Alert Logic also performs observations of relevant security information that is derived from one or multiple sources from the firewall application log data. Observations do not always meet the criteria for Alert Logic to generate an incident, but can demonstrate security value. Observations can identify security patterns and allow you to conduct threat hunting. Examples of observations that Alert Logic can perform if detected from firewall application log data are the following:
- An IP addresses in logs matches with a listed blacklisted IP addresses.
- Brute force password guessing for a user for a certain amount of time.
- An anomalous number of resource downloads for a user deviated from normal activity.
You can view data related to observations in the Firewall Log Volume Analysis Dashboard.
Firewall log configuration
You must already have configured an Alert Logic syslog remote collector, and a firewall application. To learn how to configure the Alert Logic remote collector, see Install the Remote Collector for Linux or Install the Remote Collector for Windows.
You must configure the third-party firewall application resources to forward firewall logs to the Alert Logic syslog remote collector on port 1514. To learn how to forward the firewall logs, reference the documentation of the third-party firewall application from which you want incidents generated.
For Managed Detection and Response customers, you also have access to the Application Registry page, which is a catalog of all the available applications from which Alert Logic can receive log data. For more information about Application Registry, see Application Registry.