SIEM Dashboard
Log aggregation, correlation rules, and threat hunting queries.
SIEM Dashboard
The SIEM (Security Information and Event Management) dashboard aggregates logs from multiple sources and helps you detect threats through correlation and analysis.
Interface Overview
The SIEM dashboard consists of four main sections:
1. Log Viewer
The central panel displays logs from various sources:
- Timestamp - When the event occurred
- Source - Where the log came from (firewall, endpoint, server)
- Event Type - Category of the event
- Severity - Info, Low, Medium, High, Critical
- Message - Event details
2. Query Bar
Search and filter logs using the query bar:
source:firewall AND action:blocked AND severity:highCommon query operators:
AND,OR,NOT- Logical operatorsfield:value- Field-specific searchfield:*- Wildcard matching"exact phrase"- Exact string match
3. Data Sources
View connected log sources:
| Source | Description |
|---|---|
| Firewall | Network traffic and blocking events |
| Endpoint | Process execution, file changes |
| Server | Authentication, service events |
| Cloud | AWS, Azure, GCP audit logs |
| Mail server and phishing alerts |
4. Correlation Rules
Pre-built rules that detect attack patterns:
- Brute Force - Multiple failed logins from same source
- Lateral Movement - Authentication across multiple hosts
- Data Exfiltration - Large outbound transfers
- Privilege Escalation - Unexpected admin access
Key Features
Alert Correlation
When the SIEM detects a pattern, it creates a correlated alert:
- Individual log events are grouped
- A correlation rule matches the pattern
- A single alert is generated with context
- Related events are linked for investigation
Threat Hunting
Proactively search for threats:
- Use the query bar to filter logs
- Look for anomalies or suspicious patterns
- Drill down into specific events
- Create custom correlation rules
Timeline View
See events in chronological order:
- Click on any alert
- Select "View Timeline"
- See all related events in sequence
- Identify the attack chain
Tips for Success
Focus on correlation - a single log rarely tells the full story. Look for patterns across multiple sources.
- Start with high-severity alerts
- Check the source IP/user across all logs
- Look for temporal patterns (events close in time)
- Use saved queries for common investigations