SIEM Use Cases

Malware Detection

It is well known that signature-based antivirus technologies have lost their productivity as the primary weapon in the fight against malware. It is observed that the detection and cleaning rates have considerably lowered in the past few years. Malware targets monetary, personal, financial, or commercial information. Credential theft, cyber warfare, and espionage or service cuts aimed at specific companies can be counted as other targets. Antivirus tools should be reinforced by means of network traffic analysis and system log analysis so as to detect modern commercial malware. In addition, there are scenarios where the antivirus technology detects but cannot delete the threat. To detect and emphasize such incidents, many corporations should considerably improve their abilities against cyber attacks.

How to detect and prevent malware

Detecting malware is difficult and complicated. Logsign USO Platform analyzes the malware indicators and attack vectors by means of pre-defined correlation rules and feeds TI and shares with the IT managers the obtained data by creating dashboards, alerts, and reports.

Using log sources such as Cyber Threat Intelligence (TI), Next-Generation Firewall (NGFW), Active Directory Authentication, DNS Server, Intrusion Prevention Systems (IPS), Process Tracking, Network Access Control (NAC), Endpoint Protection Platform (EPP), and Endpoint Protection Response (EDR), the Logsign USO platform initiates the process of detecting malicious software through multiple correlation techniques.


By means of correlation processes and Behavior Analysis, the user is tagged as Attacker, Victim, and Suspicious.


Following the first activity started by the attacker on the side of the user, the logs are enriched by means of a behavior analysis conducted with the logs coming from the sources. The log activities formed during the activities of the attacker, which are both from the insider to the external and vice versa, are shown on the relevant dashboard panels by being subjected to correlation.


Security firewalls, unauthorized entry detection systems, and endpoints collect and analyze security events from various sources. They utilize advanced analytics and correlation techniques to identify potential security threats and generate real-time alerts. Security analysts can then investigate these threats and respond immediately, reducing the risk of data breachesand unauthorized access.


It can be used for proactive threat-hunting activities. Security analysts can leverage their advanced analytical capabilities to search for indicators of security breaches (IoCs) and conduct detailed investigations into suspicious events or entities. Organizations that proactively hunt for threats can identify and mitigate potential security risks before they cause significant damage.


By centralizing and correlating security event data, the Logsign USO Platform streamlines incident response workflows. It integrates with ticketing systems and other incident response tools, allowing security teams to automate actions like quarantining compromised computers or blocking malicious IP addresses, usernames, URLs, domains, and hashes, thereby reducing response times and minimizing the impact of security incidents.

Other SIEM Use Cases