📘Cisco Certified CyberOps Associate (200-201 CBROPS)
In cybersecurity investigations, evidence is the information you use to figure out what happened during a security incident. Logs are a major source of this evidence. Different logs provide different types of evidence, and understanding this is key for the exam.
1. Types of Evidence in IT Security
Evidence can be categorized as:
- Network Evidence
- Comes from network devices like firewalls, routers, switches, and intrusion detection/prevention systems (IDS/IPS).
- Example logs: firewall allow/deny logs, router connection logs, IDS alerts.
- Use: To see suspicious network connections, blocked attempts, or unusual traffic patterns.
- Host/Operating System Evidence
- Comes from servers or user devices.
- Example logs:
- Windows Event Logs (Security, System, Application)
- Linux
/var/log/syslogor/var/log/auth.log
- Use: To track user logins, failed login attempts, system errors, or application crashes.
- Application Evidence
- Comes from software applications running on hosts.
- Example logs:
- Web server logs (Apache
access.loganderror.log) - Database logs (failed queries, login attempts)
- Email server logs
- Web server logs (Apache
- Use: To find malicious activity at the application level, like SQL injection attempts, abnormal requests, or unauthorized access.
- Security Platform Evidence
- Comes from centralized security tools.
- SIEM (Security Information and Event Management) logs: Collect and correlate logs from multiple devices.
- Example: Alert from correlated failed login attempts across multiple servers.
- SOAR (Security Orchestration, Automation, and Response) logs: Track automated responses to threats.
- Example: Log showing an automatic quarantine of a compromised endpoint.
- Use: To see trends, patterns, and automated actions in an incident.
- Command Line Evidence
- Logs or outputs from commands run on hosts.
- Example:
who,last,ps,netstat,iptableslogs- PowerShell logs (
Get-EventLog)
- Use: To manually inspect what is happening on a host, such as active processes or network connections.
Key Point for the Exam
- You should identify the type of evidence by looking at the log content.
- For example:
- If it shows IP addresses and traffic flow → network evidence
- If it shows failed login attempts → host/OS evidence
- If it shows web requests → application evidence
- If it shows correlated alerts → SIEM/SOAR evidence
- If it’s output from a command → command line evidence
3.5 Interpret Operating System, SIEM, SOAR, Application, or Command Line Logs to Identify an Event
Once you know the type of log, the next step is reading it to detect an event. Events are actions or changes that could indicate normal activity, misconfigurations, or security incidents.
1. Operating System Logs
Windows Event Logs
- Security log: login success/failure, account lockouts.
- System log: driver issues, hardware problems.
- Application log: software crashes, service errors.
Linux Logs
/var/log/auth.log: login attempts./var/log/syslogor/var/log/messages: system and service messages./var/log/kern.log: kernel-related messages.
Interpretation Example:
- Multiple failed logins followed by a successful login → possible brute-force attack.
2. SIEM Logs
- SIEM aggregates logs from multiple sources and correlates them.
- Example:
- Failed login on 5 servers from the same IP → SIEM raises an alert.
- Interpretation:
- Helps detect patterns you wouldn’t see from a single host.
- Key fields:
- Timestamp, source IP, username, event ID, severity.
3. SOAR Logs
- SOAR tracks automated actions taken after detecting incidents.
- Example:
- Quarantined a machine after detecting malware.
- Interpretation:
- You can see what the system did automatically and why.
- Useful for audit trails and incident response verification.
4. Application Logs
- Examples:
- Web server:
192.168.1.10 POST /login 401→ failed login attempt. - Database:
Failed login for user admin from IP 10.0.0.5.
- Web server:
- Interpretation:
- Check for abnormal behavior such as repeated errors, unusual access patterns, or unauthorized commands.
5. Command Line Logs
- Examples:
ps -ef→ shows running processes.netstat -an→ shows network connections.- PowerShell logs → show executed scripts.
- Interpretation:
- You can detect malware running as a process, suspicious network connections, or unauthorized commands.
Tips for Interpreting Logs
- Check timestamps: Helps determine the sequence of events.
- Look for anomalies: Unusual logins, high traffic, errors.
- Correlate logs: Compare logs from multiple sources to get a full picture.
- Identify severity: Not all events are critical; classify them as low, medium, high.
- Understand context: Know normal behavior for the system to spot unusual events.
Summary for Students
- Identify evidence type first:
- Network, host/OS, application, SIEM/SOAR, command line.
- Read logs carefully:
- Check timestamp, user, source IP, and event type.
- Interpret event:
- Failed login → brute force attempt.
- Multiple alerts → coordinated attack.
- Quarantined endpoint → automated response worked.
- Correlate across systems:
- Combine network, OS, and application logs to get full understanding.
✅ Exam Focus:
- You may be given a log snippet and asked:
- What type of evidence is this?
- What event does this log indicate?
Always answer systematically:
- Evidence type → What the log represents
- Event → What happened and what might it indicate
