Part of the SIEM problems enterprises face is failing to maintain it with the proper correlation rules.
SIEM use cases or rules are 80% of the value of the product. All SIEM solutions have a correlation feature, but they are not the same. Before choosing a SIEM, you must check correlation capabilities. Each product has many different features and their advantages and limits.
Some examples of correlation limits from product user guides and product's websites.
AlienVault:
AlienVault is a great product and combines many open source tools like vulnerability scanner and asset manager. There are some limits on correlations like:
“Cross-Correlation can only run on (just) IPS and Vulnerability Scanner logs and the combining on just IP addresses”.
“AlienVault uses 4,500 built-in “correlation directives” for threat correlation and most them are just for AlienVault NIDS”.
There is a limit on list management. Dynamic List usage in correlation rules is not supported in AlienVault.
Also, keep in mind that AlienVault correlation engine has sticky diff restrictions.
LogPoint:
LogPoint is a great tool and listed in Gartner in 2020. LogPoint user guide has details about alerts. Use case development is only with developing a search query.
ManageEngine:
ManageEngine EventAnalyzer SIEM is a good product and has many fantastic reporting features. When it comes to correlation, ManageEngine EventAnalyzer SIEM does not parse Firewall Traffic, IPS, Proxy, etc logs. Just configuration and authentication logs. So correlation rules cannot include Firewall Traffic, IPS, Proxy, etc. details.
ManageEngine EventAnalyzer SIEM has predefined rule templates. So you cannot create a rule from scratch. You have to select one predefined rule from templates.
Examples of other limits:
There is no capability to develop your own rule. You have to use available templates.
Eventlog analyzer correlation has only one operator “Fallowed by Within”. Many operators are missing like ”Not Fallowed by Within”
Eventlog has many missing operators like:
Matches,
Doesn't match,
Is null,
Is not null,
IP Range Equals,
IP Range Not Equals,
In list,
Not in list,
Starts with in list,
Starts with in list case insensitive,
Not starts with in list,
Not starts with in list case insensitive,
Contains list key in data,
Not contains string in list,
Not contains string in list case insensitive,
Is contained in string,
Regex in list,
Check data in regex list,
Contains in list,
Not contains in list,
Contains credit card number,
There is no way to use dynamic and static lists in correlation
There is no way to use the output of one correlation as an input to the new correlation rule
There are column restrictions in correlation. You cannot use all the available columns in reports
Solarwinds SIEM:
Solarwinds SIEM is a good product and has many good features. When it comes to correlation:
Solarwinds LEM does not use all the report fields on correlation. Also, correlation cannot fire on raw log data that is received
Solarwinds LEM correlation engine has many limits. For example, you cannot create a rule using the “NOT FALLOWED BY” operator
Only the AND and OR operators are supported. The NOT operator is not supported
Solarwinds does not support creating scenarios based on multiple rules.
Threshold rules are very limited. For example, you cannot create a rule like If you want to check whether there are 5 events from Host Firewalls with severity 4 or greater in 10 minutes between the same source and same destination IP
Dynamic list updates through actions are missing
Linking multiple rule fields is missing
“Group By” is not supported
You should also check system requirements and performance limits up to 5000 rule execution per day
Splunk:
If you think about SIEM, you have to consider Splunk ES. Splunk Core/Enterprise is not a SIEM product. Splunk is a great product. Splunk says that:
"Each real-time search "unpreemptively" locks 1 core on EVERY INDEXER and on your Search Head”.
Also, there is no functional real time detection.
McAfee:
EPS:
Maximum Ingestion Events Per Second (EPS) describes the peak advertised EPS for this appliance. iEPS is based on out-of-box settings with no adjustments to default event or flow aggregation and very limited overall SIEM user activity (Users, Alarms, Reports, loCs, etc.). Any customization in the configuration or increase in user activity may result in reduced observed EPS rates.
2 - Maximum Query Events Per Second (gEPS) describes what a typical ESM appliance could expect to achieve under normal, active ESM usage conditions and reduced levels of event aggregation. Max qEPS assumes multiple analysts are accessing the system simultaneously while background activities such as Alarms, Reports and CyberThreat (loC) queries are executing. In addition, Max qEPS assumes that customers would adjust the event and flow aggregation rates lower than out-of-box settings. McAfee recommends using QEPS numbers as the basis for sizing most ESM designs. Note that Max qEPS represents best performance estimates based on observations with typical larger enterprise customers; aggressive customizations or dramatic increases in user activity may result in reduced observed iEPS rates.
if a firewall admin login has occurred and after this login action there is n configuration change immediately (within 15 minutes) but if there is a change in the firewall within 12 hours, notify
Threshold rules:
Destination IP is 1.1.1.1 and destination port is 389 and sent_bytes > 100000 (total) in time frame of 10 minutes and group by source IP.
I want to know how many SQL injection attack events from a single IP for 5 minutes. I know that I can set a threshold. But I want to know the exact number.
SUM type of thresholds are not supported
If I want to detect total downloads within 5 minutes more than 500 Mb, it is not possible with Mcafee
If the correlation is important, you may consider reading technical documents. Some remarkable examples of limits and notifications are given above. There are many other SIEM solutions like IBM Qradar, Arcsight, FortiSIEM, SureLog, RSA, LogRhytm. You have to check what the product user guides and technical documents say in detail about correlation.
Correlation and detection capabilities are important. In order to choose a SIEM according to correlation capabilities you should also check if those use cases supported:
Warn if Powershell command with base64 format and more than 100 characters appears
Password changes for the same user more than 3 within 45 days
If there are more than 10 DNS requests within 5 minutes that have the same domain but different subdomains, notify. Example: xxx.domian.com, yyy.domian.com
Misuse of an account
Lateral movement
Executive only asset accessed by a non-executive user
Multiple VPN accounts failed login from a single IP
First access to critical assets
User access from multiple hosts
The user account created and deleted in a short period of time
Monitor privileged accounts for suspicious activity
Chained RDP connections
RDP with unusual charset
Multiple RDP from the same host in a short time
Lateral movement following an attack
Returns days where a user accessed more than his 95th percentile number of assets
Look for a user whose HTTP to DNS protocol ratio is %300 more than %95 of the other users for the last four-week ratio for the 4th day of the week [1],
If a user number of failed authentication ratio to the number of successful authentication is %10, alert
Data loss detection by monitoring all endpoints for an abnormal volume of data egress
Measures the similarity between well-known process names with the running ones using Levenshtein distance in real-time and detect process masquerade [2]
DGA detection [3]
Detect attack Tools [4]
Detect malware [5]
Detect suspicious/malicious processes [5]
Detect suspicious/malicious files [5]
Detect suspicious/malicious services [5]
Detect abnormal port used in outbound network connection from an asset [1]
An abnormal number of assets logged on [1]
Failed logon to an asset that a user has previously never logged on to [6]
The first time a user saves files to a USB drive
First time the user is performing an activity from a country
First VPN connection from a device for a user
First connection from a source IP
First access to a device for a user
First access to database MSSQL for peer group HR
First access to database MSSQL for user
First mail to/from a domain for the organization
First access to this web domain which has been identified as risky by a reputation feed
First execution of a process on a host
First access to object fdghsdydhas
First access from a host to a database for a user
First access from source zone Atlanta office to a database for a user
IT Manager & Software Solutions Technical Manager Vitel A.S. at a computer software company with 51-200 employees
Sep 27, 2021
There is a license required for these solutions. The customer can choose the license type, such as an annual license purchase or a perpetual license. If the customer wants maintenance they will have to pay annually.
When looking for a Security Information and Event Management (SIEM) solution, are you more likely to pick AlienVault OSSIM or Logz.io? What are the advantages and disadvantages of each? Are there specific use cases where one provides a better solution than the other?
Today, Security Information and Event Management (SIEM) solutions play a pivotal role in bolstering organizational defenses against an array of cybersecurity threats. Through the lens of real-world success stories and an evaluation of top SIEM technologies, this comprehensive article illustrates the transformative impact of SIEM systems across industries and highlights leading solutions, includ...
Enterprise Cloud and AI Security Architect at a security firm with 10,001+ employees
Feb 6, 2025
Apart from these, Google Chronicle SIEM is also the best solution for threat hunting and threat detection. We can also use Google Chronicle (Google SecOps) as a SIEM tool and even can be integrated with Mandiant ( third-party tool) for real-time threat intelligence. Google Chronicle is a cloud security service in GCP.