Day 3 – Understanding Logs, Log Types & Why Logs Are Important.


🧾 What Are Logs? (Explained in Simple Language)

Logs are records of activities happening in a system, network, application, or device.

Simple Example:

A log is like a CCTV recording, but instead of video, it records digital activities.

💡 Think of logs as:

  • A diary that records every action
  • A vehicle’s GPS history
  • A shop’s visitor register
  • A call history in your mobile

Logs tell us “what happened, when it happened, and who did it.”


🔍 Why Are Logs Important? (For SOC Analysts)

Logs help SOC Analysts:

  • Detect attacks
  • Investigate suspicious activity
  • Understand what the hacker did
  • Trace the attacker’s path
  • Prepare incident reports

Real Example:

If someone tries to log in to your account 20 times, logs will show:

  • Time of logins
  • IP address
  • Success/failure
  • Device used

Without logs → SOC cannot detect attacks.


🗂️ Types of Logs (Explained Very Simply)

1️⃣ Authentication Logs

These show login activity.

Examples:

  • Successful login
  • Failed password attempt
  • New device login

Real Example:
You receive: “New login from Chrome on Windows.”
This comes from authentication logs.


2️⃣ System Logs

These logs come from the operating system (Windows, Linux).

Examples:

  • System boot/shutdown
  • Errors/crashes
  • User creation/deletion
  • Permission changes

Real Example:
When your laptop shows “Windows restarted after a crash,”
→ this came from system logs.


3️⃣ Application Logs

Generated by software and apps.

Examples:

  • Web server logs (Apache, Nginx)
  • Database logs
  • App error logs

Real Example:
E-commerce app failing to show “Add to Cart”
→ developer checks application logs.


4️⃣ Security Logs

Special logs related to attacks or threat attempts.

Examples:

  • Firewall logs
  • Antivirus logs
  • EDR logs
  • VPN logs

Real Example:
VPN alert: “Login from unusual country.”
→ comes from security logs.


5️⃣ Network Logs

Traffic and communication logs.

Examples:

  • Incoming/outgoing connections
  • Port scanning
  • Packet flows

Real Example:
Firewall blocks unknown IP trying to connect at 2 AM.


🧰 Tools Used to View Logs (Basic Introduction)

SOC Analysts commonly use:

  • Windows Event Viewer
  • Linux Syslog (/var/log/)
  • SIEM Tools (Splunk, QRadar, ELK)
  • Firewall Consoles
  • EDR dashboards (CrowdStrike, Defender)

🧪 Simple Hands-On Demo You Can Show Your Students

1. Windows Example:

Open Event Viewer → Windows Logs → Security
Show login success / login failure events.

2. Linux Example:

Run:

sudo cat /var/log/auth.log

3. SIEM Example (If possible):

Upload sample logs into Splunk and show search results.


🧠 Real-Time Scenarios (For Understanding)

Scenario 1 – Password Guessing Attack

Logs show:

  • 15 failed login attempts
  • From same IP
  • Within 2 minutes

SOC Analyst conclusion: Brute force attack attempt.


Scenario 2 – Malware Infection

Logs show:

  • Unknown .exe file executed
  • Anti-virus detected threat
  • Outbound connection to foreign IP

SOC Analyst conclusion: Malware trying to contact attacker.


Scenario 3 – Unauthorized Login

Logs show:

  • Employee logged in at 3 AM
  • From a new country
  • Using unknown device

SOC Analyst conclusion: Account compromised.


📝 Day 3 Activity for Students

Give them a small exercise:

Ask students to write:
“Find 5 log entries from your Windows or Linux system and note what they mean.”


🏠 Day 3 Homework

Search on Google:
“What is Sysmon?”

Write:

  • What Sysmon does
  • Why SOC Analysts use it

🎤 Trainer Script for Day 3

You can read this in class:

“Logs are the digital CCTV of an organization.
They record every action inside a system.

As SOC Analysts, logs are your most important tool for detecting and understanding attacks.

Today you learned types of logs, why logs matter, and how real attacks look in logs.”


Leave a comment

Previous Post
Next Post

Recent posts

Quote of the week

in learning you will teach and in teaching you will learn

~ Phil Collins
Design a site like this with WordPress.com
Get started