Corelight
flow-image

Corelight's Introductory Guide To Threat Hunting With Zeek (Bro) Logs

Published by Corelight

If you’re considering or new to Corelight and Zeek (formerly known as Bro), this guide will help you as part of a proof of concept for an initial deployment. The guide consists of analysts questions that help demonstrate usage of the data Zeek provides, and the value of a data-centric approach for Network Security Monitoring (NSM). Questions are organized by the location of instrumentation in the network. Additionally, several threat hunting concepts are described to help deepen knowledge, especially for teams new to the practice.


Download now to learn more about Network Security Monitoring!

Download Now

box-icon-download

Required fields*

Please agree to the conditions

By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@headleymedia.com.

Related Categories Server, Applications, Network Security, IT Security & Cybersecurity, Authentication & Access Systems, IT Threats & Vulnerabilities, Data recovery, Data Loss Prevention (DLP), Disaster Recovery, Mobile Security, Email Security, Firewall, Log Management, Event Management, VPN, Malware, Endpoint Security, Network Security, Security Solutions, Security Management, ERP, Server, SAN, Server, Software