Investigate Stormshield & SonicWall Events with Logz.io Cloud SIEM
Blog post from Logz.io
Stormshield and SonicWall are popular firewalls used to monitor network traffic for potential threats, each integrating with Logz.io Cloud SIEM to streamline security event management. These firewalls can detect various attacks, such as brute force logins, DDoS, and SQL injections, but often contribute to an overwhelming number of alerts that can be challenging to prioritize. Logz.io Cloud SIEM addresses this issue by collecting, parsing, and displaying logs from these firewalls on a centralized security dashboard, allowing security teams to focus on the most critical threats. The integration process involves using FileBeat to ship logs from the firewalls to Logz.io, which then applies pre-built rules and dashboards to highlight significant security events. For Stormshield, rules focus on authentication and intrusion prevention system (IPS) policies, while SonicWall rules emphasize failed authentication attempts, IPS policy violations, and other suspicious activities. By cross-referencing logs with threat intelligence feeds, Logz.io enhances the ability to identify and investigate malicious IPs, ultimately aiding organizations in managing tool sprawl and improving their security posture.