Network VisibilityΒΆ

When you log into Security Onion Console (SOC), you may see network-based IDS alerts from Suricata, protocol metadata logs from Zeek or Suricata, file analysis logs from Strelka, or full packet capture from Stenographer. How is that data generated and stored? This section covers the various processes that Security Onion uses to analyze and log network traffic.