Network Visibility OverviewΒΆ
When you log into Security Onion Console, you may see alerts from Suricata or IDH, protocol metadata logs from Zeek or Suricata, file analysis logs from Strelka, or full packet capture from Suricata. How is that data generated and stored? This section covers the various processes that Security Onion uses to analyze and log network traffic.
