I have a fairly solid experience with setting up SOCs centred around Graylog. As such, I’ll share a few thoughts below :
- Defining the logs that should be send to Graylog - any advice on this?
You should pull as many useful logs as possible from your environment, a good starting point is AD, Firewalls, Proxy systems, Windows Sysmon logs from servers and endpoints (consider Graylog’s Sidecar for this). The key here is to ensure the logs are parsed for relevant information like IP addresses and usernames, and that the fields where you store such information have coherent names. For instance, if you use “source_ip” as a field name for source IPs in Firewall logs, you should make sure the same field name is used across all other source IPs extracted from different log sources. Also, careful with log event volumetry, a limited amount of good/useful logs is better than terabytes of useless ones.
- Defining the best use cases from a security view point that can be implemented - any advice?
This is a broad question, but you can look at the Sigma project, which is an open source collection of threat detection use cases. If you have the time and the expertise, then I would recommend building your own use cases as Graylog Event Definitions progressively, and tuning down the false positives at the same rate.
- Putting the correlations is place - how do I do this? Any documentation that might help with this?
The correlation engine is a paid feature in Graylog. However, Graylog Open does come with enough power in its event definitions to cover most of the security use cases.
- Setting up alerting via e-mail or using a central dashboard to reflect the abnormalities - any documentation on how to approach this?
Both are feasible and well described in the Graylog documentation. For dashboards, you may search for existing Content Packs shared by the community, which you can import in your Graylog instance for inspiration.
Ideally, dashboards should serve two purposes :
- help identify thresholds for use case
- help analysts investigate alerts coming out of use cases
- Would you have any other suggestions on what else I should consider in the process of trying to build some SOC capabilities with Graylog?
Consider integrating Graylog with TheHive v4, which is an open source SOAR system that can help you better manage the alerts generated by Graylog, correlate and create cases. A word of caution though, TheHive 5 is no longer open source, and has a fairly limited free version.
Also, Recon Infosec have posted an awesome blog about Graylog pipelines and how they can be used to enrich logs and detect threats.