As the first line of defense against online attackers, the firewall is a critical part of your organizations network security. Being able to work with common security tools such as a firewall, which contains numerous logs that need to be analyzed and understood, is a critical skill every SOC team member shall have.
In this exercise, a new security checks scanner server was added to the network and a planned security check has just started. Your mission is to investigate the firewall logs created by the new server and understand their purpose. By doing so, you will learn how different types of traffic appear in the firewall, allowing you to more efficiently and effectively analyze suspicious activity.
As the first line of defense against online attackers, the firewall is a critical part of your organizations network security. Being able to work with common security tools such as a firewall, which contains numerous logs that need to be analyzed and understood, is a critical skill every SOC team member shall have.
In this exercise, a new security checks scanner server was added to the network and a planned security check has just started. Your mission is to investigate the firewall logs created by the new server and understand their purpose. By doing so, you will learn how different types of traffic appear in the firewall, allowing you to more efficiently and effectively analyze suspicious activity.