Log Sources and Telemetry

Key Takeaways

  • Telemetry is useful only when it is timely, trustworthy, normalized, and tied to an asset or identity.
  • Security monitoring commonly uses logs from endpoints, identity providers, network devices, cloud platforms, applications, and DNS.
  • Timestamps, source, destination, user, action, result, and asset context are core fields for investigation.
  • Time synchronization supports accurate correlation across systems.
  • Log retention and protection help preserve evidence for incident response and compliance.
Last updated: April 2026

Log Sources and Telemetry

Security monitoring depends on telemetry: the events, metrics, alerts, and records that describe what happened in an environment. A single log rarely tells the whole story. Analysts combine endpoint, identity, network, cloud, and application data to understand user behavior and system activity.

Common Log Sources

SourceUseful eventsExample investigation question
Identity providerLogins, MFA, token use, group changesWas the user authenticated from an unusual source?
Endpoint detectionProcess starts, file writes, network connectionsDid a script launch a suspicious process?
FirewallAllowed and denied trafficDid the host connect to an unexpected destination?
DNSName lookupsDid the endpoint query a suspicious domain?
Web proxyURL access, user agent, categoryDid the user download a payload?
Cloud control planeAPI calls, role changes, storage accessDid someone change a security group or public bucket setting?
ApplicationAuthentication, transactions, errorsWas sensitive data accessed or changed?

Fields That Matter

Useful logs answer basic questions quickly: who, what, when, where, and result. Security+ scenarios often include extra data, but the core fields remain consistent.

FieldWhy it matters
TimestampEstablishes sequence and supports correlation
User or principalTies action to identity
Source IP or hostShows where activity originated
DestinationShows what was accessed
ActionShows what was attempted
ResultSuccess, failure, blocked, allowed, or error
Process or commandHelps distinguish user action from malware behavior
Asset criticalityHelps prioritize response

Realistic Telemetry Set

2026-04-29T12:01:14Z idp user=kmorgan result=success mfa=success source_ip=198.51.100.18 device=unmanaged
2026-04-29T12:04:39Z edr host=LAP-044 user=kmorgan process=powershell.exe parent=winword.exe command="-enc SQBFAFgA..." severity=high
2026-04-29T12:04:41Z dns host=LAP-044 query=cdn-update-example.net result=198.51.100.77
2026-04-29T12:04:43Z firewall src=LAP-044 dst=198.51.100.77 dst_port=443 action=allow bytes_out=88412

One event says a user logged in. The combined telemetry suggests a more serious chain: unmanaged device login, document spawning PowerShell, suspicious DNS, and outbound HTTPS traffic.

Time and Integrity

Time synchronization is critical. If endpoint logs are five minutes slow and firewall logs are accurate, the analyst may misread cause and effect. NTP or another approved time source helps preserve event order.

Logs should also be protected. Attackers often try to clear logs, stop agents, or tamper with audit settings. Centralized collection, access control, write-once storage, alerting on log source failure, and retention policies improve evidence quality.

Common Traps

  • Collecting logs but not retaining them long enough for investigation.
  • Logging only blocked traffic and missing allowed malicious traffic.
  • Ignoring clock drift between systems.
  • Treating an alert as proof without reviewing supporting telemetry.
  • Collecting high-volume data without asset, user, or business context.
Test Your Knowledge

Which field is most important for correlating a login event with a firewall event in the correct order?

A
B
C
D
Test Your Knowledge

An endpoint log shows Word spawning PowerShell with an encoded command, followed by DNS and outbound HTTPS events. What does the combined telemetry suggest?

A
B
C
D
Test Your KnowledgeMulti-Select

Which log sources are commonly useful during security monitoring? Select three.

Select all that apply

Identity provider logs
Endpoint detection logs
Firewall logs
A handwritten office seating chart
An unrelated cafeteria menu