This file includes the commands for Linux logs monitoring in an organization required by a SOC Analyst to monitor and analyze Brute Force Attempts, Commands Execution, Locate Attacking IP's etc.
-
Updated
Dec 11, 2025
This file includes the commands for Linux logs monitoring in an organization required by a SOC Analyst to monitor and analyze Brute Force Attempts, Commands Execution, Locate Attacking IP's etc.
Configured a Splunk Universal Forwarder on a remote Ubuntu system to forward syslog and authentication logs to a central Splunk indexer. Includes setup steps, search queries, and incident response observations. Part of the 30-Day SOC Challenge.
Add a description, image, and links to the linux-logging topic page so that developers can more easily learn about it.
To associate your repository with the linux-logging topic, visit your repo's landing page and select "manage topics."