Understand logs, metrics, alerts, SIEM, UEBA, and monitoring workflows for Security+ operational scenarios.
Monitoring is how security operations stop being guesswork. Security+ expects you to understand how raw telemetry becomes detection and how alerts fit triage rather than replacing it. A strong answer usually improves both visibility and analyst usefulness.
SIEM: Security information and event management platform for collecting, normalizing, correlating, and alerting on events from many systems.
UEBA: User and entity behavior analytics for spotting activity patterns that look abnormal for an identity, host, or service.
Telemetry: The log, metric, event, or trace data generated by systems and security tools.
Enrichment: Adding useful context such as user, geography, device, or threat data so an alert is easier to triage.
CompTIA is usually testing whether you can:
That is why a SIEM answer is often only part of the story. Collection without retention, tuning, or triage logic is still weak operations.
flowchart LR
A["Endpoints, servers, apps, network"] --> B["Logs and telemetry"]
B --> C["Collection and normalization"]
C --> D["Correlation and alerting"]
D --> E["Triage and response"]
What to notice:
| Need | Strongest first fit | Why |
|---|---|---|
| Detect suspicious user sign-ins | Identity telemetry and behavioral logic | The signal is in the auth path |
| Understand endpoint execution and host behavior | Endpoint or EDR data | The activity lives on the host |
| See unusual east-west communication or DNS use | Network telemetry | The traffic pattern is the signal |
| Correlate events across many systems | SIEM or centralized logging pipeline | Correlation needs normalized multi-source events |
| Reduce alert fatigue | Tuning, prioritization, and better correlation | More alerts is not the same as better monitoring |
| Layer | Examples |
|---|---|
| Host and endpoint | EDR events, process creation, failed logons, file changes |
| Application | errors, auth events, admin actions, API misuse |
| Network | NetFlow, firewall logs, DNS logs, IDS/IPS events |
| Identity | SSO logs, MFA failures, privilege elevation, risky sign-ins |
1{
2 "alert": "multiple_failed_logins",
3 "user": "ajones",
4 "source_ip": "203.0.113.25",
5 "geo": "unexpected-country",
6 "mfa_result": "failed",
7 "priority": "high"
8}
What to notice:
The point of monitoring is not to prove that logs exist. It is to make suspicious behavior easier to detect and investigate. High alert volume with poor tuning can actually make detection worse because analysts start ignoring noisy systems.
A security team is receiving thousands of low-value alerts daily, while real account-takeover cases are being noticed only after users complain. Which improvement is strongest first?
A. Collect even more duplicate logs without changing triage or correlation
B. Disable identity logging to reduce noise
C. Improve correlation and alert tuning around high-value identity signals such as MFA failure patterns, impossible travel, and privilege changes
D. Stop using any centralized monitoring because it is noisy
Best answer: C. The real gap is signal quality and prioritization around the account-takeover path, not simply a lack of raw data.
Continue with 4.5 Enterprise Security Controls to connect monitoring to the network and endpoint controls you may need to tune during operations.