SIEM and Security Log Correlation#
A SIEM collects logs from across your infrastructure, normalizes them, and applies correlation rules to detect threats that no single log source would reveal. A brute force attempt is visible in auth logs. Lateral movement after successful brute force requires correlating auth logs with network flow data and process execution logs. The SIEM makes that correlation possible.
Log Sources#
The value of a SIEM depends entirely on the logs you feed it. Missing a log source means missing the attacks that source would reveal.