Should Our Remote Access VPN Clients Be Connected to the SIEM?

0
9
Asked By TechWhiz88 On

I'm trying to understand whether we should connect our remote access VPN clients to our SIEM for monitoring purposes. Specifically, does this help in checking for any suspicious login attempts and ensuring proper security logging?

5 Answers

Answered By SecurityGuru2023 On

Ideally, everything should connect to your SIEM for comprehensive monitors. Proper integration means you can catch suspicious activities effectively, including bad auth attempts. Without it, you might miss something important.

Answered By FutureTechFan On

We actually ditched the VPN entirely and switched to Netskope SASE. I feel like VPNs are just another risk unless you use IPSec throughout your network.

Answered By ChillaxinDude42 On

Nah, we've actually disconnected our VPN from the SIEM because it was just flooding us with alerts. Our dashboard now looks great - all green! Sometimes it's better to simplify things and avoid alert fatigue.

AlertMaster99 -

Gotta keep the KPIs looking good, right?

SimplicitySeeker -

This is the way!

Answered By LogNinja On

It's really about making sure all VPN activity is logged centrally in your SIEM. This way, it can alert you on anomalies. Also, having MFA and PKI can help prevent those bad login attempts before they become a problem. If users don't have a managed key setup, they won't even get to the authentication stage!

CloudFollower -

So, you're saying Google Cloud KMS is the direction you're going?

Answered By DataDrivenAdmin On

From a network perspective, those logs should definitely be prioritized as part of your overall security perimeter.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.