# Data Sources

In the this section, users have the capability to <mark style="color:green;">configure and manipulate</mark> various data sources, which <mark style="color:green;">generate information in the form of events</mark>. These data are captured by the Security Information and Event Management (SIEM). Once collected, <mark style="color:green;">they are processed and analyzed to determine whether they constitute a security incident or not</mark>. This decision depends on the analysis conducted by the alert handling engine, which is configurable to meet specific criteria.&#x20;

<figure><img src="https://2621223932-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FLTQJomzpe5BTzHSLQPAt%2Fuploads%2F0pZu74kZYGNFSiq56AC3%2FScreenshot%202023-12-05%20at%2020.27.56.png?alt=media&#x26;token=0a9c2017-566b-4b78-a0de-6ce6abf50ef2" alt=""><figcaption><p>Data Sources Overview</p></figcaption></figure>

Users can view a paginated <mark style="color:green;">list of all created data sources</mark>. This screen provides the functionality to <mark style="color:green;">filter data sources based on their status</mark>, whether active or inactive. This initial dashboard is <mark style="color:green;">designed to facilitate the administration of data sources</mark>, allowing users to change the status, edit the settings of a specific data source, or delete it with just a few clicks.

{% hint style="info" %}
**Data Source** is any location, system, or device where data is generated or stored. This includes servers, network devices, applications, databases, file systems, and even cloud services. It is used as feeding security tools and systems with real-time or near-real-time information. This includes Intrusion Detection and Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) systems, and network behavior analysis solutions.
{% endhint %}

***

### Creating a Data Source

#### Identification

When creating a data source, it's essential to provide <mark style="color:green;">a name and description</mark>.

<figure><img src="https://2621223932-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FLTQJomzpe5BTzHSLQPAt%2Fuploads%2FcmEgMSzQtvGfWbw7KdZE%2FScreenshot%202023-12-05%20at%2020.24.26.png?alt=media&#x26;token=4dfd205b-542d-4f5b-aee9-36e1727e8090" alt=""><figcaption><p>Identification Stage</p></figcaption></figure>

#### Event Types

It is possible to associate <mark style="color:green;">patterns of events</mark> (event types) detected in a data source, which share a <mark style="color:green;">history or similar behavior</mark>, with the goal of identifying and mapping anomalies. These patterns will <mark style="color:green;">serve as a reference</mark> in the development of correlation rules. This significantly enhances the <mark style="color:green;">efficiency of processing and uniformity in incident generation</mark>, contributing to a quicker and more accurate response to potential threats.

<figure><img src="https://2621223932-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FLTQJomzpe5BTzHSLQPAt%2Fuploads%2FRDctWNt9cpwamUMpUOkz%2FScreenshot%202023-12-05%20at%2020.26.02.png?alt=media&#x26;token=324ea5f9-f4a0-4d82-8a85-b0e5b6051be6" alt=""><figcaption><p>Eventy Types Stage</p></figcaption></figure>

{% hint style="info" %}
**Event Type** is a classification used to describe the nature of an event detected by data sources. Help security analysts understand what happened, why it happened, and how it should be addressed. It can be classified into various categories, such as unauthorized access attempts, system failures, configuration changes, suspicious network activities, application errors, and others. Each category represents a distinct event type with specific implications for security.
{% endhint %}

#### Config Files

It functions as a repository containing <mark style="color:green;">files used to ensure normalization and standardization</mark> among clients during the implementation of the SIEM, which will be involved in processing correlation rules. It is possible to load files in <mark style="color:green;">.xml, .config, or .json formats</mark>. Additionally, the system allows for the <mark style="color:green;">consultation of previously modified versions</mark> of these configuration files, <mark style="color:green;">facilitating the management of changes over time.</mark>

<figure><img src="https://2621223932-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FLTQJomzpe5BTzHSLQPAt%2Fuploads%2FvEpHQ33cUAcqdFJYbJwR%2FScreenshot%202023-12-05%20at%2020.27.00.png?alt=media&#x26;token=33969a88-e8c9-45e5-94a6-dfe7f64d99d2" alt=""><figcaption><p>Config Files Stage</p></figcaption></figure>

***
