Chapter 8: Monitoring, Auditing & Threat Detection

Learning Objectives

Pre-Quiz: Test Your Current Knowledge

Answer these questions before studying the material to gauge your baseline understanding.

Pre-Study Assessment

1. What is the default audit log retention period on a Cohesity cluster?

30 days 90 days 180 days 365 days

2. Which syslog tag identifies file and folder access events when forwarded from a Cohesity cluster?

cluster_audit filesystem_audit cohesity_alerts file_access_log

3. Which protocol and port combination provides encrypted syslog delivery from Cohesity to a remote server?

UDP port 514 TCP port 601 TCP+TLS port 6514 HTTPS port 443

4. What three capabilities does Cohesity DataHawk combine into a single SaaS offering?

Firewall, encryption, and access control Threat protection, data classification, and cyber vaulting Backup, replication, and disaster recovery Monitoring, alerting, and reporting

5. What is the recommended response when a DataIngestAnomalyAlert fires on a protected source?

Immediately delete all recent snapshots Restore the source using Instant Recovery from the most recent clean snapshot Disable all backup jobs and wait for manual investigation Reboot all cluster nodes to clear the anomaly

Section 1: Audit Logging

Every action taken on a Cohesity cluster -- whether a user modifies a protection policy, restores a virtual machine, or simply logs in -- is recorded in an audit log. These chronological records capture who did what, when, and from where, forming the foundation of security investigations, compliance reporting, and operational troubleshooting.

Log Architecture and Types

Cohesity DataPlatform monitors clusters for access events, file/folder changes, share and permission modifications, and configuration changes. Navigate to System > Audit Logs > Log Settings to view and configure.

Audit logs record two primary event types:

The system organizes logs into 18 predefined categories (API Key, Access Token, Alert, Protection Group, Protection Policy, Recovery Task, Region, Snapshot, User, Tenant, etc.) and tracks over 50 write action types spanning the full operational lifecycle.

Syslog TagLog Type
cluster_auditCluster configuration and administrative actions
filesystem_auditFile and folder access on Cohesity Views
cohesity_alertsAlert generation and resolution events
dataprotection_eventsBackup, replication, and recovery job events
flowchart LR A[Admin Action] --> B[Audit Engine] C[File Access] --> B D[Alert Event] --> B E[Backup/Recovery Job] --> B B --> F["cluster_audit"] B --> G["filesystem_audit"] B --> H["cohesity_alerts"] B --> I["dataprotection_events"] F --> J[Syslog Server / SIEM] G --> J H --> J I --> J

Retention Settings

SettingValue
Default retention180 days
Minimum retention90 days
Maximum retention365 days
Configuration locationSecurity > Audit Logs > Settings

Organizations requiring longer retention (e.g., PCI DSS requires 1 year, HIPAA requires 6 years for certain records) should use remote syslog forwarding to archive logs externally. Audit logs can also be exported as CSV files, which include additional detail such as IP addresses, tenant information, and impersonation data.

Interpreting Entries for Security Investigations

Cohesity provides filtering by Date Range, System, Users, Category, and Action type. In a forensic investigation, these filters help isolate relevant events. For example, investigating an unauthorized policy change involves filtering by Category "Protection Policy," setting Action to write only, and cross-referencing the user account and IP address (from CSV export) with your identity provider.

Compliance-Grade Audit Trails

For regulated industries, audit logs must be tamper-evident (forward to external syslog), complete (enable both read and write logging), retained per regulatory requirements, and accessible to auditors (CSV export + SIEM integration). Cohesity's audit framework has undergone Common Criteria evaluation.

Key Points -- Audit Logging

Section 2: Remote Syslog and Log Management

On-cluster logs are limited: stored on the system they monitor, capped at 365 days, and isolated from other infrastructure events. Remote syslog forwarding ships log data to a centralized platform in real time, solving all three problems.

Syslog Server Integration

Configuration path: Settings > Summary > Syslog tab, then click +Add.

ParameterDescription
IP Address/HostnameNetwork address of the syslog server
Port514 (UDP), 601 (TCP), or 6514 (TLS)
StreamWhich log types to forward
ProtocolTCP (default) or UDP
Encryption (TLS)Optional; encrypts log traffic
Animation: Syslog forwarding configuration walkthrough -- showing the Settings > Summary > Syslog workflow with protocol selection and TLS toggle

Format and Field Mapping

Each forwarded syslog message includes: Facility/severity (standard syslog priority), timestamp, hostname (cluster node), tag (one of four Cohesity-specific tags), and a structured message body with user, action, target object, and result. Understanding this field mapping is critical for building SIEM dashboards and correlation rules.

flowchart TD subgraph Cohesity Cluster A[Audit Logs] --> B[Syslog Forwarder] end B -->|UDP Port 514| C[Syslog Server] B -->|TCP Port 601| C B -->|TCP+TLS Port 6514| C C --> D[Splunk] C --> E[Google Chronicle] C --> F[ELK Stack] C --> G[Other SIEM]

Splunk, ELK, and SIEM Integration

ProtocolUse CaseTrade-offs
UDPHigh-volume, latency-sensitiveFastest; no delivery guarantee
TCPMost production environmentsReliable with acknowledgment; slight overhead
TCP + TLSSecurity/compliance environmentsEncrypted + reliable; requires cert management

Key Points -- Remote Syslog

Section 3: Ransomware and Breach Monitoring

DataHawk is Cohesity's SaaS-based security solution combining three pillars: threat protection (deep learning ransomware detection), ML-based data classification (powered by BigID), and cyber vaulting (FortKnox). It scans backup data without impacting production workloads.

flowchart TD A[Cohesity DataHawk] --> B[Threat Protection] A --> C[Data Classification] A --> D[Cyber Vaulting - FortKnox] B --> B1[Deep Learning Ransomware Detection] B --> B2[IOC Scanning - 100K+ Indicators] B --> B3[Custom YARA Rules] C --> C1[200+ ML Classifiers] C --> C2[50+ Compliance Policies] D --> D1[Immutable Backup Copies] D --> D2[Air-Gapped Storage]

Anomaly Detection

DataHawk's ML engine applies an anomaly strength score to each backup. When the score exceeds a configured threshold, it triggers automations. The system monitors for:

The DataIngestAnomalyAlert (CE01516011) fires at Warning severity with a 1-hour interval when anomalous data ingest rate changes are detected. Recommended response: restore from the most recent clean snapshot using Instant Recovery.

Animation: Anomaly detection pipeline -- showing normal backup (50 GB) transitioning to anomalous spike (400 GB), triggering alert cascade through SIEM to SOC analyst response

IOC Scanning

DataHawk scans using 100,000+ Indicators of Compromise and custom YARA rules. IOC categories:

IOC TypeWhat It DetectsExample
Network-basedSuspicious communication patternsC2 server connections
File-basedMalicious filenames/hashesKnown ransomware SHA-256 hashes
BehavioralEvent log patternsMass file rename operations

Threat feeds are updated daily without manual intervention. Scans can be scheduled as single execution or recurring at specified frequencies.

Data Classification

Powered by BigID, DataHawk provides 200+ ML-driven classifiers and 50+ predefined policies for GDPR, PCI, HIPAA, and other regulations. Classification identifies PII, financial records, health records, and confidential business documents -- providing immediate context during breach response about which sensitive data is in the blast radius.

Security Tool Integrations

DataHawk integrates with CrowdStrike, Microsoft Sentinel, Palo Alto, Cisco SecureX, and others. Threat feeds from external tools can be ingested, and DataHawk alerts can be embedded into SOC incident response playbooks.

Key Points -- Ransomware & Breach Monitoring

Section 4: Alerting and Notification

Alert Configuration and Severity

SeverityMeaningExample
CriticalImmediate action requiredNode failure, storage exhausted
WarningAction needed, core functionality OKDataIngestAnomalyAlert, degraded replication
InformationalAwareness onlySuccessful backup, scheduled maintenance

Alert notification rules are configured from Health > Notification, matching specific categories, severities, and alert names to notification channels.

Notification Channels

ChannelBest ForLatencyIntegration Effort
EmailSmall teams, backup notificationsMinutesLow
SNMPNOC teams with existing infrastructureSecondsMedium
SyslogSIEM correlation and complianceSecondsMedium
WebhooksAutomation, ChatOps, ticketingSecondsMedium-High

Webhooks support customized payload templates with placeholders that resolve to actual alert values at delivery time, enabling integration with virtually any HTTP-accepting system.

Escalation Framework

flowchart TD A[Cohesity Alert Generated] --> B{Severity?} B -->|Informational| C[Tier 1: Automated] B -->|Warning| D[Tier 2: Operational] B -->|Critical| E[Tier 3: Security Escalation] C --> C1[Log to SIEM only] D --> D1[Email to Ops Team] D --> D2[Log to SIEM] E --> E1[Webhook to PagerDuty/ServiceNow] E --> E2[Email to Security On-Call] E --> E3[Log to SIEM] E1 --> F[Incident Created]

Third-Party Integrations

PlatformMethodUse Case
ServiceNowWebhook; Cohesity AppAutomated incident creation/resolution
PagerDutyWebhookOn-call alerting and escalation
NagiosSNMPInfrastructure health monitoring
LogicMonitorAPI/SNMPUnified monitoring dashboard

System Health Insights is a SaaS-based AI/ML platform that analyzes Call Home data to proactively alert administrators to potential problems before they become incidents.

Key Points -- Alerting & Notification

Post-Quiz: Test Your Understanding

Now that you have studied the material, answer these questions to measure your improvement.

Post-Study Assessment

1. What is the default audit log retention period on a Cohesity cluster?

30 days 90 days 180 days 365 days

2. Which syslog tag identifies file and folder access events when forwarded from a Cohesity cluster?

cluster_audit filesystem_audit cohesity_alerts file_access_log

3. Which protocol and port combination provides encrypted syslog delivery from Cohesity to a remote server?

UDP port 514 TCP port 601 TCP+TLS port 6514 HTTPS port 443

4. What three capabilities does Cohesity DataHawk combine into a single SaaS offering?

Firewall, encryption, and access control Threat protection, data classification, and cyber vaulting Backup, replication, and disaster recovery Monitoring, alerting, and reporting

5. What is the recommended response when a DataIngestAnomalyAlert fires on a protected source?

Immediately delete all recent snapshots Restore the source using Instant Recovery from the most recent clean snapshot Disable all backup jobs and wait for manual investigation Reboot all cluster nodes to clear the anomaly

6. How many predefined categories does Cohesity's audit log system organize events into?

8 12 18 25

7. What technology powers DataHawk's data classification capability?

CrowdStrike Falcon BigID Splunk Enterprise Security Microsoft Purview

8. At what interval does the DataIngestAnomalyAlert fire (minimum time between repeated alerts)?

60 seconds 600 seconds (10 minutes) 3600 seconds (1 hour) 86400 seconds (24 hours)

9. Which notification channel is best suited for automated incident ticket creation in ServiceNow?

Email SNMP Syslog Webhook

10. Why does the Security Hardening Guide recommend remote syslog forwarding?

To reduce cluster storage consumption To assure log availability and integrity if the cluster is compromised To improve backup job performance To satisfy the minimum 90-day retention requirement

11. How many Indicators of Compromise does DataHawk use for threat scanning?

1,000+ 10,000+ 100,000+ 1,000,000+

12. In a tiered escalation framework, which tier handles DataIngestAnomalyAlert events?

Tier 1 -- Automated (syslog only) Tier 2 -- Operational (email to ops team) Tier 3 -- Security Escalation (webhook + on-call) No tier -- handled by System Health Insights only

13. What additional detail does the CSV export of audit logs provide that the Helios Dashboard does not display?

Alert severity ratings IP addresses, tenant information, and impersonation data Mermaid diagrams of event flows Encrypted password hashes

Your Progress

Answer Explanations