Summary
In this chapter, we took a mostly passive approach to security monitoring, where we had our tools do the digging and exposing for us. We looked at how to combine all of our (passive) security monitoring tools and combine them into a single, interactive dashboard view that allows us to quickly assess the security status of our environment. You should now be able to add, change, or extend the functionality of the Kibana Breach Detection dashboard or any other dashboard that ships with Security Onion, to make the best use out of the data we have been collecting.
In the next chapter, the start of Section 3, Threat Hunting, we will be rolling up our sleeves to start digging around in the environment to see if we can find some malicious activity or actors.