• Events & Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
  • Events & Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
HBS logo
HBS Logo
  • Infrastructure
    • CLOUD

      • Cloud Solutions
      • Public Cloud
      • Hybrid Cloud
      • Infrastructure as a Service
      • Cloud Security Solutions
      • Backup, Replication and Disaster Recovery
      • HBS Cloud Hosting Services

      DATA CENTER

      • Data Center Solutions
      • Traditional Data Center
      • Hyperconverged
      • Colocation
      • Directory Services
      • Cloud Email and Calendar Solutions

      NETWORK AND ACCESS

      • Network Infrastructure
      • Enterprise Mobility
      • Wireless Solutions
      • SD-WAN
      • Structured Cabling
      • Staff Augmentation
  • Managed Services
    • MANAGED ONE

      • Managed One Overview
      • Managed Backup and Disaster Recovery
      • Managed Firewall
      • Managed SaaS Security

       

      • Managed HaaS and SaaS
      • Managed IT Help Desk
      • Managed Network and Server Monitoring
      • Managed Email and Collaboration Security

      HBS + PARTNER SOLUTIONS

      • HBS Secure with Verkada
      • HBS Collaborate with Webex
      • Managed XDR
      HBS Managed One Megamenu Graphic
  • Modern Workplace
    • MICROSOFT

      • Microsoft Licensing Management
      • Microsoft Modern Workplace
      • Microsoft Fabric

       

      • Dynamics 365 Business Central
      • Dynamics 365
      • Dynamics GP

      COLLABORATION

      • Audio Visual
      • Unified Communication Solutions
      • HBS Collaborate with Webex
  • Professional Services
    • ADVISORY

      • Virtual CISO
      • Virtual CIO
      • Project Management
      • IT Business Consulting

      ENGINEERING SERVICES

      • Staff Augmentation

      AI & ANALYTICS

      • Artificial Intelligence
      • AI Advance
      • AI Predict
      • AI Assist
      • Data Management and Analytics
      • Microsoft Fabric

      APPLICATION INNOVATION

      • Website Development
      • Application Development

      DOCUMENT MANAGEMENT

      • Document Management Services
      • Document and Check Scanners
  • Security
    • CYBERSECURITY

      • Managed XDR
      • Penetration Testing
      • Vulnerability Scanning
      • Email Security Services
      • Digital Forensics and Incident Response
      • Backup, Replication and Disaster Recovery
      • Firewalls
      • Cloud Security Solutions

       

      • Virtual CISO
      • Virtual Security Team
      • Virtual Security Engineer
      • Cybersecurity Risk Assessment
      • Governance and Compliance
      • SOC 2
      • CMMC
      • Managed Security Awareness Training

      PHYSICAL SECURITY

      • Security Solutions
      • HBS Secure with Verkada
      Cybersecurity Risk Assessment Megamenu Graphic
  • Search
Contact Us
Blog

SIEM Terms and Definitions

  • Written by: Colton Bachman
  • February 20, 2017
SIEM Terminology Laptop Security Graphic

Security information and event management (SIEM) is a powerful tool that provides a holistic view into an organization’s technology security. To help you better understand SIEM and some of the most commonly used terms, we have provided the following list of definitions. 

Device – Generic term for server, firewall, switch, workstation, etc. The term “network device” can refer to devices that interconnect the network, such as firewalls, routers, and switches, but does not refer to servers or workstations. 

CMDB – Configuration Management Database. The CMDB lists all the devices that are reporting logs to the SIEM. Each device in the CMDB displays the health of the device along with the current events per second (EPS). Devices with SNMP or WMI configured can also display numerous performance metrics. 

SNMP – Stands for Simple Network Management Protocol and allows the SIEM to pull performance metrics from SNMP enabled devices. 

WMI – Windows Management Instrumentation is another service that allows the SIEM to pull performance metrics. Only works on Windows devices. 

Performance metrics – Devices configured with SNMP or WMI display various metrics, such as memory utilization, installed software, and uptime. Having SNMP enabled also allows the SIEM to pull metrics such as interface utilization, running software, and hardware information. 

Syslog – Logging standard that allows devices to send their event logs to a logging server. 

Event – An event is one entry of the log file that a device sends to the SIEM. A logon failure or a denied connection are examples of events. 

Rule – The SIEM parses out attributes from events and correlates the logs with other devices on the SIEM. The logs are run against rules, which look for a pattern of events matching specified criteria. When a pattern is discovered, an incident is triggered. 

Incident – An incident is a unique instance of a rule. Incidents provide the definition of the rule and the events that triggered the rule. 

Ticket – Incidents create tickets, which enable analysts to review incident information. Once reviewed, analyst are able to make a decision whether or not a customer needs alerted. 

Exception – An exception adds a condition to a rule to prevent it from triggering when specific conditions are met. For instance, a vulnerability scanner that runs regularly would generate an excessive amount of tickets even though the traffic is legitimate. An exception would be added to reduce the rate of false positives created by the vulnerability scanner. 

False positive – A false positive is when a rule triggers that doesn’t represent a true security incident. See for a more in depth look at false positives. 

EPS – Events per second that a device sends to the SIEM. Changes in EPS may indicate that a device needs to be checked for configuration or security issues. 

Deny/exclude list – A list of hostnames, IPs, etc. that are blocked from network access. Typically, IPs are excluded to prevent users from accessing malicious websites or to prevent known malicious IPs from connecting to the network. 

Allow list – The opposite of a deny/exclude list. Instead of blocking certain IPs, it allows access from specified IPs and blocks all others. 

STM – Synthetic Transaction Monitoring (STM) monitors the availability of certain services, such as email servers or websites. 

Discovery – A discovery is a process that searches for devices on the network. It attempts to resolve a host name and uses configured credentials to initialize monitoring for certain protocols. 

Still have more questions? If so, contact us, and we will help answer them. 

Related Content

SIEM stands for Security Information and Event Management Graphic

How Does SIEM Work?

SIEM works first by gathering all the event logs from configured devices. They are sent to a collector that typically runs on a virtual machine inside the host network.

Learn More »
SIEM Puzzle Graphic

Benefits of Log Consolidation in a SIEM Environment

SIEM is a security strategy that seeks to efficiently consolidate and manage network data. Compare reacting to malicious traffic with and without a SIEM solution.

Explore More »
Alerts Graphic

How SIEM/XDR Tuning Reduces Alert Fatigue

Learn how trained SOC analysts leverage SIEM tuning to turn out-of-the-box rules into meaningful tools that reduce alert fatigue.

Read More »
  • Cybersecurity, Education, Managed XDR
Blog

Connect:

[email protected]  |  800.236.7914

HBS logo

HQ | 1700 Stephen Street
Little Chute, WI 54140
Locations

HBS Remote Support | Service & Technical Support | E-Bill Portal
Terms & Conditions | Cookie Policy | Privacy Policy | Onboarding Form | End User Agreements | E-Bill FAQ | Site Map
©2025 Heartland Business Systems. All rights reserved.

Halo from HBS
This chat may be recorded as described in our Privacy Policy.