1. Zeek as a Network Telemetry Engine
$ core idea: Zeek parses protocols and writes structured logs: conn.log for connection metadata, dns.log for query and response details, http.log for request and response headers, ssl.log for TLS certificate and handshake data, files.log for file transfers, and notice.log for policy-triggered events. Each log type answers different investigative questions.
$ defender angle: The value of Zeek logs compounds when you pivot across them. A suspicious domain in dns.log connects to an IP in conn.log, which connects to a certificate in ssl.log and a user-agent in http.log. That chain builds investigative context that no single alert can provide.
$ prove understanding: Explain the different roles of Zeek and Suricata in a network monitoring architecture.