1. What Zeek Is and Why Defenders Use It
Zeek parses network traffic and writes structured logs for each protocol session. Rather than matching signatures, it extracts metadata: connection tuples, DNS queries and responses, HTTP headers, TLS handshake details, file transfers, and notices. That metadata becomes the evidence base for investigations and hunting.
The logs are what make Zeek useful at scale. conn.log, dns.log, http.log, ssl.log, and files.log give you a durable record of network behavior without storing full packet payloads everywhere. You can answer most network investigation questions from those logs alone.
For blue teams, Zeek fills the gap between raw packets and high-level alerts. It preserves the protocol context that makes the difference between “something happened” and “here is exactly what the client requested and what the server returned.”