{"id":14261,"date":"2026-02-13T13:03:25","date_gmt":"2026-02-13T10:03:25","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=14261"},"modified":"2026-02-13T13:03:25","modified_gmt":"2026-02-13T10:03:25","slug":"kaspersky-siem-4-2-update","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-siem-4-2-update\/14261\/","title":{"rendered":"SIEM ile hesap ihlallerini tespit etme"},"content":{"rendered":"<p>G\u00fcn\u00fcm\u00fczde meydana gelen olaylar\u0131n \u00f6nemli bir k\u0131sm\u0131, hesaplar\u0131n ele ge\u00e7irilmesiyle ba\u015fl\u0131yor. \u0130lk eri\u015fim arac\u0131lar\u0131 tam anlam\u0131yla bir su\u00e7 end\u00fcstrisi haline geldi\u011finden, sald\u0131rganlar\u0131n \u015firketlerin altyap\u0131s\u0131na y\u00f6nelik sald\u0131r\u0131lar\u0131, \u00e7al\u0131\u015fanlar\u0131n parolalar\u0131 ve giri\u015f bilgilerini sat\u0131n alarak \u00e7ok daha kolay bir \u015fekilde organize edebilmeleri m\u00fcmk\u00fcn hale geldi. \u00c7e\u015fitli uzaktan eri\u015fim y\u00f6ntemlerinin yayg\u0131n olarak kullan\u0131lmas\u0131, bu g\u00f6revi daha da kolayla\u015ft\u0131rm\u0131\u015ft\u0131r. Ayn\u0131 zamanda, bu t\u00fcr sald\u0131r\u0131lar\u0131n ilk a\u015famalar\u0131 genellikle tamamen yasal \u00e7al\u0131\u015fan eylemleri gibi g\u00f6r\u00fcn\u00fcr ve geleneksel g\u00fcvenlik mekanizmalar\u0131 taraf\u0131ndan uzun s\u00fcre tespit edilemez.<\/p>\n<p>Yaln\u0131zca hesap koruma \u00f6nlemlerine ve parola ilkelerine g\u00fcvenmek bir se\u00e7enek de\u011fildir. Sald\u0131rganlar\u0131n \u00e7e\u015fitli kimlik av\u0131 sald\u0131r\u0131lar\u0131, bilgi h\u0131rs\u0131z\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar veya sadece i\u015f ve ki\u015fisel hesaplar\u0131 i\u00e7in ayn\u0131 parolay\u0131 yeniden kullanan ve \u00fc\u00e7\u00fcnc\u00fc taraf hizmetlerdeki s\u0131z\u0131nt\u0131lara fazla dikkat etmeyen \u00e7al\u0131\u015fanlar\u0131n dikkatsizli\u011fi yoluyla \u00e7al\u0131\u015fanlar\u0131n kimlik bilgilerini ele ge\u00e7irme olas\u0131l\u0131\u011f\u0131 her zaman vard\u0131r.<\/p>\n<p>Sonu\u00e7 olarak, bir \u015firketin altyap\u0131s\u0131na y\u00f6nelik sald\u0131r\u0131lar\u0131 tespit etmek i\u00e7in, yaln\u0131zca bireysel tehdit imzalar\u0131n\u0131 tespit edebilen ara\u00e7lar\u0131n yan\u0131 s\u0131ra, normal kullan\u0131c\u0131 ve sistem s\u00fcre\u00e7lerinden sapmalar\u0131 tespit edebilen Davran\u0131\u015f Tespiti sistemlerine de ihtiyac\u0131n\u0131z vard\u0131r.<\/p>\n<h2>SIEM\u2019de yapay zeka kullanarak hesap ihlallerini tespit etme<\/h2>\n<p><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ueba-rules-in-kaspersky-siem\/13685\/\" target=\"_blank\" rel=\"noopener\">\u00d6nceki yaz\u0131m\u0131zda<\/a> da belirtti\u011fimiz gibi, hesap ele ge\u00e7irme sald\u0131r\u0131lar\u0131n\u0131 tespit etmek i\u00e7in Kaspersky Unified Monitoring and Analysis Platform SIEM sistemimizi; kimlik do\u011frulama s\u00fcre\u00e7leri, a\u011f etkinli\u011fi ve Windows tabanl\u0131 i\u015f istasyonlar\u0131 ve sunucularda s\u00fcre\u00e7lerin y\u00fcr\u00fct\u00fclmesi s\u0131ras\u0131ndaki anormallikleri tespit etmek \u00fczere tasarlanm\u0131\u015f bir dizi UEBA kural\u0131yla donatt\u0131k. Son g\u00fcncellemede, sistemi ayn\u0131 y\u00f6nde geli\u015ftirmeye devam ederek yapay zeka yakla\u015f\u0131mlar\u0131n\u0131n kullan\u0131m\u0131n\u0131 ekledik.<\/p>\n<p>Sistem, kimlik do\u011frulama s\u0131ras\u0131nda normal kullan\u0131c\u0131 davran\u0131\u015f\u0131n\u0131n bir modelini olu\u015fturur ve atipik oturum a\u00e7ma zamanlar\u0131, ola\u011fand\u0131\u015f\u0131 olay zincirleri ve anormal eri\u015fim giri\u015fimleri gibi ola\u011fan senaryolardan sapmalar\u0131 izler. Bu yakla\u015f\u0131m, SIEM\u2019in \u00e7al\u0131nan kimlik bilgileriyle yap\u0131lan kimlik do\u011frulama giri\u015fimlerini ve ge\u00e7mi\u015fte fark edilmeyen karma\u015f\u0131k senaryolar da dahil olmak \u00fczere, zaten ele ge\u00e7irilmi\u015f hesaplar\u0131n kullan\u0131m\u0131n\u0131 tespit etmesini sa\u011flar.<\/p>\n<p>Sistem, tek tek g\u00f6stergeleri aramak yerine normal kal\u0131plardan sapmalar\u0131 analiz eder. Bu, karma\u015f\u0131k sald\u0131r\u0131lar\u0131n daha erken tespit edilmesini sa\u011flarken, hatal\u0131 pozitiflerin say\u0131s\u0131n\u0131 azalt\u0131r ve SOC ekiplerinin operasyonel y\u00fck\u00fcn\u00fc \u00f6nemli \u00f6l\u00e7\u00fcde azalt\u0131r.<\/p>\n<p>Daha \u00f6nce, UEBA kurallar\u0131n\u0131 kullanarak anomalileri tespit etmek i\u00e7in, \u00f6n haz\u0131rl\u0131k \u00e7al\u0131\u015fmalar\u0131n\u0131 ger\u00e7ekle\u015ftiren ve ara verilerin depoland\u0131\u011f\u0131 ek listeler olu\u015fturan birka\u00e7 kural belirlemek gerekiyordu. Art\u0131k, yeni korelat\u00f6r i\u00e7eren SIEM\u2019in yeni s\u00fcr\u00fcm\u00fcnde, tek bir \u00f6zel kural kullanarak hesap ele ge\u00e7irme olaylar\u0131n\u0131 tespit etmek m\u00fcmk\u00fcn.<\/p>\n<h2>Kaspersky Unified Monitoring and Analysis Platformundaki di\u011fer g\u00fcncellemeler<\/h2>\n<p>Altyap\u0131 ne kadar karma\u015f\u0131k ve etkinlik hacmi ne kadar b\u00fcy\u00fck olursa; platform performans\u0131, eri\u015fim y\u00f6netimi esnekli\u011fi ve g\u00fcnl\u00fck operasyon kolayl\u0131\u011f\u0131 gereksinimleri de o kadar kritik hale gelir. Modern bir SIEM sistemi, tehditleri do\u011fru bir \u015fekilde tespit etmekle kalmamal\u0131, ayn\u0131 zamanda ekipman\u0131 s\u00fcrekli olarak y\u00fckseltmeye ve s\u00fcre\u00e7leri yeniden olu\u015fturmaya gerek kalmadan \u201cdayan\u0131kl\u0131\u201d olmal\u0131d\u0131r. Bu nedenle, 4.2 s\u00fcr\u00fcm\u00fcnde platformu daha pratik ve uyarlanabilir hale getirmek i\u00e7in bir ad\u0131m daha att\u0131k. G\u00fcncellemeler; mimariyi, alg\u0131lama mekanizmalar\u0131n\u0131 ve kullan\u0131c\u0131 deneyimini etkiler.<\/p>\n<h3>Esnek roller ve ayr\u0131nt\u0131l\u0131 eri\u015fim kontrol\u00fc eklenmesi<\/h3>\n<p>SIEM\u2019in yeni s\u00fcr\u00fcm\u00fcndeki en \u00f6nemli yeniliklerden biri esnek rol modelidir. Art\u0131k m\u00fc\u015fteriler, farkl\u0131 sistem kullan\u0131c\u0131lar\u0131 i\u00e7in kendi rollerini olu\u015fturabilir, mevcut rolleri \u00e7o\u011faltabilir ve belirli uzmanlar\u0131n g\u00f6revleri i\u00e7in bir dizi eri\u015fim hakk\u0131n\u0131 \u00f6zelle\u015ftirebilir. Bu, SOC analistleri, y\u00f6neticileri ve m\u00fcd\u00fcrleri aras\u0131nda sorumluluklar\u0131n daha kesin bir \u015fekilde ayr\u0131lmas\u0131n\u0131 sa\u011flar, a\u015f\u0131r\u0131 ayr\u0131cal\u0131k riskini azalt\u0131r ve SIEM ayarlar\u0131nda \u015firketin i\u00e7 s\u00fcre\u00e7lerini daha iyi yans\u0131t\u0131r.<\/p>\n<h3>Yeni ili\u015fkilendirme cihaz\u0131 ve bunun sonucunda artan platform kararl\u0131l\u0131\u011f\u0131<\/h3>\n<p>4.2 s\u00fcr\u00fcm\u00fcnde; olaylar\u0131 daha h\u0131zl\u0131 i\u015fleyen ve daha az donan\u0131m kayna\u011f\u0131 gerektiren yeni bir ili\u015fkilendirme motorunun (2.0) beta s\u00fcr\u00fcm\u00fcn\u00fc tan\u0131tt\u0131k. M\u00fc\u015fteriler i\u00e7in bu \u015fu anlamlara gelir:<\/p>\n<ul>\n<li>Yo\u011fun operasyonlarda istikrarl\u0131 \u00e7al\u0131\u015fma<\/li>\n<li>Acil altyap\u0131 geni\u015fletmesine gerek kalmadan b\u00fcy\u00fck miktarda veriyi i\u015fleme yetene\u011fi<\/li>\n<li>Daha \u00f6ng\u00f6r\u00fclebilir performans<\/li>\n<\/ul>\n<h3>MITRE ATT&amp;CK matrisine g\u00f6re TTP kapsam\u0131<\/h3>\n<p>Ayr\u0131ca, MITRE ATT&amp;CK teknik, taktik ve prosed\u00fcr matrisinin kapsam\u0131n\u0131 sistematik olarak geni\u015fletmeye devam ediyoruz: <a href=\"https:\/\/opentip.kaspersky.com\/coverage-map?selectedProducts=KUMA\" target=\"_blank\" rel=\"noopener nofollow\">Bug\u00fcn, Kaspersky SIEM matrisin tamam\u0131n\u0131n %60\u2019\u0131ndan fazlas\u0131n\u0131 kapsamaktad\u0131r<\/a>. Alg\u0131lama kurallar\u0131 d\u00fczenli olarak g\u00fcncellenir ve yan\u0131t \u00f6nerileriyle birlikte sunulur. Bu, m\u00fc\u015fterilerin hangi sald\u0131r\u0131 senaryolar\u0131n\u0131n zaten kontrol alt\u0131nda oldu\u011funu anlamalar\u0131na ve genel olarak kabul g\u00f6rm\u00fc\u015f bir end\u00fcstri modeline dayal\u0131 olarak savunma stratejilerini planlamalar\u0131na yard\u0131mc\u0131 olur.<\/p>\n<h3>Di\u011fer iyile\u015ftirmeler<\/h3>\n<p>S\u00fcr\u00fcm 4.2 ayr\u0131ca, olaylar\u0131 yedekleme ve geri y\u00fckleme \u00f6zelli\u011finin yan\u0131 s\u0131ra, b\u00fct\u00fcnl\u00fck kontrol\u00fc ile g\u00fcvenli ar\u015fivlere veri aktarma \u00f6zelli\u011fini de sunmaktad\u0131r. Bu \u00f6zellik; \u00f6zellikle soru\u015fturmalar, denetimler ve yasal uyumluluk a\u00e7\u0131s\u0131ndan b\u00fcy\u00fck \u00f6nem ta\u015f\u0131maktad\u0131r. Analistlerin rahatl\u0131\u011f\u0131 i\u00e7in arka plan arama sorgular\u0131 uygulanm\u0131\u015ft\u0131r. Art\u0131k, karma\u015f\u0131k ve kaynak yo\u011fun aramalar, \u00f6ncelikli g\u00f6revleri etkilemeden arka planda \u00e7al\u0131\u015ft\u0131r\u0131labilir. Bu, b\u00fcy\u00fck veri k\u00fcmelerinin analizini h\u0131zland\u0131r\u0131r.<\/p>\n<p>Kaspersky SIEM\u2019i d\u00fczenli olarak g\u00fcncellemeye devam ediyor, alg\u0131lama yeteneklerini geni\u015fletiyor, mimariyi iyile\u015ftiriyor ve yapay zeka i\u015flevselli\u011fi ekliyoruz. B\u00f6ylece platform, bilgi g\u00fcvenli\u011fi ekiplerinin ger\u00e7ek d\u00fcnya ko\u015fullar\u0131na en iyi \u015fekilde uyum sa\u011fl\u0131yor ve sadece olaylara m\u00fcdahale etmekle kalmay\u0131p, gelecek i\u00e7in s\u00fcrd\u00fcr\u00fclebilir bir koruma modeli olu\u015fturmaya da yard\u0131mc\u0131 oluyor. <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/unified-monitoring-and-analysis-platform?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Resmi \u00fcr\u00fcn sayfas\u0131nda<\/a> SIEM sistemimiz olan Kaspersky Unified Monitoring and Analysis Platform\u2019un g\u00fcncellemelerini takip edin.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"13478\">\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky SIEM&#8217;de yapay zeka ve di\u011fer g\u00fcncellemelerle, ele ge\u00e7irilmi\u015f hesaplarla ilgili sald\u0131r\u0131lar\u0131 tespit etme.<\/p>\n","protected":false},"author":2757,"featured_media":14262,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[1564,1936,1424],"class_list":{"0":"post-14261","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-hesaplar","11":"tag-siem","12":"tag-yapay-zeka"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-siem-4-2-update\/14261\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/kaspersky-siem-4-2-update\/30130\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/kaspersky-siem-4-2-update\/25191\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/kaspersky-siem-4-2-update\/30007\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/kaspersky-siem-4-2-update\/31840\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/kaspersky-siem-4-2-update\/30458\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/kaspersky-siem-4-2-update\/41231\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/kaspersky-siem-4-2-update\/55214\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/kaspersky-siem-4-2-update\/23609\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/kaspersky-siem-4-2-update\/24728\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/kaspersky-siem-4-2-update\/33182\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/kaspersky-siem-4-2-update\/30219\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/kaspersky-siem-4-2-update\/35891\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/kaspersky-siem-4-2-update\/35546\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/siem\/","name":"siem"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2757"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=14261"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14261\/revisions"}],"predecessor-version":[{"id":14264,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14261\/revisions\/14264"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/14262"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=14261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=14261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=14261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}