Splunk • Sysmon • Atomic Red Team • MITRE ATT&CK
// 01 — PROJECT OVERVIEW
A fully functional home SIEM environment that simulates a corporate blue team setup — built entirely with free tools on a single machine. Designed to develop real SOC analyst skills through hands-on attack simulation and detection engineering.
// 02 — BUILD GUIDE
Click each phase to expand the full build steps. Follow in order — each phase depends on the previous one being complete.
Windows10-Victim, Type=Windows 10 64-bit, RAM=4096MB, Disk=60GBSkip Unattended Installation — Start VM → install Windows → use "Domain join instead" for local accountClean-Installhttp://localhost:80009997windows and index sysmonipconfig on host PC → note the VirtualBox Host-Only Network IPv4 addressinputs.conf at the path shown abovesysmon64.exe -accepteula -i sysmonconfig-export.xml (use SwiftOnSecurity config)Local System account → RestartSee the Detections section below for all 5 SPL queries and what they catch.
SOC Detection Lab → Classic Dashboard// 03 — DETECTION RULES
Each detection simulated with Atomic Red Team, caught with a custom SPL query, and verified with real log output in Splunk.
// 04 — REFERENCE
The most important Event IDs every SOC analyst should memorise. Sourced from both Windows Security log and Sysmon.
| EVENT ID | LOG SOURCE | MEANING | WHY IT MATTERS |
|---|---|---|---|
| 4624 | Security | Successful logon | Baseline — track normal login patterns, spot off-hours access |
| 4625 | Security | Failed logon | Brute force detection — high count in short window = attack |
| 4648 | Security | Logon with explicit credentials | Pass-the-hash, lateral movement indicator |
| 4672 | Security | Special privileges assigned | Admin logon — alert on unexpected accounts |
| 4720 | Security | User account created | Backdoor account creation — always investigate |
| 4732 | Security | User added to security group | Privilege escalation — especially Administrators group |
| 4776 | Security | NTLM credential validation | Credential attacks — watch for failures and off-network sources |
| 1 | Sysmon | Process created | Everything that launches — core detection source for all attacks |
| 3 | Sysmon | Network connection made | C2 beaconing, data exfiltration, lateral movement |
| 10 | Sysmon | Process accessed another process | LSASS access = credential dumping attempt |
| 11 | Sysmon | File created | Malware dropping files, ransomware encryption activity |
| 13 | Sysmon | Registry value set | Persistence mechanisms — run keys, service installs |
// 05 — MITRE ATT&CK
All 5 detections mapped to the MITRE ATT&CK Enterprise framework — the industry standard for categorising adversary behaviour.
// 06 — TROUBLESHOOTING
Every issue encountered during this lab build, with exact fixes. If you hit something not listed here, open a GitHub issue.