Source: TrustedSec
Author: Carlos Perez
URL: https://trustedsec.com/blog/building-a-detection-foundation-part-5-correlation-in-practice
ONE SENTENCE SUMMARY:
Series shifts from logging sources to practical detections using Windows Security events, PowerShell logging, and Sysmon telemetry together for visibility.
MAIN POINTS:
- Focus transitions from collecting telemetry to building actionable detections.
- Windows Security events support logon tracking and authentication activity analysis.
- Process execution auditing helps identify suspicious program launches and lineage.
- PowerShell logging improves visibility into script content and execution behaviors.
- Sysmon augments Windows logging with richer host and network telemetry.
- Network event collection enables monitoring of outbound connections and suspicious destinations.
- Combining multiple data sources strengthens context for investigation and detection fidelity.
- Proper event selection reduces noise while preserving high-value security signals.
- Centralizing logs facilitates correlation across accounts, processes, scripts, and network activity.
- Detection engineering builds on consistent, well-instrumented logging configurations.
TAKEAWAYS:
- Effective detections start with reliable, well-scoped data collection.
- Authentication and process events provide foundational signals for endpoint monitoring.
- Script telemetry is critical for observing PowerShell-based tradecraft.
- Sysmon can fill visibility gaps left by default Windows event logging.
- Correlating diverse logs improves confidence and reduces false positives.