Real time visibility into log ingestion health, authentication activity, and endpoint behavior across the homelab environment.
Total events, active hosts, Sysmon activity, and Security log volume at a glance.
Event volume by host over time + health status table. Identifies quiet endpoints and validates consistent log forwarding.
Top event codes across all sources + Sysmon-specific distribution.
Failed logons (4625) vs. successful logons (4624) with filtering out network logons that clutter the view.
Systematic Pipeline Verification
Before trusting SIEM data for security analysis, verify every layer works: endpoint logging β forwarder collection β network transmission β SIEM indexing.
Security Event ID Literacy
Understanding Windows Security, System, Application, and Sysmon logsβwhat events matter for threat detection and why.
Progressive SPL Development
Building Splunk query proficiency through GUI usage. Start by clicking event details, filter accordingly, and be able to understand what is changing.
Threat-Informed Defense
Connecting Phase 1 vulnerabilities to MITRE ATT&CK techniques and identifying which Windows events would detect each tactic.
Visual Security Monitoring
Simple dashboard providing real-time visibility into log ingestion health, authentication activity, and system behavior.
Compiled Learning Resources
Completed Splunk free online training and referenced Microsoft's Windows Event appendix.
Visual security monitoring for lab environment
Verification on Windows and Linux for event forwarding
Validation scripts and baseline analysis
Understanding the difference between benign and useful events
How event correlation translates to potentials indicators of compromise
Filtering Sysmon's Process Creation event