Detection & Monitoring

Overview

Detection and monitoring form the foundation of defensive security — without visibility into what is happening on systems and networks, threats go unnoticed until damage is done. This section covers log analysis fundamentals, platform-specific log sources, network-based detection, and rule-based detection with Sigma and YARA.

Topics

Detection Workflow

1. Collect    → Centralize logs from endpoints, servers, network devices
2. Normalize  → Parse into consistent format (timestamps, field names)
3. Correlate  → Match events across sources (host + network + auth)
4. Detect     → Apply rules (Sigma, Suricata, YARA) and anomaly baselines
5. Alert      → Triage alerts, reduce false positives, escalate confirmed
6. Respond    → Hand off to incident response (see incident-response/)