Your first day as a Tier-1 SOC analyst. A Splunk dashboard is firing alerts โ your job is to triage them, separate noise from real threats, and document your findings.
This lab simulates a real-world SOC scenario where you're handed a Splunk dashboard with multiple active alerts. You'll learn to triage efficiently, apply analyst methodology, and build confidence reading logs and PCAP data.
The lab environment includes a pre-configured Splunk instance loaded with Windows Event Logs, network traffic data, and simulated alert rules โ all based on real detection logic.
Date: 2024-11-15 09:14:33 UTC
You've just started your shift. Your SIEM shows 8 unresolved alerts from the past 2 hours. One alert is flagged HIGH priority โ a potential data exfiltration from a finance workstation. Your task: triage all 8 alerts, escalate if necessary, and close false positives with justification.
Step 1: Boot the VM and open Splunk at http://localhost:8000. Default creds: admin / shewag123
Step 2: Navigate to the "SOC_TRIAGE" app dashboard. You'll see the alert queue pre-loaded.
Step 3: Start with ALERT_006 (HIGH - large outbound transfer). Run this SPL query:
Step 4: ALERT_002 and ALERT_008 are correlated. The failed logins preceded SMB lateral movement โ this is a real incident. Escalate.
Step 5: ALERT_007 is a false positive โ Windows Defender update failures are common and benign without additional indicators. Close it.
Final answer: True positives: ALERT_001, 002, 004, 006, 008. False positives: 003, 005, 007. ALERT_002+008 should be escalated as Tier-2 incident.