Detection • Triage • Evidence
Log Analysis Workflow: Alert → Evidence → Action
A calm, evidence-driven way to respond to alerts without panic or guesswork.
akhil@triage:~
evidence
$ alert --id 1842 --summarize
Signal: suspicious login + new device
Next: correlate identity + endpoint + network
The 5 questions that matter
- What happened? (exact event and timestamps)
- Where? (device, user, IP, geo, host)
- So what? (impact if true)
- How sure are we? (confidence level)
- What action is safe now? (containment that doesn’t break business)
Step 1: Normalize the alert into facts
- Time window: first seen, last seen
- Entities: user, endpoint, IP, process, URL/domain
- Category: identity, endpoint, network, email, cloud app
- Severity vs confidence: treat them separately
Step 2: Correlate across three sources
Identity logs
Sign-in anomalies, impossible travel, new device enrollments, MFA prompts, token refresh patterns.
Endpoint telemetry (EDR)
Process tree, command line, persistence attempts, suspicious parent processes, lateral movement signals.
Network / firewall logs
Destination reputation, unusual ports, beacon patterns, new outbound destinations, DNS anomalies.
Step 3: Build a timeline (simple but powerful)
[T0] User sign-in from IP A
[T1] MFA challenge accepted
[T2] New device registration
[T3] Endpoint spawns suspicious process
[T4] Outbound connection to unknown domain
[T5] Data access spike / file encryption indicators
A timeline turns messy logs into a decision-friendly story.
Step 4: Decide the safest containment action
- Identity risk: force password reset, revoke sessions, require MFA reauth, block sign-in temporarily.
- Endpoint risk: isolate host in EDR, kill process, quarantine file, collect artifacts.
- Network risk: block domain/IP, restrict egress, tighten rules for the affected segment.
Professional principle: choose containment actions that reduce blast radius fast, but don’t destroy evidence.
Step 5: Close the loop (the part most teams skip)
- Root cause: vulnerability, misconfig, weak control, human error.
- Fix: patch / harden / restrict / train.
- Verify: retest and confirm through logs.
- Document: incident note + evidence links (ISO-ready).