Advanced Security #SIEM #detection-rules #UEBA #log-analysis

SIEM Vocabulary

5 exercises — master SIEM vocabulary for SOC analysts: SIEM architecture and core functions vs. log aggregation, detection vs. correlation rules with MITRE ATT&CK mapping, true/false positive/negative classification and the alert fatigue problem, log source onboarding steps, and UEBA behavioural analytics.

0 / 5 completed
SIEM quick reference
  • SIEM — collects + normalises + correlates + alerts; turns raw logs into actionable security detections.
  • Detection rule — fires on a single known-bad event or indicator. Correlation rule — fires when a pattern of events across sources/time is suspicious.
  • MITRE ATT&CK — framework of adversary TTPs; mapping rules to techniques enables detection coverage gap analysis.
  • TP: alert fired, real threat. FP: alert fired, benign event (alert fatigue). FN: no alert, real threat (worst outcome — missed breach). TN: no alert, no threat (normal operation).
  • Log source onboarding — connectivity + parsing + normalisation + event coverage validation + rule activation + coverage matrix update.
  • UEBA — ML baselines normal user/entity behaviour; alerts on deviations like impossible travel, off-hours access, data volume anomalies, peer group outliers.
  • Alert fatigue — too many FPs cause analysts to stop trusting alerts; base-rate error is the root cause; solved by rule tuning and UEBA calibration.
1 / 5

A SOC manager explains the team's tooling: "Everything flows into the SIEM. It's not just a log storage system — it aggregates, normalises, and correlates events from across our environment so we can detect threats we'd never see by looking at any single source."

What is a SIEM, what are its core functions, and what distinguishes it from a simple log aggregator?