Platform Overview
- Telemetry model: Dual-layer collection via network gateway (Suricata IDS) and endpoint agent (Sysmon + WinEventLog), forwarded to Splunk for centralised analysis.
- Architecture: Gateway IDS provides flow-level visibility; the Windows endpoint is instrumented with Sysmon, providing multi-category host telemetry including process execution, file system activity, registry modifications, DNS queries, network connections, process access events, and indicators of injection-related behaviour.
- Scope: Detection logic validation, log ingestion, and cross-index correlation within a small-scale environment.
- Constraints: Non-production scale, single analyst, no enterprise distributed architecture, no EDR functionality, no cloud connectivity testing.
Endpoint Telemetry Scope
The Windows endpoint uses Sysmon to provide multi-category host telemetry across process execution, file system activity, registry modifications, DNS queries, network connections, process access behaviour, and persistence-related indicators.
Active Sysmon event coverage in this environment:
Process activity
- Event ID 1 - ProcessCreate
- Event ID 5 - ProcessTerminate
File system activity
- Event ID 2 - FileCreateTime
- Event ID 11 - FileCreate
- Event ID 15 - FileCreateStreamHash
- Event ID 23 - FileDelete
Registry activity
- Event ID 12 - RegistryObjectCreate/Delete
- Event ID 13 - RegistryValueSet
- Event ID 14 - RegistryObjectRename
Network activity
- Event ID 3 - NetworkConnect
DNS activity
- Event ID 22 - DNSQuery
Process access / injection indicators
- Event ID 8 - CreateRemoteThread
- Event ID 10 - ProcessAccess
WMI persistence telemetry
- Event ID 19 - WmiEventFilter
- Event ID 20 - WmiEventConsumer
System telemetry
- Event ID 4 - Sysmon Service State Change
- Event ID 6 - DriverLoad
- Event ID 16 - Sysmon Configuration Change
Named pipe monitoring
- Event ID 18 - PipeEvent
Other host activity
- Event ID 24 - ClipboardChange
1. Overview
Lab Name: SOC Lab v1
Purpose: Construct a small-scale monitoring environment for ingesting and analysing host and network telemetry.
Scope:
- Single analyst environment
- Non-production scale
- Controlled test network
Architecture Overview
Diagram: SOC Lab v1 showing attack traffic flow, gateway inspection, endpoint telemetry collection, and centralised analysis in Splunk.
2. Environment Summary
2.1 Host Platform
- Host OS: Windows 11 Pro
- Hypervisor: Hyper-V
- Host hardware: Multi-core consumer CPU, 32 GB RAM, SSD-based storage.
2.2 Virtual Machines
| VM Name | Role | OS | Notes |
|---|---|---|---|
| Ubuntu-24.04-Splunk-Enterprise | SIEM | Linux | Ubuntu 24.04 server build - Memory 4096MB, 8 Processors, VHD 60GB (Gen1) |
| Ubuntu-24.04-Suricata | Gateway/IDS | Linux | Ubuntu 24.04 server build - Memory 4096MB, 8 Processors, VHD 20GB (Gen1) |
| Win11-25H2-UF | SplunkUF/Sysmon | Windows 11 Pro | Win11Pro - Memory 4096MB, 8 Processors, VHD 43GB (Gen2) |
| Kali-2025.4-Test | Simulate attacks | Linux | Kali 2025.4 - Memory 4096MB, 8 Processors, VHD 25GB (Gen2) |
3. Network Design
3.1 Network Segments
| Network | Type | Addressing | Purpose | Comments |
|---|---|---|---|---|
| NAT | NAT | 192.168.100.1 | Internet access only | |
| InternalLab | Internal | 10.0.0.0/24 | Monitored lab traffic | Enable MAC address spoofing for the gateway ‘VM as a router’ |
4. Tooling and Components
4.1 SIEM Platform
- Platform: Splunk Enterprise
- Deployment type: Full deployment (trial)
- Primary purpose in lab: Analysis, dashboards, pivots, reports
4.2 Network Sensor
- Tool: Intrusion Detection System
- Function: Detect incoming traffic, forward logs to Splunk with UF
- Traffic visibility: Default gateway (sees all traffic coming through eth0 interface)
4.3 Endpoint Telemetry
- Source OS: Win11-25H2-UF
- Telemetry collected: WinEventLog/Sysmon
- Forwarding method: Splunk Universal Forwarder
5. Data Collection
5.1 Log Sources
| Source | Log Type | Destination |
|---|---|---|
| Win11-25H2-UF | Sysmon (operational) | sysmon |
| Win11-25H2-UF | Security event log | security |
| Win11-25H2-UF | System event log | wineventlog |
| Win11-25H2-UF | Application event log | wineventlog |
| Ubuntu-24.04-Suricata | EVE.JSON (alerts, flows, DNS, HTTP, TLS) | suricata_eve |
| Ubuntu-24.04-Suricata | Suricata stats / engine metrics | suricata_stats |
5.2 Ingestion Validation
Logs validated via direct index searches (e.g. index=sysmon, index=suricata_eve) using a 24-hour time range. Non-zero event counts and recent timestamps confirmed successful ingestion and correct index routing.
6. Detection and Analysis
6.1 Test Activity Summary
16 controlled tests executed: 4 network-observable (scanning, brute-force, reconnaissance) and 12 host-only (command execution, persistence, process injection, WMI, scheduled tasks, discovery, DNS, tool transfer).
7. Findings
Observed Strengths
- Endpoint telemetry generated reliable evidence across multiple activity categories, including process execution, file system events, registry persistence activity, DNS queries, network connections, process access behaviour, and WMI persistence activity (Sysmon Event IDs 19 and 20, confirmed in T1546.003).
- Network scanning and brute-force activity produced observable flow and alert events.
- Cross-index correlation performed via time-bounded searches.
Observed Gaps
Observed gaps in the monitoring environment include:
- No endpoint detection and response (EDR) platform or behavioural analytics layer
- No PowerShell script block logging (Event ID 4104)
- No AMSI instrumentation
- No cloud or SaaS telemetry sources
- Detection workflows rely on manual Splunk searches rather than automated alerting or SOAR orchestration
Noise Characteristics
- Repeated scans produced high-volume flow events.
- Background Windows processes required filtering during analysis.
8. Limitations
- Scale: Small, single-segment environment; does not simulate enterprise traffic volumes or concurrent attack activity.
- Licensing: Enterprise trial (Splunk, Emerging Threats Open) limits access to premium detections.
- Hardware: Local hardware constrains performance testing and large data volumes.
- Single analyst: Reduces behavioural diversity and multi-user realism.
- Sensor scope: Limited to Sysmon endpoint telemetry and Suricata perimeter IDS; no EDR, firewall, or cloud logs.
9. Technical Observations
- Endpoint telemetry provides greater investigative depth than perimeter IDS alone.
- Perimeter IDS visibility limited to observable network-layer behaviours.
- Absence of alerts must be evaluated against sensor coverage and rule scope.
- Native utilities remain available on modern Windows builds; T1559.002 (DDE execution) was blocked by Microsoft Defender prior to execution, not by OS utility removal.
10. Document Control
- Author: Zachary McGill
- Created: 2026-01-18
- Last Updated: 2026-03-09
- Status: Complete
- Review cadence: On major lab architecture changes