Fleet provides visual heartbeat of all connected agents
Custom rules used to detect suspicious logon behavior
β What I Learned
How to create a full log pipeline from scratch
DFIR alerting in a home lab context
Elastic detection rules & correlation
Mapping alerts to real attacker TTPs
This website uses cookies
Select which cookies to opt-in to via the checkboxes below; our website uses cookies to examine site traffic and user activity while on our site, for marketing, and to provide social media functionality. More details...
Cookie settings
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. More details...