Episode 68 — Detect with Logs: High-Signal Events, Baselines, and Investigation Workflows

This episode teaches how to use logs to detect meaningful threats without drowning in noise, which is a GSEC-relevant skill because many questions describe partial evidence and require you to select the most reliable next step. You’ll define high-signal events as those strongly associated with malicious behavior, such as impossible travel logins, new admin group membership, suspicious process launches, unexpected service creation, DNS queries to unusual domains, and large outbound transfers from sensitive hosts. We’ll connect those signals to baselines so you can tell what is normal for your environment, and we’ll explain how workflows turn alerts into investigations through validation steps, scoping, and hypothesis testing. Scenarios include credential theft that appears as new device logins and token usage, lateral movement visible as remote execution patterns, and data exfiltration suggested by outbound volume and uncommon destinations. Best practices include layering identity, endpoint, and network evidence; building playbooks that define what to check first; and documenting timelines and decisions, with troubleshooting guidance for missing visibility, deceptive “normal” behavior by attackers using legitimate tools, and over-tuned rules that suppress the exact anomalies you needed to see. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 68 — Detect with Logs: High-Signal Events, Baselines, and Investigation Workflows
Broadcast by