Question 4 of 10Pro Only
Walk me through the process of designing a SIEM correlation rule from scratch. Use a brute force detection scenario as an example.
Sample answer preview
Designing a correlation rule requires systematic thinking about the threat behavior, the available data sources, and the operational context. I will walk through this using a brute force login detection scenario, which is a classic example that demonstrates the key principles…
correlation rulebrute forceT1110thresholdtime windowexclusion list