This project demonstrates the collection, processing, ingestion, and analysis of Windows Security Event Logs using Splunk to simulate a SOC-style investigation workflow and produce detections and findings based on real endpoint telemetry.
- Findings / write-up:
notes/findings.md - Detection queries & explanations:
queries/ - Screenshots / evidence:
screenshots/
- Collect Windows Security events from a monitored endpoint
- Normalize and ingest log data into Splunk
- Analyze authentication, privilege, and group activity
- Build repeatable detections and document security findings
- Windows 10 virtual machine (endpoint under analysis)
- Splunk Enterprise (SIEM)
- PowerShell for data processing
- VirtualBox for virtualization
Windows Security logs were exported from the endpoint in EVTX format and transferred to the analysis system.
The EVTX log file was converted to structured JSON before ingestion into Splunk. This was done to normalize the data into a format that is line-oriented, easy to parse, and compatible with Splunk’s JSON field extraction. This approach mirrors common incident response and forensic workflows where raw event logs are transformed into analysis-friendly formats.
The processed log data was ingested into Splunk using a dedicated index (security_lab) and a custom host value representing the monitored endpoint.
notes/findings.md— Security findings and interpretations based on observed log patternsnotes/detections.md— SPL-based detections and explanations for what they identify and why they matterqueries/— Screenshots of detection queries and resultsscreenshots/— Supporting screenshots (event counts, raw examples, data processing steps)
- Repeated Event ID 4625 failed logons consistent with brute-force or password guessing activity
- Event ID 4624 successful authentication following multiple failures (potential compromise indicator)
- Event ID 4720 creation of a new local user account (possible persistence mechanism)
- Windows Security Event interpretation
- Log normalization and transformation
- Splunk SPL detection development
- Security event correlation and analysis
- Documentation and reporting
This project uses lab-generated data for educational and portfolio purposes only.