Skip to content

Log Analysis for Cybersecurity: Reading What Matters

Why Is Log Analysis the #1 SOC Analyst Skill?

Section titled “Why Is Log Analysis the #1 SOC Analyst Skill?”

Log analysis is the process of collecting, parsing, and interpreting records generated by operating systems, applications, network devices, and security tools to detect threats, investigate incidents, and maintain situational awareness. NIST SP 800-92 (Guide to Computer Security Log Management) defines it as the foundation of effective security monitoring, and the SANS Institute consistently ranks log analysis as the single most important technical skill for entry-level SOC analysts.

Every security tool you will use — SIEMs, EDR platforms, firewalls, intrusion detection systems — ultimately produces logs. If you cannot read and interpret those logs, you cannot do the job. A SIEM alert is just a summary. The logs underneath the alert are where the truth lives. Understanding what happened, when it happened, and what to do about it always comes back to reading the logs.

According to the Verizon 2024 Data Breach Investigations Report, log analysis was a factor in detecting 67% of confirmed breaches where detection occurred internally rather than through third-party notification. Organisations with mature log management programmes detected breaches an average of 100 days faster than those without (IBM Cost of a Data Breach Report 2024).

Log analysis sounded incredibly dry to me at first — reading lines of text all day? But once I started actually looking at logs in my home lab, it clicked. Every log entry tells a story. A failed login at 3 a.m., a process spawning from an unusual directory, a DNS query to a suspicious domain — these are the breadcrumbs that reveal what attackers are doing. Coming from real estate and aged care in Sydney, I never imagined I would find raw text data this fascinating. But it is basically detective work, and that appeals to a part of my brain that spreadsheets and property listings never reached.

Certification objective: CompTIA Security+ SY0-701 covers log data sources (Domain 4.4) and security monitoring (Domain 4.1). CompTIA CySA+ CS0-003 tests log analysis extensively across threat detection and incident response domains.

Not all logs are created equal. Understanding what each log source tells you — and what it does not — is essential for effective analysis.

Log Sources in a Typical Enterprise

From endpoints to SIEM — how log data flows through an organisation

SIEM Platform
Splunk, Sentinel, Elastic — aggregates, correlates, and alerts on all log sources
Cloud Services
AWS CloudTrail, Azure AD, Google Workspace — identity and infrastructure logs
Applications
Web servers, databases, email gateways — access and error logs
Servers
Windows Event Logs, Linux syslog — authentication, process execution, services
Network Devices
Firewalls, proxies, DNS, IDS/IPS — traffic flow and connection data
Endpoints
Workstations, laptops, mobile — EDR telemetry, local event logs
Idle

Windows Event Logs are the most common log source you will encounter in a SOC. They record authentication events, process execution, service installations, and policy changes across every Windows system in the organisation.

Where to find them: Event Viewer (eventvwr.msc) or via PowerShell (Get-WinEvent). In a SOC, these are forwarded to your SIEM.

Key log channels:

ChannelWhat It RecordsSOC Relevance
SecurityLogins, logoffs, account changes, privilege usePrimary source for authentication analysis
SystemService starts/stops, driver loads, system errorsDetects persistence mechanisms and system tampering
ApplicationApplication crashes, errors, warningsIdentifies malware behaviour and application abuse
PowerShell/OperationalPowerShell command execution (if enabled)Critical for detecting fileless attacks and living-off-the-land techniques
Sysmon/OperationalProcess creation, network connections, file changes (requires Sysmon)Gold standard for endpoint visibility — install this in your home lab

Critical Windows Event IDs Every SOC Analyst Must Know

Section titled “Critical Windows Event IDs Every SOC Analyst Must Know”

These are the Event IDs you will query daily. Memorise the top ten — you will use them in every investigation.

Event IDDescriptionWhy It Matters
4624Successful logonConfirms access — check the logon type, source IP, and account name
4625Failed logonBrute-force detection — multiple 4625s followed by a 4624 is a red flag
4720User account createdNew account creation outside change management could indicate persistence
4732Member added to security groupPrivilege escalation — attacker adding themselves to the Administrators group
4688New process createdProcess execution tracking — look for unusual parent-child relationships
7045Service installedNew service installation is a common persistence technique (MITRE ATT&CK T1543.003)
4648Logon using explicit credentialsPass-the-hash or credential reuse — someone logged on as a different user
4672Special privileges assigned to new logonAdmin logon — tracks when elevated privileges are used
1102Audit log clearedAn attacker covering their tracks — this should always trigger an alert
4697Service installed (detailed)More detailed version of 7045 — captures the service file path

Linux systems use syslog for general system logging and /var/log/auth.log (Debian/Ubuntu) or /var/log/secure (RHEL/CentOS) for authentication events.

Key Linux log files:

Log FileWhat It RecordsSOC Relevance
/var/log/auth.logSSH logins, sudo usage, authentication failuresPrimary authentication log — equivalent to Windows Security log
/var/log/syslogGeneral system messages, service activityBroad system health and behaviour
/var/log/kern.logKernel messagesHardware issues, potential rootkit activity
/var/log/cron.logCron job executionPersistence mechanisms — attackers schedule tasks via cron
/var/log/apache2/access.logWeb server requestsWeb attack detection (SQL injection, path traversal, brute-force)

Firewalls log every connection they allow or deny. This gives you visibility into what is entering and leaving your network.

Key fields in firewall logs:

  • Timestamp — when the connection occurred
  • Source IP and port — where the traffic came from
  • Destination IP and port — where it was going
  • Action — allowed, denied, or dropped
  • Protocol — TCP, UDP, ICMP
  • Bytes transferred — useful for detecting data exfiltration

DNS logs are particularly valuable because virtually all network activity involves DNS. Malware needs to resolve command-and-control (C2) domains, and DNS logs capture every query. Unusual query patterns — high-frequency queries to random-looking domains, TXT record requests to unknown domains — are strong indicators of compromise.

Web proxies log all HTTP/HTTPS traffic leaving the network. They capture URLs, user agents, response codes, and bytes transferred. Proxy logs are essential for:

  • Detecting connections to known malicious domains
  • Identifying data exfiltration via HTTP POST requests
  • Tracking user web activity during an investigation
  • Spotting unusual download patterns (e.g., executables from uncommon sources)

Let us walk through a practical example of reading Windows Event Logs — the skill you will use most often.

Terminal window
# Find the 20 most recent failed logon attempts (Event ID 4625)
Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4625} -MaxEvents 20 |
Format-Table TimeCreated, @{N='Account';E={$_.Properties[5].Value}},
@{N='SourceIP';E={$_.Properties[19].Value}} -AutoSize
# Check for new user accounts created in the last 24 hours (Event ID 4720)
Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4720;
StartTime=(Get-Date).AddDays(-1)} |
Format-Table TimeCreated, @{N='NewAccount';E={$_.Properties[0].Value}},
@{N='CreatedBy';E={$_.Properties[4].Value}}
# Find new services installed (Event ID 7045) — potential persistence
Get-WinEvent -FilterHashtable @{LogName='System'; Id=7045} -MaxEvents 10 |
Format-Table TimeCreated, @{N='ServiceName';E={$_.Properties[0].Value}},
@{N='ServicePath';E={$_.Properties[1].Value}}
# Look for audit log clearing (Event ID 1102) — anti-forensics
Get-WinEvent -FilterHashtable @{LogName='Security'; Id=1102} -ErrorAction SilentlyContinue
Terminal window
# Find failed SSH login attempts
grep "Failed password" /var/log/auth.log | tail -20
# Count failed logins per source IP — identifies brute-force sources
grep "Failed password" /var/log/auth.log | awk '{print $(NF-3)}' | sort | uniq -c | sort -rn | head -10
# Check sudo usage — who escalated privileges?
grep "sudo:" /var/log/auth.log | grep -v "pam_unix" | tail -20
# Find successful SSH logins
grep "Accepted" /var/log/auth.log | tail -20
# Look for new cron jobs — potential persistence
grep -i "cron" /var/log/syslog | grep -i "install\|replace\|edit" | tail -10

Legal and ethical warning: Only analyse logs on systems you own or have explicit written authorisation to access. Unauthorised access to computer systems is a criminal offence under the Criminal Code Act 1995 (Australia), the Computer Fraud and Abuse Act (US), and similar legislation in other jurisdictions. In your home lab, practise freely.

In a real SOC, you are not manually opening Event Viewer or SSH-ing into individual servers. A SIEM (Security Information and Event Management) platform collects logs from every source across the organisation, normalises them into a common format, and lets you search, correlate, and alert on them from a single interface.

Splunk uses Search Processing Language (SPL). Here are queries you would use daily as a Tier 1 analyst.

# Find failed Windows logon attempts in the last 24 hours
index=main sourcetype=WinEventLog EventCode=4625
| stats count by Account_Name, Source_Network_Address
| sort -count
# Detect brute-force: more than 10 failed logins from one IP in 15 minutes
index=main sourcetype=WinEventLog EventCode=4625
| bin _time span=15m
| stats count by Source_Network_Address, _time
| where count > 10
# Find successful logon after multiple failures (potential compromise)
index=main sourcetype=WinEventLog (EventCode=4625 OR EventCode=4624)
| transaction Account_Name maxspan=30m
| search EventCode=4625 EventCode=4624
| table _time, Account_Name, Source_Network_Address, EventCode
# New services installed across all Windows endpoints
index=main sourcetype=WinEventLog EventCode=7045
| table _time, host, ServiceName, ServiceFileName
| sort -_time
# DNS queries to suspicious TLDs
index=dns
| search query="*.xyz" OR query="*.top" OR query="*.buzz"
| stats count by query, src_ip
| sort -count

If your target SOC runs Microsoft Sentinel, you will use Kusto Query Language (KQL).

// Failed logons in the last 24 hours
SecurityEvent
| where EventID == 4625
| where TimeGenerated > ago(24h)
| summarize FailCount=count() by TargetAccount, IpAddress
| sort by FailCount desc
// New services installed
Event
| where EventID == 7045
| project TimeGenerated, Computer, RenderedDescription
| sort by TimeGenerated desc

What Does the Full Log Analysis Workflow Look Like?

Section titled “What Does the Full Log Analysis Workflow Look Like?”

Whether you are investigating a single alert or hunting for threats, the workflow follows the same structure.

Log Analysis Workflow

The structured approach SOC analysts follow for every investigation

Collect
Step 1
Identify relevant log sources
Define time window
Gather raw data from SIEM
Normalise
Step 2
Parse fields (timestamp, source, action)
Standardise formats across sources
Enrich with threat intel data
Correlate
Step 3
Link events across log sources
Build timeline of activity
Identify patterns and anomalies
Investigate
Step 4
Check IOCs against threat intel
Determine scope of activity
Classify: TP / FP / BTP
Document
Step 5
Record findings in ticket
Note evidence and queries used
Escalate or close with rationale
Idle

Scenario: Your SIEM fires an alert — “Multiple failed logons followed by successful logon” for the account jsmith from IP address 203.0.113.47 at 02:17 UTC.

  1. Collect: Query all events for jsmith and 203.0.113.47 in the last 24 hours. Pull Windows Security logs (4624, 4625), VPN logs, and proxy logs.

  2. Normalise: Line up the timestamps. You see 47 failed logon attempts (4625) from 203.0.113.47 between 01:45 and 02:16, followed by a successful logon (4624) at 02:17. The logon type is 10 (RemoteInteractive — RDP).

  3. Correlate: Check what jsmith did after the successful logon. You find Event ID 4688 (process creation) showing cmd.exe spawning whoami, net user, and net group "domain admins" — classic reconnaissance commands. Event ID 7045 shows a new service installed at 02:23.

  4. Investigate: Look up 203.0.113.47 on AbuseIPDB and VirusTotal — it is flagged as a known brute-force source from Eastern Europe. The commands executed match MITRE ATT&CK T1087 (Account Discovery) and T1543.003 (Create or Modify System Process: Windows Service). This is a confirmed compromise.

  5. Document: Record the full timeline, every query you ran, every IOC you found, your classification (True Positive — confirmed compromise via brute-force), and escalate to Tier 2 / IR team for containment.

Experienced analysts recognise these patterns because they have seen them repeatedly. As a beginner, memorise these — they will sharpen your instincts.

PatternWhat It Looks Like in LogsMITRE ATT&CK Reference
Brute-force → successful logonMany 4625 events from one IP, then a 4624 for the same accountT1110 (Brute Force)
New service installed after compromise7045 event shortly after a suspicious 4624T1543.003 (Windows Service)
Reconnaissance commands4688 events showing whoami, net user, net group, ipconfig, nltestT1087 (Account Discovery), T1016 (System Network Configuration)
Audit log cleared1102 event — someone is covering their tracksT1070.001 (Clear Windows Event Logs)
Unusual parent-child processwinword.exe spawning powershell.exe or cmd.exeT1059 (Command and Scripting Interpreter)
Lateral movementMultiple 4624 type 3 (network logon) events from one internal host to many others in a short windowT1021 (Remote Services)
DNS tunnellingHigh volume of long, encoded DNS TXT queries to a single domainT1071.004 (Application Layer Protocol: DNS)
Data exfiltrationUnusual outbound traffic volume in proxy logs, especially to cloud storage or paste sitesT1048 (Exfiltration Over Alternative Protocol)

Not every unusual log entry is malicious. Learning to recognise benign activity saves time and prevents unnecessary escalation.

  • Scheduled vulnerability scans — mass connection attempts that look like port scanning
  • IT admin using remote tools — RDP, PsExec, or PowerShell remoting during business hours from a known admin workstation
  • Password reset cycles — multiple 4625 events when a user forgets their password and keeps trying
  • Patch deployment — new services installed across many endpoints simultaneously during a maintenance window
  • Cloud sync tools — large outbound data transfers to sanctioned cloud services (OneDrive, SharePoint)
  • Monitoring tools — network probes and health checks that trigger IDS alerts

How Do You Practise Log Analysis in a Home Lab?

Section titled “How Do You Practise Log Analysis in a Home Lab?”

You do not need a corporate SOC to build log analysis skills. Here is a practical plan using free tools.

  1. Windows VM with Sysmon — install Sysmon with the SwiftOnSecurity configuration. This generates detailed process creation, network connection, and file modification logs that mirror real enterprise telemetry.
  2. Linux VM — any Ubuntu or Debian server. SSH into it, create users, simulate activity. The auth.log fills up naturally.
  3. Splunk Free — install on a Linux VM. It processes up to 500 MB of logs per day, which is more than enough for learning.
  • Atomic Red Team — run safe, controlled attack simulations that generate the exact log entries you would see in a real compromise. Each test maps to a MITRE ATT&CK technique.
  • DVWA (Damn Vulnerable Web Application) — generates web server logs showing SQL injection, XSS, and brute-force attempts.
  • Simulate brute-force attempts — use Hydra against your own lab SSH server and then investigate the auth.log entries.
  • BOTS (Boss of the SOC) dataset — Splunk’s free competition dataset with realistic enterprise logs and investigation scenarios.

For each exercise, follow the five-step workflow (Collect, Normalise, Correlate, Investigate, Document). Write up your findings as if you were submitting a ticket in a real SOC. This builds both the technical skill and the documentation habit that hiring managers look for.

ExerciseWhat You LearnTime Investment
Investigate a brute-force attack in SplunkSPL queries, Event ID 4625/4624 correlation1-2 hours
Trace a simulated malware execution via Sysmon logsProcess trees, parent-child relationships, persistence2-3 hours
Analyse a PCAP file for C2 traffic in WiresharkDNS queries, HTTP beacons, traffic patterns1-2 hours
Complete a TryHackMe log analysis roomGuided practice with real scenarios1-2 hours per room
Run an Atomic Red Team test and find it in SplunkAttack simulation → detection → investigation2-3 hours
PlatformRelevant ContentCost
TryHackMeWindows Event Logs, Splunk, Sysmon, SOC Level 1$14/month
LetsDefendSOC simulator with log-based alert triageFree tier available
Splunk EducationSplunk Fundamentals 1 and 2Free
Blue Team Labs OnlineLog analysis and investigation challengesFree tier available
CyberDefendersReal-world forensic challenges with log dataFree

The study tracker includes log analysis practice milestones — building from basic Windows Event Logs to SIEM queries over several weeks.

Career Roadmap & Study TrackerAvailable Now

Step-by-step roadmap with study tracker worksheets and certification decision framework.

Get the Guide → $27

Log analysis is the bedrock skill of cybersecurity defence. Every investigation, every alert triage, every incident response engagement starts with reading logs.

  • Logs tell the story of what happened. SIEM alerts are summaries — the raw logs underneath contain the evidence you need to make accurate classifications.
  • Windows Event IDs 4624, 4625, 4720, 4688, 7045, and 1102 are the ones you will query most often. Learn them by heart.
  • Linux auth.log is the equivalent starting point for Linux environments — failed SSH attempts, sudo usage, and authentication events.
  • Firewall, proxy, and DNS logs provide network-level visibility that endpoint logs alone cannot give you. DNS logs are particularly valuable because nearly all malicious activity involves DNS resolution.
  • The log analysis workflow is always the same: Collect, Normalise, Correlate, Investigate, Document. Following this structure prevents you from jumping to conclusions or missing evidence.
  • Pattern recognition develops with practice. Brute-force followed by successful logon, unusual parent-child processes, new services installed after compromise — these patterns repeat across incidents.
  • You can build real log analysis skills for free using Splunk Free, Sysmon, Atomic Red Team, and TryHackMe. A home lab is the fastest path to job readiness.
  • SIEM query skills (SPL or KQL) are directly testable in interviews. Practise writing queries, not just reading them.

Individual results vary. Career timelines, salary outcomes, and job availability depend on your location, experience, market conditions, and effort. The information on this page is educational, not a guarantee of employment outcomes.

Frequently Asked Questions

What is log analysis in cybersecurity?

Log analysis is the process of collecting, parsing, and interpreting records generated by operating systems, applications, network devices, and security tools to detect threats, investigate incidents, and maintain security. It is defined as a foundational security practice by NIST SP 800-92 and is the core technical skill for SOC analysts.

What are the most important Windows Event IDs for security?

The most critical Windows Event IDs for SOC analysts are: 4624 (successful logon), 4625 (failed logon), 4720 (user account created), 4688 (process created), 7045 (service installed), 4732 (user added to security group), 4648 (logon with explicit credentials), 4672 (admin logon), and 1102 (audit log cleared). These cover authentication, process execution, persistence, privilege escalation, and anti-forensics.

What is a SIEM and why is it important for log analysis?

A SIEM (Security Information and Event Management) platform collects logs from every source across an organisation — endpoints, firewalls, servers, cloud services, and applications — normalises them into a common format, correlates events across sources, and generates alerts when suspicious patterns are detected. Without a SIEM, analysts would need to manually check logs on individual systems, which is impossible at enterprise scale.

How do I learn Splunk for free?

Splunk offers a free tier (Splunk Free) that processes up to 500 MB of logs per day — plenty for a home lab. Install it on a Linux VM, forward Windows Event Logs and Sysmon data to it, and practise writing SPL queries. Splunk Education provides free Fundamentals 1 training. TryHackMe has multiple Splunk-focused rooms in the SOC Level 1 path. The BOTS (Boss of the SOC) dataset provides realistic investigation scenarios.

What does a brute-force attack look like in logs?

A brute-force attack appears as a high volume of failed logon events (Windows Event ID 4625) from a single source IP address targeting one or more accounts in a short time window. If the attack succeeds, you will see a successful logon event (4624) following the failures. In Linux auth.log, you see repeated 'Failed password' entries from the same IP. SIEM correlation rules can automatically detect this pattern.

What is the difference between Windows Event Log and Sysmon?

Windows Event Logs are built into Windows and record authentication, system events, and application activity. Sysmon (System Monitor) is a free Microsoft Sysinternals tool that provides much more detailed endpoint telemetry — process creation with full command lines, network connections per process, file creation timestamps, and registry modifications. Sysmon is considered the gold standard for endpoint visibility and is widely used in enterprise SOCs.

How do attackers try to avoid log detection?

Common anti-forensic techniques include clearing Windows event logs (Event ID 1102), disabling logging services, timestomping (modifying file timestamps), using living-off-the-land binaries (LOLBins) that blend with legitimate system tools, and tunnelling command-and-control traffic through DNS or HTTPS to evade network logging. This is why defence-in-depth logging — collecting from multiple sources — is essential. An attacker may clear endpoint logs but cannot easily erase firewall or SIEM copies.

Can I practise log analysis without a corporate SOC?

Yes. Set up a home lab with Splunk Free, a Windows VM running Sysmon, and a Linux VM. Use Atomic Red Team to generate realistic attack telemetry, then investigate the logs as if you were in a SOC. TryHackMe SOC Level 1, LetsDefend, Blue Team Labs Online, and CyberDefenders all provide structured log analysis exercises at free or low cost. Document your investigations in a portfolio to show hiring managers.


Sources: NIST SP 800-92, NIST SP 800-61, SANS Institute, MITRE ATT&CK, Verizon DBIR 2024, IBM Cost of a Data Breach 2024. Last verified: March 2026.