Detection Phase: Log Correlation

Analyze the scenario and select the best log source for investigation.

Ready to Hunt?

You will be presented with 7 scenarios based on real-world incident response. Your job is to identify which log source or detection tool provides the vital evidence needed to confirm the threat.