Experience a day in the life of a Security Operations Center (SOC) analyst. Monitor
alerts, investigate incidents, and respond to security threats in this interactive simulation.
Alert Filters
SEVERITY
SOURCE
STATUS
Total Alerts:47
New Alerts:18
Critical Alerts:3
MTTR (Average):2.3h
Alerts
Dashboard
Playbooks
Cases
Reports
Potential Ransomware Activity DetectedCritical
EDR - Endpoint 192.168.1.45 15 minutes ago
Multiple Failed Login AttemptsHigh
Authentication - VPN Gateway 32 minutes ago
Suspicious PowerShell Command ExecutionHigh
EDR - Endpoint 192.168.1.23 47 minutes ago
Data Exfiltration Attempt DetectedCritical
IDS - Network Sensor 3 1 hour ago
Unusual Authentication TimeMedium
Authentication - Office 365 1.5 hours ago
Unencrypted Data Transfer DetectedMedium
DLP - Web Proxy 2 hours ago
Outdated Software VersionLow
Vulnerability Scanner 3 hours ago
SSL Certificate Expiring SoonLow
Certificate Monitor 4 hours ago
Potential Ransomware Activity Detected
Severity: Critical
Source: EDR - Endpoint 192.168.1.45
Detected: May 1, 2025 10:45 AM
User: jsmith@company.com
Alert ID: EDR-RW-20250501-001
Alert Description
The EDR system detected multiple suspicious activities consistent with ransomware
behavior on endpoint 192.168.1.45. This includes mass file encryption attempts,
deletion of shadow copies, and communication with known malicious command and
control servers.
Detected Activities
Timestamp
Activity
Details
Severity
10:42:15 AM
Process Creation
Suspicious PowerShell command with encoded parameters
High
10:43:22 AM
Command Execution
vssadmin delete shadows /all /quiet
Critical
10:43:48 AM
Registry Modification
Multiple registry keys associated with persistence