ExamRange

SOC Simulation: Siloed Telemetry & APT Detection

Investigate the consequences of decentralized log management. Learn how APT actors exploit visibility gaps and how SOCs build architectural solutions for enterprise-wide threat hunting.

Scenario Context

You are a Senior Security Architect conducting a post-incident review for a multinational logistics company. Last month, an Advanced Persistent Threat (APT) breached the network, maintaining access for 45 days and exfiltrating 500GB of proprietary shipping manifests.

During the root cause analysis, you discovered that the initial compromise happened on an edge VPN appliance in the Tokyo datacenter. Two days later, lateral movement was executed against a Domain Controller in London. Finally, the data was staged and exfiltrated from an AWS EC2 instance in the us-east-1 region.

The local L1 analysts missed the attack entirely. When you ask why, they explain that to investigate an alert, they must manually SSH into the Tokyo VPN to read Syslog, RDP into the London DC to view Windows Event Viewer, and log into the AWS console to check CloudTrail. The SOC is completely blind to cross-environment attacks.

Security Environment: Siloed Telemetry

Notice how these logs reside on completely separate physical/cloud systems with no automated correlation.

Location: Tokyo (Local Syslog - /var/log/auth.log)
Mar 12 03:14:22 vpn-tokyo-01 sshd[14920]: Accepted password for svc_backup from 198.51.100.77 port 49152 ssh2
Mar 12 03:15:01 vpn-tokyo-01 sudo: svc_backup : TTY=pts/0 ; PWD=/home/svc_backup ; USER=root ; COMMAND=/bin/bash
Mar 12 03:20:15 vpn-tokyo-01 systemd: Session 42 logged out.
Location: London (Local WinEventLog - Security)
EventID: 4624 (Logon)
Date: 2026-03-14T08:45:12Z
Account Name: svc_backup
Logon Type: 3 (Network)
Source Network Address: 10.10.5.22 (Tokyo VPN IP)
Process Name: \Device\HarddiskVolume2\Windows\System32\svchost.exe
Warning: High volume of lateral movement via WMI detected locally.

Security Architecture Question

You are working as a SOC analyst in a multinational company with multiple data centers and remote offices. Security logs are stored locally at each site, making it difficult to correlate incidents across different locations. Recently, an advanced persistent threat (APT) compromised multiple servers, but due to multiple sources of logs and inconsistent monitoring, the attack was detected only after significant data exfiltration had occurred. To improve visibility, streamline log analysis, and enable faster incident response, you need to implement a solution that aggregates logs from all sources into a unified system.

Which solution will you implement for your organization?