siem-logging
CommunityCentralize security logs for threat detection.
Legal & Compliance#compliance#log aggregation#incident response#threat detection#siem#security logging
Authorancoleman
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill helps you establish a robust Security Information and Event Management (SIEM) system to centralize security logs, enabling effective threat detection, incident investigation, and compliance.
Core Features & Use Cases
- SIEM Platform Selection: Provides a decision framework for choosing between Elastic SIEM, Microsoft Sentinel, Wazuh, and Splunk based on budget, infrastructure, and expertise.
- Detection Rule Development: Guides the creation of universal SIGMA rules and platform-specific queries (EQL, KQL, SPL) for threat detection.
- Log Aggregation Architecture: Details centralized, distributed, and cloud-native architectures for collecting logs.
- Compliance & Retention: Outlines log retention policies to meet GDPR, HIPAA, PCI DSS, and SOC 2 requirements.
- Alert Tuning: Strategies for reducing false positives and optimizing alert quality.
- Use Case: Implement a SIEM solution to monitor for brute-force attacks, detect privilege escalation, and ensure audit trails for compliance.
Quick Start
Use the siem-logging skill to configure Microsoft Sentinel for Azure AD log ingestion.
Dependency Matrix
Required Modules
None requiredComponents
scriptsreferences
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: siem-logging Download link: https://github.com/ancoleman/ai-design-components/archive/main.zip#siem-logging Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.