What a SIEM Does

Summary

This note explains what a SIEM is actually doing in day-to-day blue-team work. The goal is to build a realistic mental model instead of treating a SIEM as a magic dashboard.

Microsoft Sentinel dashboard example

Official Microsoft Sentinel dashboard view showing the kind of visibility layer a SIEM provides before investigation starts.

Why this matters

  • a SIEM is central to many entry-level SOC workflows
  • blue-team work becomes much easier once you understand what the platform is really doing
  • tools like Wazuh, Sentinel, Splunk, or Elastic make more sense when you separate ingestion, detection, and investigation

Environment / Scope

ItemValue
TopicSIEM fundamentals
Best use for this notebuilding a blue-team platform mental model
Main focuscollection, correlation, alerting, investigation
Safe to practise?yes

Key concepts

  • SIEM - security information and event management
  • Ingestion - bringing logs and telemetry into the platform
  • Correlation - connecting related events into something more meaningful
  • Detection - logic that turns activity into an alert-worthy signal
  • Investigation - the follow-up work after something is flagged

Mental model

Think about a SIEM as a pipeline:

log source -> collection -> normalisation -> detection -> alert -> investigation

A SIEM does not “do security” by itself.
It helps collect evidence, apply logic, and make investigation easier.

Everyday examples

NeedWhat the SIEM helps with
see failed logons across multiple systemscentral log collection
spot suspicious PowerShell activitydetection rules on endpoint telemetry
review one alert in contextinvestigation and event history
reduce noise over timetuning and rule improvement

Common misunderstandings

MisunderstandingBetter explanation
”A SIEM blocks attacks”a SIEM mainly provides visibility, alerting, and investigation support
”More logs always means better security”more data without useful detection and triage often just creates noise
”An alert means confirmed malicious activity”alerts are signals, not final conclusions
”The SIEM is the detection”the SIEM hosts detections, but detection quality still depends on rules, telemetry, and tuning

Verification

CheckExpected result
Sources are onboardedlogs arrive from expected systems
Time is correcttimestamps are consistent enough for investigation
Alerts can be producedtest events trigger expected detections
Context existsevent fields support triage and explanation

Pitfalls / Troubleshooting

ProblemLikely causeWhat to check
No alerts at allno telemetry, broken parsing, or weak detection logicingestion, timestamps, rules
Too many alertsnoisy detections or poor filteringrule quality, thresholds, source context
Alerts are hard to explainweak event contextfields, enrichment, logging quality
Same issue appears across tools differentlyinconsistent normalisationsource mapping and parser behaviour

Key takeaways

  • a SIEM is a platform for visibility, detection, and investigation support
  • alerts only matter if the underlying telemetry and logic are trustworthy
  • good SIEM work is as much about signal quality as it is about collecting logs

Official documentation