⭐ Day 12 – Blue Team Response (Incident Response for SOC Analysts)
Yesterday (Day 11) we simulated a full attack chain.
Today students will learn how SOC teams respond to real threats.
This is the transition from detection → response.
🛡️ 1. What Is Blue Team Response? (Simple Explanation)
Blue Team Response = what SOC analysts do after detecting an attack.
It includes:
- Confirm the attack
- Investigate
- Contain the attacker
- Block IP or user
- Remove threat
- Recover system
- Write incident report
This is the real SOC workflow.
🧠 2. Incident Response Lifecycle (Very Easy)
1️⃣ Detection
Find the alert in Splunk.
2️⃣ Analysis
Confirm if it’s real
Check logs, source IP, user, MITRE stage.
3️⃣ Containment
Stop the attack quickly:
- Disable user
- Block IP
- Stop service
- Quarantine machine
4️⃣ Eradication
Remove malware, delete new backdoor accounts.
5️⃣ Recovery
Restore system safely.
6️⃣ Lessons Learned
Document everything.
This is followed by SOC leaders, IR team, and forensics.
🔍 3. Example Scenario for Students
Attacker brute-forces a user → logs in → creates new admin account.
SOC Analyst must:
Step 1 – Validate alert
Check:
index=* EventCode=4625
index=* EventCode=4624
index=* EventCode=4672
index=* EventCode=4720
Step 2 – Confirm attacker IP
index=* | stats count by IpAddress
Step 3 – Check if attacker created persistence
index=* EventCode=4720 OR EventCode=4732
Step 4 – Containment
SOC should:
✔ Disable the user
✔ Block attacker IP
✔ Disconnect machine
✔ End remote RDP sessions
Step 5 – Eradication
Check:
index=* "EncodedCommand"
index=* WinEventLog:Security 7045
Remove backdoors.
🔥 4. SOC Response Actions (Simple for Beginners)
🟥 Block IP
Firewalls, WAFs, proxies.
🟧 Disable user account
Windows AD / Azure AD:
- Set password reset
- Disable account
- Remove from admin group
🟨 Isolate machine
EDR tools:
- CrowdStrike
- Defender for Endpoint
- SentinelOne
🟩 Kill malicious processes
PowerShell or EDR.
🟦 Remove persistence
Delete:
- Scheduled tasks
- New local users
- Malicious services
🟪 Document everything
SOC ticketing:
- Jira
- ServiceNow
- FreshService
📊 5. Practical SOC Response Lab for Students
Task 1 — Identify brute-force attack
index=* EventCode=4625
Task 2 — Identify successful login
index=* EventCode=4624
Task 3 — Identify admin privilege escalation
index=* EventCode=4672
Task 4 — Identify persistence
index=* EventCode=4720 OR EventCode=4732
Task 5 — Write “SOC Response Plan”
Students must prepare:
- What to block
- What to disable
- What to investigate
- How to contain
🎤 Trainer Script
Say this during class:
“Detection only tells us the attacker is inside.
Blue Team Response tells us what to do next.
A SOC analyst’s job is not just finding attacks — but stopping them.”
📝 Homework for Day 12
Students submit:
- An attack they detected
- Their response plan
- Actions they would take to contain and eradicate
- MITRE mapping
Leave a comment