Host, Application, and Other Indicators
A compromised operating system does not operate in silence. It leaves a microscopic wake of computational disturbances—anomalous processes spawning in the wrong directories, subtle registry modifications, unexpected network calls, and application logs littered with malformed input. For a Security Operations Center (SOC) analyst, the endpoint is a crime scene where the laws of physics are the rules of the operating system. When an adversary breaches a system, they must establish persistence, escalate privileges, execute payloads, and evade detection. Each of these actions fundamentally alters the state of the host.
To detect these intrusions, we cannot simply rely on antivirus signatures. We must understand the baseline rhythm of a healthy machine. By intimately knowing how legitimate processes behave, how applications interact with memory, and how human users communicate, we can spot the minute deviations that signal an attack.