AccessAnalyst Notes

Writing

Analyst Notes

Mental models, checklists, and method — the processes behind the cases.

12 notes
01
Detection4 min
Baseline Drift & False Positive Ratio (FPR) Analysis
SIEMEfficacyBaseline

Quantifying analytical fatigue post-telemetry expansion. A workflow for validating signal integrity during data onboarding.

02
Identity5 min
Identity Analytical Pivots: Session & Token Integrity
EntraToken TheftAitM

Beyond simple MFA verification. Auditing Token Theft (AitM) and Session Authority through orthogonal telemetry pivots.

03
Detection4 min
Durable False Positive Suppression & Detection Decay
DetectionsTuningEfficacy

Differentiating between volatile entity-level suppression and durable attribute-level logic. Managing detection decay.

04
Ops5 min
Orthogonal Hunt Framework: Atomic Coverage
KQLHuntingForensics

Ensuring atomic coverage by hunting TTPs across disjoint telemetry layers (Process, Network, Registry).

05
Identity5 min
Email Header Forensics: SPF / DKIM / DMARC Triage
PhishingEmailForensics

Reconstructing the Received header chain and validating the sender authentication triplet for phishing triage.

06
Identity5 min
OAuth Consent Grant Abuse & Illicit Token Persistence
EntraOAuthPersistence

Detecting and remediating malicious application consent grants that persist through password resets and MFA enforcement.

07
Detection6 min
Process Tree Reconstruction & LOLBin Analysis
MDEEDRLOLBin

Tracing parent-child execution chains and identifying Living-off-the-Land binary abuse through lineage analysis.

08
Ops5 min
Mailbox Rule Persistence & BEC Concealment
BECExchangePersistence

Detecting inbox rule creation as a persistence and concealment mechanism in Business Email Compromise campaigns.

09
Detection6 min
Lateral Movement Telemetry: SMB, WMI & RDP Pivots
MDELateral MovementForensics

Correlating cross-host execution signatures across SMB file writes, WMI process creation, and RDP session initiation.

10
Detection7 min
Ransomware Precursor Detection: Pre-Encryption Kill Chain
RansomwareEDRKill Chain

Identifying the 4-phase pre-encryption operational pattern: discovery, credential harvesting, staging, and inhibit recovery.

11
Ops5 min
Sentinel Workspace Hygiene & Ingestion Cost Governance
SentinelCostGovernance

Auditing table-level ingestion volumes, identifying verbose data sources, and implementing transformation-based cost controls.

12
Identity5 min
Conditional Access Gap Analysis & Policy Drift
EntraCA PolicyZero Trust

Systematic audit of CA policy coverage to identify authentication bypass paths and trust boundary weaknesses.

Analyst notes · Muhammad FezzanMore notes incoming