// windows event log analyser
Paste raw Windows event log data for instant browser-based triage. Detects brute force, password spray, lateral movement chains, persistence mechanisms, log clearing, and suspicious processes — maps findings to MITRE ATT&CK and generates a ready-to-paste incident note. Pasted log data is processed entirely in your browser — not sent to our servers. Prefer a structured approach? Use the step-by-step investigation workflow below.
// windows event log analyser
Paste Event Viewer text exports, XML exports, or SIEM-formatted event log data. Supports Security, System, and Sysmon events. Correlation-based detection — identifies attack chains, not just individual event IDs.
Pasted log data is processed entirely in your browser and is not sent to our servers.
Prefer the manual workflow? Follow the step-by-step investigation below.
Here's what you can expect after running the analyser on a suspicious event log:
Populate a ready-to-paste investigation report for your ticket or incident log.
Stay updated when new SOC workflows drop. No spam, unsubscribe anytime.