SOC Monitoring · AI-Assisted Investigation
ENYRAX SOC
From raw alerts to correlated incidents, attack timeline, MITRE mapping and AI-generated response recommendations.
Open Incidents
12
3 critical / 5 high / 4 medium
Correlated Alerts
428
Grouped by IP, host and behavior
AI Confidence
91%
Evidence-backed decision output
MITRE Coverage
7
Techniques mapped in demo data
Hot Incidents
Suspicious SSH Brute Force Pattern
CRITICAL
Privilege Escalation After Successful Login
HIGH
Wazuh Agent Disconnected and Reconnected
MEDIUM
Attack Timeline
07:02
Multiple failed SSH login attempts from external IP.
07:04
Successful login detected after repeated failures.
07:05
Sudo command executed by newly authenticated session.
07:06
Agent heartbeat interruption observed on target host.
AI Decision Summary
The event chain suggests a potential credential-based intrusion followed by privilege escalation. Confidence is high because login failures, successful authentication and sudo execution occurred within the same short time window.
1. Temporarily block source IP at firewall layer.
2. Review successful login session and related commands.
3. Force password rotation for affected user account.
4. Preserve logs for incident timeline reconstruction.