Detection Use Case Prioritization — What to Detect First¶
Document ID: UC-001
Version: 1.0
Last Updated: 2026-02-15
Prerequisite: SIEM installed, at least 3 log sources onboarded
The Problem¶
There are thousands of possible detection rules. You can't deploy them all at once. This guide tells you what to detect first based on real-world threat data and your available log sources.
The Framework: MITRE ATT&CK Top 10¶
Based on industry data (Mandiant M-Trends, Verizon DBIR, CrowdStrike threat reports), these are the most commonly used attack techniques:
| Rank | Technique | ID | What It Is | How Common |
|---|---|---|---|---|
| 1 | Phishing | T1566 | Malicious email (link/attachment) | 🔴🔴🔴 |
| 2 | Valid Accounts | T1078 | Stolen/compromised credentials | 🔴🔴🔴 |
| 3 | Command & Scripting | T1059 | PowerShell, cmd, bash abuse | 🔴🔴 |
| 4 | Brute Force | T1110 | Password guessing/spraying | 🔴🔴 |
| 5 | Data Encrypted (Ransomware) | T1486 | File encryption for ransom | 🔴🔴 |
| 6 | Remote Services | T1021 | RDP, SSH, SMB lateral movement | 🔴🔴 |
| 7 | Ingress Tool Transfer | T1105 | Download malware/tools | 🔴 |
| 8 | Web Application Exploit | T1190 | SQLi, RCE against web apps | 🔴 |
| 9 | Process Injection | T1055 | Living-off-the-land techniques | 🔴 |
| 10 | Account Manipulation | T1098 | Persistence via account changes | 🔴 |
Phase 1: Foundational Use Cases (Month 1–3)¶
Goal: Catch the most common and most impactful attacks.
Deploy These 10 Rules First¶
| # | Use Case | Log Source | Sigma Rule | Playbook | Priority |
|---|---|---|---|---|---|
| 1 | Multiple failed logins (brute force) | AD / Azure AD | win_multiple_failed_logins |
PB-04 | 🔴 P1 |
| 2 | Login from impossible location | Azure AD | cloud_impossible_travel |
PB-06 | 🔴 P1 |
| 3 | Office app spawns PowerShell | EDR / Sysmon | proc_office_spawn_powershell |
PB-01 | 🔴 P1 |
| 4 | Malware executed on endpoint | EDR | proc_temp_folder_execution |
PB-03 | 🔴 P1 |
| 5 | Bulk file rename (ransomware) | EDR / Sysmon | file_bulk_renaming_ransomware |
PB-02 | 🔴 P1 |
| 6 | New admin account created | AD | win_new_admin_account |
PB-07 | 🟡 P2 |
| 7 | Security log cleared | Windows | win_security_log_cleared |
PB-20 | 🟡 P2 |
| 8 | Login outside business hours | AD / Azure AD | cloud_unusual_login |
PB-05 | 🟡 P2 |
| 9 | Suspicious email forwarding rule | M365 | cloud_email_inbox_rule |
PB-17 | 🟡 P2 |
| 10 | Connection to known-bad IP | Firewall / Proxy | (custom rule) | PB-13 | 🟡 P2 |
Metrics to Track¶
- How many alerts per day? (Target: < 50 for 1 analyst)
- False positive rate? (Accept < 60% in Phase 1, tune to < 40%)
- Mean time from alert to triage? (Target: < 30 min)
Phase 2: Extended Coverage (Month 4–6)¶
Goal: Catch lateral movement, persistence, and cloud-specific threats.
Add These 10 Rules¶
| # | Use Case | Log Source | Playbook | Priority |
|---|---|---|---|---|
| 11 | Admin share access (lateral movement) | Sysmon/EDR | PB-12 | 🟡 P2 |
| 12 | Service installed (persistence) | Windows | PB-11 | 🟡 P2 |
| 13 | Encoded PowerShell execution | Sysmon | PB-11 | 🟡 P2 |
| 14 | DNS to suspicious TLD | DNS logs | PB-24 | 🟡 P2 |
| 15 | Large data upload (exfiltration) | Proxy / DLP | PB-08 | 🟡 P2 |
| 16 | Cloud IAM privilege escalation | CloudTrail / Azure | PB-16 | 🟡 P2 |
| 17 | Scheduled task created remotely | Sysmon | PB-12 | 🟢 P3 |
| 18 | Process injection (lsass.exe access) | Sysmon | PB-11 | 🟢 P3 |
| 19 | USB mass storage connected | EDR | PB-14 | 🟢 P3 |
| 20 | Failed MFA attempts (>5) | Azure AD | PB-26 | 🟢 P3 |
New Log Sources to Add¶
- DNS resolver logs
- Cloud audit logs (CloudTrail/Azure Activity)
- Proxy/web gateway logs
- DLP if available
Phase 3: Advanced Detection (Month 7–12)¶
Goal: Catch sophisticated, targeted attacks and insider threats.
Add These 10 Rules¶
| # | Use Case | Log Source | Playbook | Priority |
|---|---|---|---|---|
| 21 | Beaconing detection (regular intervals) | Proxy/NDR | PB-13 | 🟢 P3 |
| 22 | DNS tunneling (high-volume/long domains) | DNS | PB-24 | 🟢 P3 |
| 23 | S3/Blob made public | CloudTrail/Azure | PB-27 | 🟢 P3 |
| 24 | Shadow IT / unauthorized SaaS | Proxy/CASB | PB-29 | 🟢 P3 |
| 25 | Kerberoasting (SPN request anomaly) | AD | PB-15 | 🟢 P3 |
| 26 | DCSync (replication request) | AD | PB-15 | 🟢 P3 |
| 27 | Token/cookie theft (AiTM) | Azure AD | PB-26 | 🟢 P3 |
| 28 | DLL side-loading | EDR/Sysmon | PB-11 | ⚪ P4 |
| 29 | WMI remote execution | Sysmon | PB-12 | ⚪ P4 |
| 30 | OT/ICS protocol anomaly | OT network | PB-30 | ⚪ P4 |
Phase 4: Threat Hunting (Year 2+)¶
Move from alert-driven to hypothesis-driven detection:
| Hunt Hypothesis | Data Needed | Frequency |
|---|---|---|
| "Are there compromised service accounts?" | AD auth logs, UEBA | Monthly |
| "Is anyone beaconing to C2?" | Proxy + DNS statistical analysis | Weekly |
| "Are VPN credentials shared or stolen?" | VPN logs + geolocation | Monthly |
| "Is sensitive data leaving the network?" | DLP + proxy + cloud storage | Weekly |
| "Are there dormant admin accounts?" | AD account audit | Monthly |
| "Are there unknown web shells on servers?" | Filesystem scan + YARA | Monthly |
Use Case Template¶
When creating a new detection use case:
## UC-[###]: [Use Case Name]
### Objective
What are we trying to detect?
### MITRE ATT&CK
- Technique: T[####]
- Tactic: [Initial Access / Execution / Persistence / ...]
### Data Sources Required
- [ ] Source 1 (event IDs or log types)
- [ ] Source 2
### Detection Logic
### Playbook
Reference: PB-[##]
### False Positive Scenarios
- [Expected benign behavior that may trigger this]
- [How to filter/whitelist]
### Tuning Notes
- Threshold: [initial value]
- Whitelist: [IPs/users/hosts to exclude]
- Review after: [2 weeks of baseline data]
Coverage Heat Map¶
Track your detection coverage across MITRE tactics:
| Tactic | Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|---|
| Initial Access | ✅ | ✅ | ✅ | ✅ |
| Execution | ✅ | ✅ | ✅ | ✅ |
| Persistence | ⚠️ | ✅ | ✅ | ✅ |
| Privilege Escalation | ⚠️ | ✅ | ✅ | ✅ |
| Defense Evasion | ❌ | ⚠️ | ✅ | ✅ |
| Credential Access | ⚠️ | ⚠️ | ✅ | ✅ |
| Discovery | ❌ | ⚠️ | ⚠️ | ✅ |
| Lateral Movement | ❌ | ✅ | ✅ | ✅ |
| Collection | ❌ | ⚠️ | ✅ | ✅ |
| Exfiltration | ❌ | ⚠️ | ✅ | ✅ |
| Impact | ✅ | ✅ | ✅ | ✅ |
✅ = Covered | ⚠️ = Partial | ❌ = Not yet
Prioritization Scoring Formula¶
If you need to prioritize beyond this guide, score each use case:
Score = (Likelihood × 3) + (Impact × 3) + (Data Readiness × 2) + (Effort × 2)
Likelihood: 1 (rare) to 5 (happens weekly)
Impact: 1 (low) to 5 (business-critical)
Data Readiness: 1 (no data source) to 5 (data already in SIEM)
Effort: 1 (weeks to build) to 5 (deploy in hours)
Score range: 10-50 → Start with highest scoring use cases