It's 2 AM. An EDR alert fires.
"Multiple failed logon attempts followed by successful logon. Account: jsmith. Source workstation: ATTACKER-PC. Time window: 47 seconds."
You open the Windows Event Viewer. You export 187 events. You stare at the screen. Was this a real brute force? Was it the user fat-fingering their password three times before getting it right? Was it a password spray that finally hit?
The difference matters. Get it wrong and you either over-escalate (annoy the user, page IR for nothing) or under-react (miss the lateral movement that's already underway in events you haven't looked at yet).
This is the kind of triage every SOC analyst does dozens of times a month. Most of us still do it manually. Or with a clunky Excel pivot. Or by writing a Splunk query we'll never reuse.
I built a free, browser-only tool to make this 5 minutes instead of 30.
What it actually does
Windows Event Log Analyser takes raw Windows event log data — Event Viewer paste, security log text, plain text dump — and within seconds gives you a structured verdict with MITRE ATT&CK mapping.
In testing with a realistic brute-force-followed-by-lateral-movement scenario, the analyser produced 4 findings in under 2 seconds:
-
CRITICAL — Brute Force — Credential Compromise Confirmed — flags clusters of 4625 (failed logon) followed by 4624 (successful logon) from the same source within the brute-force window. →
T1110 — Brute Force -
CRITICAL — Lateral Movement Chain — correlates remote logon (4624 Type 3) with privileged session creation (4672) on the same host. →
T1021 — Remote Services -
CRITICAL — Security Log Cleared — flags 1102 events: log clearing is almost always malicious. →
T1070.001 — Clear Windows Event Logs -
HIGH — New Service Installed — flags 7045 service installation events, prompting binary-path inspection. →
T1543.003 — Windows Service
All of it runs in your browser. Your event log data never leaves your machine. No upload, no signup, no account.
Try it with the example scenario
The fastest way to see how it works:
- Open socworkflows.com/wel
- Paste a realistic chain: 5 failed logons (Event ID 4625) → 1 successful logon (4624) → service install (7045) → privileged session (4672) → log clearing (1102)
- Click Run Analysis
- Get structured findings in ~2 seconds: High Risk verdict, 4 findings, MITRE technique mapping, full event timeline
The output includes a "Copy as Incident Note" button that produces a ticket-ready markdown summary, plus prompts pre-built for ChatGPT or Claude if you want to push deeper analysis to an LLM.
What it does NOT do (because I should be honest)
This isn't a replacement for your SIEM. It does NOT:
- Process millions of events at scale (it's designed for 50-500 events — the kind you'd manually export from Event Viewer for a single investigation)
- Connect to your environment in real-time
- Persist data across sessions (close the tab, the analysis is gone)
- Replace correlation with EDR telemetry, network logs, and identity context
It's a triage aid, not a SIEM. The use case is the moment when you're staring at exported event logs and need structure fast.
Why browser-only (the privacy moat)
Most online tools for event log analysis upload your data to a server. For SOC analysts, that's often a non-starter:
- Compliance teams hate it (GDPR, HIPAA, internal policy)
- Even non-sensitive logs may contain hostnames, usernames, IPs that shouldn't leave the environment
- Some orgs have policies forbidding paste of any internal data into third-party web tools
This tool runs the entire analysis in your browser using JavaScript. The "Network" tab in your devtools will show you: zero outbound requests with your event log content. Verify it yourself.
This isn't a feature I added. It's the product thesis. SOC tools should not make your data their data.
How the analyser works (the 30-second version)
- Paste raw event log data (Event Viewer export, security log text, console copy)
- Parse — extracts Event ID, Source, Account Name, Computer, Time, Process Information, Source IP
- Pattern match against known brute force, lateral movement, persistence, and defense evasion signatures
- Score by severity and confidence
- Output structured findings with MITRE mapping + recommended actions
A few hundred lines of JavaScript. No AI magic. Just pattern matching applied consistently — which is exactly what tired SOC analysts at 2 AM can't reliably do by hand.
When to use it vs your SIEM
| Scenario | Use the SIEM | Use this tool |
|---|---|---|
| Real-time monitoring | ✅ | ❌ |
| Ad-hoc investigation of 50-500 events | Sometimes (queries are slow) | ✅ |
| Quick verdict on an exported log block | Overkill | ✅ |
| Long-term retention and search | ✅ | ❌ |
| Browser-only / privacy-sensitive triage | ❌ | ✅ |
| MITRE-mapped, incident-note-ready output in 30 seconds | Doable but takes time | ✅ |
This tool is for the moment between alert and verdict — not for the infrastructure that produced the alert.
What's next
Try it once on a real exported log block. If it saves you 20 minutes, that's the entire pitch.
- The tool: socworkflows.com/wel
- The rest of the analysers (Phishing, Credential Dumping, URL Analysis, AWS VPC Flow Logs, Ransomware Triage, SOC Alert Triage): socworkflows.com
If you're building or running a SOC, I'd love to hear what other specific triage workflows still waste your time. The next analyser I build will be based on what people tell me. Drop a comment with the log type or alert type that's currently making your 2 AM worse.
All 7 SOC.Workflows analysers are free, browser-only, and require no signup. Built by a SOC analyst, for SOC analysts.


Top comments (0)