Enhanced Logging for Better Visibility

Technical Brief: Log Validation

Technical Use Case for Log Validation

This use case helps SOC teams in identifying:

  • Missed logs that are due to unadressed threats on the prevention layer

  • Which security control has blocked a threat a multi-layered defense

  • Persistently low scoring setups in providing prevention

  • Unexpected logging content that may be due to an uninformed operational change(policy change on a defense technology)

  • New log sources deployed in networks

Talk to an Expert: Schedule a Demo

Security controls can fail to detect adversarial techniques, especially those specifically designed to evade defenses. According to research from Picus Labs, four out of the ten most used MITRE ATT&CK techniques in 2019 fell in the defense evasion category. Such scenarios create blindspots for SOC teams as no logs generated by controls.

Changes applied by the operations teams, new configurations, or a newly deployed technology without orderly change management can also pose visibility challenges and result in inefficiencies in detecting incidents.

Monitoring and driving resilience on controls not only improve tangible metrics such as number of cases, alerts, incidents, risk or cost – and lower the SOC workload but also helps to identify blindspots early on.

Discover More: How to Enhance SIEM Log Management?



Easy to deploy, intelligence driven and feature-rich Picus Security Control Validation Platform makes sure that SOC teams maintain a well scoped and threat-aware log base that always covers changes in adversarial landscape and technology infrastructure.

Explore More