A centralized repository for building, governing, validating, and operationalizing a modern detection engineering program.
This repository serves as a one-stop location for:
- detection engineering strategy and program documentation
- detection-as-code content for Microsoft Sentinel
- validation, tuning, and lifecycle governance
- ATT&CK and Cyber Kill Chain coverage tracking
- analyst triage guidance and operational support
- executive reporting, planning, and maturity development
- future multi-platform expansion, including Splunk
Detection engineering is more than writing alert logic.
A mature program requires structure, repeatable workflows, quality standards, validation, operational triage support, and reporting that connects technical content to program outcomes. This repository is designed to support that full lifecycle, from idea to validated analytic to operational use.
This repository is currently centered on Microsoft Sentinel detection engineering and is being actively refined into a more governed, scalable detection engineering program.
Current priorities include:
- improving detection quality and consistency
- standardizing rule schema and metadata
- reducing duplicate and overlapping analytics
- strengthening analyst triage guidance
- improving ATT&CK alignment and lifecycle discipline
- organizing content for long-term maintainability
Planned future growth includes:
- expanded automation and validation workflows
- stronger deployment and reporting pipelines
- additional platform support such as Splunk
- shared governance and reporting across security platforms
Detection content is organized as code and grouped by tactic under detections/sentinel/.
Current tactic areas include:
- browser
- collection
- command-and-control
- credential-access
- defense-evasion
- discovery
- execution
- exfiltration
- impact
- initial-access
- lateral-movement
- persistence
- privilege-escalation
- reconnaissance
- resource-development
- deprecated
Analyst-facing triage content is maintained under content/triage-guides/ and is intended to support consistent investigation, escalation, and response.
Governance content defines the standards used to maintain quality and consistency across the repository, including naming, severity, lifecycle, tagging, and rule quality expectations.
The docs/ structure supports executive communication, strategy, process, reporting, and visual program artifacts.
Use these documents for program intent, operating model, roadmap, and reporting:
- Executive Documents
- Program Charter
- Roadmap
- Mission
- Scope
- Maturity Model
- Metrics Catalog
- Quarterly Program Review Template
- Annual Roadmap Review
- Gap Analysis
Use these resources to build, review, validate, and maintain detection content:
- Detections
- Governance
- Documentation Hub
- Detection Lifecycle
- QA and Validation Standard
- Tuning Standard
- Detection Rule Template
- Validation Checklist
Use these resources for investigation, escalation, and operational alignment:
- Triage Guides
- SOC and Incident Response Alignment
- Alert Escalation Guidance
- Detection Feedback Loop
- Coverage
The Sentinel detection catalog has undergone a broad cleanup and normalization effort to improve quality, consistency, and maintainability.
This work included:
- reviewing rules for duplicate titles and duplicate IDs
- identifying overlapping or near-duplicate analytics
- cleaning up inconsistent metadata and ATT&CK mappings
- improving weak or overly broad logic
- converting older or package-style rules into a more consistent repository schema
- aligning detections with stronger triage guidance
- separating foundational broad analytics from narrower companion detections
- retaining stronger modern rules while retiring or demoting weaker legacy duplicates
This effort covered content across all major Sentinel tactic folders, including:
- collection
- command-and-control
- credential-access
- defense-evasion
- discovery
- execution
- exfiltration
- impact
- initial-access
- lateral-movement
- persistence
- privilege-escalation
- reconnaissance
- resource-development
Key outcomes of this cleanup include:
- cleaner rule placement by tactic
- fewer duplicate and near-duplicate detections
- more consistent schema and metadata
- improved ATT&CK alignment
- stronger triage and validation sections
- clearer lifecycle progression from experimental to production
- better separation between active, specialized, and deprecated content
Triage content has also been reviewed and expanded to better support analyst workflows.
Updated guides are being rewritten into a fuller analyst-playbook style that emphasizes:
- why the alert matters
- what the detection is looking for
- initial triage questions
- key fields to review
- step-by-step investigation guidance
- common benign explanations
- escalation criteria
- response actions
- analyst notes
This is intended to improve operational consistency and make the repository more useful to analysts, responders, and detection engineers alike.
Detection content should move through a controlled lifecycle:
experimentaltestingproductiondeprecated
Lifecycle progression should reflect validation quality, operational usefulness, tuning maturity, and analyst confidence.
See:
docs/— executive artifacts, strategy, process, visuals, and reportingdetections/— detection content managed as codecontent/— templates, triage guides, and reusable operational contentgovernance/— naming, severity, lifecycle, tagging, and quality standardscoverage/— ATT&CK and Cyber Kill Chain coverage trackingautomation/— scripts, schemas, and deployment helperstests/— validation support and testing references.github/— workflows, templates, and contribution support
Core program artifacts are located in docs/executive/:
All content should be version controlled, reviewed, and validated before promotion.
Recommended flow:
- Submit a request or change
- Review metadata, mapping, and quality
- Validate logic and operational usefulness
- Document tuning or triage considerations
- Merge through pull request review
- Promote through lifecycle stages
See:
The long-term goal of this repository is to support a mature, scalable detection engineering program with:
- governed detection-as-code workflows
- operationally useful triage content
- measurable coverage tracking
- stronger validation and tuning discipline
- executive-ready reporting
- reusable standards that can extend beyond Sentinel into additional platforms
This repository is licensed under the MIT License. See LICENSE.