Analyzes Windows Security, System, and Sysmon event logs in Splunk to detect authentication attacks, privilege escalation, persistence mechanisms, and lateral movement using SPL queries mapped to MITRE ATT&CK techniques. Use when SOC analysts need to investigate Windows-based threats, build detection queries, or perform forensic timeline analysis of Windows endpoints and domain controllers.
85
82%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
Quality
Discovery
100%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is an excellent skill description that clearly defines a specific domain (Windows security log analysis in Splunk), lists concrete capabilities (detecting authentication attacks, privilege escalation, persistence, lateral movement), and provides explicit trigger guidance for when to use it. The description is rich in natural trigger terms that SOC analysts would use and occupies a very distinct niche that minimizes conflict risk with other skills.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions: analyzes Windows Security/System/Sysmon event logs, detects authentication attacks/privilege escalation/persistence mechanisms/lateral movement, uses SPL queries mapped to MITRE ATT&CK techniques, builds detection queries, performs forensic timeline analysis. | 3 / 3 |
Completeness | Clearly answers both 'what' (analyzes Windows event logs in Splunk to detect various attack types using SPL queries mapped to MITRE ATT&CK) and 'when' (explicit 'Use when SOC analysts need to investigate Windows-based threats, build detection queries, or perform forensic timeline analysis'). | 3 / 3 |
Trigger Term Quality | Excellent coverage of natural terms a SOC analyst would use: 'Windows Security', 'Sysmon', 'Splunk', 'SPL queries', 'MITRE ATT&CK', 'authentication attacks', 'privilege escalation', 'lateral movement', 'persistence', 'forensic timeline', 'domain controllers', 'detection queries'. These are all terms practitioners naturally use. | 3 / 3 |
Distinctiveness Conflict Risk | Highly distinctive niche combining Windows event logs + Splunk + MITRE ATT&CK + specific attack categories. Very unlikely to conflict with other skills due to the specific combination of platform (Splunk), data source (Windows logs/Sysmon), and methodology (MITRE ATT&CK mapping). | 3 / 3 |
Total | 12 / 12 Passed |
Implementation
64%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This is a highly actionable skill with excellent, production-ready SPL queries covering major Windows threat detection categories mapped to MITRE ATT&CK. Its main weaknesses are verbosity (explaining tools and concepts Claude already knows, inline content that could be referenced), and the lack of validation/verification steps in the workflow — there's no guidance on tuning thresholds, verifying results, or handling false positives in what is fundamentally an investigative process.
Suggestions
Remove the 'Tools & Systems' section and trim the 'Key Concepts' table — Claude already knows what Splunk, Sysmon, and common event codes are. Keep only non-obvious mappings like Status code hex values.
Add validation checkpoints to the workflow: after each detection step, include guidance on verifying findings (e.g., 'Cross-reference brute force source IPs against known scanner lists', 'Validate new admin accounts against change management tickets').
Move the lookup CSV data, output format template, and 'Common Scenarios' detection hints into separate referenced files to reduce the main skill's token footprint.
Add a brief tuning note for thresholds (e.g., 'Adjust count > 20 based on environment baseline') since static thresholds without context can generate excessive false positives.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The skill is quite long (~250+ lines) with some sections that could be trimmed. The 'Tools & Systems' section explains what Splunk and Sysmon are (Claude knows this), and the 'Key Concepts' table explains basic event codes that are already evident from the queries themselves. However, the SPL queries themselves are dense and valuable, earning their token cost. | 2 / 3 |
Actionability | Excellent actionability — every detection category includes fully executable SPL queries that are copy-paste ready with real field names, event codes, and filtering logic. The queries include practical thresholds, eval statements for enrichment, and proper Splunk syntax. | 3 / 3 |
Workflow Clarity | The steps are clearly sequenced from authentication detection through forensic timeline building, which is logical. However, there are no validation checkpoints — no guidance on verifying query results are accurate, no feedback loops for tuning false positives, and no verification steps after building lookups or timelines. For a detection/investigation workflow, validation of findings is critical. | 2 / 3 |
Progressive Disclosure | The content is a monolithic document with all queries inline. The 'Common Scenarios' section lists additional ATT&CK techniques (Kerberoasting, DCSync, Golden Ticket) without providing their queries — these could be in a separate reference file. The lookup CSV data and the extensive output format template could also be split out to keep the main skill leaner. | 2 / 3 |
Total | 9 / 12 Passed |
Validation
90%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 10 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
Total | 10 / 11 Passed | |
888bbe4
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.