Endpoint Security Monitoring – Core Windows Processes on TryHackMe

This room taught me how to recognize and analyze the core Windows processes that run on a system. I explored the legitimate functions of processes like lsass.exe, svchost.exe, and explorer.exe, while also learning how attackers abuse them for malicious purposes. It was a balance between understanding normal behavior and spotting red flags.

I came away with a sharper eye for identifying suspicious activity in Windows environments. The exercises helped me practice distinguishing legitimate processes from look-alikes or injected code, which is a key skill for detecting endpoint compromise in real-world investigations.