Attacker on Kali Linux launches an Nmap service version scan targeting the Windows 10 victim machine on the isolated VMnet2 network.
Nmap sends TCP SYN packets across all ports probing for open services. Each packet hits Windows 10 generating network events.
Windows 10 receives the port probes. Sysmon (with SwiftOnSecurity ruleset) detects the unusual network connection patterns and logs Event ID 3 — Network Connection events.
Wazuh Agent running on Windows 10 collects Sysmon events and Windows Event Logs in real-time and forwards them to the Wazuh Manager at 192.168.100.40.
Wazuh Manager processes incoming logs against its ruleset. The high volume of connection attempts from a single source IP triggers port scan detection rules.
SOC analyst opens Wazuh dashboard, identifies the alert spike, correlates source IP, checks MITRE ATT&CK mapping, and documents findings in an incident report.