Bias Analysis
Detected Bias Types
windows_tools
powershell_heavy
windows_first
missing_linux_example
Summary
The documentation page demonstrates a bias toward Windows environments and tooling. Examples and scenarios frequently reference Windows-specific alerts (e.g., Windows Error and Warning Events), PowerShell, and remote WMI execution, with no equivalent Linux or cross-platform examples provided. Windows tools and patterns (PowerShell, WMI) are mentioned exclusively or before any Linux alternatives. There is a lack of Linux-specific detection scenarios, such as those involving Linux audit logs, SSH, or common Linux malware. The documentation does not provide parity for Linux environments in its examples or guidance.
Recommendations
- Include Linux-specific detection scenarios, such as SSH brute force, suspicious sudo usage, or Linux malware alerts.
- Provide examples of multistage attack detection involving Linux hosts, such as correlating suspicious Linux process execution with network anomalies.
- Mention Linux equivalents to Windows tools (e.g., Bash scripts, auditd, syslog) in scenario descriptions.
- Add references to Linux data sources and connectors (e.g., Linux server logs, Linux endpoint protection solutions) in the Fusion configuration and scenario tables.
- Ensure that cross-platform environments are addressed in both examples and recommendations, not just Windows-centric ones.
Create Pull Request