Windows Logs
To watch out for indicators of compromise or indicators of attack.
Last updated
To watch out for indicators of compromise or indicators of attack.
Last updated
❗ Threat Detection with Windows Event Logs
Tactic
: Credential Access
Technique
: Brute Force
Often an attack will include the creation of a new user, followed by permissions being elevated to an admin level. In this video we show you how to use Splunk to find these accounts so that you can take action if needed.
Using Anti-Virus logs to detect if malware is recurring on a host after being removed.
Using Splunk with firewall logs to detect hosts that are running network and port scans.
Tactic
: Defense Evasion
Technique
: Indicator Removal on Host
Tactic
: Credential Access
Technique
: Account Manipulation