How To Threat Hunt for Malicious Account Usage Using the Windows Event Logs

Поделиться
HTML-код
  • Опубликовано: 4 ноя 2024

Комментарии • 5

  • @aprilmeowmeow
    @aprilmeowmeow Год назад

    honestly, I'm not a net security professional or anything, I just find this interesting. thanks for the videos!

  • @hassnainjaved7399
    @hassnainjaved7399 2 года назад +1

    Need more videos like this

  • @JusticeOfHeart
    @JusticeOfHeart Год назад

    What if I want to do daily hunt for failed login activity for my organization:
    1. Will such hunt be useful?
    2. What event log do I need in addition to 4625, 4776? Mb also 4771?
    3. What do I need to look in?
    Today I just look for a following:
    - multiple failed logins for one user
    - failed logins multiple users from one source
    - failed logins multiple users that do not exists
    - failed logins where reason is locked out users
    - logon type 4 - schedule tasks failed logins
    - logon type 5 - service failed logins
    - logon type 10 - RDP failed logins