User Access Logging (UAL) Forensics

Поделиться
HTML-код
  • Опубликовано: 13 янв 2025

Комментарии • 8

  • @regulator5
    @regulator5 3 года назад +9

    You have some of the best forensic content on RUclips. Keep up the good work

  • @MSUjgasmussen
    @MSUjgasmussen 3 года назад +2

    Thank you for this information! Great job as always! 👍

  • @chrisclark5135
    @chrisclark5135 3 года назад +1

    Fantastic as always! What can we do to get an episode a week?? Haha, just kidding, but I always appreciate your content! Thanks for sharing!

    • @13Cubed
      @13Cubed  3 года назад +1

      Thanks - I wish I had the time! My goal is 1 per month, but occasionally I can hit 2.

  • @Emilsurf
    @Emilsurf 3 года назад +1

    Great stuff!

  • @PajamaJumper
    @PajamaJumper 2 года назад +1

    “Access” is an interesting term here. Assuming evtx logs have been cleared and we are unable to correlate, does the presence of database entries imply that a successful connection was made? Or do “attempts” also get logged?

    • @13Cubed
      @13Cubed  2 года назад +1

      Doesn't necessarily indicate success -- just network connectivity being present between the hosts.

  • @melvindejesus1491
    @melvindejesus1491 2 года назад +1

    Thanks a lot.