# Security Monitoring & SIEM Fundamentals

The capacity to accurately pinpoint high-risk events is what distinguishes SIEM from other network monitoring and detection tools, such as Intrusion Prevention Systems (IPS) or Intrusion Detection Systems (IDS).

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FuTgJCknKKdLm21uYoGY0%2Felastic.png?alt=media&#x26;token=b78a9f51-3443-4760-b6bd-3124b8d6f25b" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2F0yrsvyyeySnrzcMvmvtA%2Felastic1.png?alt=media&#x26;token=8b335ac8-6a14-46ba-bdb4-e426024b7d69" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FszRObCbiwdaWTHInSujO%2Fbeats1.png?alt=media&#x26;token=b09d86e4-abf9-42ac-9eb5-3ad28d64c74b" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FlWrgbkKsMUzuLwOeZejX%2Fbeats2.png?alt=media&#x26;token=5ff57008-d6a6-4af3-826b-97c336654757" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FDU0gTRQkZfw95mVs6omP%2Fdiscover.png?alt=media&#x26;token=63005082-9dba-40fb-be19-3dd540141695" alt=""><figcaption></figcaption></figure></div>

* event.code:4625
* event.code:4625 AND winlog.event\_data.SubStatus:0xC0000072
  * SubStatus value of 0xC0000072&#x20;
    * indicates that the account is currently disabled
* event.code:4625 AND winlog.event\_data.SubStatus:0xC0000072 AND @timestamp >= "2023-03-03T00:00:00.000Z" AND @timestamp <= "2023-03-06T23:59:59.999Z"
* event.code:4625 AND user.name: admin\*

{% embed url="<https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4625>" %}

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FJ3PbtaR9vO4OPke6kD8O%2Fdiscover1.png?alt=media&#x26;token=d574ddfc-a9a7-40a7-890b-89b292c13d1a" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FcSDe3wA1iWEUIeVs4x2j%2Fdiscover2.png?alt=media&#x26;token=776a7699-2ccc-4d61-b6d0-6896862ada10" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FGuZbbg60n7ysAZJ2bu26%2Fimage.png?alt=media&#x26;token=c7e25cec-dbc6-461d-b5cb-98dc42bca381" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FPcaNM6umadtS7KLZnzMx%2Fimage.png?alt=media&#x26;token=dadf2303-42db-46fe-9f2c-9f1803dc2d57" alt=""><figcaption></figcaption></figure></div>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FooXhxe17xJGw2t7qupLX%2Fimage.png?alt=media&#x26;token=76019398-24d5-4695-897a-79cdb93ae59f" alt=""><figcaption></figcaption></figure>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2Fp9zH9R4ukKUxrXj61GvL%2Fimage.png?alt=media&#x26;token=156a5dc8-d447-46c1-af3d-3a36f4dc1477" alt=""><figcaption></figcaption></figure></div>

Now before I move on, have to finish this:

* [ ] [Elastic Common Schema (ECS)](https://www.elastic.co/guide/en/ecs/current/ecs-reference.html)
* [ ] [Elastic Common Schema (ECS) event fields](https://www.elastic.co/guide/en/ecs/current/ecs-event.html)

{% embed url="<https://www.elastic.co/guide/index.html>" %}

A Security Operations Center (SOC) is an essential facility that houses a team of information security experts responsible for continuously monitoring and evaluating an organization's security status.&#x20;

The main objective of a SOC team is to identify, examine, and address cybersecurity incidents by employing a mix of technology solutions and a comprehensive set of procedures.

The [MITRE ATT\&CK](https://attack.mitre.org/) (Adversarial Tactics, Techniques, and Common Knowledge) framework serves as an extensive, regularly updated resource outlining the tactics, techniques, and procedures (TTPs) employed by cyber threat actors.

MITRE ATT\&CK framework is an indispensable asset for security operations, offering a shared language and structure for describing and understanding adversarial behavior. It is vital for enhancing various aspects of security operations, from threat intelligence and behavioral analytics to SOC maturity assessment and cyber threat intelligence enrichment.

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2Ffat8Hgo4BLL55LEdJrRH%2Fusecase1.png?alt=media&#x26;token=153582dd-68bd-4233-96dc-4520dc91f143" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FydCHVCfZoc1OW6833ZQF%2Fusecase2.png?alt=media&#x26;token=b02a1819-5a45-498a-8c19-74a73f917df5" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2F30qX05tKeKaOOYUojxUU%2Fus1.png?alt=media&#x26;token=5b07ec0c-4c04-4c98-af8a-fa014f7cd4f8" alt=""><figcaption></figcaption></figure></div>

{% embed url="<https://blog.talosintelligence.com/building-bypass-with-msbuild/>" %}

{% embed url="<https://www.cynet.com/attack-techniques-hands-on/what-are-lolbins-and-how-do-attackers-use-them-in-fileless-attacks/>" %}

When creating an SOP and documenting alert handling, consider the following:

1. process.name
2. process.parent.name
3. event.action
4. machine where the alert was detected
5. user associated with the machine
6. user activity within +/- 2 days of the alert's generation
7. After gathering this information, defenders should engage with the user and examine the user's machine to analyze system logs, antivirus logs, and proxy logs from the SIEM for full visibility.

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FpydYYbSJ5LU7Z75v6z9e%2Fvisualization29.png?alt=media&#x26;token=28c9fca5-8674-4ce6-9afe-839a035b83da" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2F9u32Fwpc8xDgVfxogJQb%2Fdashboard.png?alt=media&#x26;token=211cb314-4448-48ba-a4b7-af9cd820500b" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FV7cxqx4sIjSbHlhF4mh9%2Fvisualization.png?alt=media&#x26;token=1c479980-e9d9-4277-bfd7-14f42c3c84a0" alt=""><figcaption></figcaption></figure></div>

specify the date range as "last 15 years"

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FMbaJrJVEZbQxFVMr4mjB%2Fvisualization1.png?alt=media&#x26;token=ba58ef36-5662-4d32-9f5c-cb9d2871d7a3" alt=""><figcaption></figcaption></figure></div>

&#x20;we can use a filter to only consider needed event IDs that match what yo need

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FRDAzbZzlMN2tN7mPGV9Q%2Fvisualization2.png?alt=media&#x26;token=3cac171e-2389-4495-bb7d-a0aa942bfa01" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FxnIbMVSaP4uVtnWJfo1F%2Fvisualization11.png?alt=media&#x26;token=ff4578db-3a66-45b4-ad5f-e54e5e185ee7" alt=""><figcaption></figcaption></figure></div>

We should use the .keyword field when it comes to aggregations. Please refer to this stackoverflow question for a more elaborate answer.

{% embed url="<https://stackoverflow.com/questions/48869795/difference-between-a-field-and-the-field-keyword>" %}

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FgpVatQkmLMDfZxz9NUwz%2Fvisualization4.png?alt=media&#x26;token=422615dd-8dce-41b5-b9f7-97b6eb7f73de" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FCk502ZM1T8OtKveb0anr%2Fvisualization5.png?alt=media&#x26;token=fcc2c949-cfe5-48ba-a60b-c0eae684419d" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FAP5pi0USPMrA2d0Qfv9M%2Fvisualization6.png?alt=media&#x26;token=768eb3c8-c650-4877-9983-ded8ad11975a" alt=""><figcaption></figcaption></figure></div>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FbP5vsfHbRuTFv72MeGdI%2Fvisualization7.png?alt=media&#x26;token=18a0ba9c-8a78-4ecf-a3ca-d3cad77ba4ee" alt=""><figcaption></figcaption></figure>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FroHOPAuniRbLt7CX8Tsr%2Fvisualization13.png?alt=media&#x26;token=90909bc3-0069-44dd-bb18-96e7c2bfdade" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FCmBpMILI1RADAibVLGq0%2Fvisualization15.png?alt=media&#x26;token=35a4f688-3a25-42c0-b492-7bad00a08211" alt=""><figcaption></figcaption></figure></div>

{% embed url="<https://learn.microsoft.com/en-us/azure/active-directory/architecture/service-accounts-computer>" %}

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FUYwHDFi0wpdxQhQKnizr%2Fvisualization16.png?alt=media&#x26;token=231036dd-02a5-41ec-a7c2-21a34af3a423" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FRPVpLMXpAFIGDnwP5wTv%2Fvisualization18.png?alt=media&#x26;token=0c1369c8-0d3f-4496-ac3b-c9816ece5391" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FyPIUnWKEypVJzv0qMDOO%2Fvisualization19.png?alt=media&#x26;token=acd5ec49-b5c9-411d-b23d-dcde76698a56" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FfwvSgaBE3F8fKld4TvUB%2Fvisualization17.png?alt=media&#x26;token=6ef1817a-68b5-46f9-a5bf-0f5b421c551f" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FaqKmmUsZnVApbq7DphtT%2Fvisualization20.png?alt=media&#x26;token=e32ef44c-93cb-4f0b-aafd-75decdbe51e7" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2Fr8hVa4GpzG3tMh1JhdO8%2Fvisualization21.png?alt=media&#x26;token=21d667fd-0027-4b6c-be8f-2f4c6a0f346c" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FMSaodMRavzASCz4uFjsh%2Fvisualization22.png?alt=media&#x26;token=6b65ace6-1173-4367-856a-da1648406b80" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2F5DPljY8RuZOhMjeXU6IV%2Fvisualization23.png?alt=media&#x26;token=d750d5f7-4b90-4803-b916-5f6318daec9d" alt=""><figcaption></figcaption></figure></div>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FP6IDSYCKRj930G4zWps0%2Fvisualization25.png?alt=media&#x26;token=32cd2bf3-fd47-455a-9fc1-34ae9dc98bcb" alt=""><figcaption></figcaption></figure>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2Fkb9k5CSytV6nfr84mQax%2Fvisualization24.png?alt=media&#x26;token=21548501-e500-491b-b18a-138df27bd03b" alt=""><figcaption></figcaption></figure></div>

Computer accounts can be excluded by specifying the following KQL query and clicking on the "Update" button.

```shell-session
NOT user.name: *$ AND winlog.channel.keyword: Security
```

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FJpLMgGAuxaIHajte0y4H%2Fvisualization34.png?alt=media&#x26;token=e0d26eb9-7880-4a09-92fa-7d2bfb14b758" alt=""><figcaption></figcaption></figure></div>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FsCRaP6cHxOBxlKIBlTxa%2Fvisualization35.png?alt=media&#x26;token=718e6587-1734-435f-9f96-f0b11877a962" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FcsHXs74XSzdGYPsrtMbQ%2Fvisualization36.png?alt=media&#x26;token=7ab432b7-9f55-447a-aeed-c4ed9ad89813" alt=""><figcaption></figcaption></figure>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2F6Nm9bBclsR4PEe1083fW%2Fimage.png?alt=media&#x26;token=87368855-a750-4e66-aa17-affe9466fa9b" alt=""><figcaption></figcaption></figure></div>

SubStatus value of 0xC0000072

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FeiyxWehkSlB6tjgqabo7%2Fvisualization16.png?alt=media&#x26;token=29cf0421-a0a0-4080-920f-c3c60ebfa90b" alt=""><figcaption><p>"Create visualization"</p></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FRrG1LsDsNxt0qduPeO6V%2Fvisualization1.png?alt=media&#x26;token=151735f2-c241-483c-a39d-0a5a6dcd1baf" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FeJljnP1ysBgjj8rqkOZi%2Fimage.png?alt=media&#x26;token=a78aa770-189b-4aad-bd86-939f9c3178c3" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2F4t6KXxBXLjdgg3nDmvtc%2Fimage.png?alt=media&#x26;token=390a9101-f921-465d-aa8d-9df94c512c44" alt=""><figcaption><p>4625 – Failed logon attempt on a Windows system</p></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FxxZn3KxNtQhbv2o0pwQG%2Fimage.png?alt=media&#x26;token=bcde61c7-8004-4f41-a9d8-0cbf04d2d4bf" alt=""><figcaption><p>SubStatus (<code>winlog.event_data.SubStatus</code> field) that indicates, when set to 0xC0000072, that the failure is due to a logon with disabled user.</p></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FiFdEVx0iWTeUdRkk6rDl%2Fvisualization11.png?alt=media&#x26;token=2bb826c2-6582-4ca9-9536-413e5c2d30d7" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FKKJpcn0vUrKDrueuDhdY%2Fvisualization4.png?alt=media&#x26;token=91149886-65b8-4a3c-81b8-af7431b4cbac" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FGogKvWJABLtLkurDNGtz%2Fvisualization5.png?alt=media&#x26;token=54ba7e89-a1c0-4a7e-97a3-d1e11e8fb881" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FNJF6BxVmhCXJm2YpeBDB%2Fvisualization6.png?alt=media&#x26;token=53e37ebb-8749-494f-ae98-d68a967411b4" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FZHv8apDHUzTH5XS4yWHP%2Fvisualization7.png?alt=media&#x26;token=cafb51aa-d5c4-421a-8249-49b23c0c636b" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FbpaznngT9I2BBdEyXvrR%2Fvisualization8.png?alt=media&#x26;token=b7005c66-889a-41c8-aad2-6bec9e36248c" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2F5UtqJ3GX04LJcWXq6tRL%2Fvisualization31.png?alt=media&#x26;token=e2b18875-f73e-49fa-8fe3-8cd60108e180" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FqTj3G9PIyclGtlNQosu5%2Fimage.png?alt=media&#x26;token=c0841078-4101-48d2-b68c-15de3741389f" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2Fi6EV79314oHh3sPL9UmX%2Fimage.png?alt=media&#x26;token=52763278-92ee-4f6f-8cbe-4c5ef14192a7" alt=""><figcaption></figcaption></figure>

Service account credentials are never used for RDP logons in corporate/real-world environments. all service accounts on the environment start with `svc-`

{% embed url="<https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4624>" %}

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FSi0UTaWcF1VBtPjQo2Yf%2Fvisualization16.png?alt=media&#x26;token=54f07143-5803-4fe6-80a1-5a28ff0c04dd" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2Fx021Lym1XQaLFx9AOmPy%2Fimage.png?alt=media&#x26;token=399c0459-dd31-4a54-ad46-a3579e1ca4b9" alt=""><figcaption></figcaption></figure></div>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2F1aDRhuXBLqKpj60wnz0J%2Fvisualization1.png?alt=media&#x26;token=67bd89fd-0a6e-493d-8196-d9e73f7a13d1" alt=""><figcaption></figcaption></figure>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FBknC6skCybI07s5PKM5c%2Fvisualization38.png?alt=media&#x26;token=49d76e14-7134-4ce1-b596-bc6848db432b" alt=""><figcaption><p>4624 – An account was successfully logged</p></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FAd1NbQGpYSHctl1qbxJP%2Fvisualization39.png?alt=media&#x26;token=1dd87243-3387-48b1-b773-03ff7fc33704" alt=""><figcaption><p>logon type which should be <code>RemoteInteractive</code> (<code>winlog.logon.type</code> field).</p></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FVXDCcskZqDaod8T6EW3u%2Fimage.png?alt=media&#x26;token=d4f51f09-8d78-41cd-b581-47953b1d7159" alt=""><figcaption></figcaption></figure></div>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2F2tUoNKpPxutnWMtsVG5d%2Fvisualization5.png?alt=media&#x26;token=1bb0bc4f-c21a-46df-8c23-e9a0112479b4" alt=""><figcaption></figcaption></figure></div>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2F6KhypmvWroeknWcCRlo1%2Fvisualization7.png?alt=media&#x26;token=21c4a5c6-d2db-4c59-b815-e65cda1d2233" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FVRgI5JHUvbYSVeNHAUmd%2Fvisualization8.png?alt=media&#x26;token=8f0b133a-9063-4c60-bcf4-70546279b5d2" alt=""><figcaption></figcaption></figure>

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FnZE86dbZPdofoVW9BhF3%2Fimage.png?alt=media&#x26;token=f3f8994e-8cc2-430e-8efe-140a820157d4" alt=""><figcaption></figcaption></figure></div>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FQhJ3wleQih87b6Apryp1%2Fvisualization40.png?alt=media&#x26;token=97d812dd-00b0-4e4f-bfb9-a005d84acdd7" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FH7o3i3sk5T7hpo5wqwmK%2Fvisualization41.png?alt=media&#x26;token=41de6f9e-e134-46c0-b4a8-c86d73f8c717" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2F3b1sXOJ4zGsQ5G0R3OQB%2Fimage.png?alt=media&#x26;token=ba3c6f8e-a073-4cc7-9522-c5133055210a" alt=""><figcaption><p>don't use the <code>.keyword</code> field in KQL queries.</p></figcaption></figure>

```shell-session
user.name: svc-*
```

1. The service account whose credentials generated the successful RDP logon attempt event.
2. The machine on which the logon attempt occurred.
3. The IP of the machine that initiated the logon attempt.
4. The number of times the event has occurred (based on the specified time frame or the entire data set, depending on the settings).

click on "Save and return", and you will observe that the new visualization is added to the dashboard.

{% embed url="<https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4732>" %}

{% embed url="<https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4733>" %}

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FDt4tCYflACyTR1rzK3Ex%2Fvisualization16.png?alt=media&#x26;token=768d61e5-297c-47c7-8d89-8b8c6cd39a65" alt=""><figcaption></figcaption></figure></div>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FlLxKK26ygeLpqOFAIJJb%2Fvisualization44.png?alt=media&#x26;token=01187cc6-b204-474a-804f-d2327e78e5cd" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FHvrnswngOMpf3olNZLKv%2Fvisualization11.png?alt=media&#x26;token=189d4596-bfa9-4d94-b7f4-367db0f4a47a" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FuibgEIvKaP7fZbEyXET7%2Fvisualization6.png?alt=media&#x26;token=a2f75162-2ce5-455f-947f-7d0457f380d0" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FmQmxx9UUsHtK0Y7MddVi%2Fvisualization7.png?alt=media&#x26;token=c0dadd8a-e2f4-4dc9-a442-4cf9bfb00df4" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2Ffv1AO56tk6fGUVZKLYvL%2Fvisualization8.png?alt=media&#x26;token=c4d2e31b-196e-4bc3-a3de-6c559ba1b9bd" alt=""><figcaption></figcaption></figure>

* Which user was added to or removed from the group? (`winlog.event_data.MemberSid.keyword` field)
* To which group was the addition or the removal performed? (double-checking that it is the "Administrators" one) (`group.name.keyword` field)
* Was the user added to or removed from the group? (`event.action.keyword` field)
* On which machine did the action occur? (`host.name.keyword` field)

<div data-full-width="true"><figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FZuEAMYyaX6UYnLDiDSPD%2Fimage.png?alt=media&#x26;token=2d12ce91-424f-48f0-917e-f3c0d0d4e746" alt=""><figcaption></figcaption></figure></div>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FVbX9hLSupLd7ss4gSEPP%2Fvisualization47.png?alt=media&#x26;token=17007e59-c142-42b9-a52f-0e0ae3d74ece" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FUwQPX1i4y3QURpOE98j0%2Fvisualization48.png?alt=media&#x26;token=54e41a63-1f8e-41b9-92b4-809d430dab73" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2FqegnYzgKa3rwO3XKkHFW%2Fvisualization50.png?alt=media&#x26;token=9b919bd8-580f-439f-972c-2e0f601ac673" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2343629885-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtRrk9VAktaigFmSOtT8J%2Fuploads%2Ffugc4xPRvxejsfUV1gge%2Fimage.png?alt=media&#x26;token=37ac43b0-17cc-49f0-9663-4c29830df6c3" alt=""><figcaption></figcaption></figure>

1. `Initial Alert Review`:

* Thoroughly review the initial alert, including metadata, timestamp, source IP, destination IP, affected systems, and triggering rule/signature.
* Analyze associated logs (network traffic, system, application) to understand the alert's context.

2. `Alert Classification`:

* Classify the alert based on severity, impact, and urgency using the organization's predefined classification system.

3. `Alert Correlation`:

* Cross-reference the alert with related alerts, events, or incidents to identify patterns, similarities, or potential indicators of compromise (IOCs).
* Query the SIEM or log management system to gather relevant log data.
* Leverage threat intelligence feeds to check for known attack patterns or malware signatures.

4. `Enrichment of Alert Data`:

* Gather additional information to enrich the alert data and gain context:
  * Collect network packet captures, memory dumps, or file samples associated with the alert.
  * Utilize external threat intelligence sources, open-source tools, or sandboxes to analyze suspicious files, URLs, or IP addresses.
  * Conduct reconnaissance of affected systems for anomalies (network connections, processes, file modifications).

5. `Risk Assessment`:

* Evaluate the potential risk and impact to critical assets, data, or infrastructure:
  * Consider the value of affected systems, sensitivity of data, compliance requirements, and regulatory implications.
  * Determine likelihood of a successful attack or potential lateral movement.

6. `Contextual Analysis`:

* The analyst considers the context surrounding the alert, including the affected assets, their criticality, and the sensitivity of the data they handle.
* They evaluate the security controls in place, such as firewalls, intrusion detection/prevention systems, and endpoint protection solutions, to determine if the alert indicates a potential control failure or evasion technique.
* The analyst assesses the relevant compliance requirements, industry regulations, and contractual obligations to understand the implications of the alert on the organization's legal and regulatory compliance posture.

7. `Incident Response Planning`:

* Initiate an incident response plan if the alert is significant:
  * Document alert details, affected systems, observed behaviors, potential IOCs, and enrichment data.
  * Assign incident response team members with defined roles and responsibilities.
  * Coordinate with other teams (network operations, system administrators, vendors) as necessary.

8. `Consultation with IT Operations`:

* Assess the need for additional context or missing information by consulting with IT operations or relevant departments:
  * Engage in discussions or meetings to gather insights on the affected systems, recent changes, or ongoing maintenance activities.
  * Collaborate to understand any known issues, misconfigurations, or network changes that could potentially generate false-positive alerts.
  * Gain a holistic understanding of the environment and any non-malicious activities that might have triggered the alert.
  * Document the insights and information obtained during the consultation.

9. `Response Execution`:

* Based on the alert review, risk assessment, and consultation, determine the appropriate response actions.
* If the additional context resolves the alert or identifies it as a non-malicious event, take necessary actions without escalation.
* If the alert still indicates potential security concerns or requires further investigation, proceed with the incident response actions.

10. `Escalation`:

* Identify triggers for escalation based on organization's policies and alert severity:
  * Triggers may include compromise of critical systems/assets, ongoing attacks, unfamiliar/sophisticated techniques, widespread impact, or insider threats.
* Assess the alert against escalation triggers, considering potential consequences if not escalated.
* Follow internal escalation process, notifying higher-level teams/management responsible for incident response.
* Provide comprehensive alert summary, severity, potential impact, enrichment data, and risk assessment.
* Document all communication related to escalation.
* In some cases, escalate to external entities (law enforcement, incident response providers, CERTs) based on legal/regulatory requirements.

11. `Continuous Monitoring`:

* Continuously monitor the situation and incident response progress.
* Maintain open communication with escalated teams, providing updates on developments, findings, or changes in severity/impact.
* Collaborate closely with escalated teams for a coordinated response.

12. `De-escalation`:

* Evaluate the need for de-escalation as the incident response progresses and the situation is under control.
* De-escalate when the risk is mitigated, incident is contained, and further escalation is unnecessary.
* Notify relevant parties, providing a summary of actions taken, outcomes, and lessons learned.

Regularly review and update the process, aligning it with organizational policies, procedures, and guidelines. Adapt the process to address emerging threats and evolving needs.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://purplebyteone.gitbook.io/index/notes/education/base/purple-team/htb/htb-academy/job-role-path/soc-analyst/security-monitoring-and-siem-fundamentals.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
