Categories: General

Detecting Lateral Movement with New Events in the Windows Server 2016 Security Log

Preventing attackers from gaining control of network endpoints is difficult. Your preventative controls might stop such an event, but defense-in-depth best practices recommend a multi-layered security approach to protect your organization.

In this webcast, Seth Goldhammer, director of product management at LogRhythm, joins Randy Franklin Smith, Windows Security subject matter expert, to discuss how to detect attackers in various stages of the Cyber Attack Lifecycle. The duo examines Windows Firewall events within Windows 10 and 2016, including:

  • 4798 — A user’s local group membership that was enumerated
  • 4799 — A security-enabled local group membership that was enumerated
  • 4627 — Group membership information
  • 6416 — A new external device that was recognized by the system

These are actions normal users don’t typically engage in, and they can be strong indicators of an intruder at work.

In this webcast, Randy and Seth show how LogRhythm’s analytics can recognize progression along the Cyber Attack Lifecycle while increasing risk scoring with each progression. LogRhythm’s established entities help define different networks and hosts, providing analysts with insight and the ability to adjust risk scoring to correspond to the appropriate level of threat.

The webcast also reveals how LogRhythm can infer additional context about a user during analysis. By baselining normal system activity, analysts can establish what typical behavior looks like on their network. From there, analysts can look for anomalous events outside of baseline behavior.

To save time in future threat hunts, analysts can also build an exceptions list within each of their created alarms to exempt established users or events that have been deemed innocuous. This approach to supervised machine learning not only saves time, but allows for more intelligent security systems analytics.

LogRhythm not only collects Windows events in different ways — remotely, forwarded, etc. — but the platform also goes beyond Windows events in its ability to collect flash files, database rows, records, and more.

Watch the on-demand webcast now to learn how to take your security operations to the next level.

Share

Recent Posts

95% of Organizations Revamped Their Cybersecurity Strategies in the Last Year

Security strategies are evolving; driven by regulatory requirements, customer expectations around data privacy and AI-driven…

2 days ago

April 2024 Quarterly Launch – LogRhythm Axon

In our April 2024 quarterly release, LogRhythm Axon showcases new enhancements from its two week…

1 week ago

April 2024 Quarterly Launch – LogRhythm SIEM

In our April 2024 quarterly release, LogRhythm SIEM introduces new enhancements to bring you faster…

1 week ago