Главная
Study mode:
on
1
Introduction
2
Microsoft Security Compliance Toolkit
3
Audit Policies
4
Customer Request
5
Automate Event List
6
Mitre Attack
7
Mitre Sources
8
Three Questions
9
GUI
10
Power Event List
11
Generate Event List
12
Generate Hunting Queries
13
Generate Event List Queries
14
Configure Event List
15
Generate Queries
16
Other Options
Description:
Explore Windows Event Log investigation techniques for detecting adversaries in this 41-minute Black Hat conference talk by Miriam Wiesner. Learn about the Microsoft Security Compliance Toolkit, audit policies, and customer requests. Discover how to automate event lists, leverage the MITRE ATT&CK framework, and generate hunting queries. Gain insights into configuring event lists, generating queries, and exploring additional options to enhance your organization's threat detection capabilities and reduce the time needed to identify potential security breaches.

What the Log - So Many Events, So Little Time

Black Hat
Add to list