Главная
Study mode:
on
1
Introduction
2
Disclaimer
3
Detecting adversaries
4
The weakest link
5
Microsoft Security Compliance Toolkit
6
Audit Policy
7
Customer Request
8
Event List
9
What is Mitre Attack
10
What are your pain points
11
How to install EventList
12
How to use EventList
13
Sigma
14
Conclusion
Description:
Dive into the world of event logging and cybersecurity with this 42-minute conference talk by Miriam Wiesner. Explore techniques for detecting adversaries, understand the importance of identifying the weakest link in your security infrastructure, and learn about the Microsoft Security Compliance Toolkit. Discover the power of Audit Policy and Event List tools, gain insights into the MITRE ATT&CK framework, and address common pain points in cybersecurity. Get hands-on guidance on installing and using EventList, and explore the benefits of Sigma for threat detection. Enhance your ability to manage and analyze vast amounts of event data effectively in the face of ever-evolving security challenges.

What The Log - So Many Events, So Little Time

Cooper
Add to list
00:00
-00:56