Windows Event log for Detection and Best practice



Event log is an important part of cyber investigation we will look into best practice and some important logs that you should look for detection.

Hackers try to hide their presence for as long as possible. Event ID 104 Event Log was Cleared and event ID 1102 Audit Log was Cleared could indicate a problem. Event ID 4719 System audit policy was changed could also show malicious activity. Application crashes can also indicate the presence of a hacker.

 

Table 1 – Application Crashes

 

ID

Level

Event Log

Event Source

App Error

1000

Error

Application

Application Error

App Hang

1002

Error

Application

Application Hang

BSOD

1001

Error

System

Microsoft-Windows-WER- SystemErrorReporting

WER

1001

Informational

Application

Windows Error Reporting

EMET

1 2

Warning Error

Application Application

EMET


Hackers need access to your systems just like any other user, so it’s worth looking for suspicious login activity. Table 2 shows events that might show a problem. Pass-the-Hash (PtH) is a popular form of attack that allows a hacker to gain access to an account without needing to know the password. Look out for NTLM Logon Type 3 event IDs 4624 (failure) and 4625 (success).

Table 2 – Account Usage

 

ID

Level

Event Log

Event Source

Account Lockouts

4740

Informational

Security

Microsoft-Windows-Security- Auditing

User Added to Privileged Group

4728, 4732, 4756

Informational

Security

Microsoft-Windows-Security- Auditing

Security-Enabled group Modification

4735

Informational

Security

Microsoft-Windows-Security- Auditing

Successful User Account Login

4624

Informational

Security

Microsoft-Windows-Security- Auditing

Failed User Account Login

4625

Informational

Security

Microsoft-Windows-Security- Auditing

Account Login with Explicit Credentials

4648

Informational

Security

Microsoft-Windows-Security- Auditing


High-value assets, like domain controllers, shouldn't be managed using Remote Desktop. Logon Type 10 event IDs 4624 (Logon) and 4634 (Logoff) might point towards malicious RDP activity.

 

 

Best Practices


1.Collect Logs in a Single Place
  • If logs are stored in multiple locations then becomes harder to parse and analyze for any investigation. For example, an organization stores log files of its computers and network in archives for regular inspection of possible threats.
  • If these archives are stored in multiple locations then it is much harder to analyze logs from all locations manually.
 
2.Segment different logs into different files to easily access for researching and reading them
  • This practice means to keep the logs segmented into different categories. For example, keep the Application logs, Security logs, System logs, Network logs in each different segmented archives so that it will be easier to parse through particular logs for threat inspection.

 

3. Regular Log analysis for Potential Threats

  • Organisations should constantly keep tabs on their archived event logs. The routine check helps in identifying undetected short or long-term threats that may harm the data. This check can be done on the weekly or monthly basis. Big corporations which have a large number of collected logs require daily check up to keep their data integrity.

 

4. Archive Logs, Do not Overwrite

  • In Windows OS, the default size of the physical log file is 20 Mb which can be sufficient for a single user.
  • For an organization, the default file size is not enough for log management because the older logs get overwritten by new logs. But this can be overcome by archiving the logs. As the new logs enter the system, the older event logs get archived to a secure location which helps in troubleshooting the system if a problem is encountered.

 

5. Access to limited personnel & accesses should be logged

  • The logs access should be kept limited to authorized personnel only such as the administrator and the log analyst who maintains the integrity of the logs and constantly observe logs for potential threats.

 

6. Regularly upgrade or update log management infrastructure if there is any

  • Log management is not an easy task. It takes the experience with the proper knowledge to manage logs and to find threats that are critical for compromising the system.
  • Most organizations use log management infrastructure and tool which makes it much easier to handle the event logs. The analyst should constantly look for new upgrades and updates of the tool to keep the system safe from new threats and vulnerabilities.

 

7. Use copies of logs for Forensic Investigation

  • Event logs are a great help in a Forensic investigation as each and every event is recorded in the log files.
  • Whenever the investigation is being done using event logs make sure to create multiple copies of the acquired logs for maintaining the integrity of log data. This helps in protecting the original logs.

 

8. Store Multiple Backups

  • Storing multiple backups of logs in a secured place is a great way to protect log data from attackers who can exploit the log infrastructure. If the original log archives are lost or encrypted then backups will help in identifying the root cause of the attack. There are two types of backups:
  • Hot Backup: Backup of most recent logs. (1 to 4 Weeks)
  • Cold Backup: Backup of all logs for a long period of time. (6 to 12 Months)

0 comments:

Post a Comment

Twitter Facebook Favorites More