Investigating the things to look for in a brute force attack Go to ES > Security > alerts We look to investigate the following when we investigate an Alert and […]
Understanding SYSMON For windows, logging is enabled by default, but the log information provided is not enough, it doesn’t not track important events such a process creation, hence the need […]
What is the ELK stack and how can we use it? ELK stands for Elasticsearch, Logstash and Kibana. It is a suite of tools that work together ability to aggregate […]