How To Detect Malicious Network Share Usage With The Windows Event Logs When Threat Hunting

How To Detect Malicious Network Share Usage With The Windows Event Logs When Threat Hunting

Description

In this edition of #TechTalkTuesday we discuss the detection of malicious network share usage with the Windows Event Logs when threat hunting. By understanding what malicious network share activity looks like, you can quickly and easily investigate potential threats. This video is essential for anyone interested in incident response or threat hunting, as it’ll teach you how to identify and investigate potential threats using the Windows Event Logs. We’ll discuss the different events related to malicious network share activity, and how to use them to your advantage when threat hunting.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top