How To Use Window’s Advanced Network Connection Audit Logging to Detect and Hunt for Cyber Attackers
Description
In this edition of #TechTalkTuesday we explore Window’s advanced audit logging for network connections and talk about how you can leverage Window’s built-in features to discover attackers. We explore success and error event IDs to examine connections, packets, and ports associated with applications and lower-level protocols.