How To Use Window’s Advanced Network Connection Audit Logging to Detect and Hunt for Cyber Attackers

Description

In this edition of #TechTalkTuesday we explore Window’s advanced audit logging for network connections and talk about how you can leverage Window’s built-in features to discover attackers. We explore success and error event IDs to examine connections, packets, and ports associated with applications and lower-level protocols.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top