Introduction
In this book I share my experience and the results of my research about the Microsoft Windows security auditing subsystem and event patterns. This book covers the Windows Security auditing subsystem and event logs for Windows systems starting from Windows 7 through the most recent Windows 10 and Windows Server 2016 versions.
Many IT Security/Infrastructure professionals understand that they should know what is going on in their company's infrastructure-for example, is someone using privileged accounts during nonworking hours or trying to get access to resources he or she shouldn't have access to? Looking for activities like these is critical to all organizations. To help with this, this book provides technical details about the most common event patterns for Microsoft Windows operating systems. It is a great source of information for building new detection methods and improving a company's Security Logging and Monitoring policy.
The primary goal of this book is to explain Windows security monitoring scenarios and patterns in as much detail as possible. A basic understanding of Microsoft Active Directory Services and Microsoft Windows operational systems will be helpful as you read through the book.
The following areas are covered:
- Implementation of the Security Logging and Monitoring policy
- Technical details about the Windows security event log subsystem
- Information about most common monitoring event patterns related to operations and changes in Microsoft Windows operating systems
The following software and technologies are covered:
- Microsoft Windows security event logs
- Microsoft Windows security auditing subsystem
- Microsoft Windows Active Directory Services
- Microsoft AppLocker
- Microsoft Windows event logs (Application, System, NTLM, and others)
- Microsoft Windows 7, 8, 8.1, 10
- Microsoft Windows Server 2008 R2, 2012, 2012 R2, 2016
- Microsoft PowerShell
- Microsoft Windows Sysinternals tools
- Third-party tools
You will find detailed explanations for many event patterns, scenarios, technologies, and methods, and it is my hope that you will find that you've learned a lot, and will start using this book every day. This book is intended as a reference that you will return to many times in your career.
Who This Book Is For
This book is best suited for IT security professionals and IT system administrators. It will be most valuable for IT security monitoring teams, incident response teams, data analytics teams, and threat intelligence experts.
The best way to use this book is as a reference and source of detailed information for specific Windows auditing scenarios.
What This Book Covers
One of the main goals of this book is to help you create a Security Logging and Monitoring (SL&M) standard for your company. At the beginning of the book I cover what this standard is about, which sections it has, and discuss best practices for creating this document.
Before jumping into the world of event logs, you need to understand how the Windows Auditing Subsystem works and which components and settings belong to this system. I cover security best practices for the Windows security auditing subsystem, its components, and internal data flows.
There are multiple event logs in Windows systems besides the Security log, and many of these logs contain very useful information. It's important to know which subsystems have which event logs, the purpose of these event logs, and the type of information collected in these logs. This information is also present in this book.
I think the most interesting part of the book deals with security monitoring scenarios and patterns. Based on these scenarios, security managers, analysts, engineers, and administrators will be able to improve security monitoring policies and build new or improve existing detection methods.
How This Book Is Structured
This book consists of 15 chapters and three appendixes. The first three chapters cover general information about the Windows auditing subsystem and security monitoring policy. The remaining chapters go deeper in to different monitoring scenarios and event patterns.
Chapter by chapter, this book covers:
What You Need to Use This Book
This book requires that you have Windows 10 (build 1511 or higher) installed to open the .evtx
files included in this book's download materials.
Conventions
To help you get the most from the text and keep track of what's happening, we've used a number of conventions throughout the book.
NOTE
Notes, tips, hints, tricks, and asides to the current discussion look like this.
As for styles in the text:
- We italicize new terms and important words when we introduce them.
- We show keyboard strokes like this: Ctrl+A.
- We show filenames, URLs, and code within the text like so:
persistence.properties
.
We present code and event listings in two different ways:
We use a monofont type with no highlighting for most code and event examples.
We use bold type to emphasize code or events of particularly importance in the present context.
What's on the Website
All of the event examples used in this book are available for download at www.wiley.com/go/winsecuritymonitoring
as .evtx
files. These files can be opened by the built-in Windows 10 or Windows...