Presentation is loading. Please wait.

Presentation is loading. Please wait.

Jessica Payne Microsoft Global Incident Response and Recovery

Similar presentations


Presentation on theme: "Jessica Payne Microsoft Global Incident Response and Recovery"— Presentation transcript:

1

2 Jessica Payne Microsoft Global Incident Response and Recovery
Windows Event Forwarding – Centralized logging for everyone! Jessica Payne Microsoft Global Incident Response and Recovery INF327

3 Logging : The hardest simplest thing.

4 Venn Diagram of Common Monitoring Strategies
All the things!!!!!! (too much data, no context) Very few/None of the things This space intentionally left blank.

5 Trends with logs during Incident Response
No centralized logging Not monitoring endpoints/member servers (often just DCs) Spamming logs with extra data Not logging key events Logs roll too quickly Those with centralized logging still missing data, takes too long for IT admins to get reports

6 The Incident Response tools we wish we had
Microsoft Ignite 2015 4/27/ :07 AM The Incident Response tools we wish we had (Those are time machines.) © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

7 Windows Event Forwarding
Solution! Windows Event Forwarding

8 Fabulous Whitepapers! Spotting the Adversary with
Windows Event Log Monitoring potting_the_adversary_with_window s_event_log_monitoring.pdf

9 Benefits Built in –we have amazing products, but you already have this one Configured via GPO Uses Windows Remote Management (Kerberos) Can (and should be) targeted to specific events Native evtx (xml) log format “Push” log mode – less attack surface IT admins control their own logging destiny

10 WEF Architecture 10 Subscription Request Subscription Request

11 Pre-reqs “Server” required GPO
Local Network service needs to be granted read to the Security logs WinRM needs to be started on clients (just started, not configured)

12 Configuring WEF

13 What to monitor? Security logs being cleared
Local group changes/High value domain group changes Creation of local accounts Password changes not done by LAPS (or other password management software) Lateral account movement (need protective controls to serve as detective controls) Application crashes Service installation

14 Configuring Monitoring

15 Extensibility Works great with other SIEM investments
SCOM for alerting Azure Operational Insights Or PowerBI!

16 PowerBI dashboards

17 Resources/Shoutout http://blogs.technet.com/b/kfalde/
Everything you need to create cool X-Path filters and PowerBI dashboards.

18 Questions? @jepayneMSFT

19 Complete your session evaluation on My Ignite for your chance to win one of many daily prizes.

20 Continue your Ignite learning path
Microsoft Ignite 2015 4/27/ :07 AM Continue your Ignite learning path Visit Microsoft Virtual Academy for free online training visit Visit Channel 9 to access a wide range of Microsoft training and event recordings Head to the TechNet Eval Centre to download trials of the latest Microsoft products © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

21


Download ppt "Jessica Payne Microsoft Global Incident Response and Recovery"

Similar presentations


Ads by Google