Endpoint data
What data do you need?
Antivirus logs
HIDS/HIPS
Host-based firewall
Event logs
Antivirus logs
Antivirus software is a type of security software that is designed to detect, prevent and remove malicious software, such as viruses, worms, Trojans, spyware and adware. Antivirus software uses the following techniques to identify and block malicious software
Host-based AV
Allows antivirus detection for individual machines
Custom rules can vary for each system
Signature detection
Uses known-malicious attributes to detect malware
Behavioral/heuristic data
Machine learning
Knowledge of algorithms
Base data to build initial knowledge pool
HIDS/HIPS
HIDS (Host-based Intrusion Detection System)
HIDS is a security solution that is designed to detect potential security threats and attacks on a host system
HIDS software is installed on a host machine, and it monitors the system for suspicious behavior, including changes to system files, unauthorized access and malware activity
HIPS (Host-based Intrusion Prevention System)
HIPS is designed to prevent malicious activity from occurring on a host system
Like HIDS, HIPS software is installed on a host machine, and it uses various techniques to prevent unauthorized access and malicious activity, including behavioral analysis, application control and network intrusion prevention
HIPS can also block unauthorized changes to system files, monitor network traffic and prevent malware from executing on the system
Host-based firewalls
Host-based firewalls provide granular visibility and control over network traffic on individual computer systems
By analyzing firewall logs, a threat hunter can identify and investigate potential security threats and anomalies on a host-by-host basis
Host-based firewalls can be configured to log all network traffic, including allowed and blocked traffic, as well as traffic that is specifically targeted by firewall rules
By reviewing firewall logs, a threat hunter can identify patterns and anomalies in network traffic that may indicate security threats, such as unauthorized access attempts, malware infection or suspicious network activity
Firewall logs can also be used to track user activity on individual systems, monitor changes to system configurations and identify network-based attacks targeting specific hosts
Event logs
Windows event logs
Event logs are records of system event that occur on a computer or network, such as login attempts, software installations, system errors, etc
Event logs are stored in a structured format that includes information about the event, such as the time it occurred, the source of the event and the type of event
The common types of event logs include:
Security logs: These logs record security-related events, such as successful and failed login attempts, changes to user accounts, etc
Application logs: These logs record events related to application performance and errors, such as software crashes and application errors
System logs: These logs record events related to the system, such as system startup and shutdown, hardware failures and driver errors.
Linux event logs
Linux log locations
Most common/important logs
System process log -
/var/log/syslog
General system messages -
/var/log/messages
Authentication log -
/var/log/secure
(or auth.log)System boot log -
/var/log/boot.log
Locating logs using the command line
Navigation using the command line -
cd
andls
Most logs located at
/var/log
Logging on Windows and Linux
Main differences between platforms
Windows
Event Viewer provides stability
Event Log (EVT) format
Use Event Viewer to read
Linux
Log variation based on distribution
TXT format
Use less, car or a text editor to read
Last updated