Lateral Movement Investigation Runbook
SOC & DFIR Operations Guide
Overview & Scope
Lateral Movement Definition
Lateral Movement Categories
By Authentication Method
Category
Description
Risk Level
By Protocol/Technique
Technique
Protocol/Method
Common Tools
Common Lateral Movement Attack Chains
Chain 1: Credential Theft → Pass-the-Hash → SMB Lateral Movement
Chain 2: Kerberoasting → Service Account Compromise → Lateral Movement
Chain 3: RDP Hijacking → Session Takeover
Chain 4: WinRM PowerShell Remoting
Detection Sources & Data Mapping
Log Sources Matrix
Platform
Log Table
Lateral Movement Data
Critical Windows Event IDs
Network Logon Events
Event ID
Description
Lateral Movement Relevance
Kerberos Events
Event ID
Description
Lateral Movement Relevance
NTLM Events
Event ID
Description
Lateral Movement Relevance
Process & Service Events
Event ID
Description
Lateral Movement Relevance
Remote Access Events
Event ID
Description
Lateral Movement Relevance
Logon Type Reference
Logon Type
Name
Description
Lateral Movement Risk
Investigation Workflows
General Lateral Movement Investigation
Step 1: Initial Alert Triage
Step 2: Authentication Pattern Analysis
Step 3: Source System Investigation
Step 4: Destination System Investigation
Step 5: Scope Determination
Step 6: Timeline Construction
RDP Lateral Movement Investigation
Detection Indicators
Investigation Steps
SMB/Admin Share Lateral Movement Investigation
Detection Indicators
Investigation Steps
WinRM/PowerShell Remoting Investigation
Detection Indicators
Investigation Steps
WMI Lateral Movement Investigation
Detection Indicators
Investigation Steps
Pass-the-Hash/Ticket Investigation
Pass-the-Hash Indicators
Pass-the-Ticket Indicators
Investigation Steps
KQL Query Cheat Sheet
Network Logon Analysis
All Network Logons (Type 3)
Unusual Network Logon Sources
Lateral Movement Velocity Detection
RDP Lateral Movement
RDP Connections Analysis
RDP from Server to Workstation (Unusual Direction)
RDP Session Hijacking Detection
RDP Brute Force Followed by Success
SMB/Admin Share Activity
Admin Share Access Detection
PsExec Service Detection
SMB Lateral Movement Pattern
File Copy to Admin Shares
WinRM/PowerShell Remoting
WinRM Connections
PowerShell Remoting Commands
Remote PowerShell Session Creation
WMI Lateral Movement
Remote WMI Execution
WMI Process Creation
DCOM Lateral Movement
Pass-the-Hash / Pass-the-Ticket
NTLM Authentication Anomalies
Pass-the-Hash Detection (MDI)
Kerberos Ticket Anomalies
Scheduled Task & Service Lateral Movement
Remote Scheduled Task Creation
Remote Service Creation
Cross-Platform Queries
Unified Lateral Movement Detection
Lateral Movement Chain Reconstruction
Prisma Access Network Detection
East-West Traffic Anomalies
Unusual Internal RDP Traffic
Response Actions & Remediation
Immediate Containment Actions
Scenario
Action
Method
Containment Commands
MDE Device Isolation
Block Lateral Movement at Network Level
Disable Compromised Account
Post-Incident Remediation
For Each Compromised System
Network-Level Hardening
Action
Description
Implementation
Quick Reference Cards
Lateral Movement Tool Signatures
Tool
Process Indicators
Network Indicators
Lateral Movement Detection Checklist
Check
Data Source
Query Focus
Common Lateral Movement Ports
Port
Protocol
Usage
Risk
Escalation Matrix
Severity Classification
Severity
Criteria
Response Time
Escalation Triggers
Condition
Escalation Level
Communication Flow
MITRE ATT&CK Mapping
Lateral Movement (TA0008)
Technique
ID
Description
Detection
Related Techniques
Tactic
Technique
ID
Relevance
Appendix: Investigation Commands
Network Connection Analysis
Authentication Event Analysis
Service & Task Analysis
Remote Execution Detection
Lateral Movement Tool Detection
Evidence Collection Script
PreviousUnauthorised Access & Privilege Escalation Investigation RunbookNextBusiness Email Compromise (BEC) Investigation Runbook
Last updated