Enhanced Windows Event Log Investigation Guide
Comprehensive DFIR SOC Analyst Playbook
π Table of Contents
π― Investigation Framework
Critical Event ID Quick Reference
Category
Event IDs
Priority
Log Location
Log Locations Quick Reference
π Account Usage Investigation
Phase 1: Initial Account Assessment
Phase 2: Authentication Event Analysis
Type
Name
Description
Investigation Notes
Error Code
Meaning
Threat Indicator
Phase 3: Administrator Account Activity
Phase 4: RDP Investigation
Phase 5: Account Logon Events (Domain Controller)
π Lateral Movement Detection
Phase 1: Network Share Access
Phase 2: Service-Based Lateral Movement
Phase 3: Scheduled Task Lateral Movement
Phase 4: PsExec Detection
Phase 5: WMI Lateral Movement
Phase 6: PowerShell Remoting
π Persistence Mechanisms
Phase 1: Registry Run Keys
Phase 2: Scheduled Tasks
Phase 3: Windows Services
Phase 4: WMI Event Subscription
β¬οΈ Privilege Escalation
Tracking Privilege Changes
π» PowerShell & WMI Analysis
Phase 1: PowerShell Logging
Phase 2: WMI Analysis
π¦ Malware Execution Evidence
Phase 1: Application and System Crashes
Phase 2: Process Tracking
π¦ Event Log Collection
Live System Collection
Remote Collection at Scale
π οΈ Tool Reference
EvtxECmd
DeepBlueCLI
Chainsaw
Hayabusa
π Investigation Playbooks
Playbook 1: Suspected Compromised Account
Playbook 2: Lateral Movement Investigation
Playbook 3: PowerShell Attack Investigation
π Quick Reference: Time-Saving Queries
Top 10 Failed Logon Sources
All Admin Activity Last 24 Hours
New Services Last 7 Days
Suspicious PowerShell This Week
All RDP Sessions Today
PreviousWindows Forensic Artifacts β Investigation Workflow & CheatsheetNextUser Activity Tracking with KQL
Last updated