Windows Intrusion Detection Playbook
Introduction: The Need for Effective Windows Intrusion Detection Capabilities
Table of Contents
1. Initial Detection of Intrusion Activity
Query Option 1: Identify Suspicious Login Activity
Query Option 2: Detect Anomalous Process Execution
Query Option 3: Monitor Unusual Network Connections
2. Privilege Escalation Indicators
Query Option 1: Track Abnormal Use of Admin Tools
Query Option 2: Detect Suspicious Privilege Elevation Commands
Query Option 3: Identify Credential Dumping Attempts
3. Persistence Mechanisms
Query Option 1: Detect Registry Key Modifications
Query Option 2: Monitor Startup Folder Changes
Query Option 3: Identify Scheduled Task Creation
4. Lateral Movement Detection
Query Option 1: SMB Lateral Movement
Query Option 2: RDP Session Monitoring
Query Option 3: WMI Remote Execution
5. Data Exfiltration Indicators
Query Option 1: Monitor Large Data Transfers
Query Option 2: Detect Data Compression Tools
Query Option 3: Identify DNS Tunneling Activity
6. Incident Response and Containment
Query Option 1: Isolate Compromised Systems
Query Option 2: Correlate Indicators of Compromise (IoCs)
Query Option 3: Timeline Reconstruction
7. Conclusion
Last updated