techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.6K
active users

#windowseventlogs

0 posts0 participants0 posts today
mansi18<p>Discover the key differences between traditional 𝐭𝐞𝐱𝐭-𝐛𝐚𝐬𝐞𝐝 𝐥𝐨𝐠𝐬 𝐚𝐧𝐝 𝐬𝐭𝐫𝐮𝐜𝐭𝐮𝐫𝐞𝐝 𝐖𝐢𝐧𝐝𝐨𝐰𝐬 𝐄𝐯𝐞𝐧𝐭 𝐋𝐨𝐠𝐬 — from format and readability to system integration and analysis capabilities.</p><p>Join our SIEM course - <a href="https://www.infosectrain.com/courses/ibm-security-qradar-siem-training/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">infosectrain.com/courses/ibm-s</span><span class="invisible">ecurity-qradar-siem-training/</span></a></p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/WindowsEventLogs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsEventLogs</span></a> <a href="https://mastodon.social/tags/LogManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LogManagement</span></a> <a href="https://mastodon.social/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://mastodon.social/tags/infosectrain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosectrain</span></a></p>
Tedi Heriyanto<p>Detecting browser data theft using Windows Event Logs: <a href="https://security.googleblog.com/2024/04/detecting-browser-data-theft-using.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.googleblog.com/2024/0</span><span class="invisible">4/detecting-browser-data-theft-using.html</span></a></p><p><a href="https://infosec.exchange/tags/windowseventlogs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowseventlogs</span></a> <a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a></p>
Tedi Heriyanto<p>Yamato Security's Windows Event Log Configuration Guide For DFIR And Threat Hunting: <a href="https://github.com/Yamato-Security/EnableWindowsLogSettings" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Yamato-Security/Ena</span><span class="invisible">bleWindowsLogSettings</span></a></p><p><a href="https://infosec.exchange/tags/windowseventlogs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowseventlogs</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threathunting</span></a></p>
Tedi Heriyanto<p>Windows Event Log Analysis: <a href="https://amr-git-dot.github.io/forensic%20investigation/EventLog_Analysis/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">amr-git-dot.github.io/forensic</span><span class="invisible">%20investigation/EventLog_Analysis/</span></a></p><p><a href="https://infosec.exchange/tags/eventlog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eventlog</span></a> <a href="https://infosec.exchange/tags/windowseventlogs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowseventlogs</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dfir</span></a></p>
:hacker_z: :hacker_o: :hacker_d: :hacker_s: :hacker_e: :hacker_c: 0xD :verified:<p>Windows Event Logs - I have just completed this room! Check it out: <a href="https://tryhackme.com/room/windowseventlogs" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tryhackme.com/room/windowseven</span><span class="invisible">tlogs</span></a> <a href="https://infosec.exchange/tags/tryhackme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tryhackme</span></a> <a href="https://infosec.exchange/tags/eventlogs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eventlogs</span></a> <a href="https://infosec.exchange/tags/wevtutil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wevtutil</span></a> <a href="https://infosec.exchange/tags/get" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>get</span></a>-winevent <a href="https://infosec.exchange/tags/eventviewer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eventviewer</span></a> <a href="https://infosec.exchange/tags/windowseventlogs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowseventlogs</span></a> via <span class="h-card"><a href="https://infosec.exchange/@RealTryHackMe" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>RealTryHackMe</span></a></span></p>