Free
Threat Hunting with Windows Event Forwarding
Windows Event Forwarding (WEF) is a way you can get event logs from Windows computers and collect them on Windows Event Collector (WEC) servers. In this Threat Hunting with Windows Event Forwarding course, you will use WEF for incident detection with step-by-step instructions for configuration and management workflows.
1
H
21
M
Time
beginner
difficulty
2
ceu/cpe
Course Content
5.1 Lateral Movement as a Case Study
Module 5: Lateral Movement Case Study
1.1 Introduction
Module 1: What is Windows Event Forwarding?
2.1 Group Policy for Event Collection
Module 2: Prerequisites for Setting up Windows Event Forwarding
3.1 Configure Windows Event Collector (WEC) Part 1
Module 3: Configure Windows Event Collector (WEC)
4.1 MITRE ATT&CK Framework
Module 4: MITRE ATT&CK
1.2 Native Windows Event Forwarding
Module 1: What is Windows Event Forwarding?
2.2 Microsoft System Monitor (SysMon)
Module 2: Prerequisites for Setting up Windows Event Forwarding
3.2 Configure Windows Event Collector (WEC) Part 2
Module 3: Configure Windows Event Collector (WEC)
2.3 Which Events to log for the Threat Hunt Part 1
Module 2: Prerequisites for Setting up Windows Event Forwarding
3.3 Scaling and Performance of Windows Event Collection
Module 3: Configure Windows Event Collector (WEC)
2.4 Which Events to log for the Threat Hunt Part 2
Module 2: Prerequisites for Setting up Windows Event Forwarding
Course Description
In this course we will learn about Windows Event Forwarding. Not many people are aware of it and take advantage of this built-in native tool. Windows Event Forwarding (WEF) is a way you can get any or all event logs from Windows computers and collect them on one or more Windows Event Collector (WEC) servers.
We will provide a framework for detecting current Active Directory attack methods used by red teams for penetration testing including Lateral Movement and best practices from across the globe. The default configuration of windows does not track events required for investigation of incidents. In this course, we will provide configurations to allow you to setup verbose logging to detect suspicious events.