Hi guys,
We are new to LEM and are hoping you are able to guide us in the right direction as it looks like LEM is not able to do it....
- Detect event log cleared event? (1130,1102,104) or any event log events
In the windows event log these events indicate the log was cleared. I can’t find them in the LEM (I’ve created those events) - Build a rule for an IP address or user account enumerating available shares internally
Attacker scanning available shares on the network, not targeting a specific person but if an endpoint hits 5 different shares in 1 minute we want to know. - Search for application crash events?
*AppCrash* in application log indicates attacker attempting buffer overflow etc - New Windows Service created?
- Mitigation of pass the hash means we need to look at event 4624 ‘LogonType=3’ ‘TargetUserName!=Anonymous Logon’ ‘TargetDomainName!=%ourdomain%’
- AV service disabled, there is an event generated by McAfee when stopped. Alert and restart?
We have created what the rule which looks for this, but the events dont appear to be forwarded/processed by the LEM.
If LEM cannot do these things we will look at alternatives.
Thanks