CISO2CISO.COM & CYBER SECURITY GROUP

CISO2CISO Notepad Series SOC SOC Open Source Tools THREAT INTELLIGENCE TOP Featured Post User most voted post

OPEN SOURCE SOC TOOLS BY BONI YEAMIN

Incident Management Systems …………………………01Network Security Monitoring…………………………….02Endpoint monitoring / HIDS………………………………03Incident Response……………………………………………03Malware Sandbox and Malware Analysis…………….03Threat Intelligence Platforms……………………………04Purple Team Testing and Reporting……………………05Security Orchestration Automation and Response.08

CISO2CISO Notepad Series SOC Technical Documents Threat Hunting Cybersecurity THREAT INTELLIGENCE TOP Featured Post User most voted post

Definitive Guide to SOC as a Service – The Essential Elements of Advanced Threat Detection and Response by Crystal Bedell and Mark Bouchard – ARCTIC WOLF

Enterprise security has changed radically over the last 10 years. Antivirus and spam filters no longer provide adequate protection. Attackers bypass preventive controls and access networks...

CISO2CISO Notepad Series SOC Technical Documents TOP Featured Post Windows Cybersecurity

Windows Event Security Log Analysis

ContentsIntroduction ……………………………………………………………………………………………………………………………….. 2Event Log Format ………………………………………………………………………………………………………………………… 3Account Management Events ………………………………………………………………………………………………………. 4Account Logon and Logon Events ………………………………………………………………………………………………….. 5Access to Shared Objects …………………………………………………………………………………………………………… 11Scheduled Task Logging ……………………………………………………………………………………………………………… 12Object...