Top Windows Security Logs for UEBA

Logo
Presented by

Randy Franklin Smith, Windows Security Expert (UWS); Matt Willems, Technical Product Manager (LogRhythm)

About this talk

User and entity behaviour analytics (UEBA) and security information and event management (SIEM) are separate security solutions that can work together to detect shifts in behaviour that indicate a compromise. UEBA is enhanced by leveraging the data collected and enriched by a SIEM, and SIEM capabilities are expanded by ingesting UEBA events for further correlation. One of the best ways to understand this symbiotic relationship is to take an actual source of security events and apply UEBA to it. In this on-demand webinar, Matt Willems, LogRhythm’s technical product manager, joins Ultimate Window Security’s Randy Franklin Smith to uncover the relationship between UEBA and SIEM — giving you an inside view of user behaviour analysis in action. In this webcast, you’ll learn how to apply UEBA and SIEM using data from the Windows Security Log to track: - When a user normally logs on - The computer from which the user authenticates - Additional computers the user accesses The webinar identifies the most important events from the Windows Security Log for UEBA and the roles that generate them, as well as challenges in correlation. In addition, you’ll learn about alternative logs that augment user behaviour analysis. Presenters will also cover: - Examples of identity construction from user identifiers such as Active Directory credentials and email addresses (both corporate and personal) - Dynamic baselining (i.e., what is normal in your environment vs. a threshold/whitelist/blacklist) - Two UEBA use cases: one that focuses on authentication from an abnormal location and another that highlights an unusual time/blacklisted location Watch the webinar to learn how to successfully apply UEBA to security events.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (87)
Subscribers (19062)
We know your job isn’t easy. That’s why we combine log management, machine learning, SOAR, UEBA, and NDR to give you broad visibility across your environment so you can quickly uncover threats and minimise risk. But a mature SOC doesn’t just stop threats. With LogRhythm, you’ll easily baseline your security operations program and track your gains — so you can easily report your successes to your board. Hear best practices, see technology demos, listen to speaker panels on our European BrightTALK channel. Visit our website for more information: http://www.logrhythm.com/