Nytro Posted January 25, 2014 Report Posted January 25, 2014 Spotting the Adversary with WindowsEvent Log MonitoringAuthor: National Security Agency/Central Security ServiceContents1 Introduction ................................................................................................................ .......................... 12 Deployment................................................................................................................... ........................ 12.1 Ensuring Integrity of Event Logs ................................................................................................................... 22.2 Environment Requirements ...................................................................................................... ................... 32.3 Log Aggregation on Windows Server 2008 R2 ............................................................................................. 42.4 Configuring Source Computer Policies .......................................................................................... ............... 92.5 Disabling Windows Remote Shell ................................................................................................ ............... 152.6 Firewall Modification ......................................................................................................... ........................ 152.7 Restricting WinRM Access ...................................................................................................... .................... 182.8 Disabling WinRM and Windows Collector Service ..................................................................................... 193 Hardening Event Collection................................................................................................... .............. 203.1 WinRM Authentication Hardening Methods ............................................................................................. 203.2 Secure Sockets Layer and WinRM .............................................................................................................. 244 Recommended Events to Collect ........................................................................................................ 244.1 Application Whitelisting ...................................................................................................... ....................... 254.2 Application Crashes ........................................................................................................... ......................... 254.3 System or Service Failures .................................................................................................... ...................... 254.4 Windows Update Errors ......................................................................................................... .................... 264.5 Windows Firewall .............................................................................................................. ......................... 264.6 Clearing Event Logs ........................................................................................................... ......................... 264.7 Software and Service Installation ............................................................................................. .................. 274.8 Account Usage ................................................................................................................. .......................... 274.9 Kernel Driver Signing ......................................................................................................... ......................... 284.10 Group Policy Errors ........................................................................................................... ......................... 294.11 Windows Defender Activities ..................................................................................................................... 294.12 Mobile Device Activities ...................................................................................................... ....................... 304.13 External Media Detection ...................................................................................................... .................... 314.14 Printing Services ............................................................................................................. ............................ 324.15 Pass the Hash Detection........................................................................................................ ..................... 324.16 Remote Desktop Logon Detection ................................................................................................ ............. 335 Event Log Retention ......................................................................................................... ................... 346 Final Recommendations........................................................................................................ .............. 357 Appendix .................................................................................................................... ......................... 357.1 Subscriptions ................................................................................................................. ............................. 357.2 Event ID Definitions .......................................................................................................... .......................... 377.3 Windows Remote Management Versions.................................................................................................. 387.4 WinRM 2.0 Configuration Settings ............................................................................................................. 407.5 WinRM Registry Keys and Values ................................................................................................ ............... 437.6 Troubleshooting ............................................................................................................... .......................... 448 Works Cited ................................................................................................................. ........................ 48Download:http://www.nsa.gov/ia/_files/app/Spotting_the_Adversary_with_Windows_Event_Log_Monitoring.pdf Quote