Aura Profile picture
GCIH, GCFE | Sr. Security Consultant | Digital Forensics, Incident Response & SOC | @CuratedIntel Contributing DFIR Member
Sep 21 8 tweets 2 min read
We were discussing this at one point in @CuratedIntel. A lot of these classes uses Zeek, Sysmon, EID 4688, etc. The purpose being to expose you to what can be done with these logs and what you can find.

The reality though is that you'll deal with defaults for the most part in IR Forget your Sysmon, forget even your 4688. If you have it, chances are command line logging won't be enabled.

Default 20 MB EVTX (Security, etc.) on all endpoints, even DCs. That is, if they weren't cleaned by the TA.

No SIEM, no EDR. Default Linux logging. Nothing fancy.
Jun 10, 2022 4 tweets 2 min read
Ever wondered what happens when #MicrosoftDefender quarantines a PUP, but then you go in the notification, and select to "Allow" the application in the future? Well, a Registry value with the name of ThreatId (detected threat) is set in the Registry with a Data of 6 for Ignore. It seems that this Regkey is regularly cleaned however, since the application gets flagged every few days and I need to restart the process.

Registry key for copy/paste:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction