Reading view
How Logging Strategies Can Affect Cyber Investigations w/ Kiersten & JamesΒ

This webcast was originally published on September 12, 2024.Β Β In this video, Kirsten Gross and James Marrs discuss how logging strategies can affect cyber investigations, specifically focusing on Windows logs. [β¦]
The post How Logging Strategies Can Affect Cyber Investigations w/ Kiersten & JamesΒ appeared first on Black Hills Information Security, Inc..
A Sysmon Event ID Breakdown β Updated to Include 29!!

Jordan Drysdale // UPDATES! October 30, 2023Thereβs been an additional update for Sysmon! Event ID 29! Another Event ID (EID) was added to the Sysmon service. This event ID followed [β¦]
The post A Sysmon Event ID Breakdown β Updated to Include 29!! appeared first on Black Hills Information Security, Inc..
Webcast: Letβs Talk About ELK Baby, Letβs Talk About You and AD

BHISβ Defensery Driven Duo Delivers Another Delectable Transmission! We know you are worried about your networks. After hours of discussion, weβve come to the realization that some of our dedicated [β¦]
The post Webcast: Letβs Talk About ELK Baby, Letβs Talk About You and AD appeared first on Black Hills Information Security, Inc..
Webcast: Group Policies That Kill Kill Chains

On this webcast, weβll guide you through an iterative process of building and deploying effective and practical Group Policy Objects (GPOs) that increase security posture. Slides for this webcast can [β¦]
The post Webcast: Group Policies That Kill Kill Chains appeared first on Black Hills Information Security, Inc..
Getting Started With Sysmon

John Strand // In this blog, I want to walk through how we can set up Sysmon to easily get improved logging over what we get from normal (and just [β¦]
The post Getting Started With Sysmon appeared first on Black Hills Information Security, Inc..
Webcast: Windows logging, Sysmon, and ELK

Click on the timecodes to jump to that part of the video (onΒ YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_WindowsLogginSysmonELK.pdf 4:36 Problem Statement and Executive Problem Statement 9:00 [β¦]
The post Webcast: Windows logging, Sysmon, and ELK appeared first on Black Hills Information Security, Inc..
Webcast: Implementing Sysmon and Applocker

Click on the timecodes to jump to that part of the video (on YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_ImplementingSysmonAppLocker.pdf 5:03 Introduction, problem statement, and executive problem [β¦]
The post Webcast: Implementing Sysmon and Applocker appeared first on Black Hills Information Security, Inc..
Active Directory Best Practices to Frustrate Attackers: Webcast & Write-up

Kent Ickler & Jordan Drysdale // BHIS Webcast and Podcast This post accompanies BHISβs webcastΒ recorded on August 7, 2018,Β Active Directory Best Practices to Frustrate Attackers, which you can view below. [β¦]
The post Active Directory Best Practices to Frustrate Attackers: Webcast & Write-up appeared first on Black Hills Information Security, Inc..
How To Do Endpoint Monitoring on a Shoestring Budget β Webcast Write-Up

Joff Thyer & Derek Banks // Editorβs Note: This is a more in-depth write-up based on the webcast which can be watched here. As penetration testers, we often find ourselves [β¦]
The post How To Do Endpoint Monitoring on a Shoestring Budget β Webcast Write-Up appeared first on Black Hills Information Security, Inc..