Normal view
-
Black Hills Information Security
- How Logging Strategies Can Affect Cyber Investigations w/ Kiersten & JamesΒ
How Logging Strategies Can Affect Cyber Investigations w/ Kiersten & JamesΒ
![]()
This webcast was originally published on September 12, 2024.Β Β In this video, Kirsten Gross and James Marrs discuss how logging strategies can affect cyber investigations, specifically focusing on Windows logs. [β¦]
The post How Logging Strategies Can Affect Cyber Investigations w/ Kiersten & JamesΒ appeared first on Black Hills Information Security, Inc..
A Sysmon Event ID Breakdown β Updated to Include 29!!
![]()
Jordan Drysdale // UPDATES! October 30, 2023Thereβs been an additional update for Sysmon! Event ID 29! Another Event ID (EID) was added to the Sysmon service. This event ID followed [β¦]
The post A Sysmon Event ID Breakdown β Updated to Include 29!! appeared first on Black Hills Information Security, Inc..
-
Black Hills Information Security
- Webcast: Letβs Talk About ELK Baby, Letβs Talk About You and AD
Webcast: Letβs Talk About ELK Baby, Letβs Talk About You and AD
![]()
BHISβ Defensery Driven Duo Delivers Another Delectable Transmission! We know you are worried about your networks. After hours of discussion, weβve come to the realization that some of our dedicated [β¦]
The post Webcast: Letβs Talk About ELK Baby, Letβs Talk About You and AD appeared first on Black Hills Information Security, Inc..
Webcast: Group Policies That Kill Kill Chains
![]()
On this webcast, weβll guide you through an iterative process of building and deploying effective and practical Group Policy Objects (GPOs) that increase security posture. Slides for this webcast can [β¦]
The post Webcast: Group Policies That Kill Kill Chains appeared first on Black Hills Information Security, Inc..
Getting Started With Sysmon
![]()
John Strand // In this blog, I want to walk through how we can set up Sysmon to easily get improved logging over what we get from normal (and just [β¦]
The post Getting Started With Sysmon appeared first on Black Hills Information Security, Inc..
Webcast: Windows logging, Sysmon, and ELK
![]()
Click on the timecodes to jump to that part of the video (onΒ YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_WindowsLogginSysmonELK.pdf 4:36 Problem Statement and Executive Problem Statement 9:00 [β¦]
The post Webcast: Windows logging, Sysmon, and ELK appeared first on Black Hills Information Security, Inc..
Webcast: Implementing Sysmon and Applocker
![]()
Click on the timecodes to jump to that part of the video (on YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_ImplementingSysmonAppLocker.pdf 5:03 Introduction, problem statement, and executive problem [β¦]
The post Webcast: Implementing Sysmon and Applocker appeared first on Black Hills Information Security, Inc..
-
Black Hills Information Security
- Active Directory Best Practices to Frustrate Attackers: Webcast & Write-up
Active Directory Best Practices to Frustrate Attackers: Webcast & Write-up
![]()
Kent Ickler & Jordan Drysdale // BHIS Webcast and Podcast This post accompanies BHISβs webcastΒ recorded on August 7, 2018,Β Active Directory Best Practices to Frustrate Attackers, which you can view below. [β¦]
The post Active Directory Best Practices to Frustrate Attackers: Webcast & Write-up appeared first on Black Hills Information Security, Inc..
-
Black Hills Information Security
- How To Do Endpoint Monitoring on a Shoestring Budget β Webcast Write-Up
How To Do Endpoint Monitoring on a Shoestring Budget β Webcast Write-Up
![]()
Joff Thyer & Derek Banks // Editorβs Note: This is a more in-depth write-up based on the webcast which can be watched here. As penetration testers, we often find ourselves [β¦]
The post How To Do Endpoint Monitoring on a Shoestring Budget β Webcast Write-Up appeared first on Black Hills Information Security, Inc..