SlideShare uma empresa Scribd logo
1 de 30
Event log/Event viewer Understanding Event log for a more secured environment.
Overview Introducing… the Event Log Why Monitor Logs Enabling Event Logging Different Event Logs
Introducing…Event Log Centralized log service to allow applications and the operating system to report events that have taken place. Introduced with Windows NT 4 (1993). Main Windows  Logs Application (example: Database message) System (example: driver failure) Security (example: Logon attempt, file access) A Windows 2003 domain controller will also include Directory Service (example: Active Directory connection problem) File Replication (example: domain controller information updates) DNS Vista has introduced a lot of changes
Why Should We Monitor Logs... Organizations are obligated by regulations to gather and audit systems activity logs. To comply with the regulations organizations require the following forms of log monitoring ,[object Object]
Audit and analysis
ArchivingThe event log should also enable the organization to implement internal security policies. Each policy can be set to audit success events only, failure events only, success/failure events, or no auditing at all.
Each event category is controlled by Audit Policies: ,[object Object]
   Account logon events (for domain accounts)
   Logon events (local machine events)
	Object access (user accessing an object such as file, 	folder, printer)
	Policy change (changes in the audit, user rights and 	trust policies)
	Process tracking (detailed tracking information)
	System events (events that affect the system 	security or log) ,[object Object]
Lack of security policies to help and identify events and processes to be audited (e.g. Messenger)
The event logs are just a portion of the “chain of evidence”.
Logs are a “detective” measure and are not an IPS (Intrusion prevention system) on their own.,[object Object]
Event Viewer/ Event logs
Event Properties …
 Application  Log The application log file contains events that are logged by the applications used on a computer system.  Events that are written to the application log are determined by the developers of the software program, not the operating system. Unfortunately not all applications are programmed to write logs.  Examples: failure of MS SQL to access a database. when your virus scanner encounters a problem, it could bring this to your attention through the application log.
 System Log The system log file contains events that are logged by the operating system components. These events are often predetermined by the operating system itself.  System log files may contain information about device changes, device drivers, system changes, events, operations and more. Example: Failure of a service to start at boot up.
Security Log Events  related to resource use, such as creating, opening, or deleting files or other objects. Records events you've set for auditing with local or global group policies. It is used to bring valid and invalid logon attempts to your attention.  We need to have an account with administrative privileges to enable, use and specify which events are logged in the security log.
 Setup Log Each execution of Setup creates log files with a new time stamped log folder. Gives information about the successful or unsuccessful execution of any setup files.
Events Information event Success event Failure event Warning event Error event
Managing Event logs in C# Class EventLog  Class EventLogEntries Class EventLogEntryCollection Class EventSourceCreationData
EventLog: Static Members:							CreateEventSource();					Source Exists();						Exists();							Delete();							DeleteEventSource();					GetEventLogs();						LogNameFromSourceName();				WriteEntry();
CreateEventSource() It creates a new log The log that you specified in a call to this method not exist then System Creates a custom log and Register your application as Source The Source register your application with Event log as a valid Source of Entries You can only use Source to write one Log at a time Source can be any string but must be distinct on computer
Overloads of CreateEventSource() CreateEventSource(SourceName,LogName); CreateEventSource(SourceName,LogName, MachineName); CreateEventSource(EventSourceCreationData  obj);
SourceExist() It will check Whether specified source exist or not bool SourceExist(string SourceName);				 Check Whether specified source exist or not in                                 Current machine Bool SourceExist(SourceName,MachineName);		 Check Whether specified source exist or not in specified  		machine.
Exists():- It will Check whether Specified Log is Exist or not public static bool Exists( string logName ) Checks  on local Computer public static bool Exists( string logName, string machineName )							 Checks  on Specified Computer.
Delete():- Removes EventLog from Local/Specified computer public static void Delete( string logName ) public static void Delete( string logName, string machineName )

Mais conteúdo relacionado

Mais procurados

SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
Rizwan S
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 

Mais procurados (20)

Introduction to forensic imaging
Introduction to forensic imagingIntroduction to forensic imaging
Introduction to forensic imaging
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 
Secure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depth
 
SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SIEM : Security Information and Event Management
SIEM : Security Information and Event Management
 
Compare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework TypesCompare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework Types
 
UEFI Firmware Rootkits: Myths and Reality
UEFI Firmware Rootkits: Myths and RealityUEFI Firmware Rootkits: Myths and Reality
UEFI Firmware Rootkits: Myths and Reality
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Log Analysis
Log AnalysisLog Analysis
Log Analysis
 
Module 02 ftk imager
Module 02 ftk imagerModule 02 ftk imager
Module 02 ftk imager
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
Windows Forensic 101
Windows Forensic 101Windows Forensic 101
Windows Forensic 101
 
INCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEW
 
Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 

Destaque

Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
CTIN
 

Destaque (6)

Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Audit policy giám sát hệ thống
Audit policy  giám sát hệ thốngAudit policy  giám sát hệ thống
Audit policy giám sát hệ thống
 
EventLog Analyzer - Product overview
EventLog Analyzer - Product overviewEventLog Analyzer - Product overview
EventLog Analyzer - Product overview
 
Kiến trúc Bảo mật Toàn diện
Kiến trúc Bảo mật Toàn diệnKiến trúc Bảo mật Toàn diện
Kiến trúc Bảo mật Toàn diện
 
Vi Minh Toại - Security Risk Management, tough path to success
Vi Minh Toại - Security Risk Management, tough path to successVi Minh Toại - Security Risk Management, tough path to success
Vi Minh Toại - Security Risk Management, tough path to success
 
ManageEngine EventLog Analyzer v7. 2
ManageEngine EventLog Analyzer v7. 2ManageEngine EventLog Analyzer v7. 2
ManageEngine EventLog Analyzer v7. 2
 

Semelhante a Eventlog

Semelhante a Eventlog (20)

Net framework session03
Net framework session03Net framework session03
Net framework session03
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windows
 
ArcSight Basics.ppt
ArcSight Basics.pptArcSight Basics.ppt
ArcSight Basics.ppt
 
First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]
 
Big Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using SplunkBig Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using Splunk
 
Log analysis using elk
Log analysis using elkLog analysis using elk
Log analysis using elk
 
First Responders Course - Session 6 - Detection Systems [2004]
First Responders Course - Session 6 - Detection Systems [2004]First Responders Course - Session 6 - Detection Systems [2004]
First Responders Course - Session 6 - Detection Systems [2004]
 
Windows Event Analysis - Correlation for Investigation
Windows Event Analysis - Correlation for InvestigationWindows Event Analysis - Correlation for Investigation
Windows Event Analysis - Correlation for Investigation
 
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training SessionInfocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
 
Registry Forensics
Registry ForensicsRegistry Forensics
Registry Forensics
 
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny ZeltserSecurity Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
 
1556 a 09
1556 a 091556 a 09
1556 a 09
 
Lecture_02_Operating System Structures Operating Systems
Lecture_02_Operating System Structures Operating SystemsLecture_02_Operating System Structures Operating Systems
Lecture_02_Operating System Structures Operating Systems
 
A self adaptive learning approach for optimum path evaluation of process for ...
A self adaptive learning approach for optimum path evaluation of process for ...A self adaptive learning approach for optimum path evaluation of process for ...
A self adaptive learning approach for optimum path evaluation of process for ...
 
Back-2-Basics: Exception & Event Instrumentation in .NET
Back-2-Basics: Exception & Event Instrumentation in .NETBack-2-Basics: Exception & Event Instrumentation in .NET
Back-2-Basics: Exception & Event Instrumentation in .NET
 
Back-2-Basics: Exception & Event Instrumentation in .NET
Back-2-Basics: Exception & Event Instrumentation in .NETBack-2-Basics: Exception & Event Instrumentation in .NET
Back-2-Basics: Exception & Event Instrumentation in .NET
 
Play Framework Logging
Play Framework LoggingPlay Framework Logging
Play Framework Logging
 
Power Shell for System Admins - By Kaustubh
Power Shell for System Admins - By KaustubhPower Shell for System Admins - By Kaustubh
Power Shell for System Admins - By Kaustubh
 
Setting up Sumo Logic - June 2017
Setting up Sumo Logic - June 2017Setting up Sumo Logic - June 2017
Setting up Sumo Logic - June 2017
 
File access auditing
File access auditingFile access auditing
File access auditing
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Último (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

Eventlog

  • 1. Event log/Event viewer Understanding Event log for a more secured environment.
  • 2. Overview Introducing… the Event Log Why Monitor Logs Enabling Event Logging Different Event Logs
  • 3. Introducing…Event Log Centralized log service to allow applications and the operating system to report events that have taken place. Introduced with Windows NT 4 (1993). Main Windows Logs Application (example: Database message) System (example: driver failure) Security (example: Logon attempt, file access) A Windows 2003 domain controller will also include Directory Service (example: Active Directory connection problem) File Replication (example: domain controller information updates) DNS Vista has introduced a lot of changes
  • 4.
  • 6. ArchivingThe event log should also enable the organization to implement internal security policies. Each policy can be set to audit success events only, failure events only, success/failure events, or no auditing at all.
  • 7.
  • 8. Account logon events (for domain accounts)
  • 9. Logon events (local machine events)
  • 10. Object access (user accessing an object such as file, folder, printer)
  • 11. Policy change (changes in the audit, user rights and trust policies)
  • 12. Process tracking (detailed tracking information)
  • 13.
  • 14. Lack of security policies to help and identify events and processes to be audited (e.g. Messenger)
  • 15. The event logs are just a portion of the “chain of evidence”.
  • 16.
  • 19. Application Log The application log file contains events that are logged by the applications used on a computer system. Events that are written to the application log are determined by the developers of the software program, not the operating system. Unfortunately not all applications are programmed to write logs. Examples: failure of MS SQL to access a database. when your virus scanner encounters a problem, it could bring this to your attention through the application log.
  • 20. System Log The system log file contains events that are logged by the operating system components. These events are often predetermined by the operating system itself. System log files may contain information about device changes, device drivers, system changes, events, operations and more. Example: Failure of a service to start at boot up.
  • 21. Security Log Events related to resource use, such as creating, opening, or deleting files or other objects. Records events you've set for auditing with local or global group policies. It is used to bring valid and invalid logon attempts to your attention. We need to have an account with administrative privileges to enable, use and specify which events are logged in the security log.
  • 22. Setup Log Each execution of Setup creates log files with a new time stamped log folder. Gives information about the successful or unsuccessful execution of any setup files.
  • 23. Events Information event Success event Failure event Warning event Error event
  • 24. Managing Event logs in C# Class EventLog Class EventLogEntries Class EventLogEntryCollection Class EventSourceCreationData
  • 25. EventLog: Static Members: CreateEventSource(); Source Exists(); Exists(); Delete(); DeleteEventSource(); GetEventLogs(); LogNameFromSourceName(); WriteEntry();
  • 26. CreateEventSource() It creates a new log The log that you specified in a call to this method not exist then System Creates a custom log and Register your application as Source The Source register your application with Event log as a valid Source of Entries You can only use Source to write one Log at a time Source can be any string but must be distinct on computer
  • 27. Overloads of CreateEventSource() CreateEventSource(SourceName,LogName); CreateEventSource(SourceName,LogName, MachineName); CreateEventSource(EventSourceCreationData obj);
  • 28. SourceExist() It will check Whether specified source exist or not bool SourceExist(string SourceName); Check Whether specified source exist or not in Current machine Bool SourceExist(SourceName,MachineName); Check Whether specified source exist or not in specified machine.
  • 29. Exists():- It will Check whether Specified Log is Exist or not public static bool Exists( string logName ) Checks on local Computer public static bool Exists( string logName, string machineName ) Checks on Specified Computer.
  • 30. Delete():- Removes EventLog from Local/Specified computer public static void Delete( string logName ) public static void Delete( string logName, string machineName )
  • 31. DeleteEventSource():- Removes the event source registration from the event log of the local/Specified computer. public static void DeleteEventSource( string source ) public static void DeleteEventSource( string source, string machineName )
  • 32. GetEventLogs():- Searches for all event logs on the local/Specified computer and creates an array of EventLog objects that contain the list. public staticEventLog[] GetEventLogs() public static EventLog[] GetEventLogs( string machineName )
  • 33. LogNameFromSourceName():- Gets the name of the log to which the specified source is registered on specified computer public static string LogNameFromSourceName( string Source, string machineName )
  • 34. WriteEntry():- Writes a new record in the specified log where the Source was registered Entry may consist of:- Message text to the event log. EnentLogEntryType EventId Category rawData(byte[])
  • 35. Overloads of WriteEntry():- public static void WriteEntry( string source, string message ) public static void WriteEntry( string source, string message, EventLogEntryType type ) public static void WriteEntry( string source, string message, EventLogEntryType type, int eventID ) public static void WriteEntry( string source, string message, EventLogEntryType type, int eventID, short category )
  • 36. Properties:- Log:- Gets or sets the name of the log to read from or write to. LogDisplayName:- Gets the event log's friendly name. MachineName :-Gets or sets the name of the computer on which to read or write events. Source :-Gets or sets the source name to register and use when writing to the event log. Entries :-Gets the contents of the event log.
  • 37. Constructor:- EventLog():-Initializes a new instance of the EventLog class. Does not associate the instance with any log. EventLog(String LogName):- Initializes a new instance of the EventLog class. Associates the instance with a log on the local computer. EventLog(String Logname, String machine):- Initializes a new instance of the EventLog class. Associates the instance with a log on the specified computer. EventLog(String log, String computer, String source):- Initializes a new instance of the EventLog class. Associates the instance with a log on the specified computer and creates or assigns the specified source to the EventLog.
  • 38. Non Static Members:- Programmatic Explanation..