Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Manage Engine: SIEM Best Practices: Windows Auditing & Security Response

Manage Engine
05/06/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • 68% of data breaches take months to discover, making real-time monitoring and daily log review critical for reducing detection time from months to hours
  • Modern SIEM solutions must address five key challenges: cloud visibility loss, sophisticated attacks, internal threats (30% of incidents), IoT attack surface expansion, and GDPR compliance requirements
  • Windows security auditing should focus on uncommon indicators like privilege escalation patterns, lateral movement correlation, and persistence mechanisms rather than just common brute-force attempts
  • Essential monitoring areas include system events (service installations, restarts), data access tracking (the four vital Ws), web server activity (entry point attacks), and firewall traffic baselines
  • Protecting log integrity is fundamental—attackers disable logging services and tamper with logs to cover tracks, making logging policy change monitoring a critical security control
  • Organizations should implement both scheduled daily reports for periodic review and real-time alerting for immediate threat detection like ransomware launches

The State of Security Response in 2019

The session opens with a sobering statistic from Verizon's Data Breach Investigations Report: 68% of breaches take months or longer to discover. This fundamental failure in detection time creates massive business and legal exposure. The presenters identify five major challenges making real-time monitoring difficult: loss of visibility as users move to cloud platforms like Office 365 and AWS, increasingly sophisticated attack vectors including new ransomware strains, rising internal threats accounting for 30% of attacks, expanded attack surfaces from IoT device proliferation, and stringent new regulations like GDPR with mandatory breach reporting requirements. Despite these challenges, modern SIEM solutions have evolved with advanced correlation engines, cloud monitoring capabilities, machine learning-based user behavior analytics, threat intelligence integration, and extensive third-party integrations to accelerate threat detection and response.

Critical Windows Security Events and Active Directory Auditing

Vivin presents a framework for transforming raw log data into actionable security insights, using the analogy of a Fitbit converting step counts into meaningful health indicators. He emphasizes that effective SIEM implementation requires adding indicators to existing information to enable action. The session focuses on uncommon but critical Windows auditing use cases gathered from interactions with thousands of administrators. Key areas covered include detecting credential compromise beyond common brute-force attacks, identifying privilege escalation attempts through monitoring of security group modifications and administrative role assignments, tracking lateral movement by correlating logon events across multiple systems, and detecting persistence mechanisms through monitoring of scheduled task creation and service installations. A practical honeypot technique is shared: renaming the default Administrator account and creating a decoy account to trap unauthorized access attempts.

Essential Security Monitoring Beyond Windows

Siddharth expands the discussion to critical non-Windows monitoring areas that organizations must address. System events serve as inevitable indicators of attacks—ransomware must install itself, services must start, and systems may restart unexpectedly. Organizations should track service installations, software deployments, and server restarts as baseline security indicators. Data access monitoring requires tracking the four vital Ws: who accessed data, which data was accessed, when access occurred, and what modifications were made. File integrity monitoring and column integrity monitoring technologies help maintain audit trails for sensitive data. Web server activity monitoring is emphasized as a critical entry point defense, tracking site visitors, file uploads/downloads, HTTP error code spikes indicating denial-of-service attacks, and known attack patterns like SQL injection and cross-site scripting.

Firewall Traffic Analysis and Log Integrity Protection

Firewall traffic analysis provides early attack detection by establishing baselines of normal network behavior. Organizations should monitor traffic by source, destination, and protocol to detect anomalies like sudden SSH traffic spikes or unusual outbound data transfers indicating compromised hosts. Continuous blocking attempts against specific IP addresses signal potential breach attempts requiring permanent blacklisting. Firewall logs prove essential for post-breach investigation, enabling security teams to backtrack attacks and identify compromise sources. The session concludes with a critical but often overlooked security control: tracking logging policy changes. Attackers frequently attempt to disable logging services or tamper with collected logs to cover their tracks. Organizations must proactively monitor for syslog service shutdowns, event log service disruptions, and any attempts to modify or delete collected log data, as these actions themselves serve as strong indicators of compromise.

Chapters

0:00 - Introduction and Session Overview
4:42 - Current State of Security Response
9:15 - SIEM Evolution and Capabilities
12:17 - Windows Security Auditing Framework
15:44 - Critical Windows Event IDs
34:24 - Daily Monitoring and Real-Time Alerting
36:22 - System Events and Data Access Monitoring
40:50 - Firewall Traffic and Log Integrity
45:09 - Common IT Security Mistakes
54:02 - Questions to Ask Your SIEM Vendor
57:39 - ManageEngine Log360 Overview
59:25 - Live Q&A Session

Key Quotes

4:56 "... 68% of breaches took months or longer to discover. Think about how horrifying that is if that happened in your organization."
8:15 "... 30 percent of attacks were because of a malicious insider. One in three attacks. So this is really mind boggling numbers that we need to watch out for."
14:48 "If you add indicators to the existing information that you have, that again becomes actionable insights. That's the whole point of my session."
35:23 "If something bad happened in the middle of the night, you probably, at worst case scenario, you would detect it in the next day morning's scheduled report."
43:53 "Attackers know that and they try to change your logging policies and they try to shut down your logging services so that they don't get caught when they carry out an attack."
60:46 "Every time a user is trying to authenticate against your DC with a common well-known account as administrator, it could mean something to you."
Categories:
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Security Operations
  • Technical Deep Dive
  • Best Practices
  • Webinar
  • Threat Intelligence
  • Identity & Access
  • Cloud Security
  • SIEM best practices
  • Windows security auditing
  • Active Directory monitoring
  • Breach detection time
  • Internal threat detection
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Manage Engine: SIEM Best Practices: Windows Auditing & Security Response

              Upcoming Webinar Calendar

              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: What to Do Now That You Still Have Passwords
                https://www.truthinit.com/index.php/channel/1913/world-password-day-what-to-do-now-that-you-still-have-passwords/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Existing Passwords.
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-existing-passwords/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Risks
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-risks/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing AI Governance Foundations for GenAI at Every Deployment Stage
                https://www.truthinit.com/index.php/channel/1936/establishing-ai-governance-foundations-for-genai-at-every-deployment-stage/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Harnessing AI: Transforming Perception into Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transforming-perception-into-purposeful-mastery/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Insights into Our New Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-insights-into-our-new-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/

              Upcoming Events

              • May
                06

                World Password Day: What to Do Now That You Still Have Passwords

                05/06/202610:00 PM ET
                • May
                  07

                  World Password Day: Strategies for Managing Your Passwords Effectively.

                  05/07/202605:00 AM ET
                  • May
                    07

                    World Password Day: Strategies for Managing Your Existing Passwords.

                    05/07/202601:00 PM ET
                    • May
                      12

                      Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage

                      05/12/202601:00 PM ET
                      • May
                        12

                        Effective Strategies for Safeguarding Active Directory and Minimizing Data Risks

                        05/12/202611:30 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version