Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

How to Start a Security Investigation from an Alert

N-able
05/11/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • MDR platforms ingest logs from endpoints, cloud providers, and network appliances to provide comprehensive visibility across the entire IT environment for security investigations
  • Thorough documentation is critical during investigations — analysts should timestamp every finding, command, and hypothesis so others can reconstruct the investigation and verify all angles were explored
  • System enumeration alerts on internal machines indicate an attacker has already breached perimeter defenses, not initial reconnaissance, requiring immediate investigation of how they gained access
  • Analysts use logon IDs and session IDs from alert details to pivot and trace related suspicious activities within the same user session across the environment

MDR Platform Investigation Workflow

This demonstration walks through the initial stages of a security investigation using an MDR (Managed Detection and Response) platform that functions as an advanced SIEM. The platform ingests logs from multiple sources including Windows and Linux endpoints, cloud providers like Azure and AWS, and network appliances via syslog. The session emphasizes the critical importance of documentation during investigations, showing how analysts use investigation managers to create case files, timestamp findings, and maintain detailed notes that allow others to reconstruct the investigation process. The instructor stresses that thorough documentation is essential not just for compliance and potential legal proceedings, but for ensuring no investigative angles are left unexplored.

Analyzing System Enumeration Alerts

The demonstration focuses on triaging a specific alert for system enumeration detection involving the execution of ipconfig.exe from an administrator account. The analysis reveals this is likely not reconnaissance against a public-facing asset, but rather indicates an attacker who has already breached internal defenses and is now mapping the internal network. The instructor explains how to examine alert details including file authenticity, integrity levels, and execution context to determine whether legitimate Microsoft binaries are being used in a living-off-the-land attack. Key investigative techniques include using logon IDs and terminal session IDs to pivot and identify related activities within the same session, while being mindful of the volume of logs generated by servers when setting time windows for investigation.

Chapters

0:00 - MDR Platform Overview
1:23 - Investigation Documentation Best Practices
2:32 - Creating an Investigation Case
4:54 - Triaging System Enumeration Alert
6:55 - Analyzing Alert Evidence and Context
8:38 - Using Log IDs for Pivoting
9:45 - Time Window Considerations for Log Analysis

Key Quotes

3:10 "When I'm doing an investigation or an IR, or even like an operation, right? Like I have a text file, I'm like timestamping everything, like every command I look at every directory, I'm looking at like, my thoughts, like in hypotheses, right? Like, it should be like a detective, right? You have to have case notes, right? ..."
4:09 "I know actually like some really good threat, like, what do you call it, like incident response people, like the folks who are like, you know, out there doing the Fortune 500 responses when they happen, you know, like no time to spare, like billions of dollars of risk. They actually use like voice recorders, just like you would see like a medical examiner use."
5:48 "So they think that could be, cause yes, right? They think that this could be considered a portion of the reconnaissance stage. And like, that may be the case if this was a public facing asset, right? But like, we know our network. We don't see a source IP here indicating that it's a public machine. Like we know how to read these logs. Like this is an internal machine. So like, if somebody's already scanning it, they've already breached some defense layer."
8:42 "We're going to see like the log on ID, the terminal session ID, and then we can use these values to pivot, right? And see, were there any other activities taken in this same log on or, you know, in the same session? ..."

Categories:
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Security Operations
  • Threat Intelligence
  • Technical Deep Dive
  • Demo
  • How-To
  • MDR platforms
  • Security investigation workflow
  • Alert triage
  • System enumeration detection
  • Living off the land attacks
  • Incident response documentation
  • Log analysis techniques
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: How to Start a Security Investigation from an Alert

              Upcoming Webinar Calendar

              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Perceptions of AI Risks and Threats through Data Lineage Insights
                https://www.truthinit.com/index.php/channel/1895/transforming-perceptions-of-ai-risks-and-threats-through-data-lineage-insights/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Data Lineage: Revealing AI Risks and Hidden Threats
                https://www.truthinit.com/index.php/channel/1894/transforming-data-lineage-revealing-ai-risks-and-hidden-threats/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-phases/
              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                APAC: Establishing an AI Governance Framework for GenAI Throughout the Deployment Process
                https://www.truthinit.com/index.php/channel/1953/establishing-an-ai-governance-framework-for-genai-throughout-the-deployment-process/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Harnessing AI: Transitioning from Illusion to Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                AI in the Fast Lane: Effectively Managing AI Security for Small Teams
                https://www.truthinit.com/index.php/channel/1951/ai-in-the-fast-lane-effectively-managing-ai-security-for-small-teams/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: What to Address First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-what-to-address-first/

              Upcoming Events

              • May
                12

                Transforming Perceptions of AI Risks and Threats through Data Lineage Insights

                05/12/202601:00 PM ET
                • May
                  12

                  Implementing Effective Strategies for Active Directory Security and Data Protection

                  05/12/202611:30 PM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Threats through Data Lineage

                    05/13/202601:00 AM ET
                    • May
                      13

                      Transforming Data Lineage: Revealing AI Risks and Hidden Threats

                      05/13/202605:00 AM ET
                      • May
                        19

                        Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases

                        05/19/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version