Camden, a network specialist in an organization, monitored the behavior of the organizational network using SIFM from a control room. The SIEM detected suspicious activity and sent an alert to the camer
a. Based on the severity of the incident displayed on the screen, Camden made the correct decision and immediately launched defensive actions to prevent further exploitation by attackers.
Which of the following SIEM functions allowed Camden to view suspicious behavior and make correct decisions during a security incident?
The IP address of the attacker is 10.10.1.16. This can be verified by analyzing the Windows.events.evtx file using a tool such as Event Viewer or Log Parser. The file contains several Audit Failure logs with event ID 4625, which indicate failed logon attempts to the system. The logs show that the source network address of the failed logon attempts is 10.10.1.16, which is the IP address of the attacker3. The screenshot below shows an example of viewing one of the logs using Event Viewer4: Reference: Audit Failure Log, [Windows.events.evtx], [Screenshot of Event Viewer showing Audit Failure log]
Gerald
4 months agoKallie
5 months agoAdela
5 months agoLera
5 months agoLashandra
5 months agoMohammad
6 months agoBrittni
6 months agoMike
6 months agoRosendo
6 months agoAlline
6 months agoBrittney
6 months agoShonda
6 months agoRobt
6 months agoStevie
6 months agoRolande
6 months agoMaynard
6 months agoAlisha
6 months agoRusty
11 months agoEdison
9 months agoViola
10 months agoShakira
10 months agoJess
11 months agoHailey
10 months agoJosephine
10 months agoCecil
11 months agoRosann
11 months agoSvetlana
11 months agoLayla
12 months agoJaclyn
10 months agoBurma
10 months agoNoah
11 months agoWillodean
12 months agoClemencia
10 months agoNatalie
10 months agoValentin
10 months agoLajuana
11 months agoCherelle
12 months agoCurtis
11 months agoDerrick
11 months agoLavera
11 months agoMona
11 months agoRuth
11 months agoAdolph
11 months agoGlenn
1 year agoScot
1 year agoFrancisca
1 year ago