Insider Threat Detection Using Microsoft Log Files

Insider Threat Detection Using Microsoft Log Files
Categories: Computers, Monitor
64.67 CAD
Buy Now

Many threats to a network are not detected in a timely manner. Some are found hours or even days after the threat occurs. This research enhances threat detection in networks by parsing log data from the Windows event viewer. The data is processed in real time, and the notification of a threat results in the immediate sending of an email alertto the administrator. This notification is an imperative first step which alerts administrators of a possible threat that needs to be fully investigated. It was found that timely auditing of all components of the Microsoft Event Log, along with a script running to monitor these events on all network systems, can alert an administrator immediately of a potential threat situation on the network via email, resulting in more efficient defense tactics.