Analytics & Use Cases
Analytics & Use Cases
After Logpoint ingests your logs, you can:
Use Windows Search Templates to access and view events.
Access and view events through Windows Dashboards.
Set up Alerts to automatically trigger a SIEM incident.
Set up Windows Reports.
Search Templates
Search Templates are GUI-based search queries that use base queries or placeholders filled in at runtime. You can add multiple base queries to a search template and use them to run search queries or create dashboard widgets.
Logpoint provides the following search templates out-of-the-box:
LP_ADFS Issued Claim Identity
LP_Beaconing for Threat Hunting with Microsoft Sysmon
Use Search Templates:
Update Parameters
In the Update Parameters, enter the required parameter(s):
Select Override widget time range to set a time range.
Select Repos.
Click Update.
After updating, widgets start populating the results. Logpoint forwards you to Search Template View to access the dashboards of the search template.
Windows Dashboards
Windows has 22 out-of-the-box dashboards. Each dashboard provides different Windows data depending on your logs and what you want to see.
LP_AD: Computer Account Management
Widgets available in the LP_AD: Computer Account Management dashboard provide details of Audit Computer Account Management events.
Top 10 Users in Computer Account Management
The top 10 users or computers, including domain controllers, member servers or workstations in the Computer Account Management.
Computer Account Management Overview
Details of events generated when a computer account is created, changed or deleted based on user, domain, actions and computer.
Top 10 Computers in Computer Account Management
The top 10 computer accounts that were created, modified or deleted in Computer Account Management.
Top 10 Actions by Users in Computer Account Management
An overview of the top 10 user actions, such as when a computer account was created, deleted, or changed.
Top 10 Actions in Computer Account Management - Time Trend
A time trend of top 10 Computer Account Management actions from the last 24 hours, involving computer account created, changed or deleted.
Computer Account Management
A detailed overview of account-related actions to computers that are a member of domains. The computer account related actions include computer account created, deleted, or changed.
LP_AD: Critical User Activities
Widgets available in the LP_AD: Critical User Activities dashboard provide details of users added, removed, enabled, disabled, or created in Active Directory Security Groups.
Users Added to Administrator Group
Users added to the Windows administrative group. Administrative groups are Domain Admins, Enterprise Admins, Schema Admins, and DNSAdmins. Microsoft event ID: 4728.
Users Removed from Administrator Group
Users removed from the Windows administrative group. Microsoft event ID: 4729.
Users Disabled
Users disabled in Windows administrative group. Microsoft event ID: 4725.
Users Enabled
Users enabled in Windows administrative group. Microsoft event ID: 4722.
Password Never Expires
A user checked in the Password Never Expires event. Microsoft event ID: 4738.
Users Created with a $
Usernames created starting with a dollar sign ($) in Azure Directory.
Users Changed to End with $
Usernames changed to end with a dollar sign ($) in Azure Directory.
User Added to a LogPoint Group in Active Directory
Users added to the LogPoint group in Active Directory.
User Removed from a LogPoint Group in Active Directory
Users removed from the LogPoint group in Active Directory.
LP_AD: Distribution Group Management
Widgets available in the LP_AD: Distribution Group Management dashboard provide details of users or groups in Active Directory Distribution Group Management.
Top 10 Users in Distribution Group Management
The top 10 users in the Distribution Groups lists.
Top 10 Groups in Distribution Group Management
The top 10 groups in the Distribution Groups lists.
Top 10 Actions by Users in Distribution Group Management
The top 10 actions (added, removed, created, changed, deleted) in Distribution Groups.
Distribution Group Management Overview
Distribution Groups based on group members, actions, objects and users.
Distribution Group Management
Distribution Groups based on log timestamp, path, group members, actions, objects and users.
Actions in Distribution Group Management - Time Trend
A time trend of actions performed on users or devices in the Distribution Group within the last 24 hours.
LP_AD: Machine Authentication Requests
Widgets provide details of machines or services authenticated by Kerberos.
Top 10 Machines in Successful Kerberos Authentication
Top machines/services successfully authenticated by Kerberos.
Top 10 Machines in Failed Kerberos Authentication
Top machines/services not successfully authenticated by Kerberos.
Machines in Successful Kerberos Authentication
Machines/services successfully authenticated based on user, source address and pre-authentication type.
Machines in Failed Kerberos Authentication
Machines/services not successfully authenticated based on user, source address, reason and pre-authentication type.
Attempts by Machine per IP: Revoked Credentials
Clients whose credentials have been revoked (disabled, expired, locked, logon hours).
Attempts by Machine per IP: Expired Password
Kerberos pre-auth failed due to expired password.
Attempts by Machine per IP: Client Not Found in Krb DB
Kerberos pre-auth failed as client not found in Kerberos DB.
LP_AD: OU and GPO
Widgets provide details of Organizational Unit (OU) and Group Policy Object (GPO).
Group Policy Object Creation
GPO created. Microsoft event ID: 5137.
Group Policy Object Deletion
GPO deleted. Microsoft event ID: 5141.
Group Policy Object Linked/Unlinked or Enforced/Unenforced or Link Enabled/Disabled to OUs
GPO link/unlink/enforce events. Microsoft event ID: 5136.
Group Policies Updated
GPO updated. Microsoft event ID: 5136.
Block Inheritance on an OU
Inheritance set to block/unblock on an OU. Microsoft event ID: 5136.
Group Policy Updated on Computers
gpupdate events. Microsoft event ID: 1704.
Group Policy Object Linked/Unlinked or Enforced/Unenforced or Link Enabled/Disabled for the Domain
GPO linked/unlinked for domain. Microsoft event ID: 5136.
Block Inheritance on the Domain
Inheritance set on domain. Microsoft event ID: 5136.
Delegation of Authority or ACL Change on an OU
ACL changed on an OU. Microsoft event ID: 5136.
Delegation of Control or ACL Change on the Domain
ACL changed on domain. Microsoft event ID: 5136.
OU Deletion
OU deleted. Microsoft event ID: 5141.
OU Creation
OU created. Microsoft event ID: 5137.
Failed Group Policy Update on Computers
gpupdate failed. Microsoft event ID: 1704.
LP_AD: Policy Changes
Widgets provide details on Active Directory audit policy, user rights, logon rights and domain policy.
Audit Policy Changes
Changed audit policies. Microsoft event ID: 4719.
User Rights Changes
Changed user rights. Microsoft event IDs: 4704 and 4705.
Logon Rights Changes
Changed logon rights. Microsoft event IDs: 4717 and 4718.
Domain Policy Change - List
Changed default domain policy. Microsoft event ID: 4739.
LP_AD: Security Group Management
Widgets keep track of security-enabled group activities.
Top 10 Users in Security Group Management
Top 10 users in a security-enabled group.
Top 10 Groups in Security Group Management
Top 10 security-enabled groups.
Top 10 Actions by Users in Security Group Management
Top 10 actions performed by users in a security-enabled group.
Security Group Management
Security-enabled group based on timestamp, users, domains, actions, objects, and groups.
Actions Security Group Management
Actions performed in a security-enabled group.
Security Group Creation
Created security groups.
Security Group Deletion
Deleted security-enabled groups.
Users Added Security Groups
Users added to a security-enabled group.
Users Removed from Security Groups
Users removed from a security-enabled group.
Top 10 Users in Group Creation
Top 10 users in security group creation.
Top 10 Users in Group Deletion
Top 10 users in security group deletion.
Top 10 Users in Adding Users to Groups
Top 10 users that added users to security-enabled groups.
Top Users in Removing Users from Groups
Top 10 users that removed users from security-enabled groups.
LP_Windows Service, LP_Windows Antimalware, LP_Windows Authentication, LP_Windows Configuration, LP_Windows DHCP, LP_Windows DNS, LP_Windows File Auditing, LP_Windows Overview, LP_Windows Sysmon Overview, LP_ADFS Auditing, LP_Windows BITS, LP_AppLocker, LP_Windows Service Control Manager
(Each of those dashboards contains numerous widgets describing event types, time trends, top items, status, and lists. The original document lists full widget tables for each — retain the dashboards and the detailed widget tables as needed in your docs.)
Adding Windows Dashboards
Windows Alerts
The alert rules available for Windows are many. Each alert rule includes: Trigger Condition, ATT&CK Category/Tag/ID, Minimum Log Source Requirement, and a Query. Below are examples of several alert rules in the format: title, metadata, and query.
LP_Windows Users Enabled
Trigger Condition: A user is enabled (event ID 4722).
ATT&CK Category: Credential Access, Persistence, Execution, Defense Evasion
ATT&CK Tag: Account Manipulation, User Execution, Abuse Elevation Control Mechanism, Bypass User Access Control
ATT&CK ID: T1098, T1204, T1548
Minimum Log Source Requirement: Windows
Query:
LP_Windows Group Policy Object Creation
Trigger Condition: Creation of a Group Policy Object.
ATT&CK Category: Credential Access, Persistence, Defense Evasion, Privilege Escalation
ATT&CK ID: T1098, T1484, T1548, T1212, T1068
Minimum Log Source Requirement: Windows
Query:
LP_Windows Unusual File Access
Trigger Condition: A file is accessed more than 10 times within 10 minutes.
ATT&CK Category: Discovery
ATT&CK Tag: File and Directory Discovery, Data Staged, Data from Information Repositories
ATT&CK ID: T1083, T1074, T1213
Minimum Log Source Requirement: Windows
Query:
LP_Windows Unusual User Access to an Object
Trigger Condition: A file or object is accessed by a user more than 10 times in a given time.
ATT&CK Category: Discovery
ATT&CK Tag: File and Directory Discovery, Data from Network Shared Drive, Network Share Discovery
ATT&CK ID: T1083, T1039, T1135
Minimum Log Source Requirement: Windows
Query:
LP_Windows Possible Successful Lateral Movement using Pass the Hash
Trigger Condition: Logpoint detects successful use of PtH for lateral movement between workstations.
ATT&CK Category: Lateral Movement
ATT&CK Tag: Use Alternate Authentication Material, Pass the Hash
ATT&CK ID: T1550, T1550.002
Minimum Log Source Requirement: Windows
Query:
(There are many additional alert rules in the Windows set — each follows the same format. Include alerts such as: User Added to Administrator Group, unBlock Inheritance on OU, Delegation of Authority Change in OU, Registry Value Change, OU Deletion, Successful Brute Force Attack from Same User, User Rights Changes, Failed Login Attempt using Expired Account, Registry Key Permission Change, Service State Change, User Account Lockout, User Removed from Administrator Group, Block Inheritance on OU, Kerberos Pre-authentication failed, and many others. Each alert includes the human-readable metadata above and a query block in the same format.)
Adding Windows Alert Rules
Reports
There are 15 different reports:
LP_Active Directory Authentication Requests
LP_Active Directory Object Management
LP_Active Directory Report
LP_AD: Computer Account Management
LP_AD: Critical User Activities
LP_AD: Distribution Group Management
LP_AD: Machine Authentication Requests
LP_AD: OU and GPO
LP_AD: Policy Changes
LP_AD: Security Group Management
LP_AD: Service
LP_AD: User Account Management
LP_AD: User Authentication Requests
LP_Windows Administrator Report
LP_Windows Configuration Report
Knowledge Base Lists:
ADMINS
FILE_EXTENSIONS
LOGPOINT_GROUPS
Report Templates
LP_Windows Administrator Report is an incident summary report providing statistical information on Windows log events, account-related events, process events, event categories, member status, and policy changes.
LP_Active Directory Authentication Requests provides statistics on authentication requests made on Domain Controllers using Kerberos.
LP_Active Directory Object Management provides statistical information on management of security principal objects (account and group management).
LP_Active Directory Report provides statistical information on changes made in Active Directory.
Using Report Templates: Data analysis can be conducted using graphs, time trends, lists, and text. Report data summarizes incidents over a specific period (e.g., past 24 hours). When generating a report, the calendar period can be customized.
Generating a Report:
We do our best to ensure the content we provide is complete, accurate and up to date. Logpoint makes no representations or warranties of any kind, express or implied about the documentation. We update it on a best-effort basis.
Last updated
Was this helpful?