• Two Main Type of Tables “Ending with Events (Majority) or Info”
    • Events "Contains information about events or activities that were monitored by one of our sensors whether it is coming from endpoints, emails, cloud apps, identities. Most of the tables that represent events will have action types, the actions types are different event types (ConnectionFailed, ConnectionFound, ConnectionRequest) we have in the table. "
    • Info “Contains information about state of specific entity.”
  • The ABC’s of Security “When you’re conducting analysis, you can categorize the things you need to examine into four main categories: authentication, backdoors, communication, and data.”
    • Authentication “Authentication is crucial from a tracking perspective. When considering authentication, you should ask yourself how the attacker established identity to the system, which identities are compromised, and what are our administrative identities. If an attacker has a credential during an incident, this needs to be part of your recovery investigation. It’s also important to track any identities you come across during your investigation as potentially compromised.”

    • Backdoors “Backdoors refer to how the attacker is controlling the system. The attacker can use a publicly exposed interface or a piece of malware installed on the machine, such as a trojan, dropper, or downloader. The goal is to determine the mechanism the attacker used to control the endpoint during the incident. If it’s a piece of malware, it can typically be uniquely identified by its hash, while a PowerShell script’s launch string may contain the actual attack.”

    • Communication “Communication refers to the communication path between the attacker and the system. This can be an inbound connection to a publicly exposed service, a reverse shell, or communication back to a known command and control channel. Phishing technically involves a control channel.”

    • Data "Data is the last category. Data may be encrypted, obfuscated, or stolen. The goal is to determine what data was affected and how it was affected. From a data perspective, it’s important to track any data exfiltrated from the network. "

      What sensitive information was stolen (Confidentiality) or tempered (Integrity) or made unavailable (Availability)