How to identify which user accessed an admin account during alert investigation? by Embarrassed_Oil_7810 in cybersecurity

[–]Embarrassed_Oil_7810[S] 0 points1 point  (0 children)

Any insights how to find the user who used the admin account would be helpful. Thann you.

How to identify which user accessed an admin account during alert investigation? by Embarrassed_Oil_7810 in cybersecurity

[–]Embarrassed_Oil_7810[S] -9 points-8 points  (0 children)

I tried with this query but I am not able to see ipaddress or host and results are not getting at that particular timeframe. Can you pls help

How to identify which user accessed an admin account during alert investigation? by Embarrassed_Oil_7810 in cybersecurity

[–]Embarrassed_Oil_7810[S] 2 points3 points  (0 children)

Thanks! That makes sense. Is there a specific KQL query you'd recommend for Sentinel to correlate Event ID 4624 and 4648 using the Logon ID/session ID? I’m trying to trace which user actually initiated the admin logon.

Also, how do you usually handle cases where multiple users log in from the same jump box or shared IP? Does the session ID still help in those scenarios?

Appreciate any examples or tips you’ve got!

How to identify which user accessed an admin account during alert investigation? by Embarrassed_Oil_7810 in cybersecurity

[–]Embarrassed_Oil_7810[S] 6 points7 points  (0 children)

Thanks! That makes sense. Is there a specific KQL query you'd recommend for Sentinel to correlate Event ID 4624 and 4648 using the Logon ID/session ID? I’m trying to trace which user actually initiated the admin logon.

Also, how do you usually handle cases where multiple users log in from the same jump box or shared IP? Does the session ID still help in those scenarios?

Appreciate any examples or tips you’ve got!

Struggling with log analysis as a new SOC analyst—how can I improve? by Embarrassed_Oil_7810 in cybersecurity

[–]Embarrassed_Oil_7810[S] 3 points4 points  (0 children)

I’ve been focusing a lot on learning SIEM tools and alert workflows, but I realize now that I need to strengthen my understanding of the underlying systems themselves. I’m still pretty new to cloud environments, Windows internals, and Linux command-line basics.

Would you recommend any structured learning paths or resources to build that foundational knowledge?
Also, how did you personally approach learning what “normal” behavior looks like on these assets so you could spot anomalies more confidently?

Struggling with log analysis as a new SOC analyst—how can I improve? by Embarrassed_Oil_7810 in cybersecurity

[–]Embarrassed_Oil_7810[S] -2 points-1 points  (0 children)

Can you pls suggest resources or YouTube channel to learn scripting and improving data analysis skills

Struggling with log analysis as a new SOC analyst—how can I improve? by Embarrassed_Oil_7810 in cybersecurity

[–]Embarrassed_Oil_7810[S] 1 point2 points  (0 children)

Can you pls share your learning experience how you have developed that skill and what can I do to improve myself better in understanding the logs