
Sign up to save your podcasts
Or
Windows Scheduled Tasks are often used by attackers to establish persistence. As an analyst, you want to be aware of the different windows event codes that record these details. These artifacts come up in just about every windows compromise assessment, consider them core triage skills. There are several events, all of which I will go over in this episode. I will break them down from a DFIR point of view and give you the triage methodology...
4.9
6161 ratings
Windows Scheduled Tasks are often used by attackers to establish persistence. As an analyst, you want to be aware of the different windows event codes that record these details. These artifacts come up in just about every windows compromise assessment, consider them core triage skills. There are several events, all of which I will go over in this episode. I will break them down from a DFIR point of view and give you the triage methodology...
1,982 Listeners
364 Listeners
640 Listeners
370 Listeners
180 Listeners
1,017 Listeners
316 Listeners
408 Listeners
7,945 Listeners
189 Listeners
312 Listeners
76 Listeners
128 Listeners
43 Listeners
168 Listeners