SIEM Search Expressions - challenge


hi, is anyone able to assist with the search criteria for this challenge please?

Hi, if you can follow through with the steps in guided exercise you will find the answers in wazuh.

Look at step 11 …

So first you want to look for login failures, what Windows Event ID is that? Then you want to use AND NOT twice in the query.

So…

1.) First find all login failures.

2.) Then find any name associated with a login failure.

3.) Then look for all login failure but NOT associated with that first name.

4.) Then find a new name.

5.) Then look for all login failures but NOT associated with that first name AND NOT the second name.

6.) Then find the final name.

Note, just because an account has a login failure doesn’t mean there was a brute force attack on that account. However, for this lab, that is an assumption you can make. Also you COULD just find all login failures and hunt through all the records until you find all three names, but you need to be efficient when working a SOC :slight_smile: