Home

Log sources for process creation (4688) events from endpoints

%3CLINGO-SUB%20id%3D%22lingo-sub-977152%22%20slang%3D%22en-US%22%3ELog%20sources%20for%20process%20creation%20(4688)%20events%20from%20endpoints%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-977152%22%20slang%3D%22en-US%22%3E%3CP%3EHi%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20noticed%20that%20lots%20of%20the%20use%20cases%20in%20Sentinel%20are%20driven%20by%20process%20creation%20events%20-%204688%20in%20the%20Security%20event%20log%3B%20suspicious%20Powershell%20command%20lines%2C%20for%20example.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIs%20Microsoft's%20idea%20that%20the%20Sentinel%20agent%20would%20be%20deployed%20to%20all%20endpoints%20in%20order%20to%20capture%20these%3F%20Or%20can%20it%20leverage%20Defender%20ATP%20for%20these%20events%20(not%20just%20ATP's%20alerts).%20Or%20is%20the%20expectation%20that%20a%20customer%20might%20use%20Defender%20ATP%20for%20endpoint%20coverage%2C%20but%20ingest%20Security%20event%20logs%20from%20Windows%20Servers%20into%20the%20SIEM%20only%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1013905%22%20slang%3D%22en-US%22%3ERe%3A%20Log%20sources%20for%20process%20creation%20(4688)%20events%20from%20endpoints%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1013905%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F439770%22%20target%3D%22_blank%22%3E%40ford8k%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ENot%20a%20solution%2C%20but%20just%20sharing%20my%20thoughts...%3C%2FP%3E%3CP%3ECapturing%20all%20the%20process%20creation%20events%20from%20ALL%20endpoints%20would%20be%20prohibitive%20from%20a%20cost%20perspective.%20For%20this%20reason%2C%20I'm%20only%20considering%20deploying%20the%20agent%20on%20endpoints%20with%20suspicious%20behavior%20though%20this%20is%20not%20an%20optimal%20approach.%20Relying%20on%20Defender%20ATP%20is%20not%20an%20option%20as%20many%20of%20our%20customers%20have%20significant%20investments%20in%20endpoint%20protection%20and%20replacing%20them%20with%20Defender%20ATP%20would%20be%20a%20long%20sales%20and%20engineering%20effort.%20As%20it%20is%2C%20we%20need%20to%20balance%20costs%20of%20ingesting%20this%20data%20vs.%20the%20increase%20in%20security%20posture.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERegards%2C%3C%2FP%3E%3CP%3EAdrian%20Grigorof%3C%2FP%3E%3CP%3EManaged%20Sentinel%20Inc.%3C%2FP%3E%3CP%3E%3CA%20href%3D%22http%3A%2F%2Fwww.managedsentinel.com%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ewww.managedsentinel.com%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
ford8k
New Contributor

Hi

 

I noticed that lots of the use cases in Sentinel are driven by process creation events - 4688 in the Security event log; suspicious Powershell command lines, for example.

 

Is Microsoft's idea that the Sentinel agent would be deployed to all endpoints in order to capture these? Or can it leverage Defender ATP for these events (not just ATP's alerts). Or is the expectation that a customer might use Defender ATP for endpoint coverage, but ingest Security event logs from Windows Servers into the SIEM only?

2 Replies

@ford8k 

 

Not a solution, but just sharing my thoughts...

Capturing all the process creation events from ALL endpoints would be prohibitive from a cost perspective. For this reason, I'm only considering deploying the agent on endpoints with suspicious behavior though this is not an optimal approach. Relying on Defender ATP is not an option as many of our customers have significant investments in endpoint protection and replacing them with Defender ATP would be a long sales and engineering effort. As it is, we need to balance costs of ingesting this data vs. the increase in security posture.

 

Regards,

Adrian Grigorof

Managed Sentinel Inc.

www.managedsentinel.com

@ford8k   It seems like Microsoft doesn't care where the data comes from as long as it is stored in the Log Analytics with Sentinel can process it.  This can be shown by having all the various connectors that attach to various systems, both Microsoft and not.  I am sure Microsoft would love for you to deploy Defender ATP on all the machines and have all that data coming into Sentinel but is it realistic?  Granted Defender handles a lot of the security for you but at the very least, the Agent can have log files sent to Sentinel.

 

There are 2 schools of thought here: 1) Monitor only what you think will cause problems and 2) Monitor everything.  While option 1 will reduce your cost, how do you know you are not missing something?  Option 2 gives you a better view of your environment but at a higher cost.

 

Personally, I lean towards option 2 as much as possible since it is better to have the data and not need it rather than need the data and not have it.

Related Conversations
Tabs and Dark Mode
cjc2112 in Discussions on
46 Replies
Extentions Synchronization
Deleted in Discussions on
3 Replies
Stable version of Edge insider browser
HotCakeX in Discussions on
35 Replies
How to Prevent Teams from Auto-Launch
chenrylee in Microsoft Teams on
30 Replies
flashing a white screen while open new tab
Deleted in Discussions on
14 Replies
Security Community Webinars
Valon_Kolica in Security, Privacy & Compliance on
13 Replies