SEC44‐Log Hunting - ConnorEast/Tech-Journal GitHub Wiki

Log Hunting Overview

This assignment requires the use of UTMStack for the purpose of searching and analyzing log files. Logs are often the most well known starting place for attack triage location. UTMStack is known to be a XDR (Extended Detection & Response) tool which has inbuilt SIEM (System Integrity and Event Management) capabilities. This assignment will require the following steps
--- Step 1: Access UTMStack & Subsidiary tool documentation.
--- Step 2: Setting up UTMStack.
--- Step 3: Creating UTMStack rules.
--- Step 4: Show the contents required in the Deliverables Section.

Demo Page Setup

image

Setup:

image image image
It seems like as of now, there are no free trials allowed on the UTMStack downloads page. This account that is being used is my school account and I only just created the account. As such its not an issue with usage or previous downloads. You might be able to install it straight from the github.

Deliverables:

1. Provide the direct link to the documentation for UTMStack.
https://documentation.utmstack.com/v10/Getting%20started/introduction
2. Provide a link to the documentation for creating rules with UTMStack.
https://documentation.utmstack.com/v10/correlation%20rules/customizable_rules
3. Provide a link to their GitHub repository.
https://github.com/utmstack/UTMStack
4. When you login to the demo, take a screenshot of the: 4.a. "Alerts" page. image
4.b. "Incidents" page image
4.c. "Log explorer" page image
4.d. "Integrations" page image
4.e. RAM and Disk Usage image image
5. Locate the "Correlation Rules" and then find the Windows rule under "System" for "clearing_windows_event_logs.yml" and take a screenshot. image image
⚠️ **GitHub.com Fallback** ⚠️