{"id":130257,"date":"2009-11-12T14:10:00","date_gmt":"2009-11-12T19:10:00","guid":{"rendered":"tag:blogger.com,1999:blog-7196788127833928948.post-83222016980090942"},"modified":"2009-11-12T14:10:00","modified_gmt":"2009-11-12T19:10:00","slug":"analysis-of-windows-security-logs-with-ms-log-parser","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/130257","title":{"rendered":"Analysis of Windows Security Logs with MS Log Parser"},"content":{"rendered":"<p>When investigating an intrusion in a Windows system, one of the first places to start is the Windows security log. Security event log is also very useful for analysis when searching for anomalies and possible intrusions.<\/p>\n<p>Reading through a Windows security log or any other log can be very difficult and time consuming, so a lot of companies have created their own tools to analyze windows event logs. But before you start going commerical, there is a tool that will get you going without any cost. Against all odds, it&#8217;s a tool made by Microsoft!<\/p>\n<p><span style=\"font-weight: bold;\">The tool<\/span><br \/>The tool in question is <a href=\"http:\/\/www.microsoft.com\/downloads\/details.aspx?FamilyID=890cd06b-abf8-4c25-91b2-f8d975cf8c07&amp;displaylang=en\">Microsoft Log parser<\/a>. Log parser is a command line tool that provides universal query access to text-based data such as log files, XML files and CSV files, as well as key data sources on the Windows operating system such as the Event Log, the Registry, the file system, and Active Directory. So, you can use it to analyze most structured text based files and the eventlog and AD on a single computer.<\/p>\n<p>You can query remote computers on the network, as long as the credentials that Log parser is running under can access the data sources on the remote computers.<\/p>\n<p><span style=\"font-style: italic;\">For Security Log, you need to run Log Parser as administrator<\/span><br \/>Note that this tool doesn&#8217;t collect data from multiple computers, it just analyzes data in a single file\/single computer repository.<\/p>\n<p><span style=\"font-weight: bold;\">The improved interface<\/span><br \/>In it&#8217;s original form, Log Parser is a command line tool, so it is not the most user friendly tool in the world. Also, it has no way of saving\/storing your prepared queries so you can invoke them later. But a promising developer named Dimce Kuzmanov created a free frontend to Log parser called <a href=\"http:\/\/www.lizardl.com\/PageHtml.aspx?lng=2&amp;PageId=18&amp;PageListItemId=17\">Log Parser Lizard<\/a>.<\/p>\n<p><a onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\" href=\"http:\/\/4.bp.blogspot.com\/_Hu1rpxRsqcU\/Svx8CeGQ-iI\/AAAAAAAAAWM\/_hY1U-Y122Q\/s1600-h\/Log+Parser+Lizard.jpg\"><img decoding=\"async\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 194px;\" src=\"http:\/\/4.bp.blogspot.com\/_Hu1rpxRsqcU\/Svx8CeGQ-iI\/AAAAAAAAAWM\/_hY1U-Y122Q\/s320\/Log+Parser+Lizard.jpg\" alt=\"\" id=\"BLOGGER_PHOTO_ID_5403330034818677282\" border=\"0\" \/><\/a><br \/>Log Parser Lizard enables you to store the prepared queries, and organizes them by type of data source on which you wish to do an analysis. It also includes <span id=\"grdPageItems__ctl3_Label2\">the ability to export results to Excel, autogenerates charts<\/span> on the result of the executed query, or ability to export the queried subset into the original format from which the analysis was performed.<\/p>\n<p><span style=\"font-weight: bold;\">Analyzing the Security Log with Log Parser Lizard<\/span><br \/>Using Log Parser Lizard for Security Log analysis is very simple. Choose the Queries button and select the Event Logs category, then create the queries that you need for your analysis. Here are some examples:<\/p>\n<ul>\n<li>SELECT * FROM SECURITY &#8211; simple dump all data from the security log<\/li>\n<li>SELECT EVENTID, COUNT(*) FROM SECURITY GROUP BY EVENTID &#8211; analyze what types of events appear in the security log and in what quantity<\/li>\n<li>SELECT * FROM SECURITY WHERE EVENTID=&#8217;517&#8242; &#8211; find whether the security log was cleared in Win2000\/XP\/2003<\/li>\n<\/ul>\n<p>After you create the query, choose the apropriate category, then click the &#8216;Generate&#8217; button to execute the query. You can also graph the results by choosing the Chart->Visible option.<\/p>\n<p><span style=\"font-weight: bold;\">Conclusion<\/span><br \/>Analyzing the Security Log is always a useful approach to security controls, so you need to include it in your routine operations. And until you buy a <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_0\">SIEM<\/span> system which will run an automatic and scheduled analysis, you should adopt a simple tool like Log Parser and Log Parser Lizard.<\/p>\n<p><span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_1\">Talkback<\/span> and comments are most welcome<\/p>\n<p>Related posts<br \/><a href=\"http:\/\/www.shortinfosec.net\/2008\/07\/mail-header-security-analysis.html\">Tutorial &#8211; Mail Header Analysis for Spoof Protection<\/a><br \/><a href=\"http:\/\/www.shortinfosec.net\/2009\/11\/reminder-tutorial-enable-auditing-on.html\">Reminder Tutorial &#8211; Enable Auditing on Windows 7<\/a><br \/><a href=\"http:\/\/www.shortinfosec.net\/2009\/10\/windows-7-full-disk-encryption-with.html\">Windows 7 Full Disk Encryption with <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_2\">Truecrypt<\/span><\/a><\/p>\n<div class=\"blogger-post-footer\"><img width='1' height='1' src='https:\/\/blogger.googleusercontent.com\/tracker\/7196788127833928948-83222016980090942?l=www.shortinfosec.net' alt='' \/><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/shortinfosec\/~4\/dmVHVQpqtko\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When investigating an intrusion in a Windows system, one of the first places to start is the Windows security log. Security event log is also very useful for analysis when searching for anomalies and possible intrusions. Reading through a Windows security log or any other log can be very difficult and time consuming, so a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-130257","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/130257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=130257"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/130257\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=130257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=130257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=130257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}