Authentication is one of the most common network events, but it can be challenging to sift through these events and determine welcome versus unwelcome activity. Microsoft event logging keeps track of authentication events. These logs can be very beneficial to correlate certain authentication activities. By monitoring successful and failed attempts over time, noticeable trends with specific usernames, hosts, and domains become apparent. This can help identify potential issues such as compromised credentials, malicious insiders, and other activities that merit deeper investigation.
Content pack demo
Content packs are available directly inside the McAfee Enterprise Security Manager user interface. Watch the video to discover how to access your content pack and get started.Watch Video
Download Content Pack
Registered ServicePortal users can log in to access the Knowledge Center for further documentation or to download the content pack file manually.Read Article
Find other content packs and partner integrations.See All
Interested in McAfee Enterprise Security Manager?Register