Lateral Movement Detection in Logs

AttackPatterns Windows Security Lateral Movement

What This Means

Detect lateral movement across your network by analyzing authentication, process, and network logs. Identify PsExec, WMI, RDP, and other techniques attackers use to spread through environments.

Example Log

-- Lateral movement evidence across multiple event types:
[4624] jsmith Type 3 (Network) on SERVER02 from 10.0.5.142
[4688] cmd.exe /c "net view \\SERVER03" on SERVER02 by jsmith
[4648] Explicit creds: jsmith using svc_admin to SERVER03
[4624] svc_admin Type 3 on SERVER03 from SERVER02 (10.0.5.50)
[4688] powershell.exe on SERVER03 by svc_admin: Invoke-Command -ComputerName SERVER04

Indicators of Suspicious Activity

How to Investigate

  1. Map the authentication chain: trace the account from initial logon through each hop
  2. Identify the pivot point — the first compromised system used for lateral movement
  3. Check for credential harvesting activity before the movement (Event 4672 + 4688 with Mimikatz indicators)
  4. Determine which accounts are being used (user accounts, service accounts, admin accounts)
  5. Assess the scope — how many systems were accessed during the movement
  6. Check for data staging or exfiltration at the endpoints of the movement chain

Recommended Mitigations

Scan This Log Instantly

Paste a suspicious log line below and get an instant AI-powered security assessment.

0 / 2000

Need a Full Investigation?

Scan entire log files, detect attack patterns, reconstruct timelines, and generate a full investigation report.

Run Smart Scan

Related Attack Patterns

Frequently Asked Questions

What are common lateral movement techniques?
Most common: PsExec/SMB execution, WMI remote execution, PowerShell remoting (WinRM), RDP, scheduled tasks on remote systems, and DCOM-based execution. Each leaves different log artifacts.
How do I detect lateral movement early?
Monitor for: admin accounts authenticating to many systems, Type 3 logons between workstations, reconnaissance commands (net view, net user), and credential use on systems outside the accounts normal scope.
What is the most effective control against lateral movement?
Network segmentation combined with credential hygiene. If each system has a unique local admin password (LAPS), admin accounts cannot pivot using shared credentials. Add micro-segmentation to limit which systems can communicate.