Detect lateral movement across your network by analyzing authentication, process, and network logs. Identify PsExec, WMI, RDP, and other techniques attackers use to spread through environments.
-- Lateral movement evidence across multiple event types: [4624] jsmith Type 3 (Network) on SERVER02 from 10.0.5.142 [4688] cmd.exe /c "net view \\SERVER03" on SERVER02 by jsmith [4648] Explicit creds: jsmith using svc_admin to SERVER03 [4624] svc_admin Type 3 on SERVER03 from SERVER02 (10.0.5.50) [4688] powershell.exe on SERVER03 by svc_admin: Invoke-Command -ComputerName SERVER04