Articles by Thorben Jändling

Learn how to set up proper audit policies, configure your WEF, and set up your WEC server to forward your AD domain’s event logs to Elastic Security — all in this blog post...

Being able to collect and process Windows Event Logs has a huge impact on the effectiveness of any cybersecurity team. In this multi-part blog series, we explore all things related to Windows Event Logs. Start here...