197k views
2 votes
What to look for in logs for WMI attachs

User Djensen
by
7.5k points

1 Answer

2 votes

Final answer:

To detect WMI attacks in logs, look for unusual activity, suspicious processes, and connections to malicious IP addresses.

Step-by-step explanation:

When looking for WMI attacks in logs, there are several things to consider:

  1. Look for unexpected or unusual activity in the logs, such as repeated failed WMI authentication attempts or an increase in WMI-related events.
  2. Check for any suspicious processes or executable code being executed using WMI.
  3. Analyze any connections or communication with malicious IP addresses or domains.

These indicators can help you identify and respond to potential WMI attacks effectively.

User Chris Walton
by
8.1k points