Endpoint Monitoring Flashcards
(40 cards)
The practice of observing and analyzing host-level activity for signs of malicious behavior.
Endpoint monitoring
A security solution that collects real-time data from endpoints and detects suspicious behavior.
Endpoint Detection and Response (EDR)
A basic tool that monitors endpoints for malware using known signatures.
Antivirus
A centralized platform that manages security policies, agent configurations, and alerting across endpoints.
Endpoint security manager
Logs that record local user logins, process launches, and system changes.
Host-based logs
Log data that shows which user account started a process and when.
Security log (Event ID 4688 in Windows)
Suspicious behavior where a script spawns a system process (e.g., PowerShell → cmd.exe).
Process chaining
Endpoint activity indicating persistence via registry modification or startup folder use.
Persistence mechanism
An alert triggered when a program tries to access memory used by another program.
Memory injection detection
Endpoint behavior where malware disables security tools or logging.
Defense evasion
The file type or artifact that stores logs and events from Windows endpoints.
.evtx (Windows Event Log file)
Tool used to monitor Linux endpoint logs in real time.
journalctl
The process of collecting and analyzing security-relevant artifacts from a single host.
Host forensics
A suspicious event where a non-administrator account gains privileged access.
Privilege escalation
Detecting commands such as net user or whoami from scripts on a host.
Reconnaissance behavior
The process used to ensure endpoint logs are not tampered with.
Log integrity verification
Monitoring technique used to detect ransomware encrypting multiple files rapidly.
File access anomaly detection
Tool used to monitor file changes, hashes, and unauthorized modifications.
File Integrity Monitoring (FIM)
Endpoint activity showing encoded PowerShell or base64 strings.
Obfuscated command execution
Suspicious access to C:\Users<user>\AppData\Temp or similar directories may indicate:
Malware staging
A known clean file altered by an attacker to evade detection.
Living off the land (LOLBin)
The use of a system tool (like regsvr32.exe) for malicious purposes.
Living off the land technique
The component responsible for sending endpoint log data to a SIEM.
Log forwarder (e.g., Winlogbeat, NXLog)
A suspicious pattern of failed login attempts on an endpoint.
Brute-force attack