{"id":2910,"date":"2026-05-02T17:53:00","date_gmt":"2026-05-02T17:53:00","guid":{"rendered":"https:\/\/zombierollz.blog\/?p=2910"},"modified":"2026-05-02T13:53:40","modified_gmt":"2026-05-02T13:53:40","slug":"auditing-and-monitoring","status":"publish","type":"post","link":"https:\/\/zombierollz.blog\/?p=2910","title":{"rendered":"Auditing and Monitoring"},"content":{"rendered":"\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-0e6e0102f36fef18c182b8d102b3f383\"><a href=\"https:\/\/tryhackme.com\/room\/auditingandmonitoringse\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/tryhackme.com\/room\/auditingandmonitoringse<\/a><br>Created by: tryhackme, strategos<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"418\" height=\"214\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-053015.png\" alt=\"\" class=\"wp-image-2911\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-053015.png 418w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-053015-300x154.png 300w\" sizes=\"auto, (max-width: 418px) 100vw, 418px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-2d9501f0c9c5497bdf3408ec0c0abd4f\">This is a great room and a good refresher for the high-level side of cybersecurity. I also got to do some low-level hands-on log combing with Linux and Windows. Task 1 briefly covers auditing and monitoring. Later, it goes into more details. With that, I obtain the answer to the first two questions.<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-e7b0501047b4e5743887cdd7110bd614\">&#8220;What do you call the systematic review of an organisation\u2019s technological infrastructure, policies and operations?&#8221;<br><br><strong>Auditing<\/strong> is a systematic, independent, and objective process of gathering and evaluating evidence to determine if an organisation, its policies, processes, controls, or financial statements comply with applicable laws, regulations, and industry standards.<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-69e7a5c4c9fb7d9dd3e478c6e411bfa7\">&#8220;What do you call the continuous observation of an organisation\u2019s computer technologies and related resources?&#8221;<br><br><strong>Monitoring<\/strong> is about continually checking a computer\u2019s or network\u2019s performance and behaviour. It involves watching over various components such as applications, storage, and networking to make sure they\u2019re working well together. Monitoring also looks for unusual behaviour and checks if anything violates established rules or policies.<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-78c5d2cf7dabe5d81e020eadaba17e52\">Task 2 does a great job of covering Audit objectives and Types.<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"220\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-053959-1024x220.png\" alt=\"\" class=\"wp-image-2912\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-053959-1024x220.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-053959-300x64.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-053959-768x165.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-053959.png 1231w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"441\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-054023-1024x441.png\" alt=\"\" class=\"wp-image-2913\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-054023-1024x441.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-054023-300x129.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-054023-768x331.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-054023.png 1266w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-da0b35eb74dfd6a9f51e9f34b56fe3d0\">They also cover internal, external, and third-party audits. Per THM, &#8221; <strong>Third-party audits:<\/strong>&nbsp;This type of audit is conducted when an organisation needs to assess its IT systems or controls within third parties, such as vendors, service providers, or subcontractors. Third-party audits ensure that the external entities a company relies on adhere to the required security, data protection, and compliance standards, thereby minimizing potential risks and exposures that may arise from their operations.&#8221;<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-9c8401797ba8d9cfda277cb25165b293\">&#8220;Which type of audit is conducted by independent auditors?&#8221;<br><br><strong>External audits:<\/strong>\u00a0External audits are conducted by independent auditors not employed by the organization being audited. These auditors are typically from external accounting or auditing firms, and the primary purpose is to provide an impartial and objective review.<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-28c1cc79f6cc26125e3bc07dfbf04c30\">&#8220;Which type of audit is conducted by an organisation\u2019s own personnel?&#8221;<br><br><strong>Internal audits:<\/strong>\u00a0These are performed by an organization\u2019s personnel or staff members assigned to the internal audit function.<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-aded05c56c3881faf61505237a9e346c\">Task 3 covers popular audit frameworks.<br><br><strong>COSO:<\/strong>\u00a0The Committee of Sponsoring Organizations of the Treadway Commission (COSO) is a private-sector initiative that develops frameworks for enterprise risk management, internal control, and fraud deterrence. COSO\u2019s\u00a0<a href=\"https:\/\/www.coso.org\/sitepages\/internal-control.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">Internal Control-Integrated Framework(opens in new tab)<\/a>\u00a0is one of the most widely used frameworks for auditing internal controls. It is typically used in various industries, including financial services, healthcare, and government.<br><br><strong>COBIT:<\/strong>\u00a0The\u00a0<a href=\"https:\/\/www.isaca.org\/resources\/cobit\" target=\"_blank\" rel=\"noreferrer noopener\">Control Objectives for Information and Related Technology(opens in new tab)<\/a>\u00a0(COBIT) is a framework for the governance and management of information and technology (IT). It provides a comprehensive set of control objectives that can be used to assess the effectiveness of an organisation\u2019s IT governance and management practices. It is typically used in various industries, including financial services, healthcare, and government.<br><br><strong>ISAE 3402:<\/strong>\u00a0<a href=\"https:\/\/isae3402.com\/ISAE3402_overview.html\" target=\"_blank\" rel=\"noreferrer noopener\">ISAE3402(opens in new tab)<\/a>\u00a0is an international standard that provides guidance on the assurance of controls over financial reporting. Auditors use it to assure of the effectiveness of an organisation\u2019s internal controls over financial reporting. It is typically used in various industries, including financial services, healthcare, and government.<br><br><strong>ISO 27001:<\/strong>\u00a0<a href=\"https:\/\/www.iso.org\/standard\/27001\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 27001(opens in new tab)<\/a>\u00a0is an international standard for information security management. It provides a set of best practices for information security management. It is typically used in various industries, including financial services, healthcare, and government.<br><br>ITIL**: ITIL stands for Information Technology Infrastructure Library. It is a framework of best practices for IT Service Management (ITSM). ITIL is used in auditing to establish a systematic approach for assessing an organisation\u2019s management and governance of IT services. By providing standard practices and criteria, ITIL helps organisations identify areas where their\u00a0ITSM\u00a0practices can be improved and to provide recommendations for how to make those improvements.<br><br><strong>PCI DSS:<\/strong>\u00a0The\u00a0<a href=\"https:\/\/www.pcisecuritystandards.org\/document_library\/?document=pci_dss\" target=\"_blank\" rel=\"noreferrer noopener\">Payment Card Industry Data Security Standard(opens in new tab)<\/a>\u00a0(PCI DSS) is a set of security requirements for organisations that accept payment cards. It is designed to protect cardholder data from unauthorised access, use, disclosure, alteration, or destruction. It is typically used in industries that accept payment cards, such as retail, hospitality, and healthcare.<br><br><strong>SOX:<\/strong>\u00a0The Sarbanes-Oxley Act of 2002 (SOX) is a federal law that establishes auditing and financial reporting requirements for public companies. It is designed to protect investors by improving the accuracy and reliability of financial reporting. It is typically used in public companies.<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-2ef9e34730d83670154ef4a2917d71aa\">&#8220;What is the standard used by organisations that process card payments?&#8221;<br><br><strong>PCI DSS<\/strong><\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-d90e90e1366f6c88d4921948bbff03c8\">&#8220;Who developed ITIL?&#8221;<br><br>TIL was developed by the Central Computer and Telecommunications Agency (<strong>CCTA<\/strong>), a government agency in Great Britain, in the late 1980s.<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-09abac549141e3c879e82a45ab6e5c67\">&#8220;Who developed COBIT?&#8221;<br><br>COBIT was developed by <strong>ISACA<\/strong> (Information Systems Audit and Control Association) to provide a framework for information technology management and governance<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-51a690ec1b99d8fa825cd44b271ea2cf\">Task 4 covers the audit process and uses COBIT as an example of how it would be applied to an org.<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"364\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-063533-1024x364.png\" alt=\"\" class=\"wp-image-2914\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-063533-1024x364.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-063533-300x107.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-063533-768x273.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-063533.png 1224w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-87b5a8d5d1d366985a45d87e3265f923\">&#8220;Which step do we present our findings about non-conformities, weaknesses and issues noted?<br><br>4. Reporting<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-ed7bc6fba6a3544844de0f71e8732c93\">&#8220;At which stage does an organisation review the steps based on recommendations for proper and satisfactory implementation?&#8221;<br><br>5. Follow-up<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-3fa12f0127b1093b9088c837d61be125\">&#8220;At which stage do the auditors establish the audit scope and define its objectives?&#8221;<br><br>1. Planning<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-de68d38d5171cb7c5c83ea7064739999\">Task 5 covers Logs and also links to another room you can check out. Apparently I&#8217;ve already completed it lol. <a href=\"https:\/\/tryhackme.com\/room\/introtologs\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/tryhackme.com\/room\/introtologs<\/a><br><br>Some of the purposes of logging are&#8230;<br><br><strong>Troubleshooting<\/strong>: Logs can be a valuable tool for troubleshooting errors. For instance, if a server fails to start, we would look at its logs to discover where it failed and what prevented it from starting.<br><br><strong>Monitoring<\/strong>: Logs provide plenty of insight into the utilisation of a system\u2019s resources. Consider the case where a server is slow, and we want to discover the bottleneck affecting its performance. The system might run low on memory, or the\u00a0CPU\u00a0might reach 100% utilisation for non-trivial durations. Logs can provide the necessary insights to pinpoint and solve the problem.<br><br><strong>Auditing<\/strong>: Logs record users\u2019 activities on a given system. On an audited system, we want to know who logged in, what files they accessed, and what changes they made. This information is necessary to audit a system or investigate any incident.<br><br><strong>Compliance<\/strong>: Logs can be a requirement to maintain compliance with relevant regulations. For instance, financial institutions need to keep logs of all financial transactions that take place.<br><br>In Task 6, I get my hands on log management with Linux.<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"370\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073542-1024x370.png\" alt=\"\" class=\"wp-image-2915\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073542-1024x370.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073542-300x108.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073542-768x277.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073542.png 1247w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-56fabbc5e80cccf6488d7e91cd244716\">THM assists with the the cli and using ausearch.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"563\" height=\"274\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073058.png\" alt=\"\" class=\"wp-image-2916\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073058.png 563w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073058-300x146.png 300w\" sizes=\"auto, (max-width: 563px) 100vw, 563px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-be21c1fb34d9a418c9ecf8c854e2b3ea\">&#8220;Using\u00a0<code>aureport<\/code>, how many failed logins have occurred so far?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"595\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073404.png\" alt=\"\" class=\"wp-image-2917\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073404.png 750w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073404-300x238.png 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-af6c56d95bb8b26918f67d1efec7b0f3\">&#8220;Using\u00a0<code>ausearch<\/code>, how many failed logins are related to the username\u00a0<code>mike<\/code>?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"668\" height=\"48\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073251.png\" alt=\"\" class=\"wp-image-2918\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073251.png 668w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073251-300x22.png 300w\" sizes=\"auto, (max-width: 668px) 100vw, 668px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-ca23680e716edc6aed013d4d0fb80bda\">&#8220;Using\u00a0<code>ausearch<\/code>, how many failed logins are related to the username\u00a0<code>root<\/code>?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"682\" height=\"50\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073021.png\" alt=\"\" class=\"wp-image-2919\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073021.png 682w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-073021-300x22.png 300w\" sizes=\"auto, (max-width: 682px) 100vw, 682px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-65390264a8120c80b88f489489926ee7\">Now on to Task 7, Log management on the Windows OS. In order to remote in through the attack box, I use command: xfreerdp \/v:IPHERE \/u:dawn \/p:AuditMe!<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"596\" height=\"563\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-074006.png\" alt=\"\" class=\"wp-image-2920\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-074006.png 596w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-074006-300x283.png 300w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"581\" height=\"593\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-074250.png\" alt=\"\" class=\"wp-image-2921\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-074250.png 581w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-01-074250-294x300.png 294w\" sizes=\"auto, (max-width: 581px) 100vw, 581px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"581\" height=\"487\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-084915.png\" alt=\"\" class=\"wp-image-2922\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-084915.png 581w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-084915-300x251.png 300w\" sizes=\"auto, (max-width: 581px) 100vw, 581px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-497eeca4926c9db40b64dfbf4f72937e\">&#8220;What is the event ID for a failed login attempt?&#8221;<br><br>4625, as seen above<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-31bd0024b6a6bba7319c5c0375c2c950\">&#8220;How many failed login attempts do you have under the security events?&#8221;<br><br>Sorting by 4625, we see 2 failed login attempts.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1015\" height=\"729\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-071745.png\" alt=\"\" class=\"wp-image-2923\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-071745.png 1015w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-071745-300x215.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-071745-768x552.png 768w\" sizes=\"auto, (max-width: 1015px) 100vw, 1015px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-74a352f69821956ed313989aa00a473e\">&#8220;How many failed login attempts took place in 2021?&#8221;<br><br>We see above there is only 1. The other failed attempt took place in 2023.<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-c3a16ab7ecf31e4853a073947f3a19fc\">Task 8 covers and presents a nice diagram of differences between logging and monitoring.<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"479\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-071906-1024x479.png\" alt=\"\" class=\"wp-image-2924\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-071906-1024x479.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-071906-300x140.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-071906-768x359.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-071906.png 1216w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-12ccf2590e53fb7fe20a208098987635\">SIEM Basics covers the all-mighty SIEM. They also link to two rooms; one that involves Wazuh that I need to tackle soon! <a href=\"https:\/\/tryhackme.com\/room\/wazuhct\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/tryhackme.com\/room\/wazuhct<\/a> and <a href=\"https:\/\/tryhackme.com\/room\/splunk101\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/tryhackme.com\/room\/splunk101<\/a>. THM has awesome Splunk rooms!<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"221\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-072943-1024x221.png\" alt=\"\" class=\"wp-image-2925\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-072943-1024x221.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-072943-300x65.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-072943-768x165.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-072943.png 1267w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-112fe06f9fde625dd1ed41cc0efa0e6c\">And another great informative table snippet to the end the room with!<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"448\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-073146-1024x448.png\" alt=\"\" class=\"wp-image-2926\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-073146-1024x448.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-073146-300x131.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-073146-768x336.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-02-073146.png 1234w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/tryhackme.com\/room\/auditingandmonitoringseCreated by: tryhackme, strategos This is a great room and a good refresher for the high-level side of cybersecurity. I also got to do some low-level hands-on log combing with Linux and Windows. Task 1 briefly covers auditing and monitoring. Later, it goes into more details. With that, I obtain the answer to the first [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2910","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/2910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2910"}],"version-history":[{"count":1,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/2910\/revisions"}],"predecessor-version":[{"id":2927,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/2910\/revisions\/2927"}],"wp:attachment":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}