IncidentResponsev2

4.20 Investigate Alerts From Host Sensors

Task

Investigate and analyze alerts generated from host-based intrusion detection systems (HIDS) and endpoint detection agents to confirm malicious activity, identify related artifacts, and escalate findings for containment and eradication actions.


Conditions

Given:


Standards

Network Analyst Responsibilities

Host Analyst Responsibilities


End State


Notes


Manual Steps

From SIEM (Security Onion / Kibana / Splunk)

Validate on Host

Correlate and Report


Running Script

# Example to pull all events from Sysmon for review
Get-WinEvent -LogName "Microsoft-Windows-Sysmon/Operational" | Export-Csv SysmonLogs.csv

Dependencies


Other Available Tools

Tool Platform Installation Usage
Sysinternals Suite Windows Portable Process, network, autorun analysis
Lsof Linux/macOS Native File and network descriptor analysis
Event Viewer / Get-WinEvent Windows Native Event log review
Kibana / Elasticsearch Cross-platform Pre-installed in Security Onion Alert review + correlation
Splunk Cross-platform Installable Alert review + correlation

Operator Recommendations and Best Practices

Operator Checklist

Best Practices


References


Revision History

Date Version Description Author
2025-05-02 1.0 Original retained + expanded with operator workflow, validation procedures, and escalation guidance Leo