Lockdown Lab #29 CRITICAL Windows Server

Configure Windows Event Forwarding (WEF)

Configure Windows Event Forwarding (WEF)

If an attacker is moving laterally through your Windows network right now, and you can’t see their steps, you’ve already lost. Most organizations are blind to post-compromise activity because they aren’t collecting the right logs.

The fix is Windows Event Forwarding (WEF). This isn’t optional; it’s foundational. You need to pull Security, System, and PowerShell event logs off your endpoints and into your SIEM. Leaving logs sitting on local machines is a disaster waiting to happen. Attackers know this and will clear them the moment they get access.

Start by ensuring the right audit policies are enabled to generate these critical logs. Without them, there’s nothing to forward. For example:

auditpol /set /category:”Logon/Logoff” /success:enable /failure:enable auditpol /set /category:”Account Logon” /success:enable /failure:enable auditpol /set /category:”Object Access” /success:enable /failure:enable

Then, configure WEF to centralize these events. This gives you visibility into everything from failed logins to suspicious process execution. If you’re not doing this, you are missing critical detection capabilities.

Go configure WEF today.

The fix

# Enable audit policies

auditpol /set /category:"Logon/Logoff" /success:enable /failure:enable

auditpol /set /category:"Account Logon" /success:enable /failure:enable

auditpol /set /category:"Object Access" /success:enable /failure:enable

auditpol /set /category:"Privilege Use" /success:enable /failure:enable

# Forward to SIEM via Windows Event Forwarding or agent

Reference: CIS Windows Server Benchmark 17

Mark this as done

Open the interactive hardening checklist and tick this off in your environment.

Open interactive checklist →

Related Posts

Enable PowerShell script block logging

Attackers live in PowerShell. Your incident response team will be blind without proper logging. This is how you catch them before they pivot from initial...

lockdown-labhardeningwindowslogging
/Shimi Cohen

Disable SMBv1

WannaCry, NotPetya, EternalBlue. These aren't ancient history; they're a stark reminder of what happens when you leave an ancient, vulnerable protocol like SMBv1 enabled. It's...

lockdown-labhardeningwindowsnetwork
/Shimi Cohen

Disable SMBv1

WannaCry, NotPetya, EternalBlue. If those names don't send a shiver down your spine, you've been lucky. The common thread? SMBv1. This isn't ancient history; it's...

lockdown-labhardeningwindowsnetwork
/Shimi Cohen