This lesson focuses on analyzing network and log data to determine whether malicious URLs were accessed.

To determine if the user has executed the file they have downloaded, this step is critical.

Navigating Log Management

To begin our analysis, navigate to the "Log Management" page. Here, we will review logs to identify any suspicious activity or connections to malicious IP addresses and command and control (C2) addresses.

image.png

Steps to follow:

Find the IP Address of the Affected Host

image.png

Navigate to the Log Management Page:

Search for the IP Addresses:

Analyze Log Entries:

Determine Access Status: