Monitoring Windows High Risk events


Details
Join us as we dive deep into the intricacies of "Monitoring Windows High Risk Events". With Windows being a prime target for cyber threats, understanding and monitoring high-risk events is paramount. This meetup is extra special, as we introduce a groundbreaking tool - DNSCollect!
Introducing DNSCollect: A New Approach to Windows 10 Event Log Collection
In today's digital ecosystem, the escalating threats of supply chain software attacks are unsettling. DNSCollect arrives as a timely solution - an agent-less tool designed exclusively for Windows 10 event log collection.
Why DNSEye?
- Supply Chain Safety: Navigate the digital age with fewer vulnerabilities. DNSCollect's agent-less design is a nod to reducing the risks of supply chain attacks.
- Remote Collections: With a unique approach using DNS queries, DNSCollect enables remote event log collections sans installations or intrusive permissions.
Your Participation Matters! We've invested heavily in DNSCollect, but community feedback is paramount. We invite attendees to test DNSCollect and contribute insights that can help refine the tool for wider use. Explore DNSCollect on GitHub: [DNSCollect/README.md at main · operation-hp/DNSCollect (github.com)](https://github.com/operation-hp/DNSCollect/blob/main/README.md)

Monitoring Windows High Risk events