- Dec 29, 2014
- 1,716
Started last night setting up some rules for good times sake for monitoring Windows connections via the CFW log. An example is that CFW can monitor svchost connections between home network PCs with an IPv6 rule set to Allow and then Log each event. This traffic is auto-allowed with the original Windows System Applications allow rule, but logging all of these events leads to DNS event spam in the log, basically rendering it useless.
The idea is working very well so far, albeit just for observation purposes at this point. I think it may lead to some nice rules for logging connection attempts from remote PCs (another neighborhood network or via the internet).
Wannacry gave me some initiative for experimenting with monitoring Windows allows by using Comodo to log processes like rundll32.exe, lsass.exe, dllhost.exe, svchost.exe, services.exe, taskhost.exe (or taskengine not sure which or both?), dwm.exe, and winlogon.exe. Then I was thinking of monitoring the script engines. From a security standpoint, anyone know of a comprehensive list of Windows processes that a developer/malware writer can use to achieve an internet connection?
The idea is working very well so far, albeit just for observation purposes at this point. I think it may lead to some nice rules for logging connection attempts from remote PCs (another neighborhood network or via the internet).
Wannacry gave me some initiative for experimenting with monitoring Windows allows by using Comodo to log processes like rundll32.exe, lsass.exe, dllhost.exe, svchost.exe, services.exe, taskhost.exe (or taskengine not sure which or both?), dwm.exe, and winlogon.exe. Then I was thinking of monitoring the script engines. From a security standpoint, anyone know of a comprehensive list of Windows processes that a developer/malware writer can use to achieve an internet connection?