SlideShare a Scribd company logo
WIPRO NGA Program – DWS
Batch
Capstone Project Presentation – 12 May 2024
www.rpsconsulting.in
Presented by – Anjali Sharma
Failed User logins: Investigating repeated failed user login
attempts
Failed User logins: Investigating repeated
failed user login attempts.
2024 - RPS Consulting all rights reserved
2
TITLE: Failed User logins: Investigating repeated failed user login
attempts.
PURPOSE: This SOP outlines the steps to be taken when investigating
repeated failed user login attempts in order to maintain the security of
the system or platform.
SCOPE: This SOP is applicable for all the personnel who are authorized
to manage servers in the window server environment.
 PROCEDURE-:
• Investigating user failure attempts using event viewer requires a systematic approach to
identify potential security threats and take appropriate actions.
•Step 1: You can use Event Viewer to see the logs and investigate events.
•Open Event Viewer in Active Directory and navigate to Windows Logs>Security.
 The pane in the center lists all the events that have been setup forauditing. You will have to
go through events registered to look for failedlogon attempts. Once you find them, you can
right click on the event and select Event Properties for more details. In the window that
opens, you can find the IP address of the device from which the logon was attempted.
•STEP 2: Identifying Root cause :
Identify the source of the failed login attempts using available information from the alert.
Check the IP address associated with the failed attempts for any signs of suspicious activity
or known malicious behavior.
Determine if there are any patterns in the login attempts, such as sequential usernames or
common passwords.
Resolution for forgotten password:
• When user forgotten their password, follow these steps:- Login to the domain as an
administrator.
Open to the server manager > navigate tools.
 In the tools> select Active Directory users and Computers.
•Step 2: In the domain (abc.local)
Right click on the user account that requires reset password.
Select reset password.
•Step 3: Set a new password for the user
•Step 4: Confirm the password change and Click OK.
•Step 5: Notify the user of the new password.
3. Monitor Logs:
Regularly monitor logs related to user login attempts across all relevant systems and
platforms.
Logs may include authentication logs, access logs, and event logs depending on the
type of system.
4. Temporary Lockouts:
If deemed necessary based on the investigation, implement temporary lockouts for the
user account or IP address associated with the failed login attempts.
Document the duration of the lockout and ensure it complies with security policies.
5. Enhanced Security Measures:
Evaluate whether additional security measures such as multi- factor authentication
(MFA) or password complexity requirements are needed to mitigate future risks.
Implement any necessary changes to strengthen security controls.
6. User Notification:
If a user account is affected by the investigation, notify the user about the failed login
attempts and any temporary lockouts imposed on their account.
Provide guidance on best practices for maintaining account security and offer
assistance if needed.
7. Documentation and Reporting:
Document the details of the investigation, including findings, actions taken, and any
recommendations for improving security.
Generate reports summarizing the investigation results and submit them to relevant
stakeholders, such as IT management or compliance teams.
8. Review and Continuous Improvement:
Regularly review the effectiveness of the investigation process and make adjustments
as necessary based on emerging threats and lessons learned.
Continuously improve security measures to enhance the resilience of the system against
unauthorized access attempts.
VALIDATION: By the following sop the server administrator can be able to Investigate and
repeated failed user login attempts.

More Related Content

PPTX
Detecting Windows horizontal password guessing attacks in near real-time
Portcullis Computer Security
 
PPTX
Critical Log Review Checklist For Security Incidents
Joe Shenouda
 
PPTX
ISACA Scholarship Competition.pptx
Junho Lee
 
PDF
CNIT 121: 17 Remediation Introduction (Part 1)
Sam Bowne
 
DOCX
Winchester Aquarium and Pet Center Incident Response Plan
R. Curtis Roth
 
PDF
Incident response before:after breach
Sumedt Jitpukdebodin
 
PPTX
Incident Response Security
ssuser30902e
 
PPTX
Detecting windows horizontal password blog
Portcullis Computer Security
 
Detecting Windows horizontal password guessing attacks in near real-time
Portcullis Computer Security
 
Critical Log Review Checklist For Security Incidents
Joe Shenouda
 
ISACA Scholarship Competition.pptx
Junho Lee
 
CNIT 121: 17 Remediation Introduction (Part 1)
Sam Bowne
 
Winchester Aquarium and Pet Center Incident Response Plan
R. Curtis Roth
 
Incident response before:after breach
Sumedt Jitpukdebodin
 
Incident Response Security
ssuser30902e
 
Detecting windows horizontal password blog
Portcullis Computer Security
 

Similar to SOP 28 Failed User logins DWS Batch NGA Program (20)

DOCX
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Anton Chuvakin
 
PDF
100_Custom_SIEM_Rules_For_Client_Onboarding_1737703364.pdf
ptnut123
 
PPT
1556 a 09
Lê Liêu
 
PDF
Incident Response: Best Practices for Common Attack Scenarios
InfosecTrain Education
 
PDF
INCIDENT RESPONSE - BEST PRACTICES FOR COMMON ATTACK SCENARIOS
infosecTrain
 
PPTX
First Responders Course - Session 5 - First Response [2004]
Phil Huggins FBCS CITP
 
PPT
Six Mistakes of Log Management 2008
Anton Chuvakin
 
DOCX
DISASTER RECOVERY 14Disaster RecoveryStude.docx
salmonpybus
 
PDF
Prévention et détection des mouvements latéraux
ColloqueRISQ
 
PPT
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
abhichowdary16
 
PDF
Understanding the Event Log
chuckbt
 
PPTX
Power of logs: practices for network security
Information Technology Society Nepal
 
PDF
Intruders
Dr.Florence Dayana
 
PPT
FIRST 2006 Full-day Tutorial on Logs for Incident Response
Anton Chuvakin
 
PDF
Irm 5-malicious networkbehaviour
Kasper de Waard
 
PDF
File000119
Desmond Devendran
 
PDF
YBB-NW-distribution
Mike Saunders
 
PPTX
You Will Be Breached
Mike Saunders
 
PPTX
How to Audit Your Incident Response Plan
Resilient Systems
 
PPTX
Incident response process
Bhupeshkumar Nanhe
 
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Anton Chuvakin
 
100_Custom_SIEM_Rules_For_Client_Onboarding_1737703364.pdf
ptnut123
 
1556 a 09
Lê Liêu
 
Incident Response: Best Practices for Common Attack Scenarios
InfosecTrain Education
 
INCIDENT RESPONSE - BEST PRACTICES FOR COMMON ATTACK SCENARIOS
infosecTrain
 
First Responders Course - Session 5 - First Response [2004]
Phil Huggins FBCS CITP
 
Six Mistakes of Log Management 2008
Anton Chuvakin
 
DISASTER RECOVERY 14Disaster RecoveryStude.docx
salmonpybus
 
Prévention et détection des mouvements latéraux
ColloqueRISQ
 
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
abhichowdary16
 
Understanding the Event Log
chuckbt
 
Power of logs: practices for network security
Information Technology Society Nepal
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
Anton Chuvakin
 
Irm 5-malicious networkbehaviour
Kasper de Waard
 
File000119
Desmond Devendran
 
YBB-NW-distribution
Mike Saunders
 
You Will Be Breached
Mike Saunders
 
How to Audit Your Incident Response Plan
Resilient Systems
 
Incident response process
Bhupeshkumar Nanhe
 
Ad

Recently uploaded (20)

PDF
MiniTool Power Data Recovery Crack New Pre Activated Version Latest 2025
imang66g
 
PPTX
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
PDF
Protecting the Digital World Cyber Securit
dnthakkar16
 
PPTX
Visualising Data with Scatterplots in IBM SPSS Statistics.pptx
Version 1 Analytics
 
PPTX
Role Of Python In Programing Language.pptx
jaykoshti048
 
PPT
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
PPTX
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
PDF
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
PPTX
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
PDF
WatchTraderHub - Watch Dealer software with inventory management and multi-ch...
WatchDealer Pavel
 
DOCX
Can You Build Dashboards Using Open Source Visualization Tool.docx
Varsha Nayak
 
PPTX
Presentation about Database and Database Administrator
abhishekchauhan86963
 
PDF
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
PDF
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
PDF
Jenkins: An open-source automation server powering CI/CD Automation
SaikatBasu37
 
PPTX
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
PPTX
Odoo Integration Services by Candidroot Solutions
CandidRoot Solutions Private Limited
 
PDF
Balancing Resource Capacity and Workloads with OnePlan – Avoid Overloading Te...
OnePlan Solutions
 
PDF
49784907924775488180_LRN2959_Data_Pump_23ai.pdf
Abilash868456
 
PPTX
Explanation about Structures in C language.pptx
Veeral Rathod
 
MiniTool Power Data Recovery Crack New Pre Activated Version Latest 2025
imang66g
 
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
Protecting the Digital World Cyber Securit
dnthakkar16
 
Visualising Data with Scatterplots in IBM SPSS Statistics.pptx
Version 1 Analytics
 
Role Of Python In Programing Language.pptx
jaykoshti048
 
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
WatchTraderHub - Watch Dealer software with inventory management and multi-ch...
WatchDealer Pavel
 
Can You Build Dashboards Using Open Source Visualization Tool.docx
Varsha Nayak
 
Presentation about Database and Database Administrator
abhishekchauhan86963
 
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
Jenkins: An open-source automation server powering CI/CD Automation
SaikatBasu37
 
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
Odoo Integration Services by Candidroot Solutions
CandidRoot Solutions Private Limited
 
Balancing Resource Capacity and Workloads with OnePlan – Avoid Overloading Te...
OnePlan Solutions
 
49784907924775488180_LRN2959_Data_Pump_23ai.pdf
Abilash868456
 
Explanation about Structures in C language.pptx
Veeral Rathod
 
Ad

SOP 28 Failed User logins DWS Batch NGA Program

  • 1. WIPRO NGA Program – DWS Batch Capstone Project Presentation – 12 May 2024 www.rpsconsulting.in Presented by – Anjali Sharma Failed User logins: Investigating repeated failed user login attempts
  • 2. Failed User logins: Investigating repeated failed user login attempts. 2024 - RPS Consulting all rights reserved 2 TITLE: Failed User logins: Investigating repeated failed user login attempts. PURPOSE: This SOP outlines the steps to be taken when investigating repeated failed user login attempts in order to maintain the security of the system or platform. SCOPE: This SOP is applicable for all the personnel who are authorized to manage servers in the window server environment.
  • 3.  PROCEDURE-: • Investigating user failure attempts using event viewer requires a systematic approach to identify potential security threats and take appropriate actions. •Step 1: You can use Event Viewer to see the logs and investigate events. •Open Event Viewer in Active Directory and navigate to Windows Logs>Security.
  • 4.  The pane in the center lists all the events that have been setup forauditing. You will have to go through events registered to look for failedlogon attempts. Once you find them, you can right click on the event and select Event Properties for more details. In the window that opens, you can find the IP address of the device from which the logon was attempted. •STEP 2: Identifying Root cause : Identify the source of the failed login attempts using available information from the alert. Check the IP address associated with the failed attempts for any signs of suspicious activity or known malicious behavior. Determine if there are any patterns in the login attempts, such as sequential usernames or common passwords. Resolution for forgotten password: • When user forgotten their password, follow these steps:- Login to the domain as an administrator.
  • 5. Open to the server manager > navigate tools.  In the tools> select Active Directory users and Computers.
  • 6. •Step 2: In the domain (abc.local) Right click on the user account that requires reset password. Select reset password.
  • 7. •Step 3: Set a new password for the user •Step 4: Confirm the password change and Click OK. •Step 5: Notify the user of the new password.
  • 8. 3. Monitor Logs: Regularly monitor logs related to user login attempts across all relevant systems and platforms. Logs may include authentication logs, access logs, and event logs depending on the type of system. 4. Temporary Lockouts: If deemed necessary based on the investigation, implement temporary lockouts for the user account or IP address associated with the failed login attempts. Document the duration of the lockout and ensure it complies with security policies. 5. Enhanced Security Measures: Evaluate whether additional security measures such as multi- factor authentication (MFA) or password complexity requirements are needed to mitigate future risks. Implement any necessary changes to strengthen security controls. 6. User Notification: If a user account is affected by the investigation, notify the user about the failed login attempts and any temporary lockouts imposed on their account. Provide guidance on best practices for maintaining account security and offer assistance if needed.
  • 9. 7. Documentation and Reporting: Document the details of the investigation, including findings, actions taken, and any recommendations for improving security. Generate reports summarizing the investigation results and submit them to relevant stakeholders, such as IT management or compliance teams. 8. Review and Continuous Improvement: Regularly review the effectiveness of the investigation process and make adjustments as necessary based on emerging threats and lessons learned. Continuously improve security measures to enhance the resilience of the system against unauthorized access attempts. VALIDATION: By the following sop the server administrator can be able to Investigate and repeated failed user login attempts.