I have some Suspicion of identity theft based on abnormal behavior alerts and one alert in particular for a user was flagged as requesting access to 32 abnormal resources. When reviewing the alert, I see some resources, both Windows servers and Windows workstations,
tagged as CIFS, some server access flagged as LDAP, etc.
To determine if the user truly accessed the resources listed, what other logs should I be reviewing? Domain controller logs? Netflow/network traffic logs?
If after investigating, I conclude the alert was a false positive and I close and exclude the user, what exactly am I excluding? Any activity from the user, or just the specific activity occurred for that user for those defined resources?
Thx