Detection of system accounts
Query the current logged-in system sessions
query user
Kick a user out of a session
logoff ID
Open lusrmgr.msc to check for new/suspicious accounts
View network connections
View all TCP and UDP port connections on the local machine and their corresponding PIDs
netstat -ano
Print the routing table
route print
View network proxy configuration
REG QUERY "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings"
Check processes
List all processes
tasklist
Forcefully terminate a process
taskkill /T /F /PID
Check startup items
View system boot time
net statistics workstation
View system scheduled tasks
schtasks /query /fo LIST /v
View program startup information
wmic startup get command,caption
View host service information
wmic service list brief
Network configuration information, including IP address, subnet mask, default gateway, etc.
ipconfig
System information, including operating system version, installation date, hardware information, etc.
systeminfo
Open the registry editor to search for and modify system registry
regedit
Used to view and configure network settings, user accounts, and shared resources.
net
Used to view and configure Windows services
sc
Scan and repair system files
sfc /scannow
Detect and repair disk errors
chkdsk
Open system configuration utility to configure startup items and services
msconfig
System log auditing
Type eventvwr.msc in the run box to open the event viewer
System log
Records events generated by operating system components, mainly including driver programs, system components, application software crashes, and data loss errors. The time types recorded in the system log are predefined by the Windows NT/2000 operating system. Default location: %SystemRoot%System32WinevtLogsSystem.evtx
Application log
Contains events recorded by applications or system programs, mainly recording events related to program execution. For example, a database program can record file errors in the application log, and program developers can decide which events to monitor. If an application crashes, we can find the corresponding record from the program event log, which may help you solve the problem. Default location: %SystemRoot%System32WinevtLogsApplication.evtx
Security log
Records system security audit events, including various types of login logs, object access logs, process tracking logs, privilege use, account management, policy changes, and system events. The security log is also the most commonly used log in forensic investigations. By default, the security log is turned off, and administrators can use group policies to enable the security log or set audit policies in the registry to make the system stop responding when the security log is full. Default location: %SystemRoot%System32WinevtLogsSecurity.evtx