1. Overview

When investigating an event, a SOC analyst needs persistent identifiers to link network activity to a physical machine and a user.

Protocols that can be used in Host and User identification:

2. Description

2.1 DHCP

2.2 NetBIOS

2.3 Kerberos