Use the T1070 - Windows Events Logs Cleared playbook
Share this page
Print
- UpdatedJul 31, 2025
- 3 minutes to read
- Zurich
- Security Incident Response Analysis
Use this playbook to investigate incidents that track event types where the user removes security logs. The following steps give you a walkthrough of the actions, tasks, and subflows that are available in the T1070 - Windows Events Logs Cleared playbook.
Before you begin
Role required:
- sn_si.admin
- flow_designer
Procedure
- When the playbook is triggered and starts executing, in Action 1, obtain the user details from the alert.
- In Action 2, check whether the user has been identified or not.
-
In Action 3, if the user has not been identified, perform the following steps:
- In Action 4, check the CMDB (Configuration management database) for the host owner details.
-
In Action 5, check whether the user has been identified from the CMDB or not.
If the user has been identified from the CMDB, a manual response task is created in Action 5 and the flow ends.
Figure 1. T1070 - Windows Events Logs Cleared playbook
-
In Action 6, if the user has not been identified from the CMDB, perform the following steps:
- In Action 7, create an incident to identify the system owner and the individual who deleted the logs.
- In Action 8, check whether the user been identified after raising an incident or not.
If the user has been identified after raising an incident, a manual response task is created in Action 8 and the flow ends.
- In Action 9, if the user has not been identified after raising an incident, perform the following steps:
- In Action 10, discuss the next course of action with peers.
- In Action 11, isolate the host system.
- In Action 12, remove any unwanted files that may have been created, and delete the rogue accounts.
- In Action 13, lift the containment and bring the systems back to operational standards.
- In Action 14, complete the post-incident review before closing the task.
In Action 15, the flow ends.
- In Action 16, if the user has been identified, then check the user's role to see if the user is authorized to clear or remove logs.
-
In Action 17, reach out to the user for validation of their business justification.
You can use the provided email template to contact the user.
Figure 2. Using the T1070 - Windows Events Logs Cleared playbook
- In Action 18, check whether a valid business justification is provided or not.
-
In Action 19, if there was a valid business justification provided, then in Action 20, document the findings so far.
The flow ends.
-
In Action 21, if there was no valid business justification provided, perform the following steps:
- In Action 22, discuss the next course of action with peers.
- In Action 23, isolate the host system.
- In Action 24, remove any unwanted files that may have been created, and delete the rogue accounts.
-
In Action 25, lift the containment and bring the systems back to operational standards.
The flow ends.
- In Action 26, complete the post-incident review before closing the task.