The easiest way to test the ATA functions is to simulate a DNS reconnaissance type attack:
- Log in to a domain computer.
- Open Command Prompt and type nslookup – REBELNET-PDC01.therebeladmin.com and press Enter. The server name can be replaced by any domain controller FQDN.
- Then type ls live.com.
- Then log in to ATA center and check the timeline. There, we can see the detected event:
- It provides detailed explanation about the issue in a way that engineers can easily understand. These events also can be exported as a Microsoft Excel file.
- ATA also allows us to send events as email alerts. This configuration can be done using ...