Summary
In this chapter, we covered what Windows process means, the relationships between processes, the process types, and the most common Windows standard process. We also explored the events that Microsoft provides, which allow you to track every process execution activity and the most common attacks and techniques that target Windows processes. Armed with this knowledge, you are better equipped to investigate suspicious activities related to process execution.
In the next chapter, we will delve into PowerShell event logs and how to effectively investigate them to uncover malicious activities and threats.