How To Tweak Windows Logs To Better Investigate Attacks