Skip to content
This repository was archived by the owner on Apr 16, 2021. It is now read-only.
Doug Burks edited this page Feb 18, 2017 · 18 revisions

Description

From https://technet.microsoft.com/en-us/sysinternals/sysmon:

System Monitor (Sysmon) is a Windows system service and device driver that, once installed on a system, remains resident across system reboots to monitor and log system activity to the Windows event log. It provides detailed information about process creations, network connections, and changes to file creation time. By collecting the events it generates using Windows Event Collection or SIEM agents and subsequently analyzing them, you can identify malicious or anomalous activity and understand how intruders and malware operate on your network.

Download sysmon here:
https://download.sysinternals.com/files/Sysmon.zip

Integration

Josh Brower wrote a great paper on integrating sysmon into Security Onion:
https://digital-forensics.sans.org/community/papers/gcfa/sysmon-enrich-security-onions-host-level-capabilities_10612

Configuration

SwiftOnSecurity has a great sysmon config file to use as a starting point:
https://github.com/SwiftOnSecurity/sysmon-config/raw/master/sysmonconfig-export.xml

Read more about it here:
https://github.com/SwiftOnSecurity/sysmon-config

You may also want to read this article for additional explanation:
https://medium.com/@lennartkoopmann/explaining-and-adapting-tays-sysmon-configuration-27d9719a89a8#.bgzhylmn8

Clone this wiki locally