|19 days ago||3 months ago|
|GNU General Public License v3.0 only||-|
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Security Cadence: Sysmon (Logging Part 2 out of ?????)
4 projects | reddit.com/r/sysadmin | 16 May 2022
There are also some excellent sample configuration files out there, and -in my opinion- the best of them is from Swift on Security: https://github.com/SwiftOnSecurity/sysmon-config
Integrating Sysmon events with Crowdsec
2 projects | reddit.com/r/CrowdSec | 16 May 2022
Thank you for those wonderful news, i will be glad to collaborate and test it for the community, in fact i am already in Crowdsec Discord channel ,but it will take little bit more time for me to be familiar with Crowdsec integration (around 2 weeks) ,have some tasks in queue ,any way ,if its help we are using this set of rules sysmon rules , to prioritize our detection , in addition we using also Soar Suffle to automate some hash checking for certain folders and files against MISP and Malwarebazar workflows
splunk sysmon events
2 projects | reddit.com/r/Splunk | 2 Apr 2022
Yes absolutely. This is a very common workflow for both. One note is that you need to also find a sysmon config to use as well, and there's no easy way to manage either sysmon or its config through Splunk. Recommendations for a config are either SwiftOnSecurity's or Olaf's SysmonModular. They significantly overlap and work with each other on patches. SwiftOnSecurity's is a better pure drop-in, and Olaf's is better if you want to do customization.
Sysmon DNS Queries Issues
1 project | reddit.com/r/blueteamsec | 28 Mar 2022
Does anyone here use Sysmon, and have you used this SwiftOnSecurity config before? I am attempting to use it for the first time to track down processes triggering suspicious DNS queries, but it is not generating any Event 22s in Event Viewer, though it should be.
What's your approach to gathering data for DFIR analysis, and how much data do you typically gather?
2 projects | reddit.com/r/cybersecurity | 26 Mar 2022
List Windows Event Id to monitor
1 project | reddit.com/r/zabbix | 24 Mar 2022
Config for sysmon to make sure important events are actually making it into the logs: https://github.com/SwiftOnSecurity/sysmon-config
Windows sysmon: nice tool to assist with DNS monitoring
1 project | reddit.com/r/TotemKnowledgeBase | 22 Mar 2022
The Microsoft Windows Sysinternals sysmon tool can identify and log which Windows process kicks out a DNS query. Sysmon generates a lot of logs by default though, so Swift on Security (our friend from Twitter and https://decentsecurity.com/) has a really nice sysmon config that filters out a bunch of the noise: https://github.com/SwiftOnSecurity/sysmon-config. This filtering will make it easier to spot the shenanigans.
Infected PC sends thousands of DNS requests, what are the options?
1 project | reddit.com/r/techsupport | 26 Feb 2022
If it's generating a lot of DNS requests, maybe download Sysmon from: https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon Put sysmon.exe in C:\tools\ and ran from an admin prompt: sysmon.exe -c .\sysmon-dns.xml Where sysmon-dns.xml is a file I created based on https://github.com/SwiftOnSecurity/sysmon-config but just targeting the DNS section. So it's down to the following: https://pastebin.com/TTrudDtr
The Mysterious SDD Failures
1 project | reddit.com/r/sysadmin | 25 Feb 2022
You could throw Sysmon on the device with a basic config such as https://github.com/SwiftOnSecurity/sysmon-config - you probably then need to increase the size of the Event log to support this.
Best monitoring software that works like event logs?
2 projects | reddit.com/r/sysadmin | 21 Feb 2022
For some of the items you mentioned having a good sysmon config would help too. https://github.com/SwiftOnSecurity/sysmon-config or https://github.com/olafhartong/sysmon-modular are good starting points
What are some alternatives?
sigma - Generic Signature Format for SIEM Systems
SysmonTools - Utilities for Sysmon
ansible-role-elasticsearch - Ansible Role - Elasticsearch
signature-base - Signature base for my scanner tools
sysmon-modular - A repository of sysmon configuration modules
vscode-sysmon - Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.
Event-Forwarding-Guidance - Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsacyber
MISP - MISP (core software) - Open Source Threat Intelligence and Sharing Platform
SysmonConfigPusher - Pushes Sysmon Configs
EventFinder2 - Finds event logs between two time points. Useful for helpdesk/support/malware analysis.
google-cloud-ops-agents-ansible - Ansible Role for Google Cloud Ops