SysmonForLinux
By Sysinternals
sysmon-config
Sysmon configuration file template with default high-quality event tracing (by SwiftOnSecurity)
Our great sponsors
SysmonForLinux | sysmon-config | |
---|---|---|
11 | 34 | |
1,598 | 4,538 | |
2.3% | - | |
6.8 | 0.0 | |
26 days ago | 3 months ago | |
C | ||
MIT License | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
SysmonForLinux
Posts with mentions or reviews of SysmonForLinux.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-09-30.
- Any useful cybersecurity software under $5k?
-
Security Cadence: Sysmon (Logging Part 2 out of ?????)
Did you know that Sysmon is so fantastic that Microsoft ported it to Linux? They sure did and it is awesome. It can be found here: https://github.com/Sysinternals/SysmonForLinux
- Sysmon for Linux 1.0.0 Released
sysmon-config
Posts with mentions or reviews of sysmon-config.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-05-30.
-
How do you actually threat hunt?
If you don't catch it what changes can you do to your logging to enable it? Can you push it out to the environment? While sysmon is awesome, you can do your hunts with built in logging most of the time... Just might not have all the data around it you want to have. I would throw sysmon on a test box (make sure you have a config file that filters out the noise: https://github.com/SwiftOnSecurity/sysmon-config)
- Microsoft recommend Sysmon and EDR
-
Security Cadence: Sysmon (Logging Part 2 out of ?????)
There are also some excellent sample configuration files out there, and -in my opinion- the best of them is from Swift on Security: https://github.com/SwiftOnSecurity/sysmon-config
-
Integrating Sysmon events with Crowdsec
Thank you for those wonderful news, i will be glad to collaborate and test it for the community, in fact i am already in Crowdsec Discord channel ,but it will take little bit more time for me to be familiar with Crowdsec integration (around 2 weeks) ,have some tasks in queue ,any way ,if its help we are using this set of rules sysmon rules , to prioritize our detection , in addition we using also Soar Suffle to automate some hash checking for certain folders and files against MISP and Malwarebazar workflows
-
splunk sysmon events
Yes absolutely. This is a very common workflow for both. One note is that you need to also find a sysmon config to use as well, and there's no easy way to manage either sysmon or its config through Splunk. Recommendations for a config are either SwiftOnSecurity's or Olaf's SysmonModular. They significantly overlap and work with each other on patches. SwiftOnSecurity's is a better pure drop-in, and Olaf's is better if you want to do customization.
- What's your approach to gathering data for DFIR analysis, and how much data do you typically gather?
-
Best monitoring software that works like event logs?
For some of the items you mentioned having a good sysmon config would help too. https://github.com/SwiftOnSecurity/sysmon-config or https://github.com/olafhartong/sysmon-modular are good starting points
-
Hosts making DNS queries to malicious site. How to dig deeper and find source?
I'd install sysmon if it is not already present on the infected machines, with Swift's config or Olaf's config file.
-
This Visual Studio Code extension is for heping in the writting of Sysmon XML configuration files - now supports Sysmon for Linux schema
SwiftOnSecurity's config is well commented, going through it may help. There's also sysmon-modular which seems similar.
- Sysmon for Linux 1.0.0 Released
What are some alternatives?
When comparing SysmonForLinux and sysmon-config you can also consider the following projects:
sysmon-modular - A repository of sysmon configuration modules
sigma - Main Sigma Rule Repository
ThreatHunting - Tools for hunting for threats.
ansible-role-elasticsearch - Ansible Role - Elasticsearch
SysmonTools - Utilities for Sysmon
vscode-sysmon - Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.
Event-Forwarding-Guidance - Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsacyber
SysmonConfigPusher - Pushes Sysmon Configs
google-cloud-ops-agents-ansible - Ansible Role for Google Cloud Ops
Aurora-Incident-Response - Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders
sysmon-config vs sysmon-modular
sysmon-config vs sigma
sysmon-config vs ThreatHunting
sysmon-config vs ansible-role-elasticsearch
sysmon-config vs SysmonTools
SysmonForLinux vs sysmon-modular
sysmon-config vs vscode-sysmon
sysmon-config vs Event-Forwarding-Guidance
sysmon-config vs SysmonConfigPusher
sysmon-config vs google-cloud-ops-agents-ansible
SysmonForLinux vs Aurora-Incident-Response
SysmonForLinux vs SysmonTools