|9 days ago||4 months ago|
|MIT License||GNU General Public License v3.0 only|
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Is Windows Defender for Business any good?
2 projects | reddit.com/r/cybersecurity | 9 Nov 2022
Agree. Harden your endpoints (if unsure where to start consider hardening kitty, https://github.com/scipag/HardeningKitty) and harden Defender (https://0ut3r.space/2022/03/06/windows-defender/). Add Sysmon with a good config (https://github.com/olafhartong/sysmon-modular) and you've reached a good starting point.
New blue team
11 projects | reddit.com/r/blueteamsec | 16 Oct 2022
Microsoft recommend Sysmon and EDR
4 projects | reddit.com/r/blueteamsec | 13 Oct 2022
Security Cadence: Sysmon (Logging Part 2 out of ?????)
4 projects | reddit.com/r/sysadmin | 16 May 2022
Another really excellent resource (also called out by Swift) is Olaf Hartong’s Sysmon-Modular project: https://github.com/olafhartong/sysmon-modular As well as having a few full configs, Olaf’s project has modular XML configurations for each supported Sysmon Event ID. This can be incredibly helpful for fine tuning your configs.
splunk sysmon events
2 projects | reddit.com/r/Splunk | 2 Apr 2022
Yes absolutely. This is a very common workflow for both. One note is that you need to also find a sysmon config to use as well, and there's no easy way to manage either sysmon or its config through Splunk. Recommendations for a config are either SwiftOnSecurity's or Olaf's SysmonModular. They significantly overlap and work with each other on patches. SwiftOnSecurity's is a better pure drop-in, and Olaf's is better if you want to do customization.
Best monitoring software that works like event logs?
2 projects | reddit.com/r/sysadmin | 21 Feb 2022
For some of the items you mentioned having a good sysmon config would help too. https://github.com/SwiftOnSecurity/sysmon-config or https://github.com/olafhartong/sysmon-modular are good starting points
Hosts making DNS queries to malicious site. How to dig deeper and find source?
2 projects | reddit.com/r/AskNetsec | 9 Feb 2022
I'd install sysmon if it is not already present on the infected machines, with Swift's config or Olaf's config file.
This Visual Studio Code extension is for heping in the writting of Sysmon XML configuration files - now supports Sysmon for Linux schema
3 projects | reddit.com/r/blueteamsec | 17 Oct 2021
SwiftOnSecurity's config is well commented, going through it may help. There's also sysmon-modular which seems similar.
Well, it happened. I got let go today.
2 projects | reddit.com/r/sysadmin | 7 Mar 2022
Now, I'm not saying that the OP was trying to put their hand in the till, but at the very least I don't think that they are being completely transparent in the original post: if you work in a BANKING environment, then you don't run downloaded scripts out of curiosity, especially ones that are trying to obfuscate and bypass security like the one that the OP has said he was interested in (https://github.com/gh0x0st/Invoke-PSObfuscation), and if you are doing that, you shouldn't be working in a this environment; it shows a terminal lack of insight and awareness. Even if you don't know about a policy, you'd hope for a shred of common sense.2 projects | reddit.com/r/sysadmin | 7 Mar 2022
What are some alternatives?
atomic-red-team - Small and highly portable detection tests based on MITRE's ATT&CK.
sysmon-config - Sysmon configuration file template with default high-quality event tracing
DetectionLabELK - DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.
Windows-Toolkit - PS one-liner cmdlets for Windows security
Power-Response - Powering Up Incident Response with Power-Response
threathunting - A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
vscode-sysmon - Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.
AzureHunter - A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
RedTeaming-Tactics-and-Techniques - Red Teaming Tactics and Techniques
sysmon-config - Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.
SysmonTools - Utilities for Sysmon