vscode-sysmon
sysmon-config
Our great sponsors
vscode-sysmon | sysmon-config | |
---|---|---|
1 | 34 | |
50 | 4,565 | |
- | - | |
2.0 | 0.0 | |
10 months ago | 3 months ago | |
TypeScript | ||
BSD 3-clause "New" or "Revised" License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
vscode-sysmon
sysmon-config
-
Troubleshooting Intermittent Slowness on Network Share
https://learn.microsoft.com/en-us/troubleshoot/windows-client/networking/networking-overview plenty of windows troubleshooting tips here too, and this is pretty good symon script saves to event viewer even after a reboot! , also care with wireshark as it may give you a false sense of there's a fault, try tcpIPview from sysinternals and yeah procmon for sure. https://github.com/SwiftOnSecurity/sysmon-config use psping to ping the server directly and see the latency goes up and down, you can ping it more often every 1 second so you get a better more detailed resul.
-
Sysmon not reading our config.xml-file
Rebooted and downloaded sysmon 14.16 and sysmonconfig-export.xml
-
Cheap, Fast, Good and Simple Remote Monitoring for Small Environments
There's all sorts of things you can do for various types of monitoring including Zabbix, Graylog, roll-your-own with Sysmon (see https://github.com/SwiftOnSecurity/sysmon-config), etc. The question becomes one of time - don't get so focused on DIY or free that you spend hours (or pay someone to spend hours) a month babysitting.
-
How do you actually threat hunt?
If you don't catch it what changes can you do to your logging to enable it? Can you push it out to the environment? While sysmon is awesome, you can do your hunts with built in logging most of the time... Just might not have all the data around it you want to have. I would throw sysmon on a test box (make sure you have a config file that filters out the noise: https://github.com/SwiftOnSecurity/sysmon-config)
-
How do I exclude specific event IDs in Sysmon?
I played around with https://github.com/SwiftOnSecurity/sysmon-config Maybe there xml can point you in the right direction
-
Finding the Process initiating a ping
and here's an off the shelf config file: https://github.com/SwiftOnSecurity/sysmon-config
- How to filter SysMon Logs for suspicious events
- SysMon Deployment Help
-
MISP integration issues
- Make sure you have sysmon installed on the agent host and it is logging event to the Sysmon folder as ID 22. Can use this xml file
-
Network Share - Word and excel files take 35 seconds to open/save, all other file types open immediately.
Out of our 286 Windows Servers, this single server did not like our sysmon config file from SwitfOnSecurity - https://github.com/SwiftOnSecurity/sysmon-config/blob/master/sysmonconfig-export.xml
What are some alternatives?
sysmon-modular - A repository of sysmon configuration modules
sigma - Main Sigma Rule Repository
ThreatHunting - Tools for hunting for threats.
ansible-role-elasticsearch - Ansible Role - Elasticsearch
SysmonTools - Utilities for Sysmon
SysmonForLinux
Event-Forwarding-Guidance - Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsacyber
SysmonConfigPusher - Pushes Sysmon Configs
google-cloud-ops-agents-ansible - Ansible Role for Google Cloud Ops
sysmon-config - Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.
EventFinder2 - Finds event logs between two time points. Useful for helpdesk/support/malware analysis.