weslambert edited this page Mar 12, 2018 · 15 revisions


From https://technet.microsoft.com/en-us/sysinternals/sysmon:

System Monitor (Sysmon) is a Windows system service and device driver that, once installed on a system, remains resident across system reboots to monitor and log system activity to the Windows event log. It provides detailed information about process creations, network connections, and changes to file creation time. By collecting the events it generates using Windows Event Collection or SIEM agents and subsequently analyzing them, you can identify malicious or anomalous activity and understand how intruders and malware operate on your network.


Josh Brower wrote a great paper on integrating sysmon into Security Onion:


Currently, our Sysmon dashboard in Kibana works only with Sysmon logs shipped via OSSEC. If you are trying to ship Sysmon logs via Winlogbeat, you can create a custom dashboard and visualizations that reference the logstash-beats-* indices, or view Sysmon logs via the Beats dashboard.


SwiftOnSecurity has a great sysmon config file to use as a starting point:

You may also want to read this article for additional explanation:


Download sysmon here:

Download SwiftOnSecurity's example sysmon config here:

More Information

How to Go from Responding to Hunting with Sysinternals Sysmon:

Clone this wiki locally
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.
Press h to open a hovercard with more details.