Skip to content
Logging Made Easy
Branch: master
Clone or download
Type Name Latest commit message Commit time
Failed to load latest commit information.
.github/ISSUE_TEMPLATE Initial commit Apr 18, 2019
Chapter 1 Files Initial commit Apr 18, 2019
Chapter 2 Files Cherry Pick Merge of @S0xbad1dea PR and my FQDN fix May 3, 2019
Chapter 3 Files Standardising package manager May 14, 2019
Chapter 4 Files Correcting partial export of Kibana Dashboards and prealpha scripted … May 2, 2019
docs Adding missing utilities for 18.04, Updating documentation to indicat… May 8, 2019
LICENSE Removing heads up notice, Adding WLB version requirement to docs, Add… May 2, 2019


Logging Made Easy

Copyright 2018-2019 Crown Copyright

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

What is Logging Made Easy (LME)?

Logging Made Easy is a self-install tutorial for small organisations to gain a basic level of centralised security logging for Windows clients and provide functionality to detect attacks. It's the coming together of multiple free and open-source software, where LME helps the reader integrate them together to produce an end-to-end logging capability. We also provide some pre-made configuration files and scripts, although there is the option to do it on your own.

Logging Made Easy can:

  • Tell you about software patch levels on enrolled devices
  • Show where administrative commands are being run on enrolled devices
  • See who is using which machine
  • In conjunction with threat reports, it is possible to query for the presence of an attacker in the form of Tools, Techniques and Procedures (TTPs)


LME is currently in early development, and as such we are marking it as Alpha.

This is not a professional tool, and should not be used as a SIEM.

LME is a 'homebrew' way of gathering logs and querying for attacks.

We have done the hard work to make things simple. We will tell you what to download, which configurations to use and have created convenience scripts to auto-configure wherever possible.

The current architecture is based upon Windows Clients, Microsoft Sysmon, Windows Event Forwarding and the ELK stack.

We are not able to comment on or troubleshoot individual installations, If you believe you have have found an issue with the LME code or documentation please submit a GitHub issue.

Who is Logging Made Easy for?

From one man bands with a handful devices to look after, through to organisations with approximately 250 devices.

LME is for you if:

  • You don’t have a SOC, SIEM or any monitoring in place at the moment
  • You lack the budget, time or understanding to set up your own logging system
  • You recognise the need to begin gathering logs and monitoring your IT.
  • You understand the LME has limitations, and is better than nothing - but no match for a professional tool.

If any, or all, of these criteria fit, then LME is a step in the right direction for you

LME could also be useful for:

  • Small isolated networks where corporate monitoring doesn’t reach

Who is the NCSC and why did they create LME?

The National Cyber Security Centre (NCSC) is a UK Government department with the mission of:

"Helping to make the UK the safest place to live and work online."

..more can be found on

We recognise the importance of gathering the right logs for security monitoring and post incident purposes, but we also recognise the pressures that face organisations. Budgets, deadlines and expertise. By producing LME we are attempting to reduce the barrier to entry for small organisations who don’t know where to start. LME may not be a fully-featured professional offering, but a step in the right direction that will make a difference in a cyber incident scenario.

Although in it’s infancy, we are hoping that LME will help organisations to make themselves more secure now and encourage better security monitoring in the future.

Table of contents

Prerequisites - Start deployment here

Chapter 1 - Set up Windows Event Forwarding

Chapter 2 – Sysmon Install

Chapter 3A – Database (Easy Method)

Chapter 3B – Database (Manual Method)

Chapter 4 - Post Install Actions




Core Team

  • Shane M, NCSC Technical Lead.
  • Lucy A, David L and Oli T, Cabinet Office Government Security Group, funding and project management.
  • Adam B, NCSC, Customer Liaison / Developer.
  • Duncan A, NCC Group, Lead Developer.
  • Harry G and Alfie T, NCSC, creating visualisations.

Our development partners

These organisations spent time trialing earlier versions of LME which was critical to development and publication.

The Community

Technology Used

You can’t perform that action at this time.