Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
To install Sysmon, use the following command:
Sysmon.exe -i -h MD5,IMPHASH -n
After installation, load the custom configuration file with the following command:
Sysmon.exe -c sysmon.cfg
Upon installation, Sysmon will begin logging events to the operational event log “C:\Windows\System32\ winevt\Logs\Microsoft-Windows-Sysmon%4Operational.evtx”.
Run with administrator rights
sysmon.exe -accepteula -i sysmonconfig-export.xml
Run with administrator rights
sysmon.exe -c sysmonconfig-export.xml
Sysmon-a.cfg
Sysmon-b.cfg
https://github.com/crypsisgroup/Splunkmon/edit/master/sysmon.cfg
http://www.crypsisgroup.com/images/site/CG_WhitePaper_Splunkmon_1216.pdf
Sysmon-c.cfg
https://decentsecurity.com/enterprise/#/sysmon-enterprise-configuration/
@SwiftOnSecurity Updated config
https://github.com/SwiftOnSecurity/sysmon-config
Sysmon-d.cfg
http://909research.com/sysmon-the-best-free-windows-monitoring-tool-you-arent-using/
Sysmon-e.cfg
https://github.com/Prevenity/sysmon
(Translated comments to english)
Sysmon_config.xml
https://www.malwarearchaeology.com/logging/
Additional configs
Configs are updated frequently
Server Config: https://gist.github.com/Neo23x0/a4b4af9481e01e749409
Client config: https://gist.github.com/Neo23x0/f56bea38d95040b70cf5
http://security-research.dyndns.org/pub/slides/BotConf/2016/Botconf-2016_Tom-Ueltschi_Sysmon.pdf
Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi
https://securitylogsdotorg.files.wordpress.com/2017/01/sysmon-2017-16-1.pdf
http://www.paul-sec.com/client-monitoring.html
http://www.incidentresponderblog.com/2016/09/detecting-lateral-movement-using-sysmon.html
http://www.darkoperator.com/blog/2014/8/8/sysinternals-sysmon
https://github.com/darkoperator/Posh-Sysmon
https://github.com/JamesHabben/sysmon-queries
https://www.crowdstrike.com/blog/sysmon-2/
https://joshuadlewis.blogspot.com/2014/10/advanced-threat-detection-with-sysmon_74.html
https://dfir-blog.com/2015/10/11/protecting-windows-networks-essential-logging/
http://www.crypsisgroup.com/images/site/CG_WhitePaper_Splunkmon_1216.pdf