Sysmon

From https://technet.microsoft.com/en-us/sysinternals/sysmon:

System Monitor (Sysmon) is a Windows system service and device driver that, once installed on a system, remains resident across system reboots to monitor and log system activity to the Windows event log. It provides detailed information about process creations, network connections, and changes to file creation time. By collecting the events it generates using Windows Event Collection or SIEM agents and subsequently analyzing them, you can identify malicious or anomalous activity and understand how intruders and malware operate on your network.

Integration

(Please note that the paper is a few years old and was therefore written for an older version of Security Onion.)

Configuration

SwiftOnSecurity has a great sysmon config file to use as a starting point:

Downloads

Download SwiftOnSecurity’s example sysmon config here:

Winlogbeat

If you are shipping Sysmon logs via Winlogbeat, confirm that your Winlogbeat configuration does NOT use the Elastic Sysmon module. Security Onion will do all the necessary parsing.

More Information

See also

For more information about sysmon, please see:
Also see “How to Go from Responding to Hunting with Sysinternals Sysmon”:
TrustedSec has a great Community Guide on Sysmon: