LogoLogo
Log In
  • Introduction
  • Registration
  • Pre-Requirements & Initialization of the Platform
    • Agent Installations
      • Windows Installation
      • Linux Installation
      • macOS Installation
      • Deploying Agent From Microsoft Intune
    • Access and Exlusion Requirements
      • Agent-Based Demo Deployment
      • Agent-Based Production Deployment
      • Agent-Based On-Premises Deployment
      • Trendmicro Exlusions
    • Troubleshooting
  • Getting Started
    • Platform Overview
    • Agent Based Deployment
      • 1. Activating Policies
      • 2. Configure Policies in the Group
      • 3. Agent Deployment
        • Windows: Downloading and Deploying The Windows Agent
        • Linux: Downloading and Deploying The Linux Agent
        • macOS: Downloading and Deploying The macOSAgent
      • 4. Enabling Classification Rules
      • 5. Review The Results & White Listing
      • 6. Reviewing and Enabling Sigma Rules
      • 7. Generating Reports
      • 8. Notification Settings
      • 9. YARA Analysis & THOR
      • 10. Configuring YARA Rules
      • 11. Remediation Management
      • 12. Results of The Analysis
    • Using the Main Dashboard and Grids
    • Classification Rules
    • Configuring Modules
      • Threat Hunting
        • Enabling Windows Autoruns & Process Analysis
        • Enabling Weak SNMP Discovery
        • Enabling Linux Analysis
        • Job Management
        • Customizing Classification Rules
        • Enabling Windows Event Log Analysis
        • Enabling Windows Sysmon Analysis
        • Enabling Windows Thor Analysis
        • Enabling Windows Security Benchmark Analysis
        • Enabling In-Depth Analysis
      • Windows Hardening
      • Remediation & Response Management
      • Notification Management
      • Vulnerability Management
      • Network Discovery
      • Windows Patch Management
      • IP Scanning
      • Software Management
      • Managing Shadow-IT
      • Microsoft Windows Defender Health Analysis
    • Configuring Sysmon
      • Sysmon Deployment
      • Managing Sysmon Rules
      • Troubleshooting Sysmon Rules
    • Important Settings
      • Organization Settings
    • Utilizing the Platform Effectively and Interpreting the Artifact Analysis Results
    • How To Manage False Positives and Optimizing the System
    • Using AI Modules
      • AI Manuel Enrichment
      • AI Auto Enrichment
      • Automating AI Enrichment
      • AI Auto Exclusions
      • AI Feedback Questions
      • AI Auto Exclusion & Enrichment for Sysmon
      • AI Activity Logs
    • GRC Management
      • Creating an Assessment & Updating Evidences
    • Integrations
      • Office 365 Azure Registration
      • Windows Security Center Azure Registration
      • Azure Active Directory Integration
      • Active Directory Integration
      • CrowdStrike Integration
      • Palo Alto - Cortex Integration
      • Palo Alto HyperVisor Integration
      • OpenVAS Integration
      • Tenable Nessus
      • Gophish Integration
    • How to Use CyberCyte Platform Effectively?
    • Enabling External Exposure Analysis
  • Administration Guide
    • Most Used
      • Threat Overview
      • Analysis & Investigation
      • Shadow IT
      • My Assignments
      • Installation Management
      • Policy Management
      • Windows Hardening Results
      • Device Management
    • Dashboards
      • Threat Overview
      • Asset Overview
      • User Overview
      • Shadow IT
      • Analysis
    • Threat Hunting
      • Notable Events
      • Analysis & Investigation
      • Visualization
      • Hunting Settings
      • E-Mail/Teams Settings
    • Threat Response
      • Response Management
      • Incident /Case Management
      • ToDo
      • Remediation & Response Settings
      • Incident /Case Management
      • Incident/Case Management Settings
      • AI Activity
      • Interactive Sessions
    • Security Assurance
      • Hardening & Configuration Management
      • Vulnerability Management
      • Windows Remediation
      • Linux Remediation
      • Software Management
      • Windows Patch Management
      • Windows Remediation & Response Settings
      • Hardening & Configuration Management Settings
    • Asset Management
      • Endpoint Management
      • Group Management
      • Settings
    • Rules & Policies
      • Artifact Classification
      • Policy Management
      • SIGMA/YARA Rules
      • Artifact Collection Parameters
    • GRC
      • Assessment Management
      • Risk and Oppurtunity Management
      • Incident/Case Management
      • Assets
      • Document Management
      • Evidences
      • ToDo & Project Management
      • Parameters
      • Settings
      • Incident/Case Management Settings
    • Settings & Reporting
      • Agents Settings
      • Deployment Settings
      • Notification Settings
      • Integration Settings
      • AI Settings
      • Credential Settings
      • Organization Settings
      • Reporting
      • Users & Groups
    • Help
      • Ask AI
      • Configuration Wizard
      • Help Guide
      • Search
      • Version & Exception Overviews
      • Troubleshoot
    • How To Manage False Positives and Optimizing the System
  • Troubleshooting
    • Troubleshooting Multitenant Functionalities & Accessing Internal Applications
    • The Agent Troubleshooting
      • Troubleshooting the Windows Agent
      • Troubleshooting the Linux Agent
      • Troubleshooting the macOS Agent
    • Proxy Troubleshooting
      • Portal Server
      • Elastic Server
    • AI Automation Troubleshooting
      • Checking the AI Mode
      • Checking AI Audit Logs
      • Checking the AI Settings
    • Troubleshooting Synchronization Problems
  • Release Notes
    • v3.3.5
    • v3.3.4
    • v3.3.3
    • v3.3.2
    • v3.3.1
    • v3.3
    • v3.2.1
    • v3.2
    • v3.1.4
    • v3.1.3
    • v3.1.2
    • v3.1.1
    • v3.1
    • v3.0.10
    • v3.0.8-9
    • v3.0.7
    • v3.0.6
    • v3.0.5
    • v3.0.4
    • v3.0.3
    • v3.0.2
    • v3.0.1
    • v3.0
    • v2.5.0 - v2.17.7
Powered by GitBook
On this page

Was this helpful?

  1. Getting Started
  2. Configuring Modules
  3. Threat Hunting

Enabling Windows Sysmon Analysis

On this page, please request access to SUPERORG from your administrator, organization users are not allowed to access other organizations.

PreviousEnabling Windows Event Log Analysis NextEnabling Windows Thor Analysis

Last updated 9 months ago

Was this helpful?

1. Initially, the Elastic server connection setting should be set from the SUPERORG settings for on-premise deployments. Please switch to SUPERORG from the top left organization selector and select "Security Management" -> "Settings". From this section, configure the Elastic username and password. By default, Elastic uses port 9200.

2. From "Rules & Policies" -> "Artifact Collection Parameters" -> "Windows Sysmon Rules" menu, rules for collecting logs are configured. The rules specify how sysmon logs are collected. Sysmon log collection takes place through a sysmon configuration file. The rules in this section are used to construct the configuration file. Based on the rules in this section, policies are used to define which sysmon rules will be used to enable sysmon log collection. The system provides built-in rules for sysmon collection. The “…” button allows the cloning of a rule for customization. It is recommended to clone the rules for modification. A new rule can be created by clicking the “+” button.

A sysmon configuration file consists of inclusion and exclusion rules. Inclusion rules define the information to be collected, and exclusion rules define the ones to be excluded. For more information on the fields and their usage for managing sysmon, please refer to the website.

3. A sysmon rule consists of the below sections for configuration:

a. Events: The sysmon events the rule will be applied. A rule can be used for different events for inclusion or exclusion.

b. Name: The name given to a rule.

c. Description: An optional description is given to the rule.

d. Filtering Level: An optional value to specify the filtering level for the rule can be configured. This value is used to group rules for easier separation.

e. Condition: Conditions for the rules are defined in this section. The selector can be used to add a condition. The rule is edited using the edit button. It is also recommended to expand the rules for easier editing/viewing with the expand button.

f. Type: A rule can be used for inclusion or exclusion and is configured using the type parameter.

When the sysmon configuration file is created, rules define for which events the rules will be valid. By creating a structure where one rule is applied to different events, One rule can be used to determine the inclusion/exclusion conditions based on shared properties.

4. Through the sysmon analysis screen accessed from "Threat Hunting" -> "Analysis & Investigation" -> "Windows Sysmon Analysis", sysmon rules can be modified. The right-click action on the value to be added enables the direct addition of a log property to the rule. Right-click -> "Sysmon Rules Mgmt." -> "Add to Image & Network Access Exclusions" action is used to add the value to a sysmon rules.

5. When sysmon is enabled, the system deploys the sysmon service with specific configuration parameters. It is recommended to leave them with the default settings but it can be changed from the "Threat Hunting" -> "Hunting Settings" -> "Agent & Sensor Settings".

6. Once the rules are configured, a policy should be created to select which Sysmon rules will be used to construct the Sysmon configuration file. Create a policy from "Rules & Policies" -> "Policy Management" -> "Policy Rules" with the type "Windows Sysmon Analysis" available from "Windows" -> "Windows Sysmon Analysis" selectors. From the policy settings, set the time interval for log collection and the rules for config file creation. The policy “Exclusion Filters” can also be used to exclude specific logs from collection through a string match. “,” can be used to specify multiple string values.

7. The final step is to assign the policy to the groups. From "Policy Management" -> "Group Management" settings, choose the created policy. The group members will retrieve the policy and start the log collection.

8. The Agent or broker will install the Sysmon service and apply the configuration file for collection.

https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon