LogoLogo
Log In
  • Introduction
  • Registration
  • Pre-Requirements & Initialization of the Platform
    • Agent Installations
      • Windows Installation
      • Linux Installation
      • macOS Installation
      • Deploying Agent From Microsoft Intune
    • Access and Exlusion Requirements
      • Agent-Based Demo Deployment
      • Agent-Based Production Deployment
      • Agent-Based On-Premises Deployment
      • Trendmicro Exlusions
    • Troubleshooting
  • Getting Started
    • Platform Overview
    • Agent Based Deployment
      • 1. Activating Policies
      • 2. Configure Policies in the Group
      • 3. Agent Deployment
        • Windows: Downloading and Deploying The Windows Agent
        • Linux: Downloading and Deploying The Linux Agent
        • macOS: Downloading and Deploying The macOSAgent
      • 4. Enabling Classification Rules
      • 5. Review The Results & White Listing
      • 6. Reviewing and Enabling Sigma Rules
      • 7. Generating Reports
      • 8. Notification Settings
      • 9. YARA Analysis & THOR
      • 10. Configuring YARA Rules
      • 11. Remediation Management
      • 12. Results of The Analysis
    • Using the Main Dashboard and Grids
    • Classification Rules
    • Configuring Modules
      • Threat Hunting
        • Enabling Windows Autoruns & Process Analysis
        • Enabling Weak SNMP Discovery
        • Enabling Linux Analysis
        • Job Management
        • Customizing Classification Rules
        • Enabling Windows Event Log Analysis
        • Enabling Windows Sysmon Analysis
        • Enabling Windows Thor Analysis
        • Enabling Windows Security Benchmark Analysis
        • Enabling In-Depth Analysis
      • Windows Hardening
      • Remediation & Response Management
      • Notification Management
      • Vulnerability Management
      • Network Discovery
      • Windows Patch Management
      • IP Scanning
      • Software Management
      • Managing Shadow-IT
      • Microsoft Windows Defender Health Analysis
    • Configuring Sysmon
      • Sysmon Deployment
      • Managing Sysmon Rules
      • Troubleshooting Sysmon Rules
    • Important Settings
      • Organization Settings
    • Utilizing the Platform Effectively and Interpreting the Artifact Analysis Results
    • How To Manage False Positives and Optimizing the System
    • Using AI Modules
      • AI Manuel Enrichment
      • AI Auto Enrichment
      • Automating AI Enrichment
      • AI Auto Exclusions
      • AI Feedback Questions
      • AI Auto Exclusion & Enrichment for Sysmon
      • AI Activity Logs
    • GRC Management
      • Creating an Assessment & Updating Evidences
    • Integrations
      • Office 365 Azure Registration
      • Windows Security Center Azure Registration
      • Azure Active Directory Integration
      • Active Directory Integration
      • CrowdStrike Integration
      • Palo Alto - Cortex Integration
      • Palo Alto HyperVisor Integration
      • OpenVAS Integration
      • Tenable Nessus
      • Gophish Integration
    • How to Use CyberCyte Platform Effectively?
    • Enabling External Exposure Analysis
  • Administration Guide
    • Most Used
      • Threat Overview
      • Analysis & Investigation
      • Shadow IT
      • My Assignments
      • Installation Management
      • Policy Management
      • Windows Hardening Results
      • Device Management
    • Dashboards
      • Threat Overview
      • Asset Overview
      • User Overview
      • Shadow IT
      • Analysis
    • Threat Hunting
      • Notable Events
      • Analysis & Investigation
      • Visualization
      • Hunting Settings
      • E-Mail/Teams Settings
    • Threat Response
      • Response Management
      • Incident /Case Management
      • ToDo
      • Remediation & Response Settings
      • Incident /Case Management
      • Incident/Case Management Settings
      • AI Activity
      • Interactive Sessions
    • Security Assurance
      • Hardening & Configuration Management
      • Vulnerability Management
      • Windows Remediation
      • Linux Remediation
      • Software Management
      • Windows Patch Management
      • Windows Remediation & Response Settings
      • Hardening & Configuration Management Settings
    • Asset Management
      • Endpoint Management
      • Group Management
      • Settings
    • Rules & Policies
      • Artifact Classification
      • Policy Management
      • SIGMA/YARA Rules
      • Artifact Collection Parameters
    • GRC
      • Assessment Management
      • Risk and Oppurtunity Management
      • Incident/Case Management
      • Assets
      • Document Management
      • Evidences
      • ToDo & Project Management
      • Parameters
      • Settings
      • Incident/Case Management Settings
    • Settings & Reporting
      • Agents Settings
      • Deployment Settings
      • Notification Settings
      • Integration Settings
      • AI Settings
      • Credential Settings
      • Organization Settings
      • Reporting
      • Users & Groups
    • Help
      • Ask AI
      • Configuration Wizard
      • Help Guide
      • Search
      • Version & Exception Overviews
      • Troubleshoot
    • How To Manage False Positives and Optimizing the System
  • Troubleshooting
    • Troubleshooting Multitenant Functionalities & Accessing Internal Applications
    • The Agent Troubleshooting
      • Troubleshooting the Windows Agent
      • Troubleshooting the Linux Agent
      • Troubleshooting the macOS Agent
    • Proxy Troubleshooting
      • Portal Server
      • Elastic Server
    • AI Automation Troubleshooting
      • Checking the AI Mode
      • Checking AI Audit Logs
      • Checking the AI Settings
    • Troubleshooting Synchronization Problems
  • Release Notes
    • v3.3.6
    • v3.3.5
    • v3.3.4
    • v3.3.3
    • v3.3.2
    • v3.3.1
    • v3.3
    • v3.2.1
    • v3.2
    • v3.1.4
    • v3.1.3
    • v3.1.2
    • v3.1.1
    • v3.1
    • v3.0.10
    • v3.0.8-9
    • v3.0.7
    • v3.0.6
    • v3.0.5
    • v3.0.4
    • v3.0.3
    • v3.0.2
    • v3.0.1
    • v3.0
    • v2.5.0 - v2.17.7
Powered by GitBook
On this page

Was this helpful?

  1. Getting Started
  2. Configuring Sysmon

Managing Sysmon Rules

PreviousSysmon DeploymentNextTroubleshooting Sysmon Rules

Last updated 9 months ago

Was this helpful?

Sysmon rules are managed through Sysmon Rules. The created rules are then used in policies. Sysmon policy creates the Sysmon configuration file dynamically based on the selected rules.

The rules are defined in "Rules & Policies" -> "Artifact Classification Parameters" -> "Windows Sysmon Rules". Each rule consists of the following parameters:

· Events: Sysmon event IDs are included in the rules. The conditions are added to the event setting in the sysmon configuration based on the events selected.

· Name: Name given to rule.

· Description: Description given to rules.

· Rule Tags: Policies use TAGS to select which rules will be active. TAGS enable easier selection of rule sets.

· Filtering Level: Filtering levels guide users on the level of filtering the rule will execute. It can be low, medium or high.

· Origin: Global rules are synchronized from the threat intelligence db. When a user creates a new rule, they are set as "User Defined."

· Condition: Condition defines the Sysmon configuration to be applied. More information is available from .

· Type: Sysmon configuration has two parts for every event id in the configuration file. The rule can be used for inclusion or exclusion. The purpose of the rule is defined here.

The rules can be edited directly from the Windows Sysmon Rules or the sysmon analysis grid. The sysmon analysis grid provides an easier way to add new items to the rules, as detailed below.

From the sysmon analysis grid, when right-clicking a value, the values can be added to the sysmon rules by selecting the "Rule Management" -> "Add to Sysmon" action. The system will request which rule the user will add the value. The users can also choose which parameters will be used. Upon completion, the new value will be added to the end of the "Condition" section of the rule.

The sysmon analysis grid can also add value to the built-in rules. This method is easier. The selected rule is added to the built-in rules, enabling users to add exclusions more easily. There are five built-in rules:

  • Sysmon Rules -> Add to Image Exclusions (Event ID 1,2,5,7,9,11,12,15,26 adds <Image>)

  • Sysmon Rules -> Add to Process Access Exclusions (Event ID 10 adds <SourceImage>)

  • Sysmon Rules -> Add to Network Access Exclusion Rules (Event ID 3,22 adds <Image>)

  • Sysmon Rules -> Add to Process Creation Exclusions (Event ID 1 adds <Image>. <CommandLine>, <ParentImage>, <ParentCommandLine>)

  • Sysmon Rules -> Add to IP Address Exclusions (Event ID 3 adds <DestinationIp>)

  • Sysmon Rules -> Add to Process DNS Query Exclusions (Event ID 22 adds <QueryName> )

https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon