

A few examples of the more useful generated events for security purposes are listed below. There are several extremely helpful Windows Event IDs that Sysmon generates to help detect common threats in many different enterprises.

Save as config.xml in c:\windows, or run the PowerShell command: Invoke-WebRequest -Uri -OutFile C:\Windows\config.xml.

Download your chosen configuration (we recommend Sysmon Modular ).Download Sysmon (or entire Sysinternals suite ).To manually install Sysmon, follow the instructions below.To automatically install Sysmon using a Poshim script, follow these instructions.You can run a Poshim script to automatically install Sysmon, or you can install it manually: Following these steps will turn on an incredible amount of logging. It is extremely easy to install and deploy. Sysmon is part of the Sysinternals software package, now owned by Microsoft and enriches the standard Windows logs by producing some higher level monitoring of events such as process creations, network connections and changes to the file system. With Sysmon, you can detect malicious activity by tracking code behavior and network traffic, as well as create detections based on the malicious activity. In addition to enabling Windows Advanced Auditing, System Monitor (Sysmon) is one of the most commonly used add-ons for Windows logging. In addition to the default built-in logging that Windows Server offers, there are also additional configuration options and software that can be added to increase the visibility of your environment.
