Skip to content

Commit 7bc2f3d

Browse files
mauneelsorathia-crestmauneel-sorathiajoepeeples
authored
DDS: Microsoft Sysmon: Added recommended Sysmon configs (#20374)
* Added recommended Sysmon configs to README * Updated README * Update microsoft_sysmon/README.md Co-authored-by: Joe Peeples <[email protected]> * Update microsoft_sysmon/README.md Co-authored-by: Joe Peeples <[email protected]> * Update microsoft_sysmon/README.md Co-authored-by: Joe Peeples <[email protected]> --------- Co-authored-by: Mauneel Sorathia <[email protected]> Co-authored-by: Joe Peeples <[email protected]>
1 parent 0f55cd7 commit 7bc2f3d

File tree

1 file changed

+25
-22
lines changed

1 file changed

+25
-22
lines changed

microsoft_sysmon/README.md

Lines changed: 25 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Run powershell.exe as admin and execute the following command:
4040
sourcecategory: windowsevent
4141
```
4242

43-
See the [sample microsoft_sysmon.d/conf.yaml][9] for available configuration options.
43+
See the [sample microsoft_sysmon.d/conf.yaml][11] for available configuration options.
4444

4545
3. [Restart the Agent][3].
4646

@@ -50,31 +50,32 @@ Follow these steps to install Sysmon:
5050
1. Download the zip file from the [Sysmon download page][4]. Extract its zip file content.
5151
2. Create an XML file for configuring Sysmon. For example, if you want to monitor processes created by apps from AppData folders, the configuration file will look like content shown below. You can add more event filters under the `EventFiltering` XML tag for other events in the same way.
5252

53-
```xml
54-
<Sysmon schemaversion="4.90">
55-
<EventFiltering>
56-
<ProcessCreate onmatch="include">
57-
<Image condition="contains">C:\Users\*\AppData\Local\Temp\</Image>
58-
<Image condition="contains">C:\Users\*\AppData\Roaming\</Image>
59-
</ProcessCreate>
60-
</EventFiltering>
61-
</Sysmon>
62-
```
53+
```xml
54+
<Sysmon schemaversion="4.90">
55+
<HashAlgorithms>md5,sha256</HashAlgorithms>
56+
<CheckRevocation/>
57+
<EventFiltering>
58+
<ProcessCreate onmatch="include">
59+
<Image condition="contains">C:\Users\*\AppData\Local\Temp\</Image>
60+
<Image condition="contains">C:\Users\*\AppData\Roaming\</Image>
61+
</ProcessCreate>
62+
</EventFiltering>
63+
</Sysmon>
64+
```
6365

64-
3. Execute the command as admin from the extracted folder:
66+
**Note:** Sysmon is highly configurable using the XML configuration file, which allows you to:
67+
- Control which events to monitor
68+
- Filter events based on processes, paths, etc.
6569

66-
```powershell
67-
.\Sysmon -i [<configfile>]
68-
```
70+
Enabling too many Sysmon event types can lead to excessive data ingestion. Community resources such as [sysmon-modular][9] and the [SwiftOnSecurity Sysmon config][10] provide recommended configurations, including examples of event inclusions and exclusions. These are intended as a starting point, and you can refer to them when tuning your own configuration.
6971

70-
**Note:** Sysmon is highly configurable using the configuration (XML) file which allows you to:
71-
- Control which events to monitor
72-
- Filter events based on processes, paths, etc.
72+
3. Run the following command as admin from the extracted folder:
7373

74-
Enabling too many event types can result in excessive data ingestion. Only critical security events should be enabled based on the threat model and monitoring needs.
75-
These events should be selectively enabled for critical system directories, processes, and users to avoid unnecessary log noise.
74+
```powershell
75+
.\Sysmon -i [<configfile>]
76+
```
7677

77-
For more details on configuration, please refer to the [Sysmon docs][7].
78+
For more details, please refer to the [Sysmon docs][7].
7879

7980
### Validation
8081

@@ -117,4 +118,6 @@ Need help? Contact [Datadog support][1].
117118
[6]: https://docs.datadoghq.com/agent/guide/integration-management/?tab=windowspowershell#install
118119
[7]: https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon#configuration-files
119120
[8]: https://docs.datadoghq.com/agent/guide/agent-commands/#agent-status-and-information
120-
[9]: https://github.com/DataDog/integrations-core/blob/master/microsoft_sysmon/datadog_checks/microsoft_sysmon/data/conf.yaml.example
121+
[9]: https://github.com/olafhartong/sysmon-modular/tree/master
122+
[10]: https://github.com/SwiftOnSecurity/sysmon-config/tree/master
123+
[11]: https://github.com/DataDog/integrations-core/blob/master/microsoft_sysmon/datadog_checks/microsoft_sysmon/data/conf.yaml.example

0 commit comments

Comments
 (0)