Thanks Josh!  Great stuff here...  For my particular use case, sysmon will 
log to the SYSTEM eventlog and enable me to capture more in-depth 
information beyond the image name of the executables being launched on the 
system.

I'll implement this next week!

-Brent

On Friday, March 27, 2015 at 6:29:03 AM UTC-7, DefensiveDepth wrote:
>
> Newly published paper: Using Sysmon to Enrich Security Onion's Host-Level 
> Capabilities 
> <http://defensivedepth.com/2015/03/27/using-sysmon-to-enrich-security-onions-host-level-capabilities/>
>
> Of particular note, I wrote an OSSEC decoder and a number of rules for 
> Sysmon Event ID 1: Process Created... 
>
> They can be found on Github 
> <https://github.com/defensivedepth/Sysmon_OSSEC>... Feel free to tweak, 
> contribute back, send feedback, etc
>
> Keep in mind that there may be issues with the current stable release 
> (2.8) as the <eventchannel> bug is unfixed--
>
> I believe the bug fix is slated to be released with 2.9...(
> https://github.com/ossec/ossec-hids/issues/224)
>
> -Josh
>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to ossec-list+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to