Event Forwarding Guidance Logo

Event Forwarding Guidance

0
Free
Visit Website

This repository hosts content for aiding administrators in collecting security relevant Windows event logs using Windows Event Forwarding (WEF). This repository is a companion to Spotting the Adversary with Windows Event Log Monitoring paper. The list of events in this repository are more up to date than those in the paper. The repository contains: Recommended Windows events to collect. Regardless of using WEF or a third party SIEM, the list of recommended events should be useful as a starting point for what to collect. The list of events in this repository are more up to date than those in the paper. Scripts to create custom Event Log views and create WEF subscriptions. WEF subscriptions in XML format. Links Microsoft Windows Event Forwarding resources Use Windows Event Forwarding to help with intrusion detection Windows 10 and Windows Server 2016 security auditing and monitoring reference Microsoft's Threat Protection: Advanced security audit policy settings Microsoft's Threat Protection: Security auditing List of important events from Microsoft Microsoft SysInternals SysInternals Sysmon ACSC GitHub Windows Event Logging repository ACSC Windows Event Logging Technica

FEATURES

ALTERNATIVES

Comprehensive endpoint security solution for enterprise networks and SMBs

Advanced malware scanning and removal tool that detects and removes various types of malware and offers additional protection with HitmanPro.Alert.

A discontinued project for Windows system administration that has been archived due to the author's dissatisfaction with the Windows operating system.

MetaDefender Cloud offers advanced threat prevention using technologies like Multiscanning, Deep CDR, and Sandbox.

A free, fast, and flexible multi-platform IOC and YARA scanner for Windows, Linux, and macOS.

Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.

Code injection library for OS X with cross-architecture support.

A library to access and parse the Microsoft Internet Explorer Cache File format.

PINNED

InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Commercial
Resources
Fabric Platform by BlackStork Logo

Fabric Platform by BlackStork

Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.

Free
Security Operations
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.

Free
Blogs and News
System Two Security Logo

System Two Security

An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Commercial
Security Operations
Aikido Security Logo

Aikido Security

Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Commercial
Application Security
Permiso Logo

Permiso

Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Commercial
IAM
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Commercial
Cloud Security
Adversa AI Logo

Adversa AI

Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.

Commercial
AI Security
CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2025 - All rights reserved