SysmonSearch Logo

SysmonSearch

0
Free
Visit Website

SysmonSearch makes event log analysis more effective and less time-consuming by aggregating event logs generated by Microsoft's Sysmon. System Overview: SysmonSearch uses Elasticsearch and Kibana (and Kibana plugin). Elasticsearch collects/stores Sysmon's event log. Kibana provides a user interface for Sysmon's event log analysis. The following functions are implemented as Kibana plugin: Visualizes Function - visualizes Sysmon's event logs to illustrate correlation of processes and networks. Statistical Function - collects the statistics of each device or Sysmon's event ID. Monitor Function - monitors incoming logs based on preconfigured rules and triggers alerts. StixIoC server allows adding search/monitor conditions by uploading STIX/IOC files. From StixIoC server Web UI, you can upload STIXv1, STIXv2, and OpenIOC format files. To try SysmonSearch, you can either install software to your own Linux environment with the provided instructions or use the Docker image. For more details, please refer to the SysmonSearch wiki documentation.

FEATURES

ALTERNATIVES

A tool that collects and displays user activity and system events on a Windows system.

Free

A community-led project focused on standardizing security event logs.

Free

Security-Guard helps secure microservices and serverless containers by detecting and blocking exploits.

Free

A dynamic GUI for advanced log analysis, allowing users to execute SQL queries on structured log data.

Free

Windows Event Log Analyzer with logon timeline generator and noise reduction for fast forensics.

Free

Search AWS CloudWatch logs on the command line with aws-sdk-for-go.

Free

Browse a library of EQL analytics now natively integrated in Elasticsearch.

Free

A tool collection for filtering and visualizing logon events, designed for experienced DFIR specialists in threat hunting and incident response.

Free