SysmonSearch makes event log analysis more effective and less time-consuming by aggregating event logs generated by Microsoft's Sysmon. System Overview: SysmonSearch uses Elasticsearch and Kibana (and Kibana plugin). Elasticsearch collects/stores Sysmon's event log. Kibana provides a user interface for Sysmon's event log analysis. The following functions are implemented as Kibana plugin: Visualizes Function - visualizes Sysmon's event logs to illustrate correlation of processes and networks. Statistical Function - collects the statistics of each device or Sysmon's event ID. Monitor Function - monitors incoming logs based on preconfigured rules and triggers alerts. StixIoC server allows adding search/monitor conditions by uploading STIX/IOC files. From StixIoC server Web UI, you can upload STIXv1, STIXv2, and OpenIOC format files. To try SysmonSearch, you can either install software to your own Linux environment with the provided instructions or use the Docker image. For more details, please refer to the SysmonSearch wiki documentation.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
Open source security data lake for AWS with real-time log normalization and Detection-as-Code capabilities.
Sysmon for Linux is a tool that monitors and logs system activity with advanced filtering to identify malicious activity.
A tool that collects and displays user activity and system events on a Windows system.
A community-led project focused on standardizing security event logs.
A Security Information and Event Management (SIEM) system with a focus on security and minimalism.
A collection of detections for Panther SIEM with detailed setup instructions.