WMI Monitor Logo

WMI Monitor

0
Free
Visit Website

Monitor WMI consumers and processes, detecting potential malicious activity. This PowerShell script monitors WMI consumers and processes, detecting potential malicious activity. **Usage:** 1. Run PowerShell as administrator. 2. Import the WMIMonitor.ps1 module. 3. Create a new event subscriber. 4. Test the process call create function. 5. Check the Application Event log for EID 8. **Disable logging:** 1. Open an Administrator PS shell. 2. Run Remove-SubscriberMonitor. 3. Confirm the event subscriber and all associated WMI objects have been successfully removed.

FEATURES

ALTERNATIVES

GravityZone is a unified endpoint security and analytics platform that provides risk assessment, threat prevention, and incident response capabilities.

Symantec Enterprise Cloud provides comprehensive cybersecurity for large enterprises, with a focus on data-centric hybrid security and innovation in threat and data protection.

Avira Free Security is an all-in-one security, privacy, and performance app for Mac, providing real-time protection, password management, VPN, and more, all for free.

A collection of utilities for working with USB devices on Linux

Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.

A free, fast, and flexible multi-platform IOC and YARA scanner for Windows, Linux, and macOS.

A discontinued project for Windows system administration that has been archived due to the author's dissatisfaction with the Windows operating system.

A collection of scripts to harden Windows 10 security and privacy