V 2.0 : MS Windows Event Logging XML - Sysmon (Configuration Guide)
System Monitor (Sysmon) is a Windows system service and device driver that, once installed on a system, remains resident across system reboots to monitor and log system activity to the Windows event log. It provides detailed information about process creations, network connections, and changes to file creation time. By collecting the events it generates using Windows Event Collection or SIEM agents and subsequently analyzing them, you can identify malicious or anomalous activity and understand how intruders and malware operate on your network.
Device Details
Vendor | MS Windows |
---|---|
Device Type | MS Windows System Monitor |
Supported Model Name/Number | Windows Server 2008, 2012, 2016+ |
Supported Software Version(s) | N/A |
Collection Method | MS Windows Event Logging |
Configurable Log Output? | N/A |
Log Source Type | MS Windows Event Logging XML - Sysmon |
Log Processing Policy | LogRhythm Default v2.0 |
Exceptions | N/A |
Additional Information |
Supported Log Messages
(List of LR Tags used to parse the log information for each message type)
Type | Product Version | Supported Schema Fields |
---|---|---|
V 2.0 : Catch All | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname> |
V 2.0 : EVID 2 : File Creation Timestamp Changed | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <processid>, <process>, <object> |
V 2.0 : EVID 3 : Network Connection Detected | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <policy>, <processid>, <process>, <login>, <domainorigin>, <protname>, <sip>, <sname>, <sport>, <dip>, <dname>, <dport> |
V 2.0 : EVID 4 : Sysmon Service State Changed | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <action>, <tag1> |
V 2.0 : EVID 8 : Remote Thread Created | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <parentprocessid>, <parentprocessname>, <parentprocesspath>, <processid>, <process>, <domainorigin>, <login>, <domainimpacted>, <account> |
V 2.0 : EVID 9 : Raw Access Read Event | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <processid>, <process>, <object> |
V 2.0 : EVID 10 : Process Access Event | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <parentprocessid>, <parentprocessname>, <parentprocesspath>, <processid>, <process>, <object>, <domainorigin>, <login>, <domainimpacted>, <account> |
V 2.0 : EVID 15 : File Stream Created | N/A | <vmid> , <severity>, <vendorinfo> , <result>, <dname>, <policy>, <processid>, <process>, <object>, <hash> |
V 2.0 : EVID 16 : Sysmon Configuration Change | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <command>, <object>, <hash> |
V 2.0 : EVID 22 : DNS Query | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <sname>, <policy>, <processid>, <subject>, <status>, <tag1>, <process>, <domainorigin>, <login> |
V 2.0 : EVID 24 : Clipboard Change | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <process>, <processid>, <session>, <hash>, <domainorigin>, <login>, <sname> |
V 2.0 : EVID 25 : Process Tampering | N/A | <vmid>, <severity>, <vendorinfo>, <dname>, <policy>, <process>, <processid>, <action> |
V 2.0 : File Creation/Deletion Events | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <processid>, <domainorigin>, <login>, <process>, <object>, <hash> |
V 2.0 : Object Loaded | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <processid>, <process>, <object>, <hash>, <domainorigin>, <login>, <status>, <subject> |
V 2.0 : Pipe Creation/Connection Events | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <process>, <processid> |
V 2.0 : Process Start/Stop Events | N/A | <vmid>, <tag1>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <processid>, <process>, <command>, <login>, <domainorigin>, <hash>, <parentprocessid>, <parentprocesspath>, <session>, <object>, <parentprocessname> |
V 2.0 : Registry Modification Events | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <action>, <tag1>, <processid>, <process>, <object>, <domainorigin>, <login>, <subject> |
N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <domainorigin>, <login>, <command> | |
V 2.0 EVID 26 : File Delete Detected | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <processid>, <domainorigin>, <login>, <process>, <object>, <hash> |
V 2.0 : EVID 27: File Block Executable | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <processid>, <domainorigin>, <login>, <process>, <object>, <hash> |
V 2.0 : EVID 28 : File Block Shredding | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <processid>, <domainorigin>, <login>, <process>, <object>, <hash> |
V 2.0 : EVID 29 : File Executable Detected | N/A | <vmid>, <severity>, <vendorinfo>, <result>, <dname>, <policy>, <processid>, <domainorigin>, <login>, <process>, <object>, <hash> |
Revision History
KB Version | Log Type | Change Type | Details |
---|---|---|---|
KB 7.1.591.0 | MS Windows Event Logging XML - Sysmon | Policy: LogRhythm Default v2.0 | New optimized log processing policy for MS Windows Event Logging XML - Sysmon. |