Skip to content

Instantly share code, notes, and snippets.

@minkione
Forked from Neo23x0/config-client.xml
Created February 15, 2017 09:35
Show Gist options
  • Save minkione/6ad9def158705d7f8621357e699b9c29 to your computer and use it in GitHub Desktop.
Save minkione/6ad9def158705d7f8621357e699b9c29 to your computer and use it in GitHub Desktop.
Sysmon Base Configuration - Workstations
<!--
This is a Microsoft Sysmon configuration to be used on Windows workstations
v0.2.1 December 2016
Florian Roth (with the help and ideas of others)
The focus of this configuration is
- malware detection (execution)
- malware detection (network connections)
- exploit detection
It is not focussed on
- hacking activity on workstation (bad admin, attacker)
See Windows server base config: https://gist.github.com/Neo23x0/a4b4af9481e01e749409
-->
<Sysmon schemaversion="3.20">
<!-- Capture MD5 Hashes -->
<HashAlgorithms>MD5,SHA1,SHA256</HashAlgorithms>
<EventFiltering>
<!-- Log all drivers except if the signature -->
<!-- contains Microsoft or Windows -->
<DriverLoad onmatch="exclude">
<Signature condition="contains">microsoft</Signature>
<Signature condition="contains">windows</Signature>
</DriverLoad>
<!-- Exclude certain processes that have the integrity level 'System' -->
<ProcessCreate onmatch="exclude">
<IntegrityLevel>System</IntegrityLevel>
</ProcessCreate>
<!-- Do log remote thread creation events with certain exceptions -->
<CreateRemoteThread onmatch="exclude">
<SourceImage condition="contains">WmiPrvSE.exe</SourceImage>
<SourceImage condition="contains">FireSvc.exe</SourceImage>
</CreateRemoteThread>
<!-- Do not log file creation time stamps -->
<FileCreateTime onmatch="include" />
<!-- Do not log raw disk access (caused event flooding with certain disk encryption drivers) -->
<RawAccessRead onmatch="include" />
<!-- Do not log process termination -->
<ProcessTerminate onmatch="include" />
<!-- Do log registry events to certain keys only (Autostart, Services, Debuggers) -->
<RegistryEvent onmatch="include">
<TargetObject condition="contains">Windows\CurrentVersion\Run</TargetObject>
<TargetObject condition="contains">Windows\CurrentVersion\Image File Execution Options</TargetObject>
<TargetObject condition="contains">CurrentControlSet\Services</TargetObject>
<TargetObject condition="contains">Microsoft\Windows NT\CurrentVersion\Winlogon</TargetObject>
<TargetObject condition="contains">Microsoft\Windows\CurrentVersion\Policies\Explorer</TargetObject>
<TargetObject condition="contains">Microsoft\Windows\CurrentVersion\RunOnce</TargetObject>
<TargetObject condition="contains">System\CurrentControlSet\Services\Tcpip\parameters</TargetObject>
</RegistryEvent>
<!-- Do not log file creation events -->
<FileCreate onmatch="include" />
<!-- Do not log if file stream is created -->
<FileCreateStreamHash onmatch="include" />
<!-- Do only log network connections to port 8080 (proxy) of every program that is not a browser -->
<NetworkConnect onmatch="exclude">
<Image condition="contains">chrome.exe</Image>
<Image condition="contains">iexplore.exe</Image> <!-- yes, malware that injects into IE will be missed -->
<Image condition="contains">firefox.exe</Image>
<DestinationPort condition="is not">8080</DestinationPort>
<!-- Direct access to Internet (without proxy server) -->
<!--
<DestinationPort condition="is not">80</DestinationPort>
-->
</NetworkConnect>
</EventFiltering>
</Sysmon>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment