EnableWindowsLogSettings
Log setup script
Enables Windows event log settings to support a larger percentage of Sigma detection rules and retain logs for longer periods
Documentation and scripts to properly enable Windows event logs.
571 stars
15 watching
51 forks
Language: Batchfile
last commit: over 1 year ago
Linked from 1 awesome list
auditingdfireventforensicshayabusalogsmonitoringsecuritysigmasysmonwindows
Related projects:
Repository | Description | Stars |
---|---|---|
| Analyzes Windows Event Logs to identify security-related events and provides forensic tools for incident response. | 769 |
| Utilities for analyzing and visualizing Windows event logs from Sysmon, helping users track and monitor system activity. | 1,492 |
| A standardized format for describing log events to facilitate detection and analysis of security threats | 8,490 |
| Automates analysis of Windows Security Events to identify user logon relations | 241 |
| A standalone tool for analyzing and detecting security-related events in various Linux logs using SIGMA rules | 684 |
| Tool to repair Windows Event Log files (.evt) acquired during forensic investigations | 18 |
| Converts Linux audit logs into standardized JSON format for enhanced security monitoring | 722 |
| Provides guidance on configuring and collecting Windows event logs to enhance forensic analysis and incident response capabilities. | 276 |
| Collects and analyzes Windows 10 event tracing data from various providers across different versions. | 275 |
| Analyzes Sysmon event logs to detect suspicious activity and visualize process and network correlations. | 419 |
| Mounts AWS CloudWatch Logs as a file system | 81 |
| A PowerShell module for analyzing Windows event logs to detect and respond to potential security threats. | 2,203 |
| Logs WMI consumer and process creation events to the Windows Application event log | 124 |
| Provides an advanced Splunk configuration for collecting Windows log data relevant to threat detection, incident response, and forensic analysis. | 85 |
| Automates enumeration of vulnerable DCOM applications to aid in lateral movement and exploitation testing | 254 |