Splunk-input-windows-baseline

Windows log collector

Provides an advanced Splunk configuration for collecting Windows log data relevant to threat detection, incident response, and forensic analysis.

Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE Att&CK

GitHub

81 stars
5 watching
10 forks
last commit: about 2 months ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
mdecrevoisier/evtx-to-mitre-attack Provides Windows log event indicators mapped to MITRE ATT&CK tactic and techniques 527
anssi-fr/dfir-o365rc A PowerShell module for collecting and analyzing logs from Microsoft 365 and Azure systems 249
mdecrevoisier/microsoft-eventlog-mindmap Provides detailed mindmaps on Microsoft auditing capacities and event logs for security and monitoring 1,044
west-wind/threat-hunting-with-splunk Provides Splunk queries to detect vulnerability exploitation attempts and subsequent compromise, including threat hunting for MITRE ATT&CK TTPs 57
inodee/threathunting-spl Provides Splunk code and prototypes for building rules and queries to detect malicious activity 266
spujadas/elk-docker A pre-configured Docker image for Elasticsearch, Logstash, and Kibana to facilitate log management and analysis. 2,157
securityjoes/forensicminer Automates evidence collection and analysis from Windows machines using PowerShell. 148
nshalabi/sysmontools Utilities for analyzing and visualizing Windows event logs from Sysmon, helping users track and monitor system activity. 1,488
splunk/botsv2 A comprehensive security dataset and CTF platform for analysis and training of information security professionals. 358
danielmartensson/opensourcelogger Software for collecting and analyzing measurement data from industrial equipment. 16
thiber-org/userline Automates analysis of Windows Security Events to identify user logon relations 240
mlsecproject/combine Tool to gather Threat Intelligence indicators from publicly available sources 655
jscu-nl/logging-essentials Provides guidance on configuring and collecting Windows event logs to enhance forensic analysis and incident response capabilities. 274
yamato-security/wela Analyzes Windows Event Logs to identify security-related events and provides forensic tools for incident response. 763
improsec/sharpeventpersist Tools to write and read shellcode from Event Log using C# and Windows persistence mechanisms 367