EnableWindowsLogSettings

Log setup script

Enables Windows event log settings to support a larger percentage of Sigma detection rules and retain logs for longer periods

Documentation and scripts to properly enable Windows event logs.

GitHub

556 stars
15 watching
51 forks
Language: Batchfile
last commit: about 1 year ago
Linked from 1 awesome list

auditingdfireventforensicshayabusalogsmonitoringsecuritysigmasysmonwindows

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
yamato-security/wela Analyzes Windows Event Logs to identify security-related events and provides forensic tools for incident response. 763
nshalabi/sysmontools Utilities for analyzing and visualizing Windows event logs from Sysmon, helping users track and monitor system activity. 1,488
sigmahq/sigma A standardized format for describing log events to facilitate detection and analysis of security threats 8,371
thiber-org/userline Automates analysis of Windows Security Events to identify user logon relations 240
wagga40/zircolite A standalone tool for analyzing and detecting security-related events in various Linux logs using SIGMA rules 680
yarox24/evtkit Tool to repair Windows Event Log files (.evt) acquired during forensic investigations 18
threathunters-io/laurel Transforms Linux audit logs into standardized, human-readable format for security monitoring 711
jscu-nl/logging-essentials Provides guidance on configuring and collecting Windows event logs to enhance forensic analysis and incident response capabilities. 274
jdu2600/windows10etwevents Collects and analyzes Windows 10 event tracing data from various providers across different versions. 267
jpcertcc/sysmonsearch Analyzes Sysmon event logs to detect suspicious activity and visualize process and network correlations. 417
asimihsan/cwl-mount Mounts AWS CloudWatch Logs as a file system 81
sans-blue-team/deepbluecli A PowerShell module for analyzing Windows event logs to detect and respond to potential security threats. 2,188
realparisi/wmi_monitor Logs WMI consumer and process creation events to the Windows Application event log 124
mdecrevoisier/splunk-input-windows-baseline Provides an advanced Splunk configuration for collecting Windows log data relevant to threat detection, incident response, and forensic analysis. 81
sud0woodo/dcomrade Automates enumeration of vulnerable DCOM applications to aid in lateral movement and exploitation testing 254