Artwork

内容由Clint Marsden提供。所有播客内容(包括剧集、图形和播客描述)均由 Clint Marsden 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Player FM -播客应用
使用Player FM应用程序离线!

Audiobook - Mastering Sysmon. Deploying, Configuring, and Tuning in 10 easy steps

44:12
 
分享
 

Manage episode 468828442 series 3578563
内容由Clint Marsden提供。所有播客内容(包括剧集、图形和播客描述)均由 Clint Marsden 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Send us a text

This episode features the complete narration of my ebook: Mastering Sysmon – Deploying, Configuring, and Tuning in 10 Easy Steps, providing a step-by-step guide to getting Sysmon up and running for better threat detection and incident response.

If you’re in security operations, digital forensics, or incident response, this episode will help you:

  • Deploy Sysmon efficiently.
  • Tune Sysmon logs for maximum insight while reducing noise.
  • Use Sysmon for investigations—from process creation tracking to network monitoring.
  • Understand real-world use cases of how Sysmon can catch adversaries in action.

Key Topics Covered:

  • Why Sysmon Matters – A deep dive into how Sysmon enhances Windows logging.
  • Common Mistakes & How to Avoid Them – Logging misconfigurations, tuning issues, and evidence handling best practices.
  • Step-by-Step Deployment Guide – From downloading Sysmon to configuring it for lean detections.
  • Tuning for Performance & Relevance – How to tweak Sysmon settings to avoid excessive log volume.
  • Investigating Security Events – Key Sysmon event IDs that provide forensic gold.
  • Real-World Use Cases – Examples of how Sysmon has caught attackers in action.
  • Sysmon Bypass Techniques – How adversaries evade detection and how to stay ahead.

Resources Mentioned:

  1. Sysmon DownloadMicrosoft Sysinternals
  2. Sysmon Configuration FilesOlaf Hartong’s Sysmon-Modular
  3. MITRE ATT&CK FrameworkMITRE ATT&CK
  4. ACSC Sysmon Config GuideACSC GitHub

Key Takeaways:

  • Sysmon provides deep system visibility – if tuned correctly.
  • Tuning is essential – Avoid log overload while keeping useful data.
  • Use a structured deployment process – From baselining performance to verifying logs.
  • Sysmon alone isn’t enough – It works best when combined with other detection tools.
  • Be aware of bypass techniques – Attackers can disable Sysmon, so defense in depth is key.

Join the AI Cyber Security Skool Group
Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.
https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea

  continue reading

25集单集

Artwork
icon分享
 
Manage episode 468828442 series 3578563
内容由Clint Marsden提供。所有播客内容(包括剧集、图形和播客描述)均由 Clint Marsden 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Send us a text

This episode features the complete narration of my ebook: Mastering Sysmon – Deploying, Configuring, and Tuning in 10 Easy Steps, providing a step-by-step guide to getting Sysmon up and running for better threat detection and incident response.

If you’re in security operations, digital forensics, or incident response, this episode will help you:

  • Deploy Sysmon efficiently.
  • Tune Sysmon logs for maximum insight while reducing noise.
  • Use Sysmon for investigations—from process creation tracking to network monitoring.
  • Understand real-world use cases of how Sysmon can catch adversaries in action.

Key Topics Covered:

  • Why Sysmon Matters – A deep dive into how Sysmon enhances Windows logging.
  • Common Mistakes & How to Avoid Them – Logging misconfigurations, tuning issues, and evidence handling best practices.
  • Step-by-Step Deployment Guide – From downloading Sysmon to configuring it for lean detections.
  • Tuning for Performance & Relevance – How to tweak Sysmon settings to avoid excessive log volume.
  • Investigating Security Events – Key Sysmon event IDs that provide forensic gold.
  • Real-World Use Cases – Examples of how Sysmon has caught attackers in action.
  • Sysmon Bypass Techniques – How adversaries evade detection and how to stay ahead.

Resources Mentioned:

  1. Sysmon DownloadMicrosoft Sysinternals
  2. Sysmon Configuration FilesOlaf Hartong’s Sysmon-Modular
  3. MITRE ATT&CK FrameworkMITRE ATT&CK
  4. ACSC Sysmon Config GuideACSC GitHub

Key Takeaways:

  • Sysmon provides deep system visibility – if tuned correctly.
  • Tuning is essential – Avoid log overload while keeping useful data.
  • Use a structured deployment process – From baselining performance to verifying logs.
  • Sysmon alone isn’t enough – It works best when combined with other detection tools.
  • Be aware of bypass techniques – Attackers can disable Sysmon, so defense in depth is key.

Join the AI Cyber Security Skool Group
Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.
https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea

  continue reading

25集单集

所有剧集

×
 
Loading …

欢迎使用Player FM

Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。

 

快速参考指南

版权2025 | 隐私政策 | 服务条款 | | 版权
边探索边听这个节目
播放