|
70 | 70 | <EventFiltering>
|
71 | 71 |
|
72 | 72 | <!--SYSMON EVENT ID 1 : PROCESS CREATION [ProcessCreate]-->
|
73 |
| - <!--COMMENT: All process launched will be logged, except for what matches a rule below. It's best to be as specific as possible, to |
74 |
| - avoid user-mode executables imitating other process names to avoid logging, or if malware drops files in an existing directory. |
| 73 | + <!--COMMENT: All processes launched will be logged, except for what matches a rule below. It's best to be as specific as possible, |
| 74 | + to avoid user-mode executables imitating other process names to avoid logging, or if malware drops files in an existing directory. |
75 | 75 | Ultimately, you must weigh CPU time checking many detailed rules, against the risk of malware exploiting the blindness created.
|
76 | 76 | Beware of Masquerading, where attackers imitate the names and paths of legitimate tools. Ideally, you'd use both file path and
|
77 | 77 | code signatures to validate, but Sysmon does not support that. Look into AppLocker/WindowsDeviceGuard for whitelisting support. -->
|
|
714 | 714 | <TargetObject condition="end with">Browser\ITBar7Layout</TargetObject> <!--Microsoft:IE: Extraneous activity-->
|
715 | 715 | <TargetObject condition="end with">Internet Explorer\Toolbar\Locked</TargetObject> <!--Microsoft:Windows:Explorer: Extraneous activity-->
|
716 | 716 | <TargetObject condition="end with">Toolbar\WebBrowser\{47833539-D0C5-4125-9FA8-0819E2EAAC93}</TargetObject> <!--Microsoft:Windows:Explorer: Extraneous activity-->
|
717 |
| - <TargetObject condition="end with">ShellBrowser</TargetObject> <!--Microsoft:InternetExplorer: Noise--> |
718 | 717 | <TargetObject condition="end with">}\PreviousPolicyAreas</TargetObject> <!--Microsoft:Windows: Remove noise from \Winlogon\GPExtensions by svchost.exe-->
|
719 | 718 | <TargetObject condition="contains">\Control\WMI\Autologger\</TargetObject> <!--Microsoft:Windows: Remove noise from monitoring "\Start"-->
|
720 | 719 | <TargetObject condition="end with">HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc\Start</TargetObject> <!--Microsoft:Windows: Remove noise from monitoring "\Start"-->
|
|
741 | 740 | <TargetObject condition="end with">\services\tunnel\Start</TargetObject> <!--Microsoft:Windows: Remove noise from monitoring "\Start"-->
|
742 | 741 | <TargetObject condition="end with">\services\usoSvc\Start</TargetObject> <!--Microsoft:Windows: Remove noise from monitoring "\Start"-->
|
743 | 742 | <!--FileExts noise filtering-->
|
744 |
| - <TargetObject condition="contains">\OpenWithProgids</TargetObject> <!--Microsoft:Windows: Remove noise from monitoring "FileExts"--> |
745 |
| - <TargetObject condition="end with">\OpenWithList</TargetObject> <!--Microsoft:Windows: Remove noise from monitoring "FileExts"--> |
746 |
| - <TargetObject condition="end with">\UserChoice</TargetObject> <!--Microsoft:Windows: Remove noise from monitoring "FileExts"--> |
747 | 743 | <TargetObject condition="end with">\UserChoice\ProgId</TargetObject> <!--Microsoft:Windows: Remove noise from monitoring "FileExts"--> <!--Win8+-->
|
748 | 744 | <TargetObject condition="end with">\UserChoice\Hash</TargetObject> <!--Microsoft:Windows: Remove noise from monitoring "FileExts"--> <!--Win8+-->
|
749 | 745 | <TargetObject condition="end with">\OpenWithList\MRUList</TargetObject> <!--Microsoft:Windows: Remove noise from monitoring "FileExts"-->
|
750 |
| - <TargetObject condition="end with">} 0xFFFF</TargetObject> <!--Microsoft:Windows: Remove noise generated by explorer.exe on monitored ShellCached binary keys--> <!--Win8+--> |
| 746 | + <TargetObject condition="contains">Shell Extentions\Cached</TargetObject> <!--Microsoft:Windows: Remove noise generated by explorer.exe on monitored ShellCached binary keys--> <!--Win8+--> |
751 | 747 | <!--Group Policy noise-->
|
752 | 748 | <TargetObject condition="end with">HKLM\System\CurrentControlSet\Control\Lsa\Audit\SpecialGroups</TargetObject> <!--Microsoft:Windows: Routinely set through Group Policy, not especially important to log-->
|
753 | 749 | <TargetObject condition="end with">SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy\Scripts\Startup\0\PSScriptOrder</TargetObject> <!--Microsoft:Windows:Group Policy: Noise below the actual key while building-->
|
|
0 commit comments