Skip to content

Commit 29af4cf

Browse files
w0rk3rCopilot
andauthored
Update docs/audit_policies/windows/sysmon_eventid1_process_creation.md
Co-authored-by: Copilot <[email protected]>
1 parent 974d4e2 commit 29af4cf

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/audit_policies/windows/sysmon_eventid1_process_creation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99

1010
Some detection rules support the use of Sysmon Event ID 1 (Process Creation) events to detect malicious and suspicious process execution activity.
1111

12-
To collect these logs, use the [Windows Integration](https://www.elastic.co/docs/current/integrations/windows)and select the `Sysmon Operational` channel on the integration setup page.
12+
To collect these logs, use the [Windows Integration](https://www.elastic.co/docs/current/integrations/windows) and select the `Sysmon Operational` channel on the integration setup page.
1313

1414
## Configuration Example
1515

0 commit comments

Comments
 (0)