SigmaHQ/tools/config/splunk-windows-all.yml

35 lines
878 B
YAML
Raw Normal View History

2017-03-17 09:00:56 +00:00
logsources:
windows:
product: windows
index: windows
2017-03-17 09:00:56 +00:00
windows-application:
product: windows
service: application
conditions:
sourcetype: 'WinEventLog:Application'
windows-security:
product: windows
service: security
conditions:
sourcetype: 'WinEventLog:Security'
windows-security:
product: windows
service: system
conditions:
sourcetype: 'WinEventLog:System'
windows-sysmon:
product: windows
service: sysmon
conditions:
source: 'WinEventLog:Microsoft-Windows-Sysmon/Operational'
windows-powershell:
product: windows
service: powershell
conditions:
source: 'WinEventLog:Microsoft-Windows-PowerShell/Operational'
windows-powershell:
product: windows
service: taskscheduler
conditions:
source: 'WinEventLog:Microsoft-Windows-TaskScheduler/Operational'