SigmaHQ/tools/config/splunk-windows-all.yml

49 lines
1.2 KiB
YAML
Raw Normal View History

2017-03-17 09:00:56 +00:00
logsources:
windows-application:
product: windows
service: application
conditions:
2017-05-26 20:40:06 +00:00
source: 'WinEventLog:Application'
2017-03-17 09:00:56 +00:00
windows-security:
product: windows
service: security
conditions:
2017-05-26 20:40:06 +00:00
source: 'WinEventLog:Security'
2017-03-17 09:00:56 +00:00
windows-security:
product: windows
service: system
conditions:
2017-05-26 20:40:06 +00:00
source: 'WinEventLog:System'
2017-03-17 09:00:56 +00:00
windows-sysmon:
product: windows
service: sysmon
conditions:
2017-05-26 20:40:06 +00:00
source: 'WinEventLog:Microsoft-Windows-Sysmon/Operational'
2017-03-17 09:00:56 +00:00
windows-powershell:
product: windows
service: powershell
conditions:
2017-05-26 20:40:06 +00:00
source: 'WinEventLog:Microsoft-Windows-PowerShell/Operational'
windows-classicpowershell:
product: windows
service: powershell-classic
conditions:
source: 'Windows PowerShell'
2017-03-17 09:00:56 +00:00
windows-powershell:
product: windows
service: taskscheduler
conditions:
2017-05-26 20:40:06 +00:00
source: 'WinEventLog:Microsoft-Windows-TaskScheduler/Operational'
windows-wmi:
product: windows
service: wmi
conditions:
source: 'WinEventLog:Microsoft-Windows-WMI-Activity/Operational'
windows-dns-server:
product: windows
service: dns-server
conditions:
2017-05-26 20:40:06 +00:00
source: 'DNS Server'
2017-03-17 23:03:21 +00:00
fieldmappings:
EventID: EventCode