SigmaHQ/tools/config/splunk-windows-all.yml

65 lines
1.7 KiB
YAML
Raw Normal View History

2017-03-17 09:00:56 +00:00
logsources:
windows-application:
product: windows
service: application
conditions:
2017-05-26 20:40:06 +00:00
source: 'WinEventLog:Application'
2017-03-17 09:00:56 +00:00
windows-security:
product: windows
service: security
conditions:
2017-05-26 20:40:06 +00:00
source: 'WinEventLog:Security'
2017-11-09 07:41:07 +00:00
windows-system:
2017-03-17 09:00:56 +00:00
product: windows
service: system
conditions:
2017-05-26 20:40:06 +00:00
source: 'WinEventLog:System'
2017-03-17 09:00:56 +00:00
windows-sysmon:
product: windows
service: sysmon
conditions:
2017-05-26 20:40:06 +00:00
source: 'WinEventLog:Microsoft-Windows-Sysmon/Operational'
2017-03-17 09:00:56 +00:00
windows-powershell:
product: windows
service: powershell
conditions:
2017-05-26 20:40:06 +00:00
source: 'WinEventLog:Microsoft-Windows-PowerShell/Operational'
windows-classicpowershell:
product: windows
service: powershell-classic
conditions:
source: 'Windows PowerShell'
2017-11-09 07:41:07 +00:00
windows-taskscheduler:
2017-03-17 09:00:56 +00:00
product: windows
service: taskscheduler
conditions:
2017-05-26 20:40:06 +00:00
source: 'WinEventLog:Microsoft-Windows-TaskScheduler/Operational'
windows-wmi:
product: windows
service: wmi
conditions:
source: 'WinEventLog:Microsoft-Windows-WMI-Activity/Operational'
windows-dns-server:
product: windows
service: dns-server
2018-05-22 14:58:13 +00:00
category: dns
conditions:
2017-05-26 20:40:06 +00:00
source: 'DNS Server'
2018-05-22 14:58:13 +00:00
windows-dns-server-audit:
product: windows
service: dns-server-audit
conditions:
source: 'Microsoft-Windows-DNS-Server/Audit'
windows-driver-framework:
product: windows
service: driver-framework
conditions:
source: 'Microsoft-Windows-DriverFrameworks-UserMode/Operational'
2018-06-08 09:45:31 +00:00
windows-ntlm:
product: windows
service: ntlm
conditions:
source: 'Microsoft-Windows-NTLM/Operational'
2017-03-17 23:03:21 +00:00
fieldmappings:
EventID: EventCode