System Monitor (Sysmon) is a Windows system service and device driver that, once installed on a system, remains resident across system reboots to monitor and log system activity to the Windows event log.
The System Monitor (Sysmon) provides detailed information about process creation, network connections, and file creation time changes. By collecting and analyzing the events generated by Windows event collection or SIEM agent, you can easily identify malicious or abnormal activities and understand how intruders and malware run on your network. The functions of these details are attractive.
Sysmon v14.12 features:
- Logs process creation with full command line for both current and parent processes.
- Records the hash of process image files using SHA1 (the default), MD5, SHA256 or IMPHASH.
- Multiple hashes can be used at the same time.
- Includes a process GUID in process create events to allow for correlation of events even when Windows reuses process IDs.
- Includes a session GUID in each event to allow correlation of events on same logon session.
- Logs loading of drivers or DLLs with their signatures and hashes.
- Logs opens for raw read access of disks and volumes.
- Optionally logs network connections, including each connection’s source process, IP addresses, port numbers, hostnames and port names.
- Detects changes in file creation time to understand when a file was really created. Modification of file create timestamps is a technique commonly used by malware to cover its tracks.
- Automatically reload configuration if changed in the registry.
- Rule filtering to include or exclude certain events dynamically.
- Generates events from early in the boot process to capture activity made by even sophisticated kernel-mode malware.
This software was developed by by Mark Russinovich and Thomas Garnier.
About Sysmon for Linux install and build instructions,you can click the link below to know more.
https://github.com/Sysinternals/SysmonForLinux
Webmaster’s note:Sysmon does not provide analysis of the events it generates, nor does it attempt to protect or hide itself from attackers.