# category: process_creation ID: 2ff912e8-159f-4789-a2ef-761292b32a23 ## Content
Expand - [category: process\_creation](#category-process_creation) - [Content](#content) - [Description](#description) - [Event Source(s)](#event-sources) - [Logging Setup](#logging-setup) - [Microsoft Windows Security Auditing](#microsoft-windows-security-auditing) - [Process Creation](#process-creation) - [Include Command-Line In Process Creation Events](#include-command-line-in-process-creation-events) - [Microsoft-Windows-Sysmon](#microsoft-windows-sysmon) - [Process Creation](#process-creation-1) - [Event Fields](#event-fields) - [Provider: Microsoft Windows Security Auditing / EventID: 4688](#provider-microsoft-windows-security-auditing--eventid-4688) - [Provider: Microsoft-Windows-Sysmon / EventID: 1](#provider-microsoft-windows-sysmon--eventid-1)
## Description This logsource guide describes how to enable the necessary logging to make use of SIGMA rules that leverage the `process_creation` category. ## Event Source(s) This section describes the event source(s) that are required to be collected in order to receive the events used by the `process_creation` category detection rules ```yml Provider: Microsoft Windows Security Auditing GUID: {54849625-5478-4994-a5ba-3e3b0328c30d} Channel: Security EventID: 4688 ``` ```yml Provider: Microsoft-Windows-Sysmon GUID: {5770385f-c22a-43e0-bf4c-06f5698ffbd9} Channel: Microsoft-Windows-Sysmon/Operational EventID: 1 ``` ## Logging Setup This section describes how to setup logging in your environment ### Microsoft Windows Security Auditing #### Process Creation - Subcategory GUID: `{0CCE922B-69AE-11D9-BED3-505054503030}` - Provider: `Microsoft Windows Security Auditing` - Channel: `Security` - Event Volume: `High` - EventID(s): - `4688` If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below ```yml - Computer Configuration - Windows Settings - Security Settings - Advanced Audit Policy Configuration - System Audit Policies - Local Group Policy Object - Detailed Tracking - Audit Process Creation - Success and Failure ``` Alternatively you can enable logging via `auditpol` using the following command(s): ```powershell # Enable Success audit Only auditpol /set /subcategory:{0CCE922B-69AE-11D9-BED3-505054503030}, /success:enable # Enable both Success and Failure auditing auditpol /set /subcategory:{0CCE922B-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable ``` If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-process-creation) #### Include Command-Line In Process Creation Events If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below ```yml - Computer Configuration - Administrative Templates - System - Audit Process Creation - Include Command Line In Process Creation Events ``` ### Microsoft-Windows-Sysmon #### Process Creation - Provider: `Microsoft-Windows-Sysmon` - Channel: `Microsoft-Windows-Sysmon/Operational` - Event Volume: `High` - EventID(s): - `1` To configure Sysmon process creation events you can follow the instructions below - Download [Sysmon](https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon) - Install Sysmon using an appropriate configuration. The configuration must include a `` element. We recommend the following configuration [sysmonconfig-export.xml](https://github.com/Neo23x0/sysmon-config/blob/master/sysmonconfig-export.xml). ```powershell sysmon -i /path/to/config ``` ## Event Fields > **Note** > > For rules using this category in SIGMA. Know that there is a mapping between `Sysmon EID 1` fields and `Microsoft Windows Security Auditing EID: 4688`. While you can use the fields of `EID 4688` it's best to use the Sysmon ones. ### Provider: Microsoft Windows Security Auditing / EventID: 4688
Expand ```yml - SubjectUserSid - SubjectUserName - SubjectDomainName - SubjectLogonId - NewProcessId - NewProcessName - TokenElevationType - ProcessId - CommandLine - TargetUserSid - TargetUserName - TargetDomainName - TargetLogonId - ParentProcessName - MandatoryLabel ```
### Provider: Microsoft-Windows-Sysmon / EventID: 1
Expand ```yml - RuleName - UtcTime - ProcessGuid - ProcessId - Image - FileVersion - Description - Product - Company - OriginalFileName - CommandLine - CurrentDirectory - User - LogonGuid - LogonId - TerminalSessionId - IntegrityLevel - Hashes - ParentProcessGuid - ParentProcessId - ParentImage - ParentCommandLine - ParentUser ```