Files
blue-team-tools/tools/config/crowdstrike.yml
T
2020-05-08 13:41:52 +03:00

20 lines
371 B
YAML

title: Splunk Windows log source conditions
order: 20
backends:
- crowdstrike
logsources:
windows-sysmon:
product: windows
service: sysmon
conditions:
EventID: 1
process_creation_1:
category: process_creation
product: windows
fieldmappings:
EventID: EventID
CommandLine: Commandline
Command_Line: Commandline
Image: ImageFileName