Files
blue-team-tools/tools/config/splunk-windows-all.yml
T
2017-03-22 11:17:46 +01:00

39 lines
1004 B
YAML

logsources:
windows-application:
product: windows
service: application
conditions:
sourcetype: 'WinEventLog:Application'
windows-security:
product: windows
service: security
conditions:
sourcetype: 'WinEventLog:Security'
windows-security:
product: windows
service: system
conditions:
sourcetype: 'WinEventLog:System'
windows-sysmon:
product: windows
service: sysmon
conditions:
source: 'WinEventLog:Microsoft-Windows-Sysmon/Operational'
windows-powershell:
product: windows
service: powershell
conditions:
source: 'WinEventLog:Microsoft-Windows-PowerShell/Operational'
windows-classicpowershell:
product: windows
service: powershell-classic
conditions:
source: 'Windows PowerShell'
windows-powershell:
product: windows
service: taskscheduler
conditions:
source: 'WinEventLog:Microsoft-Windows-TaskScheduler/Operational'
fieldmappings:
EventID: EventCode