Files
sigma-rules/docs/audit_policies/windows/readme.md
T
Jonhnathan 1119c3f137 [Docs] Fix Docs Unit Test (#5496)
* Update docset.yml

* Rename README.md to readme.md

* Update pyproject.toml
2025-12-18 05:56:09 -08:00

53 lines
3.5 KiB
Markdown

# Windows Audit Policies
Windows related audit policies that need to be implemented in order to generate the events that power our detection rules. It serves as a centralized view of the policies we use so you don't need to go through every rule to know the different audit policies required.
Audit Policies:
* [Audit Authorization Policy Change](audit_authorization_policy_change.md)
* [Audit Computer Account Management](audit_computer_account_management.md)
* [Audit Detailed File Share](audit_detailed_file_share.md)
* [Audit Directory Service Access](audit_directory_service_access.md)
* [Audit Directory Service Changes](audit_directory_service_changes.md)
* [Audit Filtering Platform Connection](audit_filtering_platform_connection.md)
* [Audit Filtering Platform Packet Drop](audit_filtering_platform_packet_drop.md)
* [Audit Handle Manipulation](audit_handle_manipulation.md)
* [Audit Logon](audit_logon.md)
* [Audit Other Object Access Events](audit_other_object_access_events.md)
* [Audit Policy Change](audit_policy_change.md)
* [Audit Process Creation and Command Line](audit_process_creation_and_command_line.md)
* [Audit Security Group Management](audit_security_group_management.md)
* [Audit Security System Extension](audit_security_system_extension.md)
* [Audit Sensitive Privilege Use](audit_sensitive_privilege_use.md)
* [Audit Special Logon](audit_special_logon.md)
* [Audit Token Right Adjusted Events](audit_token_right_adjusted_events.md)
* [Audit User Account Management](audit_user_account_management.md)
* [Audit Powershell Script Block Logging](audit_powershell_scriptblock.md)
---
# Sysmon Configuration Guides
**Caution:** The following guides provide minimal configuration examples designed to enable specific Sysmon Event IDs. Collecting Sysmon events without a tailored configuration for your environment will cause high data volume and potentially high CPU-load, and these setup instructions require significant tuning to be production-ready.
To build an efficient and production-ready configuration, we strongly recommend exploring these community resources:
- [TrustedSec Sysmon Community Guide](https://github.com/trustedsec/SysmonCommunityGuide)
- [olafhartong - sysmon-modular](https://github.com/olafhartong/sysmon-modular)
- [Neo23x0 - sysmon-config](https://github.com/Neo23x0/sysmon-config)
For a production-ready and more integrated solution that is designed to work with our detection rules and also provide native Endpoint Protection and Response, check out [Elastic Endpoint Security](https://www.elastic.co/security/endpoint-security).
* [Sysmon Event ID 1: Process Creation](sysmon_eventid1_process_creation.md)
* [Sysmon Event ID 2: File Creation Time Changed](sysmon_eventid2_file_creation_time_changed.md)
* [Sysmon Event ID 3: Network Connection](sysmon_eventid3_network_connection.md)
* [Sysmon Event ID 7: Image Loaded](sysmon_eventid7_image_loaded.md)
* [Sysmon Event ID 8: Create Remote Thread](sysmon_eventid8_createremotethread.md)
* [Sysmon Event ID 10: Process Accessed](sysmon_eventid10_process_access.md)
* [Sysmon Event ID 11: File Create](sysmon_eventid11_file_create.md)
* [Sysmon Event IDs 12, 13, 14: Registry Events](sysmon_eventid12_13_14_registry_event.md)
* [Sysmon Event IDs 17, 18: Named Pipe Events](sysmon_eventid17_18_pipe_event.md)
* [Sysmon Event IDs 19, 20, 21: WMI Events](sysmon_eventid19_20_21_wmi_event.md)
* [Sysmon Event ID 22: DNS Query](sysmon_eventid22_dns_query.md)
* [Sysmon Event ID 23: File Delete](sysmon_eventid23_file_delete.md)