Olaf Hartong's Sysmon-Modular
The current industry standard. A highly modular, easily maintainable configuration mapped directly to MITRE ATT&CK techniques, offering superior signal-to-noise ratios.
Sysmon is not a protection tool; it does not block or quarantine malicious activity. It is purely a high-fidelity sensor. Its core philosophy is to “make the invisible visible” by logging attributes that native Windows auditing ignores, such as process hashes, exact network destinations, and precise parent-child process tracking.
The power of Sysmon lies in its XML Configuration File. This file dictates exactly what the driver should log and, more importantly, what it should exclude. Without a finely tuned configuration, Sysmon will rapidly overwhelm the event log and the centralized SIEM with “noise.”
Once installed (sysmon.exe -i config.xml), the telemetry is written to a dedicated event channel:
Applications and Services Logs > Microsoft > Windows > Sysmon > Operational.
Sysmon generates dozens of event types, but DFIR analysts primarily focus on the following core events to reconstruct the attack kill chain.
A heavily steroid-injected version of the nativeEvent 4688. It records the command line, the parent process, and crucially:
mimikatz.exe to svchost.exe).This event binds a specific network connection to the exact process that initiated it—a feature notoriously absent from standard Windows logs. It records the Source/Destination IPs, ports, and the resolved Destination Hostname, making it invaluable for detecting C2 (Command & Control) beacons.
lsass.exe is the industry standard for detecting OS Credential Dumping (e.g., Mimikatz, Procdump).The most revolutionary feature of Sysmon for Incident Responders is the ProcessGuid.
In standard Windows logging, Process IDs (PIDs) are recycled rapidly by the OS, leading to timeline confusion. Sysmon generates a globally unique identifier (ProcessGuid) for every process upon creation (Event ID 1).
Analysts can use this single GUID to trace a complete, unambiguous execution chain:
Event 1: Process is created (GUID: A1B2…).Event 22: Process A1B2 queries malicious-domain.com.Event 3: Process A1B2 connects to 198.51.100.45:443.Event 11: Process A1B2 drops payload.exe into C:\Users\Public\.When Sysmon telemetry is ingested into a SIEM, analysts can deploy highly targeted behavioral hunting queries.
// Detect suspicious access to lsass.exe (Event ID 10)DeviceEvents| where ActionType == "SysmonProcessAccess"| where FileName == "lsass.exe"// Exclude known legitimate processes accessing LSASS| where InitiatingProcessFileName !in~ ("svchost.exe", "csrss.exe", "taskmgr.exe", "msmpeng.exe")| project TimeGenerated, DeviceName, InitiatingProcessFileName, InitiatingProcessCommandLine, AccessMask# Detect non-browser processes making DNS queries (Event ID 22)index=windows sourcetype="XmlWinEventLog:Microsoft-Windows-Sysmon/Operational" EventCode=22| search NOT Image IN ("*\\chrome.exe", "*\\firefox.exe", "*\\msedge.exe", "*\\iexplore.exe", "*\\system32\\svchost.exe")| table _time, host, Image, QueryName, QueryStatus| sort - _timeThe quality of an investigation depends entirely on the quality of the Sysmon XML configuration. Using the default configuration provides minimal value. DFIR teams rely on community-driven baselines tailored to map to the MITRE ATT&CK framework.
Olaf Hartong's Sysmon-Modular
The current industry standard. A highly modular, easily maintainable configuration mapped directly to MITRE ATT&CK techniques, offering superior signal-to-noise ratios.
SwiftOnSecurity Configuration
The legacy standard. A solid, foundational baseline configuration that filters out immense amounts of generic Windows noise, perfect for smaller deployments.