Player FMアプリでオフラインにしPlayer FMう!
聞く価値のあるポッドキャスト
スポンサード


1 The Secret To Getting Inspired: Millie Bobby Brown & Chris Pratt Go Behind The Scenes 21:04
Audiobook - Mastering Sysmon. Deploying, Configuring, and Tuning in 10 easy steps
Manage episode 468828442 series 3578563
This episode features the complete narration of my ebook: Mastering Sysmon – Deploying, Configuring, and Tuning in 10 Easy Steps, providing a step-by-step guide to getting Sysmon up and running for better threat detection and incident response.
If you’re in security operations, digital forensics, or incident response, this episode will help you:
- Deploy Sysmon efficiently.
- Tune Sysmon logs for maximum insight while reducing noise.
- Use Sysmon for investigations—from process creation tracking to network monitoring.
- Understand real-world use cases of how Sysmon can catch adversaries in action.
Key Topics Covered:
- Why Sysmon Matters – A deep dive into how Sysmon enhances Windows logging.
- Common Mistakes & How to Avoid Them – Logging misconfigurations, tuning issues, and evidence handling best practices.
- Step-by-Step Deployment Guide – From downloading Sysmon to configuring it for lean detections.
- Tuning for Performance & Relevance – How to tweak Sysmon settings to avoid excessive log volume.
- Investigating Security Events – Key Sysmon event IDs that provide forensic gold.
- Real-World Use Cases – Examples of how Sysmon has caught attackers in action.
- Sysmon Bypass Techniques – How adversaries evade detection and how to stay ahead.
Resources Mentioned:
- Sysmon Download – Microsoft Sysinternals
- Sysmon Configuration Files – Olaf Hartong’s Sysmon-Modular
- MITRE ATT&CK Framework – MITRE ATT&CK
- ACSC Sysmon Config Guide – ACSC GitHub
Key Takeaways:
- Sysmon provides deep system visibility – if tuned correctly.
- Tuning is essential – Avoid log overload while keeping useful data.
- Use a structured deployment process – From baselining performance to verifying logs.
- Sysmon alone isn’t enough – It works best when combined with other detection tools.
- Be aware of bypass techniques – Attackers can disable Sysmon, so defense in depth is key.
19 つのエピソード
Manage episode 468828442 series 3578563
This episode features the complete narration of my ebook: Mastering Sysmon – Deploying, Configuring, and Tuning in 10 Easy Steps, providing a step-by-step guide to getting Sysmon up and running for better threat detection and incident response.
If you’re in security operations, digital forensics, or incident response, this episode will help you:
- Deploy Sysmon efficiently.
- Tune Sysmon logs for maximum insight while reducing noise.
- Use Sysmon for investigations—from process creation tracking to network monitoring.
- Understand real-world use cases of how Sysmon can catch adversaries in action.
Key Topics Covered:
- Why Sysmon Matters – A deep dive into how Sysmon enhances Windows logging.
- Common Mistakes & How to Avoid Them – Logging misconfigurations, tuning issues, and evidence handling best practices.
- Step-by-Step Deployment Guide – From downloading Sysmon to configuring it for lean detections.
- Tuning for Performance & Relevance – How to tweak Sysmon settings to avoid excessive log volume.
- Investigating Security Events – Key Sysmon event IDs that provide forensic gold.
- Real-World Use Cases – Examples of how Sysmon has caught attackers in action.
- Sysmon Bypass Techniques – How adversaries evade detection and how to stay ahead.
Resources Mentioned:
- Sysmon Download – Microsoft Sysinternals
- Sysmon Configuration Files – Olaf Hartong’s Sysmon-Modular
- MITRE ATT&CK Framework – MITRE ATT&CK
- ACSC Sysmon Config Guide – ACSC GitHub
Key Takeaways:
- Sysmon provides deep system visibility – if tuned correctly.
- Tuning is essential – Avoid log overload while keeping useful data.
- Use a structured deployment process – From baselining performance to verifying logs.
- Sysmon alone isn’t enough – It works best when combined with other detection tools.
- Be aware of bypass techniques – Attackers can disable Sysmon, so defense in depth is key.
19 つのエピソード
Tutti gli episodi
×
1 Audiobook - Mastering Sysmon. Deploying, Configuring, and Tuning in 10 easy steps 43:16

1 Episode 16 - Mastering the Basics: Key Strategies for Cyber Investigations 30:43

1 Episode 15 -Windows event log analysis with Hayabusa. The Sigma-based log analysis tool 23:20

1 Episode 14 - AI and the future of log analysis, bug detection, forensics and AI ethical considerations with Jonathan Thompson 1:08:33

1 Episode 13-ELK EDR and Sandboxing, Home grown CTF environments, DFIR Automation & Forensics in the cloud, with Jacob Wilson 54:55

1 Episode 12 - You're forced to decide: Cyber Generalist or Cyber Specialist? 17:47

1 Episode 11 - Velociraptor, Containerisation and Infrastructure Deployed as Code with Myles Agnew 52:46

1 Episode 10 - Detecting and Preventing Phishing Attacks 19:04

1 Episode 9 -Unmasking APT40 (Leviathan): Tactics, Challenges, and Defense Strategies 21:48

1 Episode 8 - Hidden digital forensic logging for Cybersecurity on Any Budget: Practical Strategies for Enhanced Detection and Prevention Using Sysmon, Blocking Data Exfil with group policy and… 19:57

1 Episode 7 - Defending Against Scattered Spider: Understanding Their Tactics, Techniques, and Procedures 17:07

1 Episode 6 - Responding to ransomware - is your VPN a target? Plus ransomware risk mitigation with Phil Ngo 26:11

1 Episode 5 - NIST SP 800-61 Computer Security Incident Handling Guide (Post-Incident Activity) 33:06

1 Episode 4 - NIST SP 800-61 Computer Security Incident Handling Guide (Containment,Eradication and Recovery) 22:10

1 Episode 3 - (Part 2) NIST SP 800-61 Computer Security Incident Handling Guide (Detection) 11:41

1 Episode 3 - NIST SP 800-61 Computer Security Incident Handling Guide (Detection) 46:52

1 Episode 2 - NIST SP 800-61 Computer Security Incident Handling Guide (Preparation) 27:17

1 Episode 1 - Digital forensics trends and preparations, learning from real life case studies & DFIR training for getting started 23:27
プレーヤーFMへようこそ!
Player FMは今からすぐに楽しめるために高品質のポッドキャストをウェブでスキャンしています。 これは最高のポッドキャストアプリで、Android、iPhone、そしてWebで動作します。 全ての端末で購読を同期するためにサインアップしてください。