Sysmon Integration with Qradar

Sysmon-Windows Sysinternal

Rumaisa Niazi
3 min readSep 15, 2021
Photo by Maxim Hopman on Unsplash

Irrespective of the built-in logging capabilities of a Windows server, we can configure additional software for substantial host-level auditing.

Sysinternal of Microsoft offers System Monitor (Sysmon) as an add-on for advanced threat auditing by performing system-level deep monitoring, observing traffic activity, tracking code behavior, etc.

It does not generate an alarm or provide analysis or hides its presence from the attackers: instead, it runs as a service in the background and uses system drivers. The article shows how to install Sysmon in Windows and demonstrates how to send its events to Qradar.

Getting Started

Before installation, download a filter file sysmonconfig-export.xml to modify from the Github SwiftOnSecurity page. Before anything, replace the hashes in the following line with an asterisk ‘*’ as one of the best features of Sysmon is that it records hashes of all the system files.

<HashAlgorithms>md5,sha256,IMPHASH</HashAlgorithms><HashAlgorithms>*</HashAlgorithms>

The event filtering as above allows us to filter out noisy events, such that each event has a filter tag. The include for onmatch attribute only includes matched events. We will replace it with the exclude value for event IDs of 7, 9, 10, 17, and 18 to include events other than rule match events. Save the file in a separate folder.

Download Sysmon from the official website, and extract the executables from the .zip files. Use the application as per your architecture: use sysmon64.exe for a 64-bit system. Lastly, transfer the required application to the above folder.

Sysmon Installation

Run the Command-prompt with administrative privileges and cd into the path of the above folder. Execute the following command for Sysmon installation:

Sysmon64.exe -i <configuration_file/sysmonconfig-export.xml>

The command prompts to accept the license, and it is complete.

Log Source Creation

Go to the Event Viewer-> Create Custom Views, go to Event Logs in the Filter tab->Applications and Services Logs->Microsoft-> Windows->Sysmon, and select Operational.

Open the XML table to copy the query manually and paste it inside Wincollect XPath.

The QRadar contains a Sysmon content extension “IBM QRadar Content Extension for Sysmon” to receive its events (more on this later). Go to the Log Activity and filter out the latest events to verify successful Sysmon Integration with Qradar by checking the packet details.

Happy Learning! (:

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

No responses yet

Write a response