Practical Sysmon Event ID Interpretation for SOC Analysts
Master the art of interpreting Sysmon logs to detect and respond to advanced threats, transforming raw data into actionable security intelligence.
...
Share
Foundational Sysmon Event Analysis
Unit 1: Sysmon Basics & Process Activity
Sysmon's Core Mission
Process Creation (ID 1)
Process Termination (ID 5)
Unit 2: Network & Driver Activity
Network Connections (ID 3)
Driver Loaded (ID 6)
Image Loaded (ID 7)
Unit 3: File & Stream Activity
File Creation (ID 11)
Advanced Threat Detection with Sysmon
Unit 1: Unmasking Process Manipulation
Event ID 2: Process Time
Event ID 8: Remote Threads
Event ID 10: Process Access
Event ID 25: Process Tampering
Unit 2: Advanced Data & Device Monitoring
Event ID 9: Raw Disk Access
Event ID 15: Stream Creation
Event ID 22: DNS Queries
Event ID 26: File Delete Logged
Detecting Persistence and Evasion Techniques
Unit 1: Registry Monitoring for Persistence
Registry Add/Delete
Registry Value Set
Registry Key Renamed
Unit 2: WMI and Named Pipe Monitoring
WMI Event Filter
WMI Event Consumer
WMI Consumer to Filter Bind
Named Pipe Creation
Named Pipe Connected
Unit 3: File System Evasion
File Delete Archived