Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.
graylog
logging
forensics
dfir
sysmon
threat-hunting
siem
threat-sharing
threatintel
netsec
sysinternals
graylog-plugin
forensic-analysis
threat-analysis
threat-intelligence
humio
mitre-attack
sigma-rules
forensicartifacts
digitalforensics
-
Updated
Oct 6, 2022 - Batchfile