skip to content
 
 

System Monitor (Sysmon) is a Windows logging add-on that offers granular logging capabilities and captures security events that are not usually recorded by default. It provides information on process creations, network connections, changes to file systems, and more. Analyzing Sysmon logs is essential to spot malicious activities and security threats.

ManageEngine EventLog Analyzer, a powerful log management solution, can centrally collect and monitor Sysmon logs from all Windows and Linux devices to ensure endpoint security.

How does EventLog Analyzer help in monitoring and analyzing Sysmon logs?

Upon receiving logs from devices that have Sysmon installed in them, EventLog Analyzer automatically generates out-of-the-box reports that provide detailed information on critical events in the form of intuitive graphs and charts.

Monitor process creations to spot suspicious installations

EventLog Analyzer helps you keep track of various processes, including processes that are currently running as well as processes that have been terminated. Apart from the process name, you can also view additional information about the process such as the process ID, the parent process name, and the process command line. By correlating this information with threat feeds, you can spot malicious software installations or malware attacks.

Spot, investigate, and stop malware

EventLog Analyzer can help you detect and investigate various techniques employed by malware. For instance, malware usually modifies file creation timestamps to cover its tracks. With EventLog Analyzer's file audit reports, you can analyze file modifications in real time. Another common technique used by malware includes using named pipes for inter-process communication. EventLog Analyzer's process audit reports can help you monitor Sysmon event logs generated when a pipe is created or connected.

Spot, investigate, and stop malware

Detect privilege escalations to stop unauthorized data access

By integrating EventLog Analyzer with the MITRE ATT&CK framework, you can analyze Sysmon logs to discover malicious activities like privilege escalation attacks. For instance, by monitoring process creations, you can detect attackers who try to bypass User Access Control mechanisms to elevate process privileges in a system.

Detect privilege escalations to stop unauthorized data access

Monitor files to ensure their integrity  

With EventLog Analyzer, you can monitor file and stream creation operations. File creation operations will be logged when a file has been created or overwritten. You can also monitor read operations performed on a drive using the Raw Access Read report. This can help you prevent data exfiltration attacks on these files. With EventLog Analyzer's File Stream Creation report, you can monitor when a file stream is created and keep track of certain malware that drop their executables or configuration settings through browser downloads.

Monitor files to ensure their integrity

Audit network devices and resources  

With EventLog Analyzer's in-depth Sysmon log analysis capability, monitor network connections and get visibility into each connection’s process ID, source IP address, source and destination ports, and more. You can also analyze logs generated when a process executes a DNS query, regardless of its result (Success, Failure, or Cached).

Audit network devices and resources

Audit registry and configuration changes

Sometimes attackers initiate an attack by modifying registries to launch malicious applications. With EventLog Analyzer, you can monitor changes such as modifications to registry keys and registry values.

You can also monitor the state of a Sysmon service using the Service State Change report, which will tell you if the service has started or stopped running along with its version number.

Other solutions offered by EventLog Analyzer

Windows log management  

Collect, monitor, and analyze event log data to detect malicious activities using EventLog Analyzer. It provides you with actionable security information that can help you secure your network efficiently.

Syslog management  

Simplify syslog management with EventLog Analyzer. It can centrally collect, filter, and audit syslog messages obtained from various sources, and raise real-time alerts when a threat is detected.

IIS and Apache server log analysis  

Detect and mitigate web server attacks on your IIS and Apache web servers with the help of EventLog Analyzer. It also provides comprehensive, graphical reports on error events, security attacks, usage analytics, and more.

Database auditing  

Monitor and analyze database server activity, and get real-time alerts and detailed reports for common server attacks, such as SQL injection attacks and denial-of-service attacks.

Network device monitoring  

Prevent network intrusions by auditing activities on your perimeter devices. Gain in-depth insights into suspicious network events using EventLog Analyzer's predefined graphical reports.

File integrity monitoring  

Protect your company's sensitive data from unauthorized access and modifications with EventLog Analyzer. Get notified in real time when any unusual activity is detected.

5 reasons to choose EventLog Analyzer for Sysmon log analysis

1. Attack detection  

Using effective Sysmon log analysis, EventLog Analyzer detects known attack patterns such as privilege escalations and lateral movement.

2. Streamline network operations  

With Sysmon log analysis, EventLog Analyzer helps streamline network traffic and detect malicious traffic.

3. Correlate events  

Correlate process creation or modification events with threat intelligence or other security events to detect attacks at an early stage.

4. Securely store Sysmon logs  

Securely archive your Sysmon logs for future forensic investigation purposes and regulatory compliance requirements.

5. Log forensics  

Analyze your network logs and find the root cause of a security breach using EventLog Analyzer's powerful log search engine.

Frequently asked questions

Sysmon log files can be located in the following file path:
C:\Windows\System32\winevt\Logs\.

In the Event Viewer, you can view Sysmon logs in Applications and Services Logs > Microsoft > Windows > Sysmon.

Sysmon event IDs to monitor:

  • Event ID: 1    Process creation
  • Event ID: 2    A process changed a file creation time
  • Event ID: 3    Network connection
  • Event ID: 4     Sysmon service state changed
  • Event ID: 5     Process terminated
  • Event ID: 6     Driver loaded
  • Event ID: 7     Image loaded
  • Event ID: 8     CreateRemoteThread
  • Event ID: 9     RawAccessRead
  • Event ID: 10     ProcessAccess
  • Event ID: 11    FileCreate
  • Event ID: 12    RegistryEvent (Object create and delete)
  • Event ID: 13    RegistryEvent (Value Set)

To monitor Sysmon logs in EventLog Analyzer, devices that have Sysmon installed in them can be added by navigating to Settings > Configuration > Manage Application Sources. Click here to learn more.

Sysmon is a Windows system device that's designed to provide detailed information about Windows system activities in real time, which includes process creations, network connections, and changes to file creation time. It operates as a Windows service and device driver, which, once installed and configured, starts automatically with Windows. This ensures that monitoring persists through system reboots and is available from system startup to shutdown. This can give the user an understanding of the system and user behavior, which can later be used for attack detection, anomaly detection, and forensic analysis.

Sysmon can be used to monitor and log a wide variety of system activity, including process creation and termination, network connections, file and registry changes, DNS queries, and so on. This can be used to detect and investigate malware infections and track the behavior of attackers. Sysmon logs are of a great help in gaining insights of the how the systems in place are being used.

Sysmon logs enhance visibility into your network by providing detailed insights into a wide range of system activities. This comprehensive logging can help you identify anomalies and suspicious behavior that could indicate a security breach. Moreover, Sysmon logs can be effectively integrated with log management solutions to provide a centralized view of security events across your network, which can help you correlate events from different sources, identify potential threats, and streamline incident response.

Choose EventLog Analyzer to monitor your Sysmon logs

Download

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Infosys
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
A Single Pane of Glass for Comprehensive Log Management