SOC AUTOMATION — Part 4
文章描述了如何配置Wazuh代理以监控Sysmon日志,并检测恶意活动如Mimikatz密码转储工具。通过编辑Wazuh配置文件(ossec.conf),指定仅收集Sysmon日志,并备份文件以确保安全。 2025-6-6 05:3:16 Author: infosecwriteups.com(查看原文) 阅读量:9 收藏

Satyam Pathania

This might be the end

Objective: Generate Telemetry & Ingest into Wazuh

  • Sent Telemetry Containing Mimikatz
  • Triggered Custom Alert for Mimikatz

This part is all about sending custom logs from Sysmon to Wazuh, so Wazuh can monitor important activity like password dumping tools (Mimikatz).

We’ll edit the Wazuh agent config file and tell it, “Hey, watch Sysmon logs only.”

Let’s go step by step.

If you’re on a Windows 10 machine (like me), head over to:

C:\Program Files (x86)\ossec-agent\ossec.conf
image from my windows machine

Here, click on ossec.conf and open it with Notepad

As you remember we installed our sysmon in the part 2 of the series now here we will make some changes in the conf file to ask it to inject sysmon logs

Now close this file as it is and create another backup of this file, such as

Now open the OSSEC file again and scroll a bit to find “Log analysis” run the notepad as administrator


文章来源: https://infosecwriteups.com/soc-automation-part-4-47dfd7c311e5?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh