Cybersecurity · Windows Event Log Monitoring

Windows Event Log Monitoring

Using Sysmon, Windows Event Viewer, and PowerShell scripts to detect suspicious activity like failed logons, process creation, and registry changes.

View this project on GitHub

Overview

This lab demonstrates how to leverage Sysmon, Event Viewer, and PowerShell for effective log monitoring and detection on Windows systems.

Monitoring with Sysmon

Sysmon (System Monitor) extends Windows logging by capturing events like process creation, file changes, and network connections. Below are example queries using Get-WinEvent in PowerShell.

Example Queries

Monitoring with Windows Event Viewer

Failed Login Attempts

Successful Logins

Special Privileges Assigned to New Logon

Monitoring with PowerShell Scripts

Failed Login Attempts

Successful Logins

Process Creation Events

Back to Home