.png)
TLP - The Digital Forensics Podcast
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast.
In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn about new attack chains.
TLP - The Digital Forensics Podcast
Audiobook - Mastering Sysmon. Deploying, Configuring, and Tuning in 10 easy steps
This episode features the complete narration of my ebook: Mastering Sysmon – Deploying, Configuring, and Tuning in 10 Easy Steps, providing a step-by-step guide to getting Sysmon up and running for better threat detection and incident response.
If you’re in security operations, digital forensics, or incident response, this episode will help you:
- Deploy Sysmon efficiently.
- Tune Sysmon logs for maximum insight while reducing noise.
- Use Sysmon for investigations—from process creation tracking to network monitoring.
- Understand real-world use cases of how Sysmon can catch adversaries in action.
Key Topics Covered:
- Why Sysmon Matters – A deep dive into how Sysmon enhances Windows logging.
- Common Mistakes & How to Avoid Them – Logging misconfigurations, tuning issues, and evidence handling best practices.
- Step-by-Step Deployment Guide – From downloading Sysmon to configuring it for lean detections.
- Tuning for Performance & Relevance – How to tweak Sysmon settings to avoid excessive log volume.
- Investigating Security Events – Key Sysmon event IDs that provide forensic gold.
- Real-World Use Cases – Examples of how Sysmon has caught attackers in action.
- Sysmon Bypass Techniques – How adversaries evade detection and how to stay ahead.
Resources Mentioned:
- Sysmon Download – Microsoft Sysinternals
- Sysmon Configuration Files – Olaf Hartong’s Sysmon-Modular
- MITRE ATT&CK Framework – MITRE ATT&CK
- ACSC Sysmon Config Guide – ACSC GitHub
Key Takeaways:
- Sysmon provides deep system visibility – if tuned correctly.
- Tuning is essential – Avoid log overload while keeping useful data.
- Use a structured deployment process – From baselining performance to verifying logs.
- Sysmon alone isn’t enough – It works best when combined with other detection tools.
- Be aware of bypass techniques – Attackers can disable Sysmon, so defense in depth is key.