Hands-on LabIntermediate·~65 min·Includes challenge

Lab 2.6 — Sysmon Visibility Boost

Compare standard Windows logging with Sysmon-enriched telemetry. Analyze process creation, network connections, file creation, and registry events to build a visibility assessment.

Tools needed:Wazuh Dashboard

What You'll Learn

  • Understand the visibility gap between standard Windows logging and Sysmon-enhanced telemetry
  • Identify the 5 most critical Sysmon Event IDs (1, 3, 7, 11, 13) and what each detects
  • Find process creation events (Sysmon 1) that reveal the full command line of every executed program
  • Correlate Sysmon network connection events (Event 3) with firewall and SIEM alerts
  • Build a visibility comparison matrix showing what standard Windows + Sysmon catches vs. what it misses

Lab Overview

DetailValue
Lab Profilelab-wazuh
ContainersWazuh Manager, Wazuh Indexer, Wazuh Dashboard
Estimated Time60–75 minutes
DifficultyIntermediate
Browser AccessWazuh Dashboard (Web UI)
Pre-Loaded Data505 alerts including Sysmon-enriched Windows events on WIN-SERVER-01
DeliverableSysmon Visibility Assessment with detection gap analysis

The Visibility Problem. Standard Windows logging tells you that a user logged in. Sysmon tells you what process they ran, what network connections it made, what DLLs it loaded, and what registry keys it modified. In modern SOC operations, the difference between "we detected the breach in 4 hours" and "we detected the breach in 4 weeks" often comes down to Sysmon.


The Scenario

Your CISO asks: "Our Wazuh is collecting Windows Security logs, but I keep reading that we need Sysmon. What visibility are we missing without it? Show me specific examples of attacks that standard logging misses but Sysmon catches."

Your lab environment has both standard Windows Security logs AND Sysmon events on WIN-SERVER-01. You'll compare them side-by-side and build the case for why Sysmon is essential.


Part 1: Understanding the Sysmon Event ID Landscape

Sysmon generates 29 distinct event types. SOC analysts focus on 5 that cover 90% of detection use cases:

Sysmon Event IDNameSOC Value
1Process CreationSee every program executed, with full command line and parent process
3Network ConnectionSee every outbound/inbound TCP/UDP connection with process name
7Image Loaded (DLL)Detect DLL injection and sideloading attacks
11File CreatedDetect malware drops, web shells, and suspicious file writes
13Registry Value SetDetect persistence via registry modifications

Sysmon Coverage Map

💡

Sysmon vs. Windows Security Logs. Windows Security logs (Event IDs 4624, 4625, 4688, 7045, etc.) are generated by the OS. Sysmon events are generated by a separate Microsoft Sysinternals tool that hooks deeper into the kernel. They complement each other — you need BOTH for full visibility.


Part 2: Process Creation — Sysmon Event ID 1

Step 1: Find Process Creation Events

Search Wazuh for Sysmon Event ID 1 on WIN-SERVER-01:

agent.name: WIN-SERVER-01 AND data.win.system.eventID: 1 AND data.win.system.providerName: Microsoft-Windows-Sysmon

Step 2: Examine a Process Creation Event

Click on any Event ID 1 result and expand it. You'll find fields that standard logging doesn't capture:

Sysmon FieldWhat It ContainsWhy It Matters
data.win.eventdata.commandLineFull command with all argumentsSee exactly what was executed — not just "cmd.exe ran" but "cmd.exe /c whoami /all"
data.win.eventdata.parentCommandLineThe process that launched this oneTrace the execution chain — was this launched by Explorer (user) or by a script?
data.win.eventdata.parentImageParent process pathIdentify suspicious parents (Word launching PowerShell = macro malware)
data.win.eventdata.hashesFile hash (SHA256, MD5, etc.)Instantly check against threat intelligence feeds
data.win.eventdata.userAccount running the processKnow who's responsible
data.win.eventdata.currentDirectoryWorking directoryMalware often runs from Temp or AppData folders

Step 3: Compare with Windows 4688

Now search for the equivalent standard Windows event:

agent.name: WIN-SERVER-01 AND data.win.system.eventID: 4688

Compare the fields available:

FieldSysmon Event 1Windows 4688
Command lineFull command with argumentsRequires separate GPO to enable
Parent processFull path + command lineOnly process ID (no path)
File hashSHA256, MD5, IMPHASHNot available
Working directoryFull pathNot available
Network user infoLogon ID + usernameLimited

The Command Line Gap. Without Sysmon, Windows 4688 only shows that "powershell.exe" started. With Sysmon Event 1, you see: powershell.exe -enc JABjAGwAaQBlAG4AdAA= — a base64-encoded command, which is a massive red flag. This single visibility difference catches most fileless malware.

Step 4: Find Suspicious Process Creation

Search for processes that should raise analyst attention:

agent.name: WIN-SERVER-01 AND data.win.system.eventID: 1 AND data.win.eventdata.parentImage: *cmd.exe

Or look for service installations that created suspicious processes:

agent.name: WIN-SERVER-01 AND data.win.system.eventID: 1 AND data.win.eventdata.image: *powershell*

Document what you find. What processes are running? Are any suspicious?


Part 3: Network Connections — Sysmon Event ID 3

Step 1: Find Network Connection Events

agent.name: WIN-SERVER-01 AND data.win.system.eventID: 3 AND data.win.system.providerName: Microsoft-Windows-Sysmon

Step 2: Analyze Connection Fields

Each Event 3 record shows a complete network connection with the PROCESS that made it:

FieldValueAnalyst Use
data.win.eventdata.imageProcess that made the connectionWhich program is talking to the network?
data.win.eventdata.destinationIpRemote IPWhere is it connecting to?
data.win.eventdata.destinationPortRemote portWhat service? (443=HTTPS, 4445=suspicious)
data.win.eventdata.protocoltcp/udpConnection type
data.win.eventdata.initiatedtrue/falseDid the local process initiate (outbound) or receive (inbound)?

Step 3: Find Suspicious Outbound Connections

Search for outbound connections to unusual ports:

agent.name: WIN-SERVER-01 AND data.win.system.eventID: 3 AND data.win.eventdata.initiated: true AND NOT data.win.eventdata.destinationPort: (80 OR 443 OR 53)

This filters for connections that are NOT standard web (80/443) or DNS (53). What remains might be C2 communications, lateral movement, or data exfiltration.

🚨

Why Process + Network = Gold. Standard firewall logs show "10.0.2.20 connected to 185.220.101.42:4445." Sysmon Event 3 shows "powershell.exe on 10.0.2.20 connected to 185.220.101.42:4445." The process context transforms a network event from "something connected" to "this specific program made a suspicious connection" — which is immediately actionable.


Part 4: File Creation and Registry — Events 11 and 13

Step 1: Find File Creation Events (Event 11)

agent.name: WIN-SERVER-01 AND data.win.system.eventID: 11 AND data.win.system.providerName: Microsoft-Windows-Sysmon

Sysmon Event 11 captures every file created on disk. Key fields:

FieldAnalyst Use
data.win.eventdata.targetFilenameFull path of created file — watch for Temp folders, startup dirs
data.win.eventdata.imageProcess that created the file — was it Explorer or a script?

Search for files created in suspicious locations:

agent.name: WIN-SERVER-01 AND data.win.system.eventID: 11 AND data.win.eventdata.targetFilename: *Temp*

Step 2: Find Registry Modifications (Event 13)

agent.name: WIN-SERVER-01 AND data.win.system.eventID: 13 AND data.win.system.providerName: Microsoft-Windows-Sysmon

Registry modifications are the #1 persistence mechanism on Windows. Event 13 captures:

FieldAnalyst Use
data.win.eventdata.targetObjectRegistry key modified — Run keys = auto-start
data.win.eventdata.detailsValue written — the actual payload or path
data.win.eventdata.imageProcess making the change

Look for modifications to common persistence locations:

agent.name: WIN-SERVER-01 AND data.win.system.eventID: 13 AND data.win.eventdata.targetObject: *CurrentVersion\\Run*

Part 5: Build the Visibility Comparison Matrix

Visibility Comparison Matrix

Create a comprehensive matrix comparing what each log source catches:

VISIBILITY COMPARISON MATRIX
════════════════════════════
Agent: WIN-SERVER-01

ATTACK TECHNIQUE              | Win Security | Sysmon | Both | Neither
──────────────────────────────|──────────────|────────|──────|────────
User logon (4624/4625)        | ✓            |        | ✓    |
Brute force pattern           | ✓            |        |      |
Process with command line     |              | ✓      |      |
Parent → child process chain  |              | ✓      |      |
Service installation (7045)   | ✓            |        |      |
DLL loading                   |              | ✓      |      |
Network conn. with process    |              | ✓      |      |
File creation with process    |              | ✓      |      |
Registry persistence          |              | ✓      |      |
Audit log clearing (1102)     | ✓            |        |      |
Process hash                  |              | ✓      |      |
Lateral movement (PsExec)     | Partial      | ✓      |      |

Fill In Your Findings

For each row, search for relevant events in Wazuh and confirm which log source provides the data. Note the specific Wazuh fields where you found each piece of information.


Part 6: Write the CISO Brief

Write a 1-page brief answering the CISO's question: "What are we missing without Sysmon?"

Structure your brief:

  1. Executive Summary (2-3 sentences): What visibility gap exists
  2. Top 3 Detection Gaps: Specific attack types that standard logging misses
  3. Evidence: Reference specific events from your lab showing the difference
  4. Recommendation: Deploy Sysmon with a specific configuration focus

Deliverable Checklist

Before completing the lab, ensure you have:

  • Process Creation Analysis — compared Sysmon Event 1 vs. Windows 4688 for at least 3 events
  • Network Connection Analysis — found Sysmon Event 3 events and identified the connecting process
  • File/Registry Analysis — searched for Event 11 and Event 13 in suspicious locations
  • Visibility Comparison Matrix — completed for all 12 attack techniques
  • CISO Brief — 1-page document with evidence-backed recommendations

Key Takeaways

  • Standard Windows Security logs provide authentication and high-level system events
  • Sysmon adds process command lines, parent-child chains, network connections with process context, file creation, and registry modifications
  • The combination of Windows Security + Sysmon provides near-complete endpoint visibility
  • Process + Network correlation (which program made which connection) is the single most valuable Sysmon capability for SOC analysts
  • Without Sysmon, most fileless malware, living-off-the-land attacks, and lateral movement go undetected

What's Next

You've completed the SIEM Mastery module. In Module 3 — OS Internals, you'll dive deeper into the operating system artifacts that Sysmon monitors — processes, registry, file systems, and event logs — learning to investigate them directly on endpoints.

Lab Challenge: Sysmon Visibility Boost

10 questions · 70% to pass

1

Search for Sysmon Event ID 1 on WIN-SERVER-01. What field contains the full command line including all arguments of the executed process?

2

Sysmon Event ID 3 shows network connections. What critical context does it provide that standard firewall logs do NOT?

3

Compare Windows Event 4688 (Process Creation) with Sysmon Event 1 (Process Creation). Which critical field is available in Sysmon but NOT in standard 4688?

4

You search for Sysmon Event 13 (Registry Value Set) with targetObject containing 'CurrentVersion\Run'. What attack technique does this detect?

5

A Sysmon Event 1 shows: parentImage: 'C:\Program Files\Microsoft Office\WINWORD.EXE', image: 'C:\Windows\System32\cmd.exe'. Why is this parent-child relationship suspicious?

6

Which Sysmon Event ID would detect an attacker using DLL sideloading — placing a malicious DLL in the same directory as a legitimate application?

7

You filter for outbound connections (Event 3, initiated: true) excluding ports 80, 443, and 53. A result shows svchost.exe connecting to an external IP on port 4445. What should you investigate?

8

Sysmon Event 11 (File Created) shows a file created at 'C:\Users\admin\AppData\Local\Temp\update.exe' by the process 'powershell.exe'. What two indicators make this suspicious?

9

Without Sysmon, a 'living-off-the-land' attack using only built-in Windows tools (PowerShell, certutil, bitsadmin) would be nearly invisible. Which Sysmon Event ID is MOST critical for detecting this type of attack?

10

Based on your visibility comparison matrix, how many of the 12 common attack techniques are ONLY detectable with Sysmon (not by Windows Security logs alone)?

0/10 answered