Microsoft Sysmon is a Windows system service and device driver that provides detailed logging of system activity, including process creation, network connections, file modifications, and registry changes.
This integration enriches and ingests the Sysmon event logs. Use pre-built dashboard to get a high-level view of Sysmon events helping security teams monitor system activity.
To install the Microsoft Sysmon integration, run the following Agent installation command and the steps below. For more information, see the Integration Management documentation.
Note: This step is not necessary for Agent version >= 7.66.0.
Run powershell.exe as admin and execute following command:
& "$env:ProgramFiles\Datadog\Datadog Agent\bin\agent.exe" integration install datadog-microsoft_sysmon==1.0.0
-
Collecting logs is disabled by default in the Datadog Agent. Enable it in the
datadog.yaml
file with:logs_enabled: true
-
Add this configuration block to your
microsoft_sysmon.d/conf.yaml
file to start collecting your Microsoft Sysmon logs:logs: - type: windows_event channel_path: "Microsoft-Windows-Sysmon/Operational" source: microsoft-sysmon service: microsoft-sysmon sourcecategory: windowsevent
Follow these steps to install Sysmon:
- Download the zip file from the Sysmon download page. Extract its zip file content.
- Create an XML file for configuring Sysmon. For example, if you want to monitor processes created by apps from AppData folders, the configuration file will look like content shown below, you can add more event filters under the
EventFiltering
XML tag for other events in the same way.
<Sysmon schemaversion="4.90">
<EventFiltering>
<ProcessCreate onmatch="include">
<Image condition="contains">C:\Users\*\AppData\Local\Temp\</Image>
<Image condition="contains">C:\Users\*\AppData\Roaming\</Image>
</ProcessCreate>
</EventFiltering>
</Sysmon>
- Execute the command as admin from the extracted folder:
.\Sysmon -i [<configfile>]
Note: Sysmon is highly configurable using the configuration (XML) file which allows you to:
- Control which events to monitor
- Filter events based on processes, paths, etc.
Enabling too many event types can result in excessive data ingestion. Only critical security events should be enabled based on threat model and monitoring needs. These events should be selectively enabled for critical system directories, processes, and users to avoid unnecessary log noise.
For more details on configuration, please refer to the Sysmon docs.
Run the Agent's status subcommand and look for microsoft_sysmon
under the Checks section.
The Microsoft Sysmon integration collects the following Sysmon event logs:
- Process activity logs
- Network activity logs
- File activity logs
- Registry activity logs
- WMI activity logs
- Sysmon service activity logs
- Named Pipe and Clipboard activity logs
The Microsoft Sysmon integration does not include any metrics.
The Microsoft Sysmon integration does not include any events.
The Microsoft Sysmon integration does not include any service checks.
Need help? Contact Datadog support.