Update README.md
This commit is contained in:
28
README.md
28
README.md
@ -55,3 +55,31 @@ or:
|
||||
|
||||
`.\DeepBlue.ps1 -file .\evtx\new-user-security.evtx`
|
||||
|
||||
## Logging setup
|
||||
|
||||
### Security event 4688 (Command line auditing):
|
||||
|
||||
Enable Windows command-line auditing: https://support.microsoft.com/en-us/kb/3004375
|
||||
|
||||
### PowerShell auditing (PowerShell 5.0):
|
||||
|
||||
DeepBlueCLI uses module logging (PowerShell event 4013) and script block logging (4104). It does not use transcription.
|
||||
|
||||
See: https://www.fireeye.com/blog/threat-research/2016/02/greater_visibilityt.html
|
||||
|
||||
To get the PowerShell commandline (and not just script block), add the following to \Windows\System32\WindowsPowerShell\v1.0\profile.ps1
|
||||
```
|
||||
$LogCommandHealthEvent = $true
|
||||
$LogCommandLifecycleEvent = $true
|
||||
```
|
||||
See the following for more information:
|
||||
- https://logrhythm.com/blog/powershell-command-line-logging/
|
||||
- http://hackerhurricane.blogspot.com/2014/11/i-powershell-logging-what-everyone.html
|
||||
|
||||
Thank you: @heinzarelli and @HackerHurricane
|
||||
|
||||
### Sysmon
|
||||
|
||||
Install Sysmon from Sysinternals: https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon
|
||||
|
||||
Log SHA1 hashes. Others are fine; DeepBlueCLI will use SHA1.
|
||||
|
Reference in New Issue
Block a user