Windows Events Attack Samples
-
Updated
Jan 24, 2023 - HTML
Windows Events Attack Samples
🐠 Beats - Lightweight shippers for Elasticsearch & Logstash
Threat Hunting with ELK Workshop (InfoSecWorld 2017)
Universal Winlogbeat configuration
[DEPRECATED] Elastic Beats Input plugin for Graylog
Collector plugin for Graylog
Burnham Forensics ELK Deployment Files
writeup about sending Logstash data to Splunk using the HTTP Event Collector
Repository for custom applications that automate the downloading, installation, and running of various Beats into Vizion.ai Elasticsearch.
Ansible role to install winlogbeat for security monitoring.
Program to send logfiles to ELK using winlogbeat.
Graylog extractor for Microsoft Teams Rooms Devices
Materials and install for my talk about getting your ETL flow under Statistical Process Control
Install/Configure Elastic Winlogbeat through Chef
Integrated Windows endpoint log management (Docker + ELK(ElasticSearch, Logstash, Kibana) + Winlogbeat based)
Easy installation/update of Winlogbeat via Domain Controller and WinRM.
An Ansible role to install and configure Winlogbeat
This Docker project deploys a single-node ELK stack with Logstash, offering the flexibility to add custom pipelines as needed. It includes a preconfigured Winlogbeat pipeline for collecting logs from Windows systems. This setup is intended for testing and research purposes only, not for production use.
Winlogbeat installation for Windows Event Collectors (WEFCs)
Add a description, image, and links to the winlogbeat topic page so that developers can more easily learn about it.
To associate your repository with the winlogbeat topic, visit your repo's landing page and select "manage topics."