
#Fleet osquery windows#
A custom Windows auditing configuration is set via GPO to include command line process auditing and additional OS-level logging.Technology add-ons for Windows are also preconfigured. Windoes Evenet forwarder along with Winlogbeat are pre-installed and all indexes are pre-created on ELK.Microsoft Advanced Threat Analytics is installed on the WEF machine, with the lightweight ATA gateway installed on the DC.Microsoft ATA login: - vagrant:vagrant.Windows Admininstrator login: vagrant:vagrant.Enhance alerts quality by reducing false positives and eliminating false negatives.Ensure that your SIEM is collecting the correct events.Validate that your production logging is working as expected.You can use DetectionLabELK to quickly run atomic tests, see what logs are being generated and compare it to your production environment. Use cases:Ī popular use case for DetectionLabELK is when you consider adopting MITRE ATT&CK framework and would like to develop detections for its tactics. It can easily be modified to fit most needs or expanded to include additional hosts.

Its primary purpose is to allow blueteams to quickly build a Windows domain that comes pre-loaded with security tooling and some best practices when it comes to system logging configurations. It has been designed with defenders in mind. DetectionLabELK is a fork from Chris Long's DetectionLab with ELK stack instead of Splunk.ĭetectionLabELK is the perfect lab to use if you would like to build effective detection capabilities.
