I've installed Sysinternals Sysmon 3.21 on Windows Server 2012 R2 ("Log network connections" enabled), and enabled the OSSEC agent (v2.8/Wazuh 1.1.1) to monitor the "Microsoft-Windows-Sysmon/Operational" event logs by adding this bit of configuration in the agent.conf file:
<agent_config os="Windows">
<localfile>
<location>Microsoft-Windows-Sysmon/Operational</location>
<log_format>eventchannel</log_format>
</localfile>
</agent_config>
Sysmon events are now being received by the OSSEC manager, however, the number of false positive alerts is staggering - one to two thousands per hour.
Example below:
Rule: Sysmon - Suspicious Process - svchost.exe
User: NT AUTHORITY\LOCAL SERVICE
2016 May 12 17:59:24 WinEvtLog: Microsoft-Windows-Sysmon/Operational: INFORMATION(3): Microsoft-Windows-Sysmon: SYSTEM: NT AUTHORITY: dc1.anonymous.local: Network connection detected: UtcTime: 2016-05-12 21:59:21.980 ProcessGuid: {4F69E393-C8F7-5733-0000-0010B4290100} ProcessId: 412 Image: C:\Windows\System32\svchost.exe User: NT AUTHORITY\LOCAL SERVICE Protocol: udp Initiated: true SourceIsIpv6: false SourceIp: 10.10.10.10 SourceHostname: dc1.anonymous.local SourcePort: 123 SourcePortName: ntp DestinationIsIpv6: false DestinationIp: 199.182.221.110 DestinationHostname: zero.gotroot.ca DestinationPort: 123 DestinationPortName: ntp
The above is simply the Windows time service synchronizing time with a public NTP server; hundreds of other normal/benign Windows processes are being alerted in a similar fashion. Surprisingly, when I launch a browser and connect to a bunch of random web sites, this is not flagged by the sysmon rule, despite being logged locally as a sysmon event.
Aynone else have any experience with the Sysmon decoder/rules that can offer some guidance?