Ridgeline Skill

For Detection Engineers, Security Engineers, and SOC Architects

Aligned to MITRE ATT&CKSigma rules

Sysmon Configuration and Tuning

Focused skills. One thing, learned properly.

Learn to configure and tune Sysmon so it produces the telemetry your detections need without overwhelming your SIEM. Event selection, configuration architecture, noise reduction, and the deployment that makes Sysmon a detection asset instead of a data liability.

Content last updated: April 2026

Sections

SM0.1
Sysmon Event Types and What They Detect — The 29 Sysmon event types: which ones matter for detection, which generate noise, and which are essential. Event 1 (process creation), Event 3 (network connection), Event 7 (image load), Event 10 (process access), Event 11 (file creation), Event 22 (DNS query). What each event provides that native Windows logging doesn't.
SM0.2
XML Configuration Syntax — The Sysmon configuration schema: EventFiltering, RuleGroup, include/exclude logic, field conditions (is, contains, begin with, end with, image, not), and the onmatch attribute. Writing rules that capture malicious activity while filtering out legitimate noise. Configuration versioning.
SM0.3
The SwiftOnSecurity Baseline and Beyond — The SwiftOnSecurity sysmon-config as a starting point: what it includes, what it excludes, and where it needs customisation for your environment. Olaf Hartong's sysmon-modular as an alternative. Building on the baseline: adding rules for your specific threats, removing rules that generate noise in your environment.
SM0.4
Tuning for Production — The tuning workflow: deploy baseline → measure event volume → identify top noise sources → add exclusions → redeploy → measure again. Event volume analysis by event type. Finding the noisy processes (Defender, SCCM, Teams, OneDrive) and filtering them without losing detection value. The 80/20 rule: 20% of processes generate 80% of events.
SM0.5
Production Deployment: GPO, Intune, and SIEM Integration — Installing Sysmon silently. Deploying configuration via GPO and Intune. Updating configuration without reinstalling. Forwarding events to Sentinel (Windows Event Forwarding, Azure Monitor Agent, Defender for Endpoint). Monitoring Sysmon health: driver status, configuration hash, event generation rate.
SM0.6
Mapping Sysmon to Detection Rules — Which Sysmon events feed which Sigma rules. Event 1 → process creation detections. Event 10 → LSASS access detections. Event 3 → C2 network detections. Ensuring your Sysmon configuration captures the events your detections need. Gap analysis: if a Sigma rule requires Event 10 data and your config excludes it, the rule is blind.
Lab
Guided Lab: Build and Tune Sysmon for Northgate Engineering — Deploy Sysmon on an NE endpoint. Start with the SwiftOnSecurity baseline. Measure event volume. Identify the top 5 noise sources. Add targeted exclusions. Verify that the INC-2026-0501 attack techniques (encoded PowerShell, scheduled task creation, LSASS access, SMB lateral movement) are still detected after tuning. Produce the final configuration and deployment plan.