Thank you for taking the time to consider my question, I'm mainly seeking to find if it's possible to better enrich the data that is obtained from Windows hosts running Splunk UF v8.2.5, namely [WinEventLog:Security] and [WinNetMon] capabilities.
Currently we monitor for all new process run, as well as collect logs for unfamiliar IPv4 addresses reached out to by creating a inputs.conf blacklist for internal IPv4s and common websites. I'm curious if we can further enrich this data by using powershell scripts to lookup these IPv4s according to that hosts DNS resolution, (not retroactively resolving them at the point of analysis, which can lead to different results if the endpoint's DNS cache was compromised).
Additionally, I'm wondering if it's possible to use something like a powershell script to retrieve the SHA256 file hash of new processes run with the parsed log. It could be that what I need to do is just run Sysmon and monitor that, and I'm very much for that, but I've heard from more veteran employees at the company I'm currently at that sysmon killed performance and isn't feasible on endpoints. I'm very much a rookie and wasn't in a position to argue otherwise, but as far as I know sysmon has a rather light footprint in comparison to it's robust capabilities.
Any advice on these topics is greatly appreciated, and will be rewarded with karma!
* Yeah for sure you can write a custom PowerShell script that reads the EventViewer and does filtration. But you have to take that into account how much time you would need to build that capability from scratch.
* That to say the option of using [WinEventLog:Security] and combining that with PowerShell script is not possible directly today.
* One other option you have is to filter the logs before it reaches the EventLog. (I'm not a Windows expert so don't know how to do it, but I'm sure there is a way you can write rules.)
* I kinda agree that Sysmon is light weight comparitive to its capability.