Skip to content

Yamato-Security/EventLog-Baseline-Guide

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

About EventLog-Baseline-Guide

A comprehensive Streamlit application for comparing and analyzing Windows Event Log audit settings across different security baseline guides. This tool provides a user-friendly interface to visualize differences in audit settings, assess their impact on detection rule effectiveness, and make informed decisions about Windows Event Log configurations. It leverages over 4,000 Sigma rules and audit baselines to visualize detection coverage before and after applying specific configurations.

Live Demo

https://yamato-security-eventlog-baseline-guide-streamlit-app-gwlyjo.streamlit.app/

Architecture

Screenshot

Features

Windows Event Log Audit Settings Baseline Guide Comparison

Compare audit settings across multiple authoritative sources:

  • Windows Default: Microsoft's default configuration
  • YamatoSecurity: Community-driven security configurations
  • Australian Signals Directorate: Government security recommendations
  • Microsoft Server: Server-specific recommendations
  • Microsoft Client: Client-specific recommendations

Key Metrics

  • Audit Settings Analysis: Detailed breakdown of recommended vs default settings
  • Log File Size Recommendations: Optimal log retention settings
  • Sigma Rule Statistics: Impact analysis on detection rule effectiveness
  • Service and Category Breakdown: Granular analysis by Windows services and categories

Screenshot

Screenshot

Screenshot

Screenshot

Screenshot

Screenshot

Color-Coded Interface

The application uses an intuitive color-coding system:

  • 🟡 Yellow: Changes required from default settings
  • 🟢 Pale Green: Default settings are acceptable
  • ⚪ Light Gray: No auditing required or no recommendations available

Key Insights

The tool helps answer critical questions:

  • Which audit settings need to be changed from defaults?
  • How do different baseline guides compare?
  • What's the impact on detection rule effectiveness?
  • Which Windows services are most affected by configuration changes?

How to use(locally)

git clone https://github.com/Yamato-Security/EventLog-Baseline-Guide.git
cd EventLog-Baseline-Guide
pip install -r requirements.txt
streamlit run streamlit_app.py 

Other Windows Event Log Audit Settings Related Resources

Contributing

We would love any form of contribution. Pull requests, rule creation and sample evtx logs are the best but feature requests, notifying us of bugs, etc... are also very welcome. At the least, if you like our tool then please give us a star on GitHub and show your support!

License

This project is licensed under the MIT License. See the LICENSE file for details.

This tool is designed to help security professionals make informed decisions about Windows event log configuration based on established security baselines and their impact on detection rule effectiveness.

About

Windows Event Log Audit Configuration Baselines and Guidelines. Automated monitoring of audit policy settings across different security frameworks.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •