Latest Version 2.0.0
March 3, 2023
This app is archived. Learn more
This apps main function is to enable a custom Splunk search command to reconstruct a pstree from Sysmon process creation events (EventCode 1). Information from memory forensics, such as Volatility's pstree, can be very helpful to detect malicious processes. By ingesting Sysmon events in Splunk and using this command you can quickly get similar information without performing memory forensics.
(0)
Categories
Created By
Type
Downloads
Licensing
Splunk Answers
Resources