Latest Version 2.1.0
March 28, 2026
This apps main function is to enable a custom Splunk search command to reconstruct a pstree from Sysmon process creation events (EventCode 1). Information from memory forensics, such as Volatility's pstree, can be very helpful to detect malicious processes. By ingesting Sysmon events in Splunk and using this command you can quickly get similar information without performing memory forensics.
(0)
Categories
Created By
Source Code
splunk_pstree_app(Opens new window)Type
Downloads
Splunk Answers
Ask a question about this app listing(Opens new window)Resources