mirror of
https://github.com/Yamato-Security/WELA.git
synced 2025-12-06 17:22:50 +01:00
doc: add readme
This commit is contained in:
@@ -21,39 +21,41 @@
|
|||||||
# WELAについて
|
# WELAについて
|
||||||
**WELA(Windows Event Log Analyzer、ゑ羅)** は、Windowsイベントログの設定とログサイズを監査するツールです。
|
**WELA(Windows Event Log Analyzer、ゑ羅)** は、Windowsイベントログの設定とログサイズを監査するツールです。
|
||||||
Windowsイベントログは、DFIR(デジタルフォレンジックおよびインシデント対応)に不可欠な情報源であり、システムの動作やセキュリティイベントを可視化します。
|
Windowsイベントログは、DFIR(デジタルフォレンジックおよびインシデント対応)に不可欠な情報源であり、システムの動作やセキュリティイベントを可視化します。
|
||||||
**しかし、デフォルト設では、不十分なログサイズ、監査設定によって、脅威の検知漏れを引き起こす**可能性があります。
|
**しかし、デフォルト設定では、不十分なログサイズ、監査設定によって、脅威の検知漏れを引き起こす**可能性があります。
|
||||||
WELAはこうした課題を洗い出し、設定改善のための実用的な提案を行います。
|
WELAはこうした課題を洗い出し、Windowsイベントログ設定改善のための実用的な提案を行います。
|
||||||
また、**実際のSigmaルールの検知範囲に基づいてWindowsイベントログ設定を評価**し、現状の設定で何が検知できるかを把握できます。
|
また、**実際のSigmaルールの検知範囲に基づいてWindowsイベントログ設定を評価**し、現状の設定で何が検知できるかを把握できます。
|
||||||
|
|
||||||
|
|
||||||
# 関連プロジェクト
|
# 関連プロジェクト
|
||||||
|
|
||||||
* [EnableWindowsLogSettings](https://github.com/Yamato-Security/EnableWindowsLogSettings) Yamato SecurityのWindowsイベントログ設定ガイド。
|
* [EnableWindowsLogSettings](https://github.com/Yamato-Security/EnableWindowsLogSettings) Yamato SecurityのWindowsイベントログ設定ガイド
|
||||||
* [EventLog-Baseline-Guide](https://github.com/Yamato-Security/EventLog-Baseline-Guide) A tool to visualize detection gaps in Sigma rules and major guides.
|
* [EventLog-Baseline-Guide](https://github.com/Yamato-Security/EventLog-Baseline-Guide) Sigmaルールと主要なガイドにおける検知ギャップを可視化するツール
|
||||||
* [WELA-RulesGenerator](https://github.com/Yamato-Security/WELA-RulesGenerator) A tool for generating WELA's Sigma rule-related config files.
|
* [WELA-RulesGenerator](https://github.com/Yamato-Security/WELA-RulesGenerator) WELAのSigmaルール関連設定ファイルを生成するためのツール
|
||||||
|
|
||||||
# 目次
|
# 目次
|
||||||
|
|
||||||
- [WELAについて](#WELAについて)
|
- [WELAについて](#WELAについて)
|
||||||
- [関連プロジェクト](#関連プロジェクト)
|
- [関連プロジェクト](#関連プロジェクト)
|
||||||
- [目次](#目次)
|
- [目次](#目次)
|
||||||
- [Screenshots](#screenshots)
|
- [スクリーンショット](#スクリーンショット)
|
||||||
- [Features](#features)
|
- [機能](#機能)
|
||||||
- [Downloads](#downloads)
|
- [前提要件](#前提要件)
|
||||||
- [Command List](#command-list)
|
- [ダウンロード](#ダウンロード)
|
||||||
- [Command Usage](#command-usage)
|
- [WELAの実行](#WELAの実行)
|
||||||
|
- [コマンド一覧](#コマンド一覧)
|
||||||
|
- [コマンド使用例](#コマンド使用例)
|
||||||
- [audit-settings](#audit-settings)
|
- [audit-settings](#audit-settings)
|
||||||
- [audit-filesize](#audit-filesize)
|
- [audit-filesize](#audit-filesize)
|
||||||
- [update-rules](#update-rules)
|
- [update-rules](#update-rules)
|
||||||
- [Other Windows Event Log Audit Settings Related Resources](#other-windows-event-log-audit-settings-related-resources)
|
- [Windowsイベントログの監査設定に関するその他の参考資料](#Windowsイベントログの監査設定に関するその他の参考資料)
|
||||||
- [Contribution](#contribution)
|
- [貢献](#貢献)
|
||||||
- [Bug Submission](#bug-submission)
|
- [不具合の報告](#不具合の報告)
|
||||||
- [License](#license)
|
- [ライセンス](#ライセンス)
|
||||||
- [Contributors](#contributors)
|
- [貢献者](#貢献者)
|
||||||
- [Acknowledgements](#acknowledgements)
|
- [謝辞](#ジャ時)
|
||||||
- [Twitter](#twitter)
|
- [X](#X)
|
||||||
|
|
||||||
# Screenshots
|
# スクリーンショット
|
||||||
|
|
||||||
## Startup
|
## Startup
|
||||||

|

|
||||||
@@ -69,31 +71,31 @@ WELAはこうした課題を洗い出し、設定改善のための実用的な
|
|||||||
## audit-filesize
|
## audit-filesize
|
||||||

|

|
||||||
|
|
||||||
# Features
|
# 機能
|
||||||
- Audit Windows Event Log Audit policy settings.
|
- Audit Windows Event Log Audit policy settings.
|
||||||
- Checking **based on the major Windows Event Log Audit configuration guides**.
|
- Checking **based on the major Windows Event Log Audit configuration guides**.
|
||||||
- Checking Windows Event Log audit settings based on **real-world Sigma rule detectability**.
|
- Checking Windows Event Log audit settings based on **real-world Sigma rule detectability**.
|
||||||
- Audit Windows Event Log file sizes and suggest the recommended size.
|
- Audit Windows Event Log file sizes and suggest the recommended size.
|
||||||
|
|
||||||
# Prerequisites
|
# 前提要件
|
||||||
* PowerShell 5.1+
|
* PowerShell 5.1+
|
||||||
* Run PowerShell with Administrator privileges
|
* Run PowerShell with Administrator privileges
|
||||||
|
|
||||||
# Downloads
|
# ダウンロード
|
||||||
|
|
||||||
Please download the latest stable version of WELA from the [Releases](https://github.com/Yamato-Security/wela/releases) page.
|
Please download the latest stable version of WELA from the [Releases](https://github.com/Yamato-Security/wela/releases) page.
|
||||||
|
|
||||||
# Running WELA
|
# WELAの実行
|
||||||
1. Unzip the [release zip file](https://github.com/Yamato-Security/wela/releases).
|
1. Unzip the [release zip file](https://github.com/Yamato-Security/wela/releases).
|
||||||
2. Open PowerShell with **Administrator privileges**.
|
2. Open PowerShell with **Administrator privileges**.
|
||||||
3. `./WELA.ps1 help` to run WELA.
|
3. `./WELA.ps1 help` to run WELA.
|
||||||
|
|
||||||
# Command List
|
# コマンド一覧
|
||||||
- `audit-settings`: Check Windows Event Log audit policy settings.
|
- `audit-settings`: Check Windows Event Log audit policy settings.
|
||||||
- `audit-filesize`: Check Windows Event Log file size.
|
- `audit-filesize`: Check Windows Event Log file size.
|
||||||
- `update-rules`: Update WELA's Sigma rules config files.
|
- `update-rules`: Update WELA's Sigma rules config files.
|
||||||
|
|
||||||
# Command Usage
|
# コマンド使用例
|
||||||
## audit-settings
|
## audit-settings
|
||||||
`audit-settings` command checks the Windows Event Log audit policy settings and compares them with the recommended settings from [Yamato Security](https://github.com/Yamato-Security/EnableWindowsLogSettings), [Microsoft(Sever/Client)](https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/audit-policy-recommendations), and [Australian Signals Directorate (ASD)](https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/system-monitoring/windows-event-logging-and-forwarding).
|
`audit-settings` command checks the Windows Event Log audit policy settings and compares them with the recommended settings from [Yamato Security](https://github.com/Yamato-Security/EnableWindowsLogSettings), [Microsoft(Sever/Client)](https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/audit-policy-recommendations), and [Australian Signals Directorate (ASD)](https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/system-monitoring/windows-event-logging-and-forwarding).
|
||||||
RuleCount indicates the number of [Sigma rules](https://github.com/SigmaHQ/sigma) that can detect events within that category.
|
RuleCount indicates the number of [Sigma rules](https://github.com/SigmaHQ/sigma) that can detect events within that category.
|
||||||
@@ -135,7 +137,7 @@ Update WELA's Sigma rules config files:
|
|||||||
./WELA.ps1 update-rules
|
./WELA.ps1 update-rules
|
||||||
```
|
```
|
||||||
|
|
||||||
# Other Windows Event Log Audit Settings Related Resources
|
# Windowsイベントログの監査設定に関するその他の参考資料
|
||||||
|
|
||||||
* [A Data-Driven Approach to Windows Advanced Audit Policy – What to Enable and Why](https://www.splunk.com/en_us/blog/security/windows-audit-policy-guide.html)
|
* [A Data-Driven Approach to Windows Advanced Audit Policy – What to Enable and Why](https://www.splunk.com/en_us/blog/security/windows-audit-policy-guide.html)
|
||||||
* [Audit Policy Recommendations](https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/audit-policy-recommendations)
|
* [Audit Policy Recommendations](https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/audit-policy-recommendations)
|
||||||
@@ -145,33 +147,33 @@ Update WELA's Sigma rules config files:
|
|||||||
* [mdecrevoisier/Windows-auditing-baseline](https://github.com/mdecrevoisier/Windows-auditing-baseline)
|
* [mdecrevoisier/Windows-auditing-baseline](https://github.com/mdecrevoisier/Windows-auditing-baseline)
|
||||||
* [palantir/windows-event-forwarding](https://github.com/palantir/windows-event-forwarding/tree/master/group-policy-objects)
|
* [palantir/windows-event-forwarding](https://github.com/palantir/windows-event-forwarding/tree/master/group-policy-objects)
|
||||||
|
|
||||||
# Contribution
|
# 貢献
|
||||||
|
|
||||||
We would love any form of contribution.
|
We would love any form of contribution.
|
||||||
Pull requests, rule creation, and sample logs are the best, but feature requests notifying us of bugs, etc... are also very welcome.
|
Pull requests, rule creation, and sample logs are the best, but feature requests notifying us of bugs, etc... are also very welcome.
|
||||||
|
|
||||||
At the least, **if you like our tools and resources, then please give us a star on GitHub and show your support!**
|
At the least, **if you like our tools and resources, then please give us a star on GitHub and show your support!**
|
||||||
|
|
||||||
# Bug Submission
|
# 不具合の報告
|
||||||
|
|
||||||
* Please submit any bugs you find [here.](https://github.com/Yamato-Security/wela/issues/new?assignees=&labels=bug&template=bug_report.md&title=%5Bbug%5D)
|
* Please submit any bugs you find [here.](https://github.com/Yamato-Security/wela/issues/new?assignees=&labels=bug&template=bug_report.md&title=%5Bbug%5D)
|
||||||
* This project is currently actively maintained, and we are happy to fix any bugs reported.
|
* This project is currently actively maintained, and we are happy to fix any bugs reported.
|
||||||
|
|
||||||
# License
|
# ライセンス
|
||||||
|
|
||||||
* WELA is released under [MIT License](https://opensource.org/licenses/MIT)
|
* WELA is released under [MIT License](https://opensource.org/licenses/MIT)
|
||||||
|
|
||||||
# Contributors
|
# 貢献者
|
||||||
|
|
||||||
* Fukusuke Takahashi (core developer)
|
* Fukusuke Takahashi (core developer)
|
||||||
* Zach Mathis (project leader, tool design, testing, etc...) (@yamatosecurity)
|
* Zach Mathis (project leader, tool design, testing, etc...) (@yamatosecurity)
|
||||||
|
|
||||||
# Acknowledgements
|
# 謝辞
|
||||||
|
|
||||||
* [Australian Cyber Security Centre: Windows event logging and forwarding](https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/system-monitoring/windows-event-logging-and-forwarding)
|
* [Australian Cyber Security Centre: Windows event logging and forwarding](https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/system-monitoring/windows-event-logging-and-forwarding)
|
||||||
* [Microsoft: Advanced security auditing FAQ](https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/advanced-security-auditing-faq)
|
* [Microsoft: Advanced security auditing FAQ](https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/advanced-security-auditing-faq)
|
||||||
* [SigmaHQ](https://github.com/SigmaHQ/sigma)
|
* [SigmaHQ](https://github.com/SigmaHQ/sigma)
|
||||||
|
|
||||||
# Twitter
|
# X
|
||||||
|
|
||||||
You can receive the latest news about WELA, rule updates, other Yamato Security tools, etc... by following us on Twitter at [@SecurityYamato](https://twitter.com/SecurityYamato).
|
You can receive the latest news about WELA, rule updates, other Yamato Security tools, etc... by following us on X at [@SecurityYamato](https://twitter.com/SecurityYamato).
|
||||||
@@ -172,6 +172,6 @@ At the least, **if you like our tools and resources, then please give us a star
|
|||||||
* [Microsoft: Advanced security auditing FAQ](https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/advanced-security-auditing-faq)
|
* [Microsoft: Advanced security auditing FAQ](https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/advanced-security-auditing-faq)
|
||||||
* [SigmaHQ](https://github.com/SigmaHQ/sigma)
|
* [SigmaHQ](https://github.com/SigmaHQ/sigma)
|
||||||
|
|
||||||
# Twitter
|
# X
|
||||||
|
|
||||||
You can receive the latest news about WELA, rule updates, other Yamato Security tools, etc... by following us on Twitter at [@SecurityYamato](https://twitter.com/SecurityYamato).
|
You can receive the latest news about WELA, rule updates, other Yamato Security tools, etc... by following us on X at [@SecurityYamato](https://twitter.com/SecurityYamato).
|
||||||
Reference in New Issue
Block a user