From b1f1e97966067b5e85a9d527eb8b09f94b7f35d4 Mon Sep 17 00:00:00 2001 From: fukusuket <41001169+fukusuket@users.noreply.github.com> Date: Mon, 12 May 2025 11:20:27 +0900 Subject: [PATCH] doc: add readme --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 4ce63253..5c975857 100644 --- a/README.md +++ b/README.md @@ -94,7 +94,7 @@ Please download the latest stable version of WELA from the [Releases](https://gi # Command Usage ## audit-settings `audit-settings` command checks the Windows Event Log audit policy settings and compares them with the recommended settings from **[Yamato Security](https://github.com/Yamato-Security/EnableWindowsLogSettings)**, **[Microsoft(Sever/Client)](https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/audit-policy-recommendations)**, and **[Australian Signals Directorate (ASD)](https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/system-monitoring/windows-event-logging-and-forwarding)**. -RuleCount indicates the number of [Sigma rules](https://github.com/SigmaHQ/sigma) that can detect events within that category. +**RuleCount** indicates the number of **[Sigma rules](https://github.com/SigmaHQ/sigma)** that can detect events within that category. #### `audit-settings` command examples Check by YamatoSecurity(Default) recommend setting and save to CSV: