<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Rybbord on Medium]]></title>
        <description><![CDATA[Stories by Rybbord on Medium]]></description>
        <link>https://medium.com/@rybbord?source=rss-cdd4f24e2078------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*dmbNkD5D-u45r44go_cf0g.png</url>
            <title>Stories by Rybbord on Medium</title>
            <link>https://medium.com/@rybbord?source=rss-cdd4f24e2078------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Tue, 19 May 2026 06:55:36 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@rybbord/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Basic Sysmon Installation for Windows 64]]></title>
            <link>https://medium.com/@rybbord/basic-sysmon-installation-for-windows-64-f44e3b3a1f1a?source=rss-cdd4f24e2078------2</link>
            <guid isPermaLink="false">https://medium.com/p/f44e3b3a1f1a</guid>
            <category><![CDATA[siem]]></category>
            <category><![CDATA[security-operation-center]]></category>
            <category><![CDATA[incident-response]]></category>
            <category><![CDATA[digital-forensics]]></category>
            <category><![CDATA[security-event-management]]></category>
            <dc:creator><![CDATA[Rybbord]]></dc:creator>
            <pubDate>Wed, 26 Nov 2025 03:38:48 GMT</pubDate>
            <atom:updated>2025-11-26T03:38:48.792Z</atom:updated>
            <content:encoded><![CDATA[<ol><li><strong>Visit the </strong><a href="https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon"><strong>official Windows Sysmon </strong></a><strong>website and click ‘Download Sysmon’</strong></li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/493/1*R2K3XrBoIOkBaJVDg1IVsA.png" /></figure><p><strong>2. Open PowerShell as an administrator</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/731/1*mw0ndhk56X4monR0nl7I-w.png" /></figure><p><strong>3. Navigate to your downloads folder and extract the sysmon.zip file to a directory outside of your downloads.</strong></p><blockquote>PowerShell Command&gt;</blockquote><blockquote>cd C:\Users\user\Downloads</blockquote><blockquote>Expand-Archive -Path “C:\Users\user\Downloads\Sysmon.zip” -DestinationPath “C:\Users\user\Documents\Sysmon”</blockquote><p><strong>4. Download a Sysmon configuration file. Two most common are as follows:</strong></p><blockquote><a href="https://github.com/olafhartong/sysmon-modular/tree/master">https://github.com/olafhartong/sysmon-modular/tree/master</a></blockquote><blockquote><a href="https://github.com/SwiftOnSecurity/sysmon-config">https://github.com/SwiftOnSecurity/sysmon-config</a></blockquote><p>In this case, we will be working with Olaf Hartong’s ‘sysmonconfig.xml’ file. Navigate to that file path and download the raw file and move the xml to the same directory where you extracted your sysmon executables.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*zz77aHdUeDAXDQkxmmvivQ.png" /></figure><p><strong>5. Run the following command to complete the installation and configuration of sysmon</strong></p><blockquote>.\Sysmon64.exe -i sysmonconfig.xml</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/716/1*cErusc_lsgMNC8o02SFOUg.png" /></figure><p><strong>6. To confirm successful installation, open Event Viewer.</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/676/1*XH_erdIBEV1MyzFiH__Cqw.png" /></figure><p><strong>In Event Viewer, navigate to:</strong></p><p><em>Applications and Services Logs → Microsoft → Windows → Sysmon → Operational</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/901/1*zlUZPvUZedK7tqW6RtofhA.png" /></figure><p>If you are able to access the above path and there are events populated, then congratulations, you have successfully installed and configured Sysmon!</p><p>To learn about what you’re seeing and fine tune the tool, I recommend reviewing the <a href="https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon">Microsoft Sysmon Documentation</a> as well as the documentation/tutorials included with the configuration files.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=f44e3b3a1f1a" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Security Alert Resolution Codes]]></title>
            <link>https://medium.com/@rybbord/security-alert-resolution-codes-c3a0671c7ea4?source=rss-cdd4f24e2078------2</link>
            <guid isPermaLink="false">https://medium.com/p/c3a0671c7ea4</guid>
            <category><![CDATA[incident-response]]></category>
            <category><![CDATA[security-operation-center]]></category>
            <category><![CDATA[digital-forensics]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Rybbord]]></dc:creator>
            <pubDate>Fri, 01 Aug 2025 16:41:38 GMT</pubDate>
            <atom:updated>2025-08-01T16:41:38.055Z</atom:updated>
            <content:encoded><![CDATA[<p>An everyday struggle for SOC analysts is the sometimes ambiguous decision of what resolution code to choose for a security alert. Correct identification of resolution codes is essential for an organization’s security metrics, detection engineering, and reduction of alert fatigue.</p><p>Let’s start out by defining the resolution codes we typically see as the default:</p><blockquote>True Positive — Confirmed malicious activity that triggered an alert</blockquote><blockquote>True Negative—No malicious activity has occurred and no alert was triggered</blockquote><blockquote>False Positive — An alert was triggered, but no malicious activity has occurred</blockquote><blockquote>False Negative — Malicious activity has occurred, but no alert has been triggered</blockquote><p>In a large and complex security environment, these four codes can hinder understanding, efficiency, and resolution of security alerts. The issue arises when we have to question; How do we decide which rules need tuning? What do we do when the rule fired correctly, but the activity was benign? How do we create metrics based on alerts to better understand our security posture? Etc.</p><p>A better proposal may be to do away with the above resolution codes that are may be default in most SIEM, EDR, and IDS/IPS and replace them with resolution codes that better reflect security events and improve security efficiency.</p><p>Out of the four typical security resolution codes, True Negative and False Negative can be discarded. Due to the nature of a true negative, you will not have to worry about closing out a security alert with this closure code. Similarly, false negative could not be the closure code of a security alert as it would trigger no security alerts. A false negative would likely be discovered via threat hunting or during the course of investigation of other security alerts.</p><p>The following codes may better reflect the outcome of a security alert:</p><blockquote>True Positive — Confirmed malicious activity that triggered an alert. Ex; An alert triggers due to a login to an admin account from an unexpected IP. Investigation confirms that a threat actor attempted the login.</blockquote><blockquote>Non-Malicious — Activity occurred and correctly triggered an alert, however the activity is expected/benign. Ex; An alert triggers due to a login to an admin account from an unexpected IP. Investigation shows that the user forgot to connect to the company VPN before logging in.</blockquote><blockquote>Penetration Testing — Malicious activity confirmed, however the activity was part of an authorized penetration test.</blockquote><blockquote>False Positive — An alert was triggered for events that should not trigger a security alert. Ex; An alert triggers for download of a malicious file based on the hash. Investigation shows that the associated hash was mislabeled as malicious.</blockquote><blockquote>Duplicate — This activity was already alerted on and investigated.</blockquote><p>Using the above categories provides many benefits. Sometimes we have alerting rules that are quality and needed, but produce both true positive and non-malicious alerts. This is where differentiating between false positive and non-malicious resolution codes is helpful, especially to our detection engineers. Detection engineers can find alerts that were marked as false positives and review, tune, or remove the rules if needed. Whereas, if rules are marked as non-malicious, we will know that the activity needed to be investigated, but the activity was verified as expected or benign.</p><p>Additionally, this helps create metrics that more accurately represent security events. We now can identify how many alerts caught on to penetration tests, how many duplicate alerts we are handling, and how many alerts we are handling that should not have alerted in the first place.</p><p>As security professionals, we are always thinking about how we can enhance security processes within our organization. The out of the box, default configuration of tooling often does not meet the needs of a security organization. Deeper consideration into configurations such as alert resolution codes can streamline and improve many aspects of our security operations.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c3a0671c7ea4" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>