forked from splunk/attack_range
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request splunk#816 from splunk/improvements_features
Improvements
- Loading branch information
Showing
4 changed files
with
170 additions
and
3 deletions.
There are no files selected for viewing
143 changes: 143 additions & 0 deletions
143
packer/ansible/roles/windows_common/tasks/advanced_logging.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,143 @@ | ||
- name: Enable Windows Security Logging "Account Logon" | ||
win_audit_policy_system: | ||
subcategory: Credential Validation | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Account Logon" | ||
win_audit_policy_system: | ||
subcategory: Kerberos Authentication Service | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Account Logon" | ||
win_audit_policy_system: | ||
subcategory: Kerberos Service Ticket Operations | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Account Management" | ||
win_audit_policy_system: | ||
subcategory: User Account Management | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Account Management" | ||
win_audit_policy_system: | ||
subcategory: Security Group Management | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Account Management" | ||
win_audit_policy_system: | ||
subcategory: Distribution Group Management | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Account Management" | ||
win_audit_policy_system: | ||
subcategory: Computer Account Management | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Detailed Tracking" | ||
win_audit_policy_system: | ||
subcategory: Process Creation | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Detailed Tracking" | ||
win_audit_policy_system: | ||
subcategory: Process Termination | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Detailed Tracking" | ||
win_audit_policy_system: | ||
subcategory: Directory Service Access | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Logon Logoff" | ||
win_audit_policy_system: | ||
subcategory: Account Lockout | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Logon Logoff" | ||
win_audit_policy_system: | ||
subcategory: Logoff | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Logon Logoff" | ||
win_audit_policy_system: | ||
subcategory: Logon | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Logon Logoff" | ||
win_audit_policy_system: | ||
subcategory: Special Logon | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Object Access" | ||
win_audit_policy_system: | ||
subcategory: Detailed File Share | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Object Access" | ||
win_audit_policy_system: | ||
subcategory: File Share | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Object Access" | ||
win_audit_policy_system: | ||
subcategory: Filtering Platform Connection | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Object Access" | ||
win_audit_policy_system: | ||
subcategory: Kernel Object | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Object Access" | ||
win_audit_policy_system: | ||
subcategory: Other Object Access Events | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Object Access" | ||
win_audit_policy_system: | ||
subcategory: Registry | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Object Access" | ||
win_audit_policy_system: | ||
subcategory: Removable Storage | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Object Access" | ||
win_audit_policy_system: | ||
subcategory: SAM | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "Privilege Use" | ||
win_audit_policy_system: | ||
subcategory: Sensitive Privilege Use | ||
audit_type: success, failure | ||
|
||
|
||
- name: Enable Windows Security Logging "System" | ||
win_audit_policy_system: | ||
subcategory: Security State Change | ||
audit_type: success, failure | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
3 changes: 3 additions & 0 deletions
3
terraform/ansible/roles/windows_install_attack_simulation/files/profile.ps1
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
|
||
Import-Module "C:\AtomicRedTeam\invoke-atomicredteam\Invoke-AtomicRedTeam.psd1" -Force | ||
$PSDefaultParameterValues = @{"Invoke-AtomicTest:PathToAtomicsFolder"="C:\AtomicRedTeam\atomics"} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters