#
winlogbeat
Here are 20 public repositories matching this topic...
Windows Events Attack Samples
-
Updated
Dec 12, 2021 - HTML
Threat Hunting with ELK Workshop (InfoSecWorld 2017)
-
Updated
Oct 31, 2017 - PowerShell
[DEPRECATED] Elastic Beats Input plugin for Graylog
-
Updated
Mar 15, 2019 - Java
Collector plugin for Graylog
-
Updated
Jan 5, 2022 - JavaScript
Universal Winlogbeat configuration
windows
graylog
examples
universal
filebeat
filter
logging
yml
windows-10
windows-server
sysmon
siem
winlogbeat
-
Updated
Feb 25, 2021
Burnham Forensics ELK Deployment Files
-
Updated
Apr 20, 2019
An Ansible role to install and configure Winlogbeat
-
Updated
Oct 18, 2018 - Ruby
Repository for custom applications that automate the downloading, installation, and running of various Beats into Vizion.ai Elasticsearch.
elasticsearch
kibana
elasticstack
filebeat
heartbeat
apache2
metricbeat
winlogbeat
elk-stack
auditbeat
vizion
-
Updated
Jan 17, 2020 - PowerShell
Install/Configure Elastic Winlogbeat through Chef
-
Updated
Jun 17, 2020 - Ruby
Materials and install for my talk about getting your ETL flow under Statistical Process Control
-
Updated
Mar 12, 2020 - TSQL
Program to send logfiles to ELK using winlogbeat.
-
Updated
May 18, 2020 - Visual Basic .NET
Ansible role to install winlogbeat for security monitoring.
windows
security
ansible
elasticsearch
monitoring
ansible-role
windows10
siem
winlogbeat
elk-stack
windows-server-2019
-
Updated
Dec 21, 2021 - Jinja
Graylog extractor for Microsoft Teams Rooms Devices
-
Updated
Jan 25, 2021
Sysmon logs in the window environment are received from a computer in another environment through winlogbeat through Logstash, and then repositioned in Elasticsearch and displayed in PyQt.
-
Updated
Sep 2, 2021 - Python
Winlogbeat installation for Windows Event Collectors (WEFCs)
-
Updated
Feb 9, 2021 - HTML
Chef LWRP for winlogbeat(shipper for Elasticsearch & Logstash)
-
Updated
Jul 8, 2017 - Ruby
Repo for maintaining Ansible playbooks
ansible
elasticsearch
vagrant
kibana
logstash
virtualbox
runit
filebeat
elk
ansible-playbooks
winlogbeat
elk-stack
elk-ansible
virtual-instances
elasticsearch-runit
kibana-runit
logstash-runit
ansible-runit
-
Updated
Apr 25, 2019 - Shell
writeup about sending Logstash data to Splunk using the HTTP Event Collector
elasticsearch
logstash
kafka
splunk
filebeat
metricbeat
winlogbeat
splunk-enterprise
splunk-universal-forwarder
splunk-hec
-
Updated
Oct 24, 2021
Improve this page
Add a description, image, and links to the winlogbeat topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the winlogbeat topic, visit your repo's landing page and select "manage topics."


The
add_network_directionprocessor creates field names that contain dots. By default it will create a document that containsWhat is does:
{ "network.direction": "outbound" }What is SHOULD do:
{ "network": { "direction": "outbound" } }The problem is this line that directly uses the target key without considering that it could contain dots