BigTech CompaniesCybersecurityNewswireTechnology

Windows 11 Now Has Built-In Sysmon Security Monitoring

▼ Summary

– Microsoft is integrating its Sysmon security tool natively into Windows 11, starting with Insider builds.
– Sysmon monitors and logs system events for threat detection, such as process creation and file changes.
– The tool is popular for diagnosing issues and threat hunting but was previously difficult to deploy at scale.
– The native Sysmon feature is disabled by default and requires manual activation through Settings or PowerShell.
– This rollout is currently available to Windows Insiders in the Beta and Dev channels on specific preview builds.

Microsoft has begun integrating native Sysmon functionality directly into Windows 11, a significant step for enterprise security and system monitoring. This development is currently available to users enrolled in the Windows Insider Beta and Dev channels, specifically those running recent preview builds. The move transforms a powerful, previously standalone diagnostic tool into a core, optional component of the operating system.

Sysmon, or System Monitor, is a well-established Microsoft Sysinternals utility. It operates as a system service and device driver designed to track and log potentially malicious activity directly to the Windows Event Log. By default, it captures fundamental system events like process creation and termination. However, its true power lies in its configurability; administrators can tailor it to monitor complex behaviors such as executable file creation, process tampering, clipboard changes, and even create backups of deleted files for forensic analysis.

Traditionally, deploying Sysmon required a manual installation on every individual device. This process presented a considerable management hurdle for IT teams overseeing large networks. The new native integration aims to streamline deployment and centralize management, making advanced threat-hunting capabilities more accessible at scale.

As announced by the Windows Insider team, the built-in feature allows users to capture detailed system events crucial for threat detection and security analysis. “You can use custom configuration files to filter the events you want to monitor,” the team noted. All captured data is written to the standard Windows event log, ensuring compatibility with a broad ecosystem of security information and event management (SIEM) applications and other analytical tools.

It is important to understand that the native Sysmon capability is disabled by default and requires explicit activation. Users must first remove any standalone version of Sysmon installed from the Microsoft Sysinternals website. To enable the built-in version, navigate to Settings > System > Optional features > More Windows features and select Sysmon. Alternatively, administrators can use a PowerShell or Command Prompt command: `Dism /Online /Enable-Feature /FeatureName:Sysmon`. Following this, the installation is finalized by executing `sysmon -i` from an elevated command line.

This rollout to Windows Insiders follows Microsoft’s recent pattern of testing greater administrative control over Windows components. Just last month, the company began trialing a new policy that would allow IT administrators to remove the AI-powered Copilot digital assistant from managed corporate devices. These developments collectively point toward a more configurable and enterprise-focused direction for Windows management.

(Source: Bleeping Computer)

Topics

sysmon integration 95% system monitoring 90% windows insider 85% threat detection 80% optional features 75% event logging 75% preview builds 70% it deployment 70% process monitoring 70% security applications 65%