What is Sysmon

July 18, 2025 · View on GitHub

Sysmon (System Monitor) is a free, advanced system monitoring tool developed by Mark Russinovich and Tomas Garnier, with contributions from David Magnotti, Mark Cook, Rob Mead, Giulia Biagini, Alex Mihaiuc, Kevin Sheldrake, and John Lambert.
Originally, Sysmon was created for internal use at Microsoft, but it is now widely used by security professionals to enhance visibility into system activity and detect abnormal behavior or potential threats.

Sysmon enables defenders to better detect suspicious activity by monitoring and logging a broad range of system events, such as process creation, network connections, and changes to files or registry keys. These logs are especially valuable for security investigations and threat detection.

Sysmon on Windows

Sysmon for Windows supports ARM, x64 and x86 systems. Installation and configuration are managed through a single command-line tool. When installed, Sysmon logs events to the Microsoft-Windows-Sysmon/Operational Event Log.

Windows Supported Event Types

The following table lists the event types and corresponding event IDs generated by Sysmon on Windows systems:

Event TypeEvent ID
Sysmon Service Status Changed0
Process Create1
File Create Time2
Network Connect3
Service State Change4
Process Terminate5
Driver Load6
Image Load7
Create Remote Thread8
Raw Access Read9
Process Access10
File Create11
Registry Object Added or Deleted12
Registry Create13
Registry Rename14
File Create Stream Hash15
Sysmon Config Change16
Named Pipe Create17
Named Pipe Connected18
WMI Event Filter19
WMI Event Consumer20
WMI Consumer to Filter21
DNS Query22
File Delete23
Clipboard Capture24
Process Tampering25
File Delete Detected26
Error255

Sysmon on Linux

Sysmon for Linux is an open-source adaptation, designed to collect similar security-relevant events from Linux environments. It leverages eBPF (Extended Berkeley Packet Filter) to efficiently monitor system activity at the kernel level.

Sysmon for Linux can be compiled from source or installed via your distribution’s package manager. Currently supported distributions include:

  • Ubuntu
  • Debian
  • Red Hat Enterprise Linux
  • Fedora Linux
  • openSUSE
  • SUSE Linux Enterprise Server

Sysmon logs events to the native system logging facility (such as journald). The scope of supported events is narrower compared to Windows, due to differences in operating system architecture.

Linux Supported Event Types

The following table lists the event types and event IDs currently supported by Sysmon on Linux:

Event TypeEvent ID
Sysmon Service Status Changed0
Process Create1
Network Connect3
Service State Change4
Process Terminate5
Raw Access Read9
File Create11
Sysmon Config Change16
File Delete23

Sysmon for Linux uses the sysinternalsEBPF library to capture file and network activities. eBPF allows execution of custom code at the kernel level, enabling efficient and secure event collection without requiring kernel modules.

Both sysinternalsEBPF and Sysmon for Linux are open source projects, allowing the community to contribute and extend their features. You can find the projects and source code on GitHub:

Further Resources

Sysmon is a vital tool for defenders looking to increase their visibility into system activities and detect security threats on both Windows and Linux platforms.