Skip to content

Windows Event Log Integration

This guide covers how to install the KYRA EDR agent on Windows endpoints to collect and forward Windows Security, System, and Sysmon event logs to KYRA MDR.

Supported versions: Windows 10/11, Windows Server 2016, 2019, 2022, 2025


Prerequisites

  • A KYRA MDR Collector installed and running (Installation Guide)
  • Windows administrator access
  • Network connectivity to the collector or directly to KYRA platform

Step 1: Install the KYRA EDR Agent

Run PowerShell as Administrator:

Terminal window
# Download and install the KYRA EDR agent
Invoke-WebRequest -Uri "https://install.kyra.ai/edr/windows" -OutFile "$env:TEMP\kyra-edr-setup.msi"
Start-Process msiexec.exe -ArgumentList "/i $env:TEMP\kyra-edr-setup.msi TENANT_ID=your-tenant-id API_KEY=your-api-key /quiet" -Wait

The agent will:

  1. Install as a Windows service (KYRA EDR Agent)
  2. Subscribe to Security, System, and Application event channels
  3. Begin forwarding events to the KYRA Collector or platform

Group Policy Deployment

For deploying across multiple endpoints via Active Directory GPO:

  1. Download the MSI from Console > Settings > Downloads
  2. Create a transform.mst file with your Tenant ID and API Key
  3. Deploy via Computer Configuration > Policies > Software Settings > Software installation

Step 2: Configure Windows Audit Policies

Windows does not log many critical events by default. Enable the recommended audit policies to get meaningful security telemetry.

Using Group Policy (GPO)

Navigate to Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration:

CategorySubcategorySetting
Account LogonCredential ValidationSuccess, Failure
Account LogonKerberos Authentication ServiceSuccess, Failure
Account ManagementUser Account ManagementSuccess, Failure
Account ManagementSecurity Group ManagementSuccess, Failure
Logon/LogoffLogonSuccess, Failure
Logon/LogoffSpecial LogonSuccess
Object AccessFile SystemFailure
Policy ChangeAudit Policy ChangeSuccess
Privilege UseSensitive Privilege UseSuccess, Failure
Process CreationProcess CreationSuccess
SystemSecurity State ChangeSuccess

Using PowerShell

Terminal window
# Enable critical audit policies
auditpol /set /subcategory:"Logon" /success:enable /failure:enable
auditpol /set /subcategory:"Credential Validation" /success:enable /failure:enable
auditpol /set /subcategory:"User Account Management" /success:enable /failure:enable
auditpol /set /subcategory:"Security Group Management" /success:enable /failure:enable
auditpol /set /subcategory:"Special Logon" /success:enable
auditpol /set /subcategory:"Process Creation" /success:enable
auditpol /set /subcategory:"Audit Policy Change" /success:enable
# Enable command-line logging in process creation events
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit" /v ProcessCreationIncludeCmdLine_Enabled /t REG_DWORD /d 1 /f

Important: Enable command-line process auditing — without it, Event ID 4688 only shows the process name, not the full command. This is critical for detecting fileless malware and LOLBins (Living Off the Land Binaries).


Microsoft Sysmon provides detailed process, network, and file activity logging that goes far beyond native Windows events.

Terminal window
# Download Sysmon
Invoke-WebRequest -Uri "https://live.sysinternals.com/Sysmon64.exe" -OutFile "$env:TEMP\Sysmon64.exe"
# Download KYRA's recommended Sysmon config
Invoke-WebRequest -Uri "https://install.kyra.ai/sysmon/config.xml" -OutFile "$env:TEMP\sysmonconfig.xml"
# Install Sysmon with config
& "$env:TEMP\Sysmon64.exe" -accepteula -i "$env:TEMP\sysmonconfig.xml"

The KYRA EDR agent automatically collects Sysmon events from the Microsoft-Windows-Sysmon/Operational channel.


Key Event IDs Monitored

Windows Security Events

Event IDCategoryDescriptionDetection Use
4624LogonSuccessful logonLateral movement, anomalous access
4625LogonFailed logonBrute force, password spraying
4648LogonExplicit credential logonPass-the-hash, credential theft
4672LogonSpecial privileges assignedPrivilege escalation
4688ProcessNew process createdMalware execution, LOLBins
4697SystemService installedPersistence, backdoor installation
4720AccountUser account createdUnauthorized account creation
4722AccountUser account enabledDormant account activation
4728AccountMember added to security groupPrivilege escalation
4732AccountMember added to local groupLocal admin escalation
4768KerberosKerberos TGT requestedPass-the-ticket, Golden ticket
4769KerberosKerberos service ticket requestedKerberoasting
4776CredentialCredential validationNTLM authentication monitoring
5156FirewallWindows Firewall allowed connectionNetwork activity baseline
7045SystemNew service installedPersistence mechanism

Sysmon Events

Event IDDescriptionDetection Use
1Process creation (with hash)Malware detection, LOLBin abuse
3Network connectionC2 communication, data exfil
7Image loaded (DLL)DLL injection, side-loading
8CreateRemoteThreadProcess injection
10Process accessCredential dumping (LSASS)
11File createdDropper detection, staging
13Registry value setPersistence, config changes
22DNS queryC2 domain lookup, DNS tunneling

Step 4: Verify Events Are Flowing

On the Windows Endpoint

Terminal window
# Check the KYRA EDR agent is running
Get-Service "KYRA EDR Agent"
# View recent agent logs
Get-Content "C:\ProgramData\KYRA\EDR\logs\agent.log" -Tail 20
# Verify event subscription is active
wevtutil qe "KYRA-EDR/Operational" /c:5 /rd:true /f:text

In the KYRA Console

  1. Go to Log Search
  2. Filter by source_type:windows or search for your hostname
  3. You should see Windows Security events (4624, 4625, etc.)
  4. If Sysmon is installed, search for source_type:sysmon

Generate Test Events

Terminal window
# Generate a failed logon event (Event ID 4625)
net use \\localhost\IPC$ /user:TESTUSER wrongpassword 2>$null
# Generate a process creation event (Event ID 4688/Sysmon 1)
cmd.exe /c whoami
# Generate an account management event (Event ID 4720)
# WARNING: This creates an actual user — only use on test systems
net user KYRATest P@ssw0rd123 /add
net user KYRATest /delete

Detection Rules

KYRA MDR includes built-in detection rules for Windows events:

DetectionEvent IDsMITRE ATT&CKDescription
Brute Force4625T1110Multiple failed logons in short period
Pass-the-Hash4624 (Type 3)T1550.002NTLM logon with unusual source
Kerberoasting4769T1558.003RC4 encryption service ticket requests
LSASS AccessSysmon 10T1003.001Process accessing LSASS memory
Suspicious Process4688/Sysmon 1T1059Known attack tools (mimikatz, psexec, etc.)
New Service7045T1543.003Service installed from unusual path
Admin Group Change4728/4732T1098User added to privileged group
Scheduled Task4698T1053.005New scheduled task created

Troubleshooting

No Events in Console

  1. Agent running? Check Get-Service "KYRA EDR Agent"
  2. Audit policies enabled? Run auditpol /get /category:* to verify
  3. Firewall? Ensure the agent can reach the collector or ingest.seekerslab.com:443
  4. Event log permissions? The agent runs as LOCAL SYSTEM and should have access

Missing Process Events

  • Verify Process Creation auditing is enabled: auditpol /get /subcategory:"Process Creation"
  • Enable command-line logging via the registry key shown in Step 2
  • Install Sysmon for richer process telemetry

High CPU or Memory Usage

The KYRA EDR agent typically uses less than 1% CPU and 50 MB RAM. If usage is high:

  1. Check the log file at C:\ProgramData\KYRA\EDR\logs\agent.log for errors
  2. Verify the Sysmon config is not overly broad (e.g., logging all network connections)
  3. Restart the agent: Restart-Service "KYRA EDR Agent"