With the addition of the brand-new “FileExecutableDetected” option, Microsoft has made Sysmon 15 a protected process and made it available for download. This option logs the creation of executable files.

For those not acquainted with Sysmon (or Framework Screen), it is a free Microsoft Sysinternals device that can screen and hinder malignant/dubious action and log occasions to the Windows Occasion Log.
Of course, Sysmon screens fundamental occasions like new cycle creation and the end of cycles. However, advanced configuration files can be created to monitor a variety of behaviors, including file deletions, changes to the Windows clipboard, and detecting and preventing file shredding.
Clients can find the total rundown of mandates in the Sysmon composition, which can be seen by running the sysmon – s order at the order line.
Recently, Microsoft delivered Sysmon 15.0, which incorporates two new highlights – the solidifying of the program by transforming it into a safeguarded interaction and the capacity to recognize when executable records are made on the checked framework.
Sysmon is now a protected process
As Sysmon is normally used to distinguish malevolent way of behaving, it is in danger entertainers’ wellbeing to mess with or cripple the product.
With this delivery, Microsoft changed over the Sysmon.exe executable into a safeguarded cycle to keep noxious code from being infused into the interaction.
According to a Microsoft article about the feature, “a new concept of protected service has been introduced in Windows 8.1 to allow anti-malware user-mode services to be launched as a protected service.”
“After the help is sent off as safeguarded, Windows utilizes code trustworthiness to just permit confided in code to stack into the safeguarded administration. Windows additionally safeguards these cycles from code infusion and different assaults from administrator processes.”
After Sysmon is sent off, you can see it is a safeguarded interaction by utilizing Cycle Pioneer and looking at its Security properties, as displayed beneath.

Based on Process Explorer, Sysmon is running as a PPL process (PROTECTED_ANTIMALWARE_LIGHT), which is further described in this article by Elastic.
Learn more about Sysmon
Sysmon is an advanced network monitoring tool with a ton of directives that allow you to create configuration files that meet your organization’s needs.
Due to the program’s complexity, it is strongly advised that you read the Sysmon documentation and play around with configuration options to see how the various directives work.
Sadly, Sysmon is definitely not a legitimate program, expecting clients to lead experimentation to test highlights and see what occasions are kept in touch with the occasion log.
Fortunately Sysmon won’t stack a misconfigured setup document, so in the event that you see a “Design record approved” message while stacking Sysmon, you know that you’re in some measure in good shape.
You should also read Olaf Hartong’s blog posts about Sysmon, as he documents the new features as they are released.
Finally, admins can use or read through the premade Sysmon configuration files from Florian Roth and SwiftOnSecurity to see how directives can be used to block malware.