Having more data available before, during and after an attack is critical, having a good baseline is key. 'In this talk we will look at how to get this done, the various ways available to deploy Sysmon, and what we can do to ship those logs to your SIEM. 'Join this webcast to hear Scott Lynch discuss the different ways possible to get those ever important logs off your systems and into the SIEM, where analysis can be done and threat hunting can be taken to a whole new level!