About ICS Watch Dog

Mission

ICS Watch Dog lowers the barrier to Sysmon adoption in industrial and critical infrastructure environments. The project provides curated configurations, a modular detection library, and assessment tools that help Windows administrators deploy and mature endpoint monitoring -- from first install through advanced OT-specific detection.

What the Project Provides

How It Works

The project follows a progression model. Each step builds on the previous one:

  1. Deploy a curated config -- Choose by system role (workstation, server, OT, jump host). Each config is self-contained and deployable without editing. See Configuration Files.
  2. Assess your coverage -- Run the coverage tool to measure how well the config fits your system. Identify unmonitored processes, uncovered vendors, and unmatched ports. See Coverage Assessment.
  3. Extend with modules -- Merge vendor, protocol, or sector modules to close gaps. The merge tool combines a base config with selected modules into a deployable config. See Module Library.
  4. Validate detection -- Run the efficacy test to confirm Sysmon is generating expected events. See Efficacy Testing.
  5. Build and contribute -- Write custom modules for your environment and share them with the community. See Build Your Own Module and Community Contributions.

SANS ICS 5 Critical Controls

Every curated configuration maps to the SANS ICS 5 Critical Controls:

ControlHow ICS Watch Dog Supports It
#1 ICS Incident ResponseForensic evidence via process, file, registry, and network logs
#2 Defensible ArchitectureDetection of processes crossing network boundaries
#3 ICS Network VisibilityHost-side complement to network monitoring (process-to-connection correlation)
#4 Secure Remote AccessDetection of known remote access and RMM tools per CISA/NSA guidance
#5 Vulnerability ManagementSoftware execution, driver loading, and service change logging

For the full control-by-control mapping with specific Sysmon Event IDs, see the SANS ICS 5 Controls guide.

Project History

ICS Watch Dog was created to address a gap in the ICS/OT cybersecurity community: Sysmon is a powerful, free tool for Windows endpoint visibility, but its XML configuration format is a barrier for many OT teams. Existing Sysmon config projects (SwiftOnSecurity, sysmon-modular) target enterprise IT environments and do not address the specific needs of industrial control systems.

The project started with curated configurations and has grown to include a modular detection library, a coverage assessment toolchain, MITRE ATT&CK integration, LOLBAS detection, a provenance and validation framework, and a community contribution process.

This project is dual-licensed. The open-source license is Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) -- you may use, modify, and redistribute with attribution, provided derivative works are shared under the same or compatible license. Organizations that need to incorporate ICS Watch Dog content into proprietary products or services without the ShareAlike obligation may obtain a commercial license from Cutaway Security, LLC.

Sponsor

This project was developed and is supported by Cutaway Security, LLC. in collaboration with each contributor.

Contributors