I have read mixed reviews, our team within our DoD sector suggest that ingestion the logs directly into the SIEM platform would be best and I feel that having a third party tool with signatures, look at the event and determine if was malicious and then forward on an alert to the ESM for investigation.
The next issue we have is getting these events and sub-events parsed.
I have noticed that McAfee ePolicy Orchestrator sometimes alerts on powershell events but we can't seem to write a custom parser override or find the field that contains the full powershell command issues, only partial information on the command.
Any help would be much appreciated!