Skip to main content

vast limits GmbH and uberAgent are now part of Citrix, a business unit of Cloud Software Group. Learn more at

This documentation does not apply to the most recent version of uberAgent. Click here for the latest version.

Threat Detection Metrics

Process Tagging

uberAgent processes a rule set and applies tags accordingly.


  • Source type: uberAgentESA:ActivityMonitoring:ProcessTagging
  • Used in dashboards: Activity Monitoring Events
  • Enabled through configuration setting: ActivityMonitoring
  • Related configuration settings: [ActivityMonitoringRule]

List of Fields in the Raw Agent Data

Field Description Data type Unit Example
EventType Event type. Can be 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21 or 22. See also EventTypeName. Number 4
ProcName Process name String svchost.exe
ProcParentName Parent process name String services.exe
ProcUser Process user String domain\JohnDoe
ProcLifetimeMs Process lifetime Number ms 500
ProcId Process ID Number 12345
ProcParentId Parent process ID Number 67890
ProcGUID Process GUID String 4b3e3686-7854-4d98-0023-1e0e617bf2e4
ProcParentGUID Parent process GUID String d72ceb7e-7851-02ec-005d-139741c4afd6
ProcPath Process path String C:\WINDOWS\System32\svchost.exe
ProcCmdline Process commandline String C:\WINDOWS\System32\svchost.exe -k LocalSystemNetworkRestricted
ProcTag1 Rule tag: the tag assigned to events originating from the matching rule. String net-connect-suspicious-sources
ProcRiskScore1 Rule risk score: the risk score assigned to events originating from the matching rule. Number 75
IsElevated Indicates if the process was started elevated (admin rights) String 1
SessionId Session ID Number 2
SessionGUID Session GUID String 00000000-b242-d759-7a63-d686b0ffd501
AppId Application ID String Svc:WdiSystemHost
AppVersion Application version String 1.0
IsProtected Indicates if the process was started protected String 1
EventCount The number of identical events that occured during the interval period Number 42

Additionally, one can enhance the information sent to the back-end by defining a number of generic properties that will be sent along with the fields above. Any field listed under Common Event Properties, Network Event Properties, Image Load Event Properties, or Registry Event Properties can be used as a generic property.

List of Calculated Fields

Field Description Data type Unit Example Where available
EventTypeName Names for event types based on the lookup lookup_process_tagging_eventtype. Can be Process.Start, Process.Stop, Image.Load, Net.Connect, Net.Receive, Net.Reconnect, Net.Retransmit, Net.Send, Reg.Key.Create, Reg.Value.Write, Reg.Delete, Reg.Key.Delete, Reg.Value.Delete, Reg.Key.SecurityChange, Reg.Key.Rename,Reg.Key.SetInformation, Reg.Key.Load, Reg.Key.Unload, Reg.Key.Restore, Reg.Key.Save, Reg.Key.Replace or Reg.Any. String Process.Start Splunk data model, Splunk SPL
ProcUser coalesce (ProcUserExpanded, ProcUser) String Domain\JohnDoe Splunk data model
User ProcUser String Domain\JohnDoe Splunk data model
TimestampMs _time * 1000 Number ms 1585913547467 Splunk data model


Your email address will not be published. Required fields are marked *