This documentation does not apply to the most recent version of uberAgent. Click here for the latest version.
Activity Monitoring Metrics
Process Tagging
uberAgent processes a rule set and applies tags accordingly.
Details
- Source type:
uberAgentESA:ActivityMonitoring:ProcessTagging
- Used in dashboards: Activity Monitoring Events
- Enabled through configuration setting:
ActivityMonitoring
- Related configuration settings:
[ActivityMonitoringRule]
List of Fields in the Raw Agent Data
Field | Description | Data type | Unit | Example |
---|---|---|---|---|
EventType | Event type. Can be 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 or 22 . See also EventTypeName . |
Number | 4 | |
ProcName | Process name | String | svchost.exe | |
ProcParentName | Parent process name | String | services.exe | |
ProcUser | Process user | String | domain\JohnDoe | |
ProcLifetimeMs | Process lifetime | Number | ms | 500 |
ProcId | Process ID | Number | 12345 | |
ProcParentId | Parent process ID | Number | 67890 | |
ProcGUID | Process GUID | String | 4b3e3686-7854-4d98-0023-1e0e617bf2e4 | |
ProcParentGUID | Parent process GUID | String | d72ceb7e-7851-02ec-005d-139741c4afd6 | |
ProcPath | Process path | String | C:\WINDOWS\System32\svchost.exe | |
ProcCmdline | Process commandline | String | C:\WINDOWS\System32\svchost.exe -k LocalSystemNetworkRestricted | |
ProcTag1 | Rule tag: the tag assigned to events originating from the matching rule. | String | net-connect-suspicious-sources | |
ProcRiskScore1 | Rule risk score: the risk score assigned to events originating from the matching rule. | Number | 75 | |
IsElevated | Indicates if the process was started elevated (admin rights) | String | 1 | |
SessionId | Session ID | Number | 2 | |
SessionGUID | Session GUID | String | 00000000-b242-d759-7a63-d686b0ffd501 | |
AppId | Application ID | String | Svc:WdiSystemHost | |
AppVersion | Application version | String | 1.0 | |
IsProtected | Indicates if the process was started protected | String | 1 | |
EventCount | The number of identical events that occured during the interval period | Number | 42 |
Additionally, one can enhance the information sent to the back-end by defining a number of generic properties that will be sent along with the fields above. Any field listed under Common Event Properties, Network Event Properties, Image Load Event Properties, or Registry Event Properties can be used as a generic property.
List of Calculated Fields
Field | Description | Data type | Unit | Example | Where available |
---|---|---|---|---|---|
EventTypeName | Names for event types based on the lookup lookup_process_tagging_eventtype . Can be Process.Start , Process.Stop , Image.Load , Net.Connect , Net.Receive , Net.Reconnect , Net.Retransmit , Net.Send , Reg.Key.Create , Reg.Value.Write , Reg.Delete , Reg.Key.Delete , Reg.Value.Delete , Reg.Key.SecurityChange , Reg.Key.Rename ,Reg.Key.SetInformation , Reg.Key.Load , Reg.Key.Unload , Reg.Key.Restore , Reg.Key.Save , Reg.Key.Replace or Reg.Any . |
String | Process.Start | Splunk data model, Splunk SPL | |
ProcUser | coalesce (ProcUserExpanded, ProcUser) |
String | Domain\JohnDoe | Splunk data model | |
User | ProcUser |
String | Domain\JohnDoe | Splunk data model | |
TimestampMs | _time * 1000 |
Number | ms | 1585913547467 | Splunk data model |