Skip to main content
Skip table of contents

V 2.0 : Cylance Optics : WMI Threat Detected

Vendor Documentation

Classification

Rule Name

Rule Type

Common Event

Classification
V 2.0 : Cylance Optics : WMI Threat DetectedBase RuleGeneral Threat MessageActivity

Mapping with LogRhythm Schema

Device Key in Log MessageLogRhythm SchemaData TypeSchema Description
Description<policy>Text/StringThe name of the Detection Rule that was triggered.
Device ID<serialnumber>Text/String
The unique ID for the device.
Device Name<dname>Text/String
The name of the device on which the Detection Event occurred.
Event IDN/AN/AThe unique ID for the Detection Event.
Event NameN/AN/AThe Detection Event involved a Target File.
Event Type<vmid>Text/String
The Detection Event involved a Target File.
Instigating Process Image File Sha256<hash>Text/String
The SHA256 hash of the process that instigated the action.
Instigating Process Name<process>Text/String
The name of the process that instigated the action.
Instigating Process Owner<domainorigin>, <login>Text/String
The user who owns the process that instigated the action.
Severity<severity>Text/String
The severity of the event.
High: A malicious event that requires immediate attention.
Medium: A suspicious event that should be reviewed.
Low: An important event, but may not be malicious.
Info: An observed event.
Operation<action>Text/String
The WMI operation that was executed. Commonly a binding creation, a filter creation, or a consumer creation.
Operation Length<size>NumberThe length of the observed Operation field.
Consumer Text<command>Text/StringThe text (commonly the command to be executed) associated with a WMI event.
Consumer Text LengthN/AN/AThe length of the observed Consumer Text field.
Zone NamesN/AN/AThe zones to which the device belongs.
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.