Skip to main content
Skip table of contents

V 2.0 : Process Creation/Termination Events

Vendor Documentation

Classification

Rule NameRule TypeCommon EventClassification
V 2.0 : Process Creation/Termination EventsBase RuleProcess/Service Startup Or Shutdown ActivityStartup and Shutdown
V 2.0 : EVID 4688 : New Process CreatedSub RuleProcess/Service StartedStartup and Shutdown
V 2.0 : EVID 4689 : Process TerminatedSub RuleProcess/Service StoppedStartup and Shutdown

Mapping with LogRhythm Schema  

Device Key in Log MessageLogRhythm SchemaData TypeSchema Description
ProviderN/AN/AIdentifies the provider that logged the event. The Name and GUID attributes are included if the provider used an instrumentation manifest to define its events. The EventSourceName attribute is included if a legacy event provider (using the Event Logging API) logged the event.
EventID<vmid>NumberThe identifier that the provider used to identify the event.
VersionN/A N/AThe version number of the event's definition.
Level<severity>String/Number/TextThe severity level defined in the event.
Task<vendorinfo>Text/StringThe task defined in the event. Task and Opcode are typically used to identify the location in the application from where the event was logged.
OpcodeN/A N/AThe opcode defined in the event. Task and Opcode are typically used to identify the location in the application from where the event was logged.
Keywords<result>Text/StringA bitmask of the keywords defined in the event. Keywords are used to classify types of events (for example, events associated with reading data).
TimeCreatedN/A N/AThe time stamp that identifies when the event was logged. The time stamp will include either the SystemTime attribute or the RawTime attribute.
EventRecordIDN/A N/AThe record number assigned to the event when it was logged.
CorrelationN/A N/AThe activity identifiers that consumers can use to group related events together.
ExecutionN/A N/AContains information about the process and thread that logged the event.
ChannelN/A N/AThe channel to which the event was logged.
Computer<dname>Text/StringThe name of the computer on which the event occurred.
SubjectUserSidN/A N/AThe SID of account that requested the create process operation.
SubjectUserName<login>Text/StringThe name of the account that requested the create process operation.
SubjectDomainName<domainorigin>Text/StringThe subject’s domain or computer name. Formats vary, and include the following:
  • Domain NETBIOS name example: CONTOSO
  • Lowercase full domain name: contoso.local
  • Uppercase full domain name: CONTOSO.LOCAL
  • For some well-known security principals, such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is NT AUTHORITY.
  • For local user accounts, this field will contain the name of the computer or device that this account belongs to.
SubjectLogonId<session>Text/StringA hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID.
NewProcessId<processid>Text/StringA hexadecimal Process ID of the new process.
NewProcessName

<object>

<process>

Text/StringThe full path and the name of the executable for the new process.
TokenElevationType<objecttype>Text/String

TokenElevationTypeDefault (1): Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account (for which UAC disabled by default), service account or local system account.

TokenElevationTypeFull (2): Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.

TokenElevationTypeLimited (3): Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.

ProcessId<parentprocessid>Text/String/NumberA hexadecimal Process ID of the process which ran the new process.
CommandLine<command>Text/StringContains the name of executable and arguments which were passed to it.
TargetUserSidN/A N/AThe SID of target account.
TargetUserName<account>Text/StringThe name of the target account.
TargetDomainName<domainimpacted>Text/StringThe target's domain or computer name. Formats vary, and include the following:
  • Domain NETBIOS name example: CONTOSO
  • Lowercase full domain name: contoso.local
  • Uppercase full domain name: CONTOSO.LOCAL
  • For some well-known security principals, such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is NT AUTHORITY.
  • For local user accounts, this field will contain the name of the computer or device that this account belongs to.
TargetLogonIdN/A N/AA hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID.
ParentProcessName

<parentprocesspath>

<parentprocessname>

Text/StringThe full path and the name of the executable for the process.
MandatoryLabelN/A N/AThe SID of integrity label which was assigned to the new process.


JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.