Advanced Reporting Tool — Data Fields

Applies To: WatchGuard Advanced Reporting Tool

WatchGuard EPDR and WatchGuard EDR send data to the Advanced Visualization Tool, which organizes it into data tables that are easy to read. Each line of a data table is an event monitored by WatchGuard EPDR or WatchGuard EDR.

alert

This data table includes information on incidents shown in the Activity tile on the WatchGuard EPDR or WatchGuard EDR dashboard.

Name Explanation Values

eventdate

Date when the event was received on the Advanced Reporting Tool server.

Date

machineIP

IP address of the customer computer that triggered the alert.

IP address

date

Date on the user computer when the event was generated.

Date

alertType

Category of the threat that triggered the alert.

Malware

PUP

machineName

Name of the computer.

String

executionStatus

Indicates whether the threat was run.

Executed

Not Executed

dwellTimeSecs

Time in seconds from the first time the threat was seen on the network.

Seconds

itemHash

Hash of the detected threat.

String

itemName

Name of the detected threat.

String

itenPath

Full path of the file that contains the threat.

String

sourceIP

If the malware came from outside the network, this indicates the IP of the remote computer.

IP address

sourceMachineName

If the malware came from outside the network, this indicates the name of the remote computer.

String

sourceUserName

If the malware came from outside the network, this indicates the user of the remote computer.

String

urlList

List of accessed URLs if a browser exploit is detected.

String

docList

List of accessed documents if a file exploit is detected.

String

version

Content of the Version attribute of the process metadata.

String

vulnerable

Indicates if the application is considered vulnerable.

Boolean

install

This data table logs all the information generated during the installation of the endpoint agents on computers.

Field Description Values

eventDate

Date when the event was received on the Advanced Reporting Tool server.

Date

serverdate

Date on the user computer when the event was generated.

Date

machine

Name of the computer.

String

machineIP

IP address of the computer.

IP address

machineIP1

IP address of an additional network card if installed.

IP address

machineIP2

IP address of an additional network card if installed.

IP address

op

Operation performed.

Install

Uninstall

Upgrade

osVersion

Operating system version.

String

osServicePack

Service Pack version.

String

osPlatform

Platform of the operating system installed:

  • Darwin_x86_64: macOS (64-bit)
  • Win64NT: Windows (64-bit)
  • Win32NT: Windows (32-bit)
  • Linux_i686: Linux (32-bit)
  • Linux_x86_64: Linux (32-bit)
  • Win64ARM: Windows for ARM processors

Enumeration

monitoredopen

This data table logs the data files accessed by the applications that run on the computer, and the processes that accessed user data.

Field Description Values

eventdate

Date when the event was received on the Advanced Reporting Tool server.

Date

serverdate

Date on the server when the event was generated.

Date

date

Date on the user computer when the event was generated.

Date

machine

Name of the customer computer.

String

machineIP

IP address of the customer computer.

IP address

user

Process user name.

String

muid

Internal ID of the customer computer.

String in this format: xxxxxxxx-xxxx-xxxx- xxxxxxxxxxxxxxx

parentHash

Digest or hash of the file that accessed data.

String

parentPath

Path of the process that accessed data.

String

parentValidSig

Digitally signed process that accessed data.

Boolean

parentCompany

Content of the Company attribute of the metadata of the file that accessed data.

String

parentCat

Category of the file that accessed data.

Goodware

Malware

PUP

Unknown

Monitoring

parentMWName

Malware name if the file that accessed data is classified as a threat.

String

Null if the item is not malware

childPath

Name of the data file accessed by the process. By default, only the file extension is indicated to preserve the privacy of the customer data.

String

loggedUser

User logged in to the computer at the time of file access.

String

firstParentCat

Initial classification of the parent file that performed the logged operation.

Goodware

Malware

PUP

Unknown

Monitoring

Null

monitoredregistry

This data table logs every attempt to modify the registry as well as when software accesses the registry permissions, passwords, certificate stores, and similar information.

Name Explanation Values

eventdate

Date when the event was received on the Advanced Reporting Tool server.

Date

date

Date of the user computer when the event was generated.

Date

machine

Name of the computer.

String

machineIP

IP address of the computer.

IP address

user

User name of the process that accessed or modified the registry.

String

muid

Internal ID of the customer computer.

String in the following format xxxxxxxx-xxxx-xxxx- xxxx-xxxxxxxxxxxx

parentHash

Digest or hash of the process that accessed or modified the registry.

String

parentPath

Path of the executable that accessed or modified the registry.

String

parentValidSig

Digitally-signed process that accessed the registry.

Boolean

parentCompany

Content of the Company attribute of the metadata of the process that accessed the registry.

String

parentCat

Process category.

Goodware

Malware

PUP

Unknown

Monitoring

parentMwName

Malware name if the process is classified as a threat.

String

Null if the item is not malware

regAction

Operation performed on the computer registry.

CreateKey

CreateValue

ModifyValue

key

Affected registry branch or key.

String

value

Name of the affected value under the registry key.

String

valueData

Value content.

String

loggedUser

User logged in to the computer at the time of registry access.

String

firstParentCat

Initial classification of the parent file that performed the logged operation.

Goodware

Malware

PUP

Unknown

Monitoring

Null

notblocked

This data table logs the items that WatchGuard EPDR or WatchGuard EDR did not scan because of exceptional situations, such as service timeout on startup or configuration changes.

Name Description Values

evendate

Date when the event was received on the Advanced Reporting Tool server.

Date

date

Date of the user computer when the event was generated.

Date

machine

Name of the computer.

String

machineIP

IP address of the computer.

IP address

user

Process user name.

String

muid

Internal ID of the computer.

String in the following format xxxxxxxx-xxxx-xxxx-xxxx- xxxxxxxxxxxx

parentHash

Digest or hash of the parent file.

String

parentPath

Parent process path.

String

parentValidSig

Digitally signed parent process.

Boolean

parentCompany

Content of the Company attribute of the parent process metadata.

String

parentCat

Parent file category.

Goodware

Malware

PUP

Unknown

Monitoring

ParentmwName

Malware name if the parent file is classified as a threat.

String

Null if the item is not malware

childHash

Child file digest or hash.

String

childPath

Child process path.

String

childValidSig

Digitally-signed child process.

Boolean

childCompany

Content of the company attribute of the child process metadata.

String

childCat

Child process category.

Goodware

Malware

PUP

Unknown

Monitoring

childMWName

Malware name if the child file is classified as a threat.

String

Null if the item is not malware

firstParentCat

Initial classification of the parent file that performed the logged operation.

Goodware

Malware

PUP

Unknown

Monitoring

Null

firstChildCat

Initial classification of the child file that performed the logged operation.

Goodware

Malware

PUP

Unknown

Monitoring

Null

ops

This data table logs all operations performed by processes seen on the network.

Field Description Values

eventdate

 

Date when the event was received on the Advanced Reporting Tool server.

 

Date

 

serverdate

Date on the user computer when the event was generated.

Date

machine

Name of the computer.

String

machineIP

IP address of the computer.

IP address

user

Process user name.

String

op

Operation performed.

CreateDir

Exec

CreatePE

DeletePE

LoadLib

OpenCmp

RenamePE

CreateCmp

muid

Unique ID of the computer.

String in this format: xxxxxxxxxxxx-xxxx-xxxx- xxxxxxxxxxxx

parentHash

Parent file digest or hash.

String

parentDriveType

Type of drive where the parent process resides.

Fixed

Remote

Removable

parentPath

Parent process path.

String

parentValidSig

Digitally-signed parent process.

Boolean

parentCompany

Content of the Company attribute of the parent file metadata.

String

parentCat

Parent file category.

Goodware

Malware

PUP

Unknown

Monitoring

parentMWName

Name of the malware found in the parent file.

String

Null if the item is not malware

childHash

Child file digest or hash.

String

childDriveType

Type of drive where the child process resides.

Fixed

Remote

Removable

childPath

Child process path.

String

childValidSig

Digitally-signed child process.

Boolean

childCompany

Content of the Company attribute of the child file metadata.

String

childCat

Child file category.

Goodware

Malware

PUP

Unknown

Monitoring

childMWName

Name of the malware found in the child file.

String

Null if the item is not malware

Ocs_Exec

Indicates whether software considered as vulnerable was run.

Boolean

Ocs_Name

Name of the software considered vulnerable.

String

OcsVer

Version of the software considered vulnerable.

String

action

Action performed.

Allow

Block

BlockTimeout

serviceLevel

Agent mode:

  • Learning: The agent allows the execution of unknown processes.
  • Hardening: The agent prevents the execution of processes classified as threats.
  • Block: The agent prevents the execution of processes classified as threats and unknown processes.

Enumeration

params

Command line execution parameters of the process run.

Character string

firstParenCat

Initial classification of the parent file that performed the logged operation.

Goodware

Malware

PUP

Unknown

Monitoring

Null

processnetbytes

This data table logs the data usage of processes seen on the network. ART generates a log for each process approximately every four hours with the amount of data transferred since the last log was sent.

Field Description Values

eventdate

Date when the event was received on the Advanced Reporting Tool server.

Date

serverdate

Date of the user computer when the event was generated.

Date

machineName

Name of the computer.

String

machineIP

IP address of the computer.

IP address

version

Version of the WatchGuard Endpoint Agent.

String

user

Process user name.

String

muid

Internal ID of the computer.

String in this format: xxxxxxxx-xxxx- xxxx-xxxx-xxxxxxxxxxxx

hash

Digest or hash of the process.

String

path

Program name and path.

String

bytesSent

Number of bytes sent by the process since the last event was generated.

Numeric

bytesReceived

 

Number of bytes received by the process since the last event was generated.

Numeric

registry

This data table logs all operations performed on the registry branches used by malicious programs to become persistent and survive computer restarts.

Field Description Values

eventdate

Date when the event was received on the Advanced Reporting Tool server.

Date

serverdate

Date on the user computer when the event was generated.

Date

machine

Name of the computer.

String

machineIP

IP address of the computer.

IP address

user

User name of the process that modified the registry.

String

op

Operation performed on the computer registry.

ModifyExeKey

CreateExeKey

hash

Digest/hash of the process that modified the registry.

String

muid

Unique ID of the computer.

String in the following format xxxxxxxx-xxxx-xxxx-xxxx- xxxxxxxxxxxx

targetPath

Path of the executable that the registry key points to.

Type of drive where the process that accessed the registry resides

regKey

Registry key.

String

driveType

Type of drive where the process that accessed the registry resides.

String

path

Path of the process that modified the registry.

String

validSig

Registry key.

Boolean

company

Registry key.

String

Cat

 

Process category.

Goodware

Malware

PUP

Unknown

Monitoring

mwName

Malware name if the process is classified as a threat

String

Null if the item is not malware.

firstCat

Category of the process the first time it was classified

Goodware

Malware

PUP

Unknown

Monitoring

socket

This data table logs all network connections established by the processes seen on the network.

Field Description Values

eventdate

Date when the event was received on the Advanced Reporting Tool server.

Date

serverdate

Date on the user computer when the event was generated.

Date

machine

Name of the computer.

String

machineIP

IP address of the computer.

IP address

user

Process user name.

String

hash

Digest or hash of the process that established the connection.

String

driveType

Type of drive where the process that established the connection resides.

Fixed

Remote

Removable

path

Path of the process that established the connection.

String

protocol

Communications protocol used by the process.

TCP

UDP

ICMP

ICMPv6

IGMP

RF

remotePort

Destination port the process communicates with.

0-65535

direction

Communication direction.

Upload

Download

Bidirectional

Unknown

remoteIP

Destination IP address.

IP address

localPort

Source IP address.

0-65535

localIP

IPv6 destination address.

IP address

validSig

Digitally-signed file that established the connection.

Boolean

company

Content of the Company attribute of the metadata of the file that established the connection.

String

category

Current category of the process that established the connection.

Goodware

Malware

PUP

Unknown

Monitoring

mwName

Malware name if the process that established the connection is classified as a threat.

String

Null if the item is not malware

firstCategory

Category of the process the first time it was classified.

Goodware

Malware

PUP

Unknown

Monitoring

times

Number of times the same communication event has occurred in the last hour. For two communication events to be considered the same, these parameters plus the communication direction must be the same:

  • Process name
  • Local IP address of the process
  • Process path
  • Target IP address of the communication
  • Target port of the communication

The first time a communication is detected, an event is sent with the times field set to 1. Later, for each hour that passes after the first event, the times field indicates the number of equal communication events that have occurred in that time span minus 1, along with the date of the last event logged.

Numeric

toastblocked

This data table contains a record for each process blocked because WatchGuard EPDR or WatchGuard EDR has not yet returned the relevant classification.

Field Description Values

eventdate

Date when the event was received on the Advanced Reporting Tool server.

Date

serverdate

Date on the user computer when the event was generated.

Date

machineName

Name of the computer.

String

machineIP

IP address of the computer.

IP address

user

User name of the process blocked.

String

muid

Unique ID of the computer.

String in this format: xxxxxxxx-xxxx-xxxx- xxxx-xxxxxxxxxxxx

hash

Digest or hash of the process blocked.

String

path

Path of the process blocked.

String

toastBlockReason

0 OK: The user accepts the message.

1 Timeout: The pop-up message disappears due to non-action by the user.

2 Angry: The user rejects the block action.

3 Block

4 Allow

5 BadCall

Enumerator

toastResult

Result of the pop-up message:

  • 0 OK: The user accepts the message.
  • 1 Timeout: The pop-up message disappears due to non-action by the user.
  • 2 Angry: The user rejects the block action.
  • 3 Block
  • 4 Allow
  • 5 BadCall

Enumerator

URLdownload

This data table contains information on HTTP downloads performed by processes seen on the network (such as URLs, downloaded file data, computers that downloaded data).

Field Description Values

eventdate

Date when the event was received on the Advanced Reporting Tool server.

Date

serverdate

Date on the user computer when the event was generated.

Date

Machine

Name of the computer.

String

machineIP

IP address of the computer.

IP address

User

Process user name.

String

muid

Internal ID of the customer computer.

String in this format: xxxxxxxx-xxxx-xxxx- xxxx-xxxxxxxxxxxx

url

Download URL.

URL stem

parentHash

Digest or hash of the process that downloaded the file.

String

parentDriveType

Type of drive where the process that downloaded the file resides.

Fixed

Remote

Removable

parentPath

Path of the process that downloaded the file.

String

parentValidSig

Digitally-signed process that downloaded the file.

Boolean

parentCompany

Content of the Company attribute of the metadata of the process that downloaded the file.

String

parentCat

Category of the process that downloaded the file.

Goodware

Malware

PUP

Unknown

Monitoring

parentMwname

Malware name if the process that downloaded the file is classified as a threat.

String

Null if the item is not malware

childHash

Digest or hash of the downloaded file.

String

childDriveType

Type of drive where the process that downloaded the file resides.

Fixed

Remote

Removable

childPath

Path of the downloaded file.

String

childValidSig

Digitally-signed downloaded file.

Boolean

childCompany

Content of the company attribute of the downloaded file metadata.

String

childCat

Category of the downloaded file.

Goodware

Malware

PUP

Unknown

Monitoring

childMwname

Malware name if the downloaded file is classified as a threat.

String

Null if the item is not malware

firstParentCat

Initial classification of the parent file that performed the logged operation.

Goodware

Malware

PUP

Unknown

Monitoring

Null

firstChildCat

Initial classification of the child file that performed the logged operation.

Goodware

Malware

PUP

Unknown

Monitoring

Null

vulnerableappsfound

This data table logs every vulnerable application found on each computer on the network.

Field Description Values

eventdate

Date when the event was received on the Advanced Reporting Tool server.

Date

serverdate

Date on the user computer when the event was generated.

Date

muid

Internal ID of the computer.

String in this format: xxxxxxxx-xxxx-xxxx- xxxx-xxxxxxxxxxxx

machineName

Name of the computer.

String

machineIP

IP address of the computer.

IP address

criticalSoftEventType

Indicates the existence of vulnerable software.

Present

itemHash

Digest of the vulnerable program found on the computer.

String

fileName

Name of the vulnerable file.

String

filePath

Full path of the vulnerable file.

String

internalName

Content of the Name attribute of the vulnerable file metadata.

String

companyName

Content of the Company attribute of the vulnerable file metadata.

String

fileVersion

Content of the Version attribute of the vulnerable file metadata.

String

productVersion

Content of the ProductVersion attribute of the vulnerable file metadata.

String

Related Topics

About Data Tables