Monitor Executable Files Downloaded

Applies To: WatchGuard Advanced Reporting Tool

Executable files and compressed files that include executable files are the primary source of illegal software, games, and potentially unwanted programs. To reduce the risk of attack, we recommend that you monitor the executable and compressed files downloaded in your network.

The URLDownload table contains information on the HTTP downloads performed by processes on the network. With the Advanced Reporting Tool, you can create queries to filter data in the URLDownload table to see how many unique downloads of executable files or compressed files occurred.

For a complete list of the columns in the URLDownload table, see Fields Available in the URLDownload Table.

Your operator role determines what you can see and do in WatchGuard Cloud. Your role must have the Access Advanced Security Information permission to view or configure this feature. For more information, go to Manage WatchGuard Cloud Operators and Roles.

Fields Available in the URLDownload Table

This table lists the fields available in the URLDownload table. Each field can be used in a query to filter the data table.

Field Description Values

eventdate

Date when the Advanced Reporting Tool server received the event.

Date

serverdate

Date on the user computer when the event was generated.

Date

Machine

Name of the computer that downloaded the file.

String

machineIP

IP address of the customer computer.

IP address

User

User name of the person who ran the process that downloaded the file.

String

muid

Internal ID of the customer computer.

String in this format: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx

url

URL of the downloaded file.

URI stem (portion of a URL that appears after the host and port, but precedes the query string)

parentHash

Digest/hash of the process that downloaded the file.

String

parentDriveType

Type of drive where the process that downloaded the file resides.

  • Fixed
  • Remote
  • Removable

parentPath

Path of the process that downloaded the file.

String

parentValidSig

Indicates whether the process that downloaded the file was digitally signed.

Boolean

parentCompany

Content of the Company attribute of the metadata of the process that downloaded the file.

String

parentCat

Category of the process that downloaded the file.

  • Goodware
  • Malware
  • PUP
  • Unknown
  • Monitoring

parentMwname

Malware name if the process that downloaded the file is classified as a threat.

  • String
  • Null if the item is not malware

childHash

Digest/hash of the downloaded file.

String

childDriveType

Type of drive where the process that downloaded the file resides.

  • Fixed
  • Remote
  • Removable

childPath

Path of the downloaded file.

String

childValidSig

Indicates whether the process that downloaded the file was digitally signed.

Boolean

childCompany

Content of the Company attribute of the downloaded file metadata.

String

childCat

Category of the downloaded file.

  • Goodware
  • Malware
  • PUP
  • Unknown
  • Monitoring

childMwname

Malware name if the downloaded file is classified as a threat.

  • String
  • Null if the item is not malware

firstParentCat

Initial classification of the parent file that performed the logged operation.

  • Goodware
  • Malware
  • PUP
  • Unknown
  • Monitoring
  • Null

firstChildCat

Initial classification of the child file that was downloaded for the logged operation.

  • Goodware
  • Malware
  • PUP
  • Unknown
  • Monitoring
  • Null

Related Topics

Data Search in the Advanced Visualization Tool

Sample SQL Query Text