The following table shows different types of details that display for each type of event.
Event Type |
Details |
---|---|
blocked |
The path and hash of a process that is blocked by a Carbon Black EDR process hash ban. When expanded, metadata for the process and its binary appear:
|
childproc |
|
crossproc |
Windows only (not supported on Windows XP/2003): Shows occurrences of processes that cross the security boundary of other processes:
|
emet |
(Windows only) The EMET mitigation type reported when this process was invoked and the filename used in the attempt to run the process. Additional details include number of endpoints and processes that have seen the event, the time of the EMET mitigation, the EMET ID of the event, and any warnings. Output from EMET might provide additional details. |
fileless scriptload | (Windows only) The fileless_scriptload event represents each occasion when the sensor detected AMSI-decoded script content that was executed by any process on the endpoint. This content consists only of fileless script content that was not stored in a file on the file system when that content was executed. When expanded, Fileless Script Load Metadata appears:
Note: The
Command line field can be expanded to view the full command if it is truncated.
|
filemod |
The number of endpoints that have seen this file modification and the number of processes in which the file modification occurred on those endpoints. |
fork |
(macOS and Linux only) Indicates that this is a fork process and shows the instance’s parent process, forked with a different Process ID (PID). When a process performs a fork() system call, all activity for that process continues to be associated with the parent. A new fork event type is displayed on the Process Analysis page of the parent, indicating that the parent process performed a fork. The PID of the forked process and the timestamp of when the fork occurred is recorded |
modload |
|
netconn |
The number of network connections that the execution of this process either attempted or established. |
posix_exec |
(macOS and Linux only) Indicates this is a posix_exec process and shows the instance’s process that is loaded and the new binary image. If a process performs an exec() system call, a new process document will not be created. This activity will be reported as a new posix_exec event type within the process, and the process metadata will be updated to reflect the new image and command line associated with the exec() system call. |
regmod |
Windows sensors only. The number of endpoints that have seen a modification of a registry key, and the number of processes in which the registry modification occurred on those endpoints. |