-
Notifications
You must be signed in to change notification settings - Fork 422
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Windows logon sessions and tokens #810
Comments
That's actually a property of the process, not the token. Protection is a 2-tuple:
Some reading if you're curious to know more: https://www.crowdstrike.com/blog/evolution-protected-processes-part-2-exploitjailbreak-mitigations-unkillable-processes-and/ |
Ah. Yeah, I was just blindly copying values from the existing Endgame schema. Good context! |
Yes Logon ID from a security event is the same as a authentication_id in process events. Where do you see
I would like to be able to say that every process has a token. It's an interesting case for security events that involve tokens but not processes. I don't have a quick answer as to the best way forward.
I think that would be |
@rw-access Is this still relevant? |
for process execution data, token_sid which is supposed to have value of process.Ext.token.sid will be useful for a subcategory of rules and also for tuning and hunting. |
Relates to #647 to map Endpoint fields
Relates to #809 because our approach for multiple tokens should mirror our approach for multiple users
Bringing in @gabriellandau and @wburgess1 to correct all the places that I'm wrong about tokens and sessions in Windows.
I think there are some fields we have within Endpoint that should be added to ECS.
There are probably more fields. But the other question is what should this field set be and where should it go? We could do something like this:
One downside for that approach is deciding what happens when you have information about an event, like a 4624 logon, but there aren't any processes yet.
Could it also make sense to have token be top level?
Another problem is the issue for multiple tokens. If you have a process that accessed another process's primary token, how do you represent both of those? You have potentially the primary token of the source process, the impersonation token of the source process, and the token that was accessed for another process. We'd also have to figure out how to represent multiple processes in a single event, like #809.
The text was updated successfully, but these errors were encountered: