What events are collected by Field Effect?

Introduction

The following article outlines what types of data is logged by Field Effect MDR for analysis. To see our policy requirements that will maximize Field Effect MDR's effectiveness, see Audit Policy Requirements for Field Effect MDR.


Data Collected by Field Effect

Endpoint Agents

Field Effect collects all the fundamental telemetry points from an endpoint, including, (but not limited to):

  • Process execution
  • User sessions
  • Installed software
  • module and driver loading
  • Network activity
  • Removable media activity
  • System event logs


These fundamental telemetry points apply to all operating systems supported by Field Effect MDR. With Windows specifically, Field Effect MDR can collect crash dumps. 


Log Collection: Windows Advanced Audit Policy

Field Effect MDR collects the following Advanced Audit Policy event logs: 


Event IDCategorySubcategoryDetails
4624Logon/LogoffLogonAn account was successfully logged on.
4625Logoff, Audit LogonAn account failed to log on.
4663Object AccessKernel ObjectAn attempt was made to access an object.
4672Privilege UseAudit Non-Sensitive Privilege UseSpecial privileges assigned to new logon
4720Account ManagementUser Account ManagementA user account was created.
4722A user account was enabled.
4725A user account was disabled.
4728Security Group ManagementA member was added to a security-enabled global group.
4729A member was removed from a security-enabled global group.
4732A member was added to a security-enabled local group.
4738Security Group ManagementA user account was changed.
4740User Account ManagementA user account was locked out.
4741Computer Account ManagementA computer account was created.
4743A computer account was deleted.
4768Account LogonKerberos Authentication ServiceA Kerberos authentication ticket (TGT) was requested.
4769Kerberos Service Ticket OperationsA Kerberos service ticket was requested.
4770A Kerberos service ticket was renewed.
4781Account ManagementUser Account ManagementThe name of an account was changed.


Additional Event Log Sources

The event IDs listed below are logged and applied in certain analytics but not enabled from Windows Advanced Audit Policy.


SourceEvent ID
List: WEL Source = System 5829
5828
5827
7031
1074
41
WEL Source = Application15
51
List: Source = Microsoft-Windows-Windows Defender/Operational1015
1116
1008
1007
1006
1117
1118
1119
1120
BList: Source = Microsoft-Windows-TerminalServices-LocalSessionManager/Operational21
25
List: Source = Microsoft-Windows-WLAN-AutoConfig/Operational11000


Network Sensor (traffic)

The network sensor is able to collect the following metrics for analysis: 

  • Connection Information
    • Source IP / Port
    • Destination IP / Port
    • Bytes In
    • Bytes Out
    • Total number of packets
  • DNS Resolutions
  • TLS Certificates
  • SMB Resource usage
  • FTP Traffic Summary
  • Traffic fingerprinting: DHCP, MDNS, NetBIOS information 


Cloud Integrations

The following data is collected from cloud service providers that are integrated with Field Effect MDR. To learn more about out cloud integrations, see our Help Center chapter on the topic


ProviderEvent TypeDescriptionProvider Resources
AWSAWS CloudTrail Management Events Provides information about the management operations performed on resources within an AWS account. These are also known as _control plane operations_Learn More
AWS GuardDut Findings  This must be enabled in AWS. Represents potentials security issues detected within the network. GuardDuty generates a finding whenever it detects unexpected and potentially malicious activity in an AWS environment.Learn More
Azure ADOffice 365 Management Activity APIUsed to retrieve information about user, admin, system, and policy actions and events from Office 365 and Azure AD activity logs.Learn More
Google Workspace

Reports API activity data


Reports list information for activities in a specific Google Workspace application or service. Activity reports include the date, time, user, and type of activity.Learn More
OktaSystem log dataRecords system events related to your organization. This provides an audit trail that can be used to understand platform activity and to diagnose problems.Learn More


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article