Skip to content

Code42

Code42

About

File events represent the creation, modification, deletion, and movement of files in your organization's working environment (both on endpoints and in supported cloud providers).

When file activity occurs on an endpoint or in the cloud, Incydr records metadata about the event and retains it for 90 days. At any time in that 90-day window you can search for the file activity based on the metadata collected, such as (but not limited to):

  • the file name
  • who acted on the file
  • whether the file was shared in a cloud service or email
  • the device the file was stored on

Product Details

Vendor URL: Code42

Product Type: SaaS

Product Tier: Tier III

Integration Method: Custom

Integration URL: Code42 - Cyderes Documentation

Log Guide: Sample Logs by Log Type

Parser Details

Log Format: JSON

Expected Normalization Rate: near 100%

Data Label: CODE42

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
actor security_result.about.user.userid
deviceUid principal.asset_id
deviceUserName principal.user.userid
domainName principal.administrative_domain
eventId metadata.product_log_id
eventType metadata.product_event_type
fieldErrors.error security_result.about.investigation.comments
fieldErrors.field security_result.about.investigation.comments
fileName target.file.full_path
fileOwner target.user.attribute.permissions.name
filePath target.file.full_path
fileSize target.file.size
md5Checksum target.file.md5
mimeTypeByBytes target.file.mime_type
osHostName principal.hostname
privateIpAddresses principal.nat_ip
processName target.process.file.full_path
riskIndicators.nam security_result.category_details
riskScore security_result.about.investigation.severity_score
riskSeverity security_result.severity_details
sha256Checksum target.file.sha256
tabUrl target.url
windowTitle.0 target.resource.name

Product Event Types

Event UDM Event Classification
CREATED FILE_CREATION
DELETED FILE_DELETION
MODIFIED FILE_MODIFICATION
READ FILE_READ

Log Sample

{"actor":null,"cloudDriveId":null,"createTimestamp":"2021-09-24T14:37:06.011Z","destinationCategory":null,"destinationName":null,"detectionSourceAlias":null,"deviceUid":"uid","deviceUserName":"john.doe","directoryId":[],"domainName":"domain","emailDlpPolicyNames":null,"emailFrom":null,"emailRecipients":null,"emailSender":null,"emailSubject":null,"eventId":"event","eventTimestamp":"2021-09-29T17:01:32.865Z","eventType":"MODIFIED","exposure":[],"fieldErrors":[],"fileCategory":"Uncategorized","fileCategoryByBytes":"Uncategorized","fileCategoryByExtension":"Uncategorized","fileClassifications":[],"fileId":null,"fileName":"clip_colorschememapping.xml","fileOwner":"SYSTEM","filePath":"C:/Temp/msohtmlclip1/01/","fileSize":314,"fileType":"FILE","insertionTimestamp":"2021-09-29T17:03:13.916437Z","md5Checksum":"md5","mimeTypeByBytes":"application/xml","mimeTypeByExtension":"application/xml","mimeTypeMismatch":false,"modifyTimestamp":"2021-09-29T17:01:31.973Z","operatingSystemUser":"","osHostName":"hostname1","outsideActiveHours":false,"printJobName":null,"printedFilesBackupPath":null,"printerName":null,"privateIpAddresses":["10.2.230.16","fe80:0:0:0:ecc7:e0df:71c4:55b7%eth5","0:0:0:0:0:0:0:1","127.0.0.1"],"processName":null,"processOwner":null,"publicIpAddress":"10.5.5.5","remoteActivity":"UNKNOWN","removableMediaBusType":null,"removableMediaCapacity":null,"removableMediaMediaName":null,"removableMediaName":null,"removableMediaPartitionId":[],"removableMediaSerialNumber":null,"removableMediaVendor":null,"removableMediaVolumeName":[],"riskIndicators":[],"riskScore":0,"riskSeverity":"NO_RISK_INDICATED","sha256Checksum":"sha256","shared":null,"sharedWith":[],"sharingTypeAdded":[],"source":"Endpoint","sourceCategory":null,"sourceName":null,"sourceTabs":[],"syncDestination":null,"syncDestinationUsername":[],"tabUrl":null,"tabs":[],"trustReason":null,"trusted":false,"url":null,"userUid":"uid","windowTitle":[]}

Sample Parsing

metadata.product_log_id = "event"
metadata.event_timestamp = "2021-09-29T17:04:48.533979Z"
metadata.event_type = "GENERIC_EVENT"
metadata.vendor_name = "Code42"
metadata.product_name = "CrashPlan"
metadata.product_event_type = "MODIFIED"
metadata.ingested_timestamp = "2021-09-29T17:04:48.533979Z"
principal.hostname = "hostname1"
principal.asset_id = "CP:uid"
principal.user.userid = "john.doe"
principal.ip = "10.2.230.16"
principal.ip = "127.0.0.1"
principal.administrative_domain = "host.domain.com"
principal.nat_ip = "10.5.5.5"
principal.asset.asset_id = "CP:uid"
target.user.attribute.permissions.name = "SYSTEM"
target.file.sha256 = "sha256"
target.file.md5 = "md5"
target.file.size = "314"
target.file.full_path = "C:/Temp/msohtmlclip1/01/clip_colorschememapping.xml"
target.file.mime_type = "application/xml"
security_result.severity_details = "NO_RISK_INDICATED"

Parser Alerting

This product currently does not have any Parser-based Alerting

Rules

Coming Soon