Skip to content

Osquery

Osquery

About

Osquery is a universal, light-weight, highly configurable endpoint agent which can collect and normalize data across macOS, Linux, Windows and container environments. It is managed by The Linux Foundation and is widely adopted by IT security teams looking for an open platform for endpoint visibility. osquery increases visibility across your infrastructure and gives you the power to ask questions using SQL across any machine, such as “Which machines are running vulnerable software packages?” and “Where else are we seeing this malicious process?”

Product Details

Vendor URL: Gain Open Source Security Tools With osquery - Uptycs

Product Type: EDR

Product Tier: Tier I

Integration Method: Syslog

Integration URL: Logging - osquery - Read the Docs

Log Guide: Logging - osquery - Read the Docs

Parser Details

Log Format: JSON

Expected Normalization Rate: 75%

Data Label: OSQUERY_EDR

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
action security_result.action_details
columns.address target.hostname
columns.address target.domain.name
columns.address target.ip
columns.parent principal.process.parent_pid
columns.path target.process.file.mime_type
columns.path target.process.file.full_path
columns.pid target.process.pid
columns.port target.port
columns.protection_type metadata.description
columns.state security_result.summary
counter additional.counter
description metadata.description
directory principal.process.file.mime_type
epoch additional.epoch
event_type metadata.event_type
hostIdentifier principal.hostname
key target.registry.registry_key
name principal.asset.software
name security_result.summary
numerics additional.numerics
Osquery metadata.product_name
product_event metadata.product_event_type
shell principal.process.command_line
snapshot.0.name principal.asset.platform_software.platform_version
snapshot.0.name principal.asset.platform_software.platform_patch_level
snapshot.0.platform principal.asset.platform_software.platform
source_url src.file.full_path
suser principal.user.userid
type metadata.description

Product Event Types

type,subtype severity UDM Event Classification alerting enabled
Default STATUS_UNCATEGORIZED
columns.pid, columns.path PROCESS_LAUNCH
login-event USER_LOGIN

Log Sample

{"snapshot":[{"arch":"64-bit","build":"19041","codename":"Microsoft Windows 10 Pro","install_date":"1644465445","major":"10","minor":"0","name":"Microsoft Windows 10 Pro","patch":"","platform":"windows","platform_like":"windows","version":"10.0.19041"}],"action":"snapshot","name":"os_version","hostIdentifier":"DEVICENAMAE","calendarTime":"Sun Jun 12 16:32:40 2022 UTC","unixTime":1655051560,"epoch":0,"counter":0,"numerics":false}

Sample Parsing

metadata.event_timestamp = "2022-06-12T16:32:40Z"
metadata.event_type = "STATUS_UNCATEGORIZED"
metadata.product_name = "Osquery"
metadata.product_event_type = "os_version"
additional.numerics = "false"
additional.counter = "0"
additional.epoch = "0"
principal.hostname = "DEVICENAMAE"
principal.asset_id = "CS:a6v546v51r65f1v6e51v564b16000"
principal.asset.hostname = "DEVICENAMAE"
principal.asset.asset_id = "CS:a6v546v51r65f1v6e51v564b16000"
principal.asset.platform_software.platform = "WINDOWS"
principal.asset.platform_software.platform_version = "Microsoft Windows 10 Pro"
principal.asset.platform_software.platform_patch_level = "10.0.19041"
security_result.summary = "os_version"
security_result.action_details = "snapshot"

Parser Alerting

This product currently does not have any Parser-based Alerting

Rules

Coming Soon