Skip to content

Windows Applocker

Windows Applocker

About

AppLocker helps you control which apps and files users can run. These include executable files, scripts, Windows Installer files, dynamic-link libraries (DLLs), packaged apps, and packaged app installers.

Product Details

Vendor URL: Windows Applocker Overview

Product Type: Application Whitelisting

Product Tier: Tier III

Integration Method: Syslog

Integration URL: Syslog Integration - Cyderes Documentation

Log Guide: Using Event Viewer with AppLocker

Parser Details

Log Format: Syslog

Expected Normalization Rate: 90%

Data Label: WINDOWS_APPLOCKEr

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
AccountName principal.user.userid
AccountType principal.user.attribute.roles.name
Channel security_result.about.resource.type
Domain principal.administrative_domain
EventID metadata.product_event_type
EventType security_result.severity
Hostname principal.hostname
Message security_result.description
ProcessID target.process.pid
ProviderGuid target.resource.product_object_id
RecordNumber observer.asset.product_object_id
RuleAndFileData.Fullfile_path target.process.file.full_path
RuleAndFileData.PolicyName security_result.summary
RuleAndFileData.RuleId security_result.rule_id
RuleAndFileData.RuleName security_result.rule_name
RuleAndFileData.RuleSddl security_result.about.labels.value
RuleAndFileData.TargetProcessId target.process.pid
SourceModuleName metadata.description
SourceModuleType observer.application
ThreadID security_result.threat_id
UserID target.user.userid

Product Event Types

EventID UDM Event Classification
8002 PROCESS_OPEN
8005 PROCESS_OPEN
8006 PROCESS_OPEN
8020 PROCESS_OPEN
all others GENERIC_EVENT

Log Sample

{"EventTime":"2022-11-08T14:47:59.387392-06:00","Hostname":"Hostname1","Keywords":aslwl,"EventType":"INFO","SeverityValue":2,"Severity":"INFO","EventID":8002,"SourceName":"Microsoft-Windows-AppLocker","ProviderGuid":"{guid}","Version":0,"Task":0,"OpcodeValue":0,"RecordNumber":record1,"ProcessID":18668,"ThreadID":2488,"Channel":"Microsoft-Windows-AppLocker/EXE and DLL","Domain":"domain","AccountName":"username","UserID":"sid","AccountType":"User","Message":"filepath was allowed to run.","Opcode":"Info","EventReceivedTime":"2022-11-08 14:48:30","SourceModuleName":"applocker","SourceModuleType":"im_msvistalog"}

Sample Parsing

metadata.event_type = "PROCESS_OPEN"
metadata.vendor_name = "Microsoft"
metadata.product_name = "Windows Applocker"
metadata.product_event_type = "8002"
metadata.description = "applocker"
principal.hostname = "Hostname1"
principal.user.userid = "username"
principal.user.attribute.roles.name = "User"
principal.administrative_domain = "domain"
principal.asset.hostname = "Hostname1"
target.user.userid = "sid"
target.process.pid = "18668"
target.process.file.full_path = "filepath"
target.resource.product_object_id = "guid"
observer.application = "im_msvistalog"
observer.asset.product_object_id = "record1"
security_result.about.resource.type = "Microsoft-Windows-AppLocker/EXE and DLL"
security_result.description = "filepath was allowed to run."
security_result.action = "ALLOW"
security_result.severity = "INFORMATIONAL"
security_result.threat_id = "2488"

Parser Alerting

This product currently does not have any Parser-based Alerting

Rules

Coming Soon