Document toolboxDocument toolbox

.dlp.digitalguardian vv7.9.0

Introduction

The tags beginning with dlp.digitalguardian identify events generated by Digital Guardian.

The full tag must have 4 levels. The first two are fixed as dlp.digitalguardian. The third level identifies the type of events sent, and the fourth level indicates the event subtype.

Technology

Brand

Type

Subtype

dlp

digitalguardian

  • arc
  • events

These are the valid tags and corresponding data tables that will receive the parsers' data:

Tag

Data table

dlp.digitalguardian.arc.eventsdlp.digitalguardian.arc.events

Log samples

The following are sample logs sent to each of the dlp.digitalguardian data tables. Also, find how the information will be parsed in your data table under each sample log.

Extra columns

Fields marked as Extra in the table below are not shown by default in data tables and need to be explicitly requested in the query. You can find them marked as Extra when you perform a query so they can be easily identified. Learn more about this in Selecting unrevealed columns.

dlp.digitalguardian.arc.events

2022-02-07 08:42:20.578 localhost=127.0.0.1 dlp.digitalguardian.arc.events: {"Agent Version": "192.168.68.494", "Source Is Removable": "Yes", "Destination Directory": "https://some_user@email/ocs/docs", "Is User Local Admin": "hugheskathy", "Process Local Modify Time": "2021-11-15 04:40:27 AM", "Local Port": "2146", "DNS Hostname": "some_user@email", "Parent Process Internal Name": "runtimebroker.", "Process Local Access Time": "2021-11-16 02:34:02 PM", "Destination File Path": "https://some_user@email/ocs/docs/recent", "Attachment File Size": "2.0 KB", "_time": 1637118848127, "SHA256 Hash": "55FB2E04CD06EEAD8EBBDE256BD0C2FB6666670E8671AF0D9640D5714437641E", "Destination Was Classified": "hugheskathy", "Application": "winword.exe", "File Version": "16.0.13801.21004", "Operation Type": "Network Transfer Upload", "Company Name": "microsoft corporation", "Server Process Time": 1637118848127, "Was Private Address": "hugheskathy", "Was Detail Blocked": "hugheskathy", "Destination Bus Type": "Unknown", "Wireless SSID": "", "Protocol": "TCP", "Command Line": "\\"C:\\\\Program Files\\\\Microsoft Office\\\\root\\\\Office16\\\\WINWORD.EXE\\" http:something", "Encryption Status": "0", "File Internal Name": "winword", "Source File Encryption": "hugheskathyne", "Product Name": "microsoft office", "Unique ID": "fb275002-4751-11ec-916d-c8d9d2136870", "Process File Size": "1.9 MB", "Process PID": 18180, "MD5 Hash": "928d8e8ccd1f1cec214a0e6909b20b90", "Network Direction": "Outbound", "Event Display Name": "Network Transfer Upload", "Process Directory": "c:\\\\program files\\\\microsoft office\\\\root\\\\office16", "Attachment Source File Path": "recent", "Was Mobile Device": "hugheskathy", "Attachment Source Drive Type": "Unknown", "Computer Name": "client\\\\T64148", "Destination File Extension": "[no extension]", "Product Version": "16.0.13801.21004", "Bytes Written": "2.0 KB", "Process Path": "c:\\\\program files\\\\microsoft office\\\\root\\\\office16\\\\winword.exe", "Source IP Address": "192.168.128.176", "URL Path": "", "x86 Or x64": "x64", "Destination File Name": "recent", "Machine Type": "Windows", "Source Was Classified": "hugheskathy", "Parent MD5 Hash": "64fe4cba-af61-00a1-4c52-f19c8f2169dc", "Process File Extension": "exe", "User": "vargaskimberly", "Was Classified": "hugheskathy", "Parent Application": "runtimebroker.exe", "Was Removable": "hugheskathy", "Remote Port": "0", "Attachment Source File Name": "recent", "Original Name": "winword.exe", "Process Local Creation Time": "2021-10-26 07:45:17 AM", "User Domain": "zgarner", "Was Wireless": "hugheskathy", "File Description": "microsoft word", "Application Internal Name": "winword.exe", "Bytes Read": "2.0 KB", "Destination Is Removable": "hugheskathy", "MAC Address": "00:11:22:2e:a7:57", "Attachment Source Directory": "[no folder]", "Adapter Name": "", "Source File Extension": "[no extension]", "Is Virtual Session": "Yes", "Process Domain": "zgarner", "Was Rule Violated": "hugheskathy", "Event Time": "2021-11-17 02:56:58 AM", "Destination Drive Type": "Remote", "IP Address": "", "Destination File Encryption": "hugheskathyne", "Event Local Time": "2021-11-16 09:56:58 PM"}
2022-02-07 08:42:20.578 localhost=127.0.0.1 dlp.digitalguardian.arc.events: {"Machine Type": "Windows", "Bytes Written": "25.4 KB", "File Internal Name": "electron.exe", "Destination Drive Type": "Fixed", "dg_src_dev.dev_prdname": "name", "Source Was Classified": "kyle05", "Application": "code.exe", "Was Mobile Device": "kyle05", "Destination File Extension": "[no extension]", "Destination File Name": "5adb6a90-b674-495f-aa71-38b48ea9386f", "Original Name": "electron.exe", "Attachment File Size": "25.4 KB", "Unique ID": "00f1818c-4759-11ec-916d-c8d9d2136870", "Parent Application": "code.exe", "Process Directory": "c:\\\\program files\\\\microsoft vs code", "dg_dst_dev.dev_bt": null, "Was Rule Violated": "kyle05", "Process Local Creation Time": "2021-09-20 03:35:39 PM", "Attachment Source File Name": "-271f7375", "Process File Extension": "exe", "Destination Was Classified": "kyle05", "Source File Extension": "[no extension]", "Is User Local Admin": "kyle05", "Event Display Name": "File Move", "dg_dst_dev.dev_dt": "Fixed", "dg_src_dev.dev_dt": "Fixed", "Company Name": "microsoft corporation", "MAC Address": "00:11:22:fb:81:52", "File Version": "1.56.2", "Attachment Source File Path": "c:\\\\users\\\\gregorydavid\\\\appdata\\\\roaming\\\\code\\\\backups\\\\1632176040615\\\\file\\\\-271f7375", "Product Name": "visual studio code", "User Domain": "thomasricardo", "Destination File Encryption": "kyle05ne", "User": "gregorydavid", "Was Removable": "kyle05", "Agent Version": "192.168.77.524", "dg_dst_dev.dev_vendor": "", "dg_src_dev.dev_bt": null, "dg_dst_dev.dev_prdname": "name", "_time": 1637121248041, "dg_src_dev.dev_vendor": "", "Process Domain": "thomasricardo", "Destination Bus Type": null, "Product Version": "1.56.2", "Computer Name": "client\\\\T64148", "Attachment Source Directory": "c:\\\\users\\\\gregorydavid\\\\appdata\\\\roaming\\\\code\\\\backups\\\\1632176040615\\\\file", "Attachment Source Drive Type": "Fixed", "Application Internal Name": "code.exe", "MD5 Hash": "5dd56f4f1fc0cda7ae60d34c23402bd8", "Parent Process Internal Name": "code.exe", "Operation Type": "File Move", "Process Path": "c:\\\\program files\\\\microsoft vs code\\\\code.exe", "Process File Size": "118.5 MB", "Was Detail Blocked": "kyle05", "Source Is Removable": "kyle05", "Command Line": "\\"C:\\\\Program Files\\\\Microsoft VS Code\\\\Code.exe\\" --type=renderer --disable-color-correct-rendering --field-trial-handle=2748,1331101976909089453,15210884913975035566,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --standard-schemes=vscode-webview,vscode-file --secure-schemes=vscode-webview,vscode-file --bypasscsp-schemes --cors-schemes=vscode-webview,vscode-file --fetch-schemes=vscode-webview,vscode-file --service-worker-schemes=vscode-webview --streaming-schemes --app-user-model-id=Microsoft.VisualStudioCode --app-path=\\"C:\\\\Program Files\\\\Microsoft VS Code\\\\resources\\\\app\\" --no-sandbox --no-zygote --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3712 /prefetch:1 --vscode-window-config=vscode:7a0ee6c2-3ad1-4525-af19-ca55e28a859d", "x86 Or x64": "x64", "Was Classified": "kyle05", "File Description": "visual studio code", "Parent MD5 Hash": "4f6fd55d-c01f-a7cd-ae60-d34c23402bd8", "Event Local Time": "2021-11-16 10:47:03 PM", "Source File Encryption": "kyle05ne", "SHA256 Hash": "3DFD2D6123C1FA3AB44CC117FBBF9811AC4B039011AB94B736251855142F65C5", "Destination File Path": "c:\\\\users\\\\gregorydavid\\\\appdata\\\\local\\\\temp\\\\5adb6a90-b674-495f-aa71-38b48ea9386f", "Process PID": 26600, "Server Process Time": 1637121248041, "Destination Is Removable": "kyle05", "Event Time": "2021-11-17 03:47:03 AM", "Destination Directory": "c:\\\\users\\\\gregorydavid\\\\appdata\\\\local\\\\temp", "Process Local Modify Time": "2021-11-15 05:00:29 PM", "Bytes Read": "25.4 KB", "Process Local Access Time": "2021-11-15 05:00:29 PM", "Is Virtual Session": "Yes"}
2022-02-07 08:42:20.579 localhost=127.0.0.1 dlp.digitalguardian.arc.events: {"URL Host": "mydomain.net", "Process Local Creation Time": "2019-06-20 10:54:36 AM", "Protocol": "HTTP", "Event Time": "2021-11-17 10:18:10 PM", "Wireless SSID": "", "Operation Type": "Network Operation", "DNS Hostname": "mydomain.net", "Original Name": "chrome.exe", "Bytes Written": "0 B", "Is User Local Admin": "njohnson", "_time": 1637188694825, "Event Display Name": "Network Operation", "Was Removable": "njohnson", "Remote Port": "80", "Process Directory": "c:\\\\program files (x86)\\\\google\\\\chrome\\\\application", "Was Detail Blocked": "njohnson", "Was Classified": "njohnson", "Computer Name": "client\\\\T64148", "Company Name": "google llc", "URL Context Path": "/somepath", "URL Path": "http://mydomain.net/somepath", "IP Address": "192.168.24.74", "Process File Extension": "exe", "Encryption Status": "0", "MAC Address": "00:11:22:36:54:85", "URL Port": 80, "File Version": "94.0.4606.61", "Application": "chrome.exe", "Parent MD5 Hash": "82534946-644e-104f-ffdc-9e093fd18f94", "Bytes Read": "0 B", "Is Virtual Session": "Yes", "File Internal Name": "chrome_exe", "Process PID": 25804, "Adapter Name": "", "Process File Size": "2.4 MB", "Product Name": "google chrome", "Network Direction": "Outbound", "Process Domain": "harrismatthew", "Local Port": "2110", "Parent Process Internal Name": "chrome.exe", "User Domain": "harrismatthew", "Was Mobile Device": "njohnson", "Source IP Address": "192.168.5.53", "Was Wireless": "njohnson", "File Description": "google chrome", "Process Path": "c:\\\\program files (x86)\\\\google\\\\chrome\\\\application\\\\chrome.exe", "Event Local Time": "2021-11-17 05:18:10 PM", "Process Local Modify Time": "2021-10-20 12:12:55 AM", "Machine Type": "Windows", "SHA256 Hash": "97F7C592D69DFE06FE51B758886798AB62E03BF8EAB5F9E17CE4DD1323875FE2", "Was Private Address": "Yes", "User": "kelly07", "URL Scheme": "http", "Parent Application": "chrome.exe", "Process Local Access Time": "2021-11-15 08:17:27 AM", "Agent Version": "192.168.146.2414", "Product Version": "94.0.4606.61", "Was Rule Violated": "njohnson", "Unique ID": "c1a5429c-98ac-103b-5d09-806e7f2e9c1d", "MD5 Hash": "464953824e644f10ffdc9e093fd18f94", "x86 Or x64": "x64", "Command Line": "\\"C:\\\\Program Files (x86)\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe\\" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2948,3652731506834864307,6137009968055880687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3244 /prefetch:8", "Server Process Time": 1637188694825, "Application Internal Name": "chrome.exe"}

And this is how the log would be parsed:

Field

Value

Type

Extra fields

eventdate

2022-02-07 08:42:20.578

timestamp


hostname

localhost

str


machine_type

null

str


file_internal_name

null

str


application

winword.exe

str


md5_hash

null

str


original_name

null

str


dg_custom_data_dg_scope

null

str


parent_application

null

str


process_directory

null

str


was_rule_violated

null

str


process_local_creation_time

null

str


process_path

null

str


process_file_extension

null

str


was_removable

null

str


dg_custom_data_dg_values

null

str


is_user_local_admin

hugheskathy

str


event_display_name

null

str


dg_custom_data_dg_name

null

str


company_name

microsoft corporation

str


file_version

16.0.13801.21004

str


product_name

null

str


user_domain

null

str


mac_address

null

str


user

null

str


agent_version

192.168.68.494

str


unique_id

null

str


command_line

\

str


product_version

null

str


computer_name

null

str


application_internal_name

null

str


was_mobile_device

null

str


_time

2021-11-17 03:14:08.127

timestamp


operation_type

Network Transfer Upload

str


process_file_size

null

str


was_detail_blocked

hugheskathy

str


process_domain

null

str


event_local_time

null

str


was_classified

null

str


file_description

null

str


parent_md5_hash

null

str


sha256_hash

55FB2E04CD06EEAD8EBBDE256BD0C2FB6666670E8671AF0D9640D5714437641E

str


process_pid

null

int4


server_process_time

2021-11-17 03:14:08.127

timestamp


event_time

null

str


parent_process_internal_name

runtimebroker.

str


process_local_modify_time

2021-11-15 04:40:27 AM

str


x86_or_x64

null

str


process_local_access_time

2021-11-16 02:34:02 PM

str


is_virtual_session

null

str


bytes_written

null

str


destination_drive_type

null

str


dg_src_dev_dev_prdname

null

str


source_was_classified

null

str


destination_file_extension

null

str


destination_file_name

null

str


attachment_file_size

2.0 KB

str


dg_dst_dev_dev_bt

null

str


attachment_source_file_name

null

str


destination_was_classified

hugheskathy

str


source_file_extension

null

str


dg_dst_dev_dev_dt

null

str


dg_src_dev_dev_dt

null

str


attachment_source_file_path

null

str


destination_file_encryption

null

str


dg_dst_dev_dev_vendor

null

str


dg_src_dev_dev_bt

null

str


dg_dst_dev_dev_prdname

null

str


dg_src_dev_dev_vendor

null

str


destination_bus_type

Unknown

str


attachment_source_directory

null

str


attachment_source_drive_type

null

str


source_is_removable

Yes

str


source_file_encryption

null

str


destination_file_path

https://some_user@email/ocs/docs/recent

str


destination_is_removable

null

str


destination_directory

https://some_user@email/ocs/docs

str


bytes_read

null

str


dns_hostname

some_user@email

str


url_path

null

str


dg_alert_dg_policy_dg_category_name

null

str


was_private_address

hugheskathy

str


dg_alert_dg_category_name

null

str


network_direction

null

str


source_ip_address

null

str


dg_alert_alert_etu

null

str


wireless_ssid

 

str


remote_port

null

str


dg_alert_dg_rule_action_type

null

str


dg_alert_alert_ur

null

str


adapter_name

null

str


dg_alert_dg_name

null

str


was_wireless

null

str


local_port

2146

str


dg_alert_alert_at

null

str


dg_alert_alert_al

null

str


protocol

TCP

str


dg_alert_alert_wb

null

str


dg_alert_alert_etl

null

str


dg_alert_dg_policy_dg_name

null

str


dg_alert_dg_detection_source

null

str


encryption_status

null

str


dg_alert_alert_bc

null

str


ip_address

null

str


was_mobile_copy

null

str


dg_recipients_uad_mr

null

str


dg_attachments_dg_src_dir

null

str


dg_attachments_dg_file_size

null

str


event_was_blocked

null

str


event_has_rule_violation

null

str


dg_recipients_uad_mrt

null

str


dg_attachments_uad_sdt

null

str


email_subject

null

str


dg_attachments_uad_sp

null

str


email_sender

null

str


dg_attachments_dg_src_file_name

null

str


dg_recipients_dg_rec_email_domain

null

str


url_host

null

str


url_context_path

null

str


url_port

null

int4


url_scheme

null

str


hostchain

localhost=127.0.0.1

str

✓

tag

dlp.digitalguardian.arc.events

str

✓

rawMessage

{"Agent Version": "192.168.68.494", "Source Is Removable": "Yes", "Destination Directory": "https://some_user@email/ocs/docs", "Is User Local Admin": "hugheskathy", "Process Local Modify Time": "2021-11-15 04:40:27 AM", "Local Port": "2146", "DNS Hostname": "some_user@email", "Parent Process Internal Name": "runtimebroker.", "Process Local Access Time": "2021-11-16 02:34:02 PM", "Destination File Path": "https://some_user@email/ocs/docs/recent", "Attachment File Size": "2.0 KB", "_time": 1637118848127, "SHA256 Hash": "55FB2E04CD06EEAD8EBBDE256BD0C2FB6666670E8671AF0D9640D5714437641E", "Destination Was Classified": "hugheskathy", "Application": "winword.exe", "File Version": "16.0.13801.21004", "Operation Type": "Network Transfer Upload", "Company Name": "microsoft corporation", "Server Process Time": 1637118848127, "Was Private Address": "hugheskathy", "Was Detail Blocked": "hugheskathy", "Destination Bus Type": "Unknown", "Wireless SSID": "", "Protocol": "TCP", "Command Line": "\\"C:\\\\Program Files\\\\Microsoft Office\\\\root\\\\Office16\\\\WINWORD.EXE\\" http:something", "Encryption Status": "0", "File Internal Name": "winword", "Source File Encryption": "hugheskathyne", "Product Name": "microsoft office", "Unique ID": "fb275002-4751-11ec-916d-c8d9d2136870", "Process File Size": "1.9 MB", "Process PID": 18180, "MD5 Hash": "928d8e8ccd1f1cec214a0e6909b20b90", "Network Direction": "Outbound", "Event Display Name": "Network Transfer Upload", "Process Directory": "c:\\\\program files\\\\microsoft office\\\\root\\\\office16", "Attachment Source File Path": "recent", "Was Mobile Device": "hugheskathy", "Attachment Source Drive Type": "Unknown", "Computer Name": "client\\\\T64148", "Destination File Extension": "[no extension]", "Product Version": "16.0.13801.21004", "Bytes Written": "2.0 KB", "Process Path": "c:\\\\program files\\\\microsoft office\\\\root\\\\office16\\\\winword.exe", "Source IP Address": "192.168.128.176", "URL Path": "", "x86 Or x64": "x64", "Destination File Name": "recent", "Machine Type": "Windows", "Source Was Classified": "hugheskathy", "Parent MD5 Hash": "64fe4cba-af61-00a1-4c52-f19c8f2169dc", "Process File Extension": "exe", "User": "vargaskimberly", "Was Classified": "hugheskathy", "Parent Application": "runtimebroker.exe", "Was Removable": "hugheskathy", "Remote Port": "0", "Attachment Source File Name": "recent", "Original Name": "winword.exe", "Process Local Creation Time": "2021-10-26 07:45:17 AM", "User Domain": "zgarner", "Was Wireless": "hugheskathy", "File Description": "microsoft word", "Application Internal Name": "winword.exe", "Bytes Read": "2.0 KB", "Destination Is Removable": "hugheskathy", "MAC Address": "00:11:22:2e:a7:57", "Attachment Source Directory": "[no folder]", "Adapter Name": "", "Source File Extension": "[no extension]", "Is Virtual Session": "Yes", "Process Domain": "zgarner", "Was Rule Violated": "hugheskathy", "Event Time": "2021-11-17 02:56:58 AM", "Destination Drive Type": "Remote", "IP Address": "", "Destination File Encryption": "hugheskathyne", "Event Local Time": "2021-11-16 09:56:58 PM"}

str

✓