Mappings: Windows - Microsoft-Windows-Sysmon/Operational - 21
Input | Value |
---|---|
Vendor | Microsoft |
Product | Windows |
Log Format | Windows |
Event ID Regex Pattern | Microsoft-Windows-Sysmon/Operational-21 |
Output | Value |
---|---|
Vendor | Microsoft |
Product | Windows |
Record Type | Audit |
Cloud SIEM Schema Field | Original Record Key | Notes |
---|---|---|
description | None | The static text WmiEventConsumerToFilter activity detected is populated in this schema field. |
device_hostname | Computer | |
timestamp | EventData.UtcTime | We expect the orginal record value of EventData.UtcTime is in the format yyyy-MM-dd HH:mm:ss.SSS |
user_username | EventData.User |