Follow Process
Follow Process events report processes that match user forensic config rules based on process attributes such as binary path, command string, and so on. Processes that are reported under this Follow Process event are for auditing purposes and not necessary having any security events.
Example 1: Report processes that are run by cmd.exe or powershell.exe
Event Type = Follow Process AND (Process Info - Exec Path contains cmd.exe OR Process Info - Exec Path contains powershell.exe)
Example 2: Report any processes which are created by winword.exe or excel.exe or powerpnt.exe.
Event Type = Follow Process with_ancestor (Process Info - Exec Path contains winword.exe OR Process Info - Exec Path contains excel.exe OR Process Info - Exec Path contains powerpnt.exe)
Note: Follow Process events can be tracked by one of the following process signals:
-
Process Info - Exec Path
-
Process Info - Command String
-
Process Info - Username
-
Follow Process - Parent Exec Path
-
Follow Process - Parent Command String
-
Follow Process - Parent Username