Skip to main content

➡️ Allowlisting

Allowlisting events

Events represent all executions and elevations triggered across your workstations.

Overview

  • Events are captured on workstations when applications get executed (allowlisting) or elevated (elevation control)
  • For execution, idemeum agent tracks msi and exe files
  • There are no duplicate events, and each event is uniquely represented by a combination of a file name and parent process. If several events for a file name / parent combination get pushed to the cloud, only the latest event is shown with the updated timestamp.
  • Allowlisting execution events are uploaded to idemeum cloud every 5 minutes
  • Elevations events are uploaded to cloud in real time

Event structure

To access events navigate to your organization / customer admin portal and access Events section.

  • Timestamp - date and time for when the execution or elevation happened
  • Computer - workstation that generated the event
  • User - user that was logged into the computer when event was generated
  • Filename - file name of the executable
  • Execution - tag that shows whether the application was allowed to execute or not. When in audit mode, the tag will be Audit as there are no rules enforcement. If you hover over the tag, you will see the rule that is matching the execution based on which the decision is made.
  • Elevation - tag that shows whether the application was allowed to elevate or not. For standard non-admin executions this tag is not shown.
  • Publisher - organization that signed the executable. If you expand the event, you will be able to see whether the publisher is verified by operating system or not.
  • Parent - parent process that was responsible for launching the executable
  • Actions - actions that you can take on the event, including rule creation

If you click on the event, you will be presented with the detailed information, including hashes, verified publisher, path, and more. At the bottom of the event section you will find the publisher certificate elements (i.e details of the organization that signed the executable). The green checkmark indicates that the publisher is verified by operating system.

Understanding events

Let's review the major cases of events that you will encounter in idemeum. Here we assume both Allowlisting and Elevation are enabled for the customer / organization.

Execution without elevation

  1. Let's say there is no rule for cmd.exe. You launch cmd.exe, and it gets blocked. There is one execution event generated.
  1. Now you create a rule for cmd.exe to allow execution, but not allowing child processes. You launch cmd.exe, and it is allowed.
  1. Now you try to explore child process control. You have a rule for cmd.exe to allow execution, but not allowing child processes. You launch tor.exe from cmd.exe. The TOR launch is blocked. And in the event you can see the message that child process is denied.
  1. Now you create a rule to allow cmd.exe and also allow child processes. You launch tor.exe from cmd.exe. The execution is allowed.

Execution with elevation

  1. Let's say you do not have a rule for notepad++.exe. Execution is not allowed, and elevation is not allowed. When you trigger notepad++ installation, the elevation screen is presented and the application is blocked. One event is generated with both execution and elevation denied.
  1. Now you have created a rule for notepad++.exe. You allow execution and configure the application to automatically elevate. When you trigger notepad++ installation, elevation screen is presented and then allowed. Installation goes through. There are two events generated - one for elevation, and one for successful execution.