Skip to main content

Output

AttributeTypeDetailed OnlyDescription
idstringID of the output.
urlstringSelf URL
hostIdstringID of the host that owns the output.
hostUrlstringURL of the host that owns the output.
agentsIdsstring[]List of Agent IDs of the agents managing the output.
domainIdstringAD only: ID of the owning domain
domainUrlstringAD only: Link to the owning domain
logsUrlstringLink to the file output log files (for the local agent only, that has the API Server running)
isEnabledboolWhether or not the output is enabled. If disabled, no activity is forwarded to it.
typestringLogFile,Syslog,Amqp
logFileFileOutputLog file settings
syslogSyslogOutputSyslog settings
amqpAmqpOutputAMQP/DEFEND settings
fileFilterFileFilterFiltering settings for file activity
sharePointFilterSharePointFilterFiltering settings for SharePoint
commentstringUser's comment
managedBystringName of a product that manages this output, if not self managed by NAM Agent. Values: StealthINTERCEPT
windowsWindowsOptionsWindows filtering settings
status.updatedAtDateTimeA timestamp when the status has changed to this value.
status.typestringOK, Error, or Warning - indicates a type of the status.
status.summarystringA user-friendly summary string of the status. May be empty for the OK type, non-empty otherwise.
status.detailsstringA user-friendly message that describes the status. May be empty.
statusHistoryUrlstringURL of the output's status history.
altHoststringA hostname that is reported in the activity events instead of the real hostname.
stats.reportedAtDateTimeTimestamp indicating the last time when an event was reported to the Output.
stats.reportedCountlongTotal number of events reported to the Output.
stats.lastEventTimeDateTimeThe most recent timestamp among all reported events to the Output.
stats.filesCountintNumber of log files on the agent's server.
stats.filesSizelongTotal size of log files on the agent's server.
stats.archiveFilesCountintNumber of log files in the archival location.
stats.archiveFilesSizelongTotal size of log files in the archival location.
stats.archiveLastEventTimeDateTimeThe most recent timestamp in the recently archived log file.

FileOutput

AttributeTypeDetailed OnlyDescription
formatstringTsv, Json
pathstringLog file path on the agent's drive. Timestamp is added before the extension.
archivePathstringLog file path in the archival location (UNC path)
periodToRetainLogintNumber of days to keep the log files alive both on the local drive and in the archive
reportUserNameboolResolve and report user name
reportUncPathboolReport UNC paths in addition to local/native paths
addCToPathboolPrepend the path C:\ and change the forward slashes to backslashes.
reportMillisecondsboolReport events' time with milliseconds
stealthAuditboolThe file was marked for consumption by Access Analyzer

SyslogOutput

AttributeTypeDetailed OnlyDescription
serverstringHostname/address of the syslog server in the format HOST:PORT.
protocolstringUDP, TCP, TLS
separatorstringLf,Cr, CrLf, Nul, Rfc5425
reportUncPathboolReport UNC paths in addition to local/native paths
addCToPathboolPrepend the path C:\ and change the forward slashes to backslashes.
templatestringText of the syslog template that is currently set to be used.

AmqpOutput

AttributeTypeDetailed OnlyDescription
serverstringHostname/address of the AMQP server or the Threat Manager server and the port in the SERVER:PORT format
userNamestringUser name for the AMQP connection, if needed. ForThreat Managerintegration, use an empty string.
passwordstringPassword / App Token for the AMQP connection. Password / App Token is not exposed.
queuestringMessage queue name to post events to. ForThreat Manager integration, use an empty string.
exchangestringExchange name to post events to. ForThreat Manager integration, use "StealthINTERCEPT" for domain outputs or "AM" for host outputs.
vhoststringVirtual Host name, if needed. ForThreat Managerintegration, use an empty string.

FileFilter

AttributeTypeDetailed OnlyDescription
allowedbool
deniedbool
cifsbool
nfsbool
readbool
dirReadbool
createbool
dirCreatebool
renamebool
dirRenamebool
deletebool
dirDeletebool
updatebool
permissionbool
dirPermissionbool
attributebool
dirAttributebool
readOptimizeboolSuppress subsequent read operations in the same folder, by the same user.
shareAddbool
shareDeletebool
shareUpdatebool
sharePermissionbool
streamReadboolReads of Alternate Data Streams.
streamUpdateboolUpdates of Alternate Data Streams.
streamDeleteboolDeletes of Alternate Data Streams.
streamAddboolAdds of Alternate Data Streams.
includePathsstring[]Depreciated. This has been replaced by 'pathFilters'.
excludePathsstring[]Depreciated. This has been replaced by 'pathFilters'.
excludeExtensionsstring[]
excludeProcessesstring[]
excludeReadProccessesstring[]
excludeAccountsstring[]
filterGroupsboolProcess group membership when filtering.
officeFilteringboolSuppress Microsoft Office and other applications operations on temporary files.
pathFiltersstring[]List of paths to include and exclude.
discardPreviewSubfolderReadsbool
discardPreviewSubfolderReadsIntervalint
discardPreviewFileReadsbool
discardPreviewFileReadsIntervalint
discardPreviewFileReadsFilenamesstring[]
duplicateReadsIntervalint

SharePointFilter

AttributeTypeDetailed OnlyDescription
operationsstring[]
includeUrlsstring[]
excludeUrlsstring[]
excludeAccountsstring[]

WindowsOptions

AttributeTypeDetailed OnlyDescription
vssCreationbool
vssDeletionbool
vssActivitybool
discardReorderedAclbool
discardInheritedAclbool

Response Example

{
    "id": "fcf4ad5d951548f0af10a8909c9cc284",
    "url": "https://127.0.0.1:4494/api/v1/hosts/Windows-kdvm02/outputs/fcf4ad5d951548f0af10a8909c9cc284",
    "hostId": "Windows-kdvm02",
    "hostUrl": "https://127.0.0.1:4494/api/v1/hosts/Windows-kdvm02",
    "agentsIds": [
        "AGENT2"
    ],
    "isEnabled": false,
    "type": "LogFile",
    "logFile": {
        "format": "Tsv",
        "path": "C:\\ProgramData\\Netwrix\\Activity Monitor\\Agent\\ActivityLogs\\KDVM02_Log_.tsv",
        "archivePath": "",
        "periodToRetainLog": 10,
        "reportUserName": false,
        "reportUncPath": false,
        "addCToPath": true,
        "reportMilliseconds": true,
        "stealthAudit": true
    },
    "fileFilter": {
        "allowed": true,
        "denied": true,
        "cifs": true,
        "nfs": true,
        "read": true,
        "dirRead": false,
        "create": true,
        "dirCreate": true,
        "rename": true,
        "dirRename": true,
        "delete": true,
        "dirDelete": true,
        "update": true,
        "permission": true,
        "dirPermission": true,
        "attribute": true,
        "dirAttribute": true,
        "readOptimize": false,
        "shareAdd": false,
        "shareDelete": false,
        "shareUpdate": false,
        "sharePermission": false,
        "streamRead": true,
        "streamUpdate": true,
        "streamDelete": true,
        "streamAdd": true,
        "includePaths": [],
        "excludePaths": [],
        "excludeExtensions": [
            ".TMP",
            ".RCV",
            ".DS_STORE",
            ".POLICY",
            ".MANIFEST",
            ".LACCDB",
            ".LDB"
        ],
        "excludeProcesses": [
            "SBTService.exe",
            "FPolicyServerSvc.exe",
            "CelerraServerSvc.exe",
            "FSACLoggingSvc.exe",
            "HitachiService.exe",
            "SIWindowsAgent.exe",
            "SIGPOAgent.exe",
            "LogProcessorSrv.exe",
            "SearchIndexer.exe",
            "WindowsSearch.exe",
            "StealthAUDIT",
            "MonitorService35.exe",
            "MonitorService40.exe",
            "MonitorService45.exe",
            "Configuration.exe",
            "ConfigurationAgent.exe",
            "ConfigurationAgent.Grpc.Host.exe"
        ],
        "excludeReadProcesses": [],
        "excludeAccounts": [
            "S-1-5-17",
            "S-1-5-18",
            "S-1-5-19",
            "S-1-5-20"
        ],
        "filterGroups": false,
        "officeFiltering": false,
        "pathFilters": [
            "-**\\~$*.DOC",
            "-**\\~$*.DOCX",
            "-**\\~$*.ODT",
            "-**\\~$*.PPT",
            "-**\\~$*.PPTX",
            "-**\\~$*.PUB",
            "-**\\~$*.RTF",
            "-**\\~$*.TXT",
            "-**\\~$*.WPS",
            "-**\\~$*.XLSX",
            "-**\\~$*.XSN",
            "-**\\~$*.XML",
            "-**\\~$*.DOCM",
            "-**\\~$*.DOTX",
            "-**\\~$*.DOTM",
            "-**\\~$*.DOT",
            "-**\\~$*.MHT",
            "-**\\~$*.HTM",
            "-**\\~$*.XLSM",
            "-**\\~$*.XLSB",
            "-**\\~$*.XLTX",
            "-**\\~$*.XLTM",
            "-**\\~$*.XLAM",
            "-**\\~$*.ODS",
            "-**\\~$*.PPTM",
            "-**\\~$*.POTX",
            "-**\\~$*.POTM",
            "-**\\~$*.POT",
            "-**\\~$*.THMX",
            "-**\\~$*.PPSX",
            "-**\\~$*.PPSM",
            "-**\\~$*.PPS",
            "-**\\~$*.ODP",
            "-**\\~$*.PDF",
            "-**\\~$*.XPS",
            "-**\\.TEMPORARYITEMS\\**",
            "-**\\~SNAPSHOT\\**",
            "-**\\WATSONRC.DAT",
            "-**\\DESKTOP.INI",
            "-C:\\Windows\\**",
            "-C:\\Program Files\\**",
            "-C:\\Program Files (x86)\\**",
            "-C:\\ProgramData\\**",
            "-C:\\Documents and Settings\\**",
            "-C:\\Users\\**"
        ],
        "discardPreviewSubfolderReads": true,
        "discardPreviewSubfolderReadsInterval": 10,
        "discardPreviewFileReads": false,
        "discardPreviewFileReadsInterval": 60,
        "discardPreviewFileReadsFilenames": [
            "*.exe",
            "*.url",
            "*.lnk"
        ],
        "duplicateReadsInterval": 60
    },
    "comment": "",
    "managedBy": "",
    "windows": {
        "vssCreation": true,
        "vssDeletion": true,
        "vssActivity": true,
        "discardReorderedAcl": true,
        "discardInheritedAcl": false
    },
    "status": {
        "updatedAt": "2024-10-01T18:46:00.6768171Z",
        "type": "OK",
        "summary": "OK",
        "details": "OK"
    },
    "statusHistoryUrl": "https://127.0.0.1:4494/api/v1/hosts/Windows-kdvm02/outputs/fcf4ad5d951548f0af10a8909c9cc284/statusHistory",
    "altHost": "",
    "stats": {
        "reportedAt": "2024-09-30T18:49:12.282Z",
        "reportedCount": 12,
        "lastEventTime": "2024-09-30T18:49:12.282Z",
        "filesCount": 1,
        "filesSize": 2204,
        "archiveFilesCount": 0,
        "archiveFilesSize": 0
    }
}

File

AttributeTypeDetailed OnlyDescription
idstringActivity Log File ID.
sizeintFile size in bytes
localPathstringFile path on the local disk
isZipboolIs it a Zip archive
isArchivedboolDetermines whether the file is on a local drive of the agent or moved to the archival location.
typestringTsv, Json
updatedAtDateTimeLast time the file was updated
activityFromDateTimeActivity events in the file are not younger than the date.
activityToDateTimeActivity events in the file are not older than the date.
outputIdstringID of the output that produced the file.
contentUrlstringLink to the file content. MIME type application/x-msdownload

Response Example

[
    {
        "id": "localhost_Log_20190410_000000.tsv",
        "size": 81658576,
        "localPath": "C:\\Program Files\\STEALTHbits\\StealthAUDIT\\FSAC\\SBTFileMon_Logs\\localhost_Log_20190410_000000.tsv",
        "isZip": false,
        "isArchived": false,
        "type": "Tsv",
        "updatedAt": "2019-04-10T17:45:07.2211753Z",
        "activityFrom": "2019-04-05T18:16:57",
        "activityTo": "2019-04-10T17:45:07",
        "outputId": "9c90791891774715bdb3415823790d7c",
        "contentUrl": "https://localhost:4494/api/v1/logs/get/localhost_Log_20190410_000000.tsv"
    },
    {
        "id": "localhost_Log_20190401_000000.tsv.zip",
        "size": 11,
        "localPath": "C:\\Program Files\\STEALTHbits\\StealthAUDIT\\FSAC\\SBTFileMon_Logs\\localhost_Log_20190401_000000.tsv.zip",
        "isZip": true,
        "isArchived": false,
        "type": "Tsv",
        "updatedAt": "2019-04-10T02:03:48.8899252Z",
        "activityFrom": "0001-01-01T00:00:00",
        "activityTo": "2019-04-10T02:03:48.8879242Z",
        "outputId": "9c90791891774715bdb3415823790d7c",
        "contentUrl": "https://localhost:4494/api/v1/logs/get/localhost_Log_20190401_000000.tsv.zip"
    },
  {
    "id": "localhost_Log_20190405.tsv.zip",
    "size": 295102,
    "localPath": "\\\\WRKST0100\\SBACTIVITYLOGS\\WRKST0100\\WRKST0100_9c907918-9177-4715-bdb3-415823790d7c\\localhost_Log_20190405.tsv.zip",
    "isZip": true,
    "isArchived": true,
    "type": "Tsv",
    "updatedAt": "2019-04-05T20:59:55.1462518Z",
    "activityFrom": "2019-04-05T18:16:57",
    "activityTo": "2019-04-05T20:59:55",
    "outputId": "9c90791891774715bdb3415823790d7c",
    "contentUrl": "https://localhost:4494/api/v1/logs/archive/get/WRKST0100/WRKST0100_9c907918-9177-4715-bdb3-415823790d7c/localhost_Log_20190405.tsv.zip"
  }
]

Policy

AttributeTypeDetailed OnlyRead-OnlyDescription
idstringXPolicy ID.
urlstringXSelf URL.
namestringPolicy name.
descriptionstringPolicy description.
pathstringPolicy location.
guidstringXPolicy GUID.
isEnabledboolWhether the policy is enabled.
updatedAtDateTimeXWhen the policy was last modified.
xmlstringPolicy body in XML format. It's the same format used by Threat Prevention Powershell.

Response Example

[
    {
        "id": "1000",
        "url": "https://127.0.0.1:4494/api/v1/domains/KDUD1/policies/1000",
        "name": "SAM AD Changes",
        "description": "",
        "path": "Policies\\Auditing",
        "guid": "56abcb01-0248-4f9c-8e61-aaeb8a30b5ff",
        "isEnabled": true,
        "updatedAt": "2024-08-22T19:05:31.22",
        "xml": "<?xml version=\"1.0\" encoding=\"utf-16\"?>\r\n<AdConfigPolicy xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" id=\"1000\" enabled=\"true\" enabledHint=\"ManualSwitch\" name=\"SAM AD Changes\" path=\"Policies\\Auditing\" builtIn=\"false\" odbcEnabled=\"true\" syslogEnabled=\"false\" emailAlertingEnabled=\"false\" emailLimiterEnabled=\"true\" emailLimiterMode=\"1\" emailLimiterInterval=\"15\" createdBy=\"SAM\" createdOn=\"2024-08-21T19:14:26.724\" modifiedBy=\"KDDC01$\" modifiedOn=\"2024-08-22T19:05:31.220\" owner=\"KDDC01$\" guid=\"56abcb01-0248-4f9c-8e61-aaeb8a30b5ff\" description=\"\" templateCategory=\"\" policyType=\"kNvMonitor\" ldapPolicyRunDateUtc=\"0001-01-01T00:00:00.000\" ldapPolicyEndDateUtc=\"0001-01-01T00:00:00.000\" ldapPolicyStarted=\"false\" eventSinks=\"{'SAM':{'url':'amqp://localhost:4499','login':'G59/xvKl2Guna0By1UCduG3otKlbUBJD','password':'9TCPAXDkl6IIyx+SvmBNlw=='}}\" eventConsumers=\"\">\r\n  <linkedReports />\r\n  <schedule enabled=\"false\" origin=\"Server\" />\r\n  <registration eventSource=\"AD\" enabled=\"true\" name=\"Active Directory Changes\" description=\"\" erTypeIds=\"1400\">\r\n    <filter type=\"successFailure\" success=\"true\" failure=\"true\" />\r\n    <filter type=\"hostFrom\">\r\n      <includeList />\r\n      <excludeList />\r\n    </filter>\r\n    <filter type=\"windowsPerpetrator\">\r\n      <enableForgedPAC>false</enableForgedPAC>\r\n      <includeList />\r\n      <excludeList />\r\n      <includeRIDs />\r\n    </filter>\r\n    <filter type=\"windowsObject\">\r\n      <includeList />\r\n      <excludeList />\r\n    </filter>\r\n    <filter type=\"windowsAdEvents\">\r\n      <eventTypeFilter>\r\n        <item>Object Added</item>\r\n        <item>Object Modified</item>\r\n        <item>Object Deleted</item>\r\n        <item>Object Moved/Renamed</item>\r\n      </eventTypeFilter>\r\n    </filter>\r\n    <filter type=\"windowsAttr\">\r\n      <includeList />\r\n      <excludeList />\r\n      <includeAttributesList />\r\n      <excludeAttributesList />\r\n    </filter>\r\n    <filter type=\"windowsClass\">\r\n      <includeList />\r\n      <excludeList />\r\n    </filter>\r\n    <filter type=\"windowsContext\">\r\n      <includeList />\r\n      <excludeList />\r\n    </filter>\r\n    <filter type=\"ipAddressFrom\">\r\n      <includeList />\r\n      <excludeList />\r\n    </filter>\r\n    <filter type=\"windowsDomain\">\r\n      <includeList />\r\n      <excludeList />\r\n    </filter>\r\n  </registration>\r\n</AdConfigPolicy>"
    },
    {
        "id": "1001",
        "url": "https://127.0.0.1:4494/api/v1/domains/KDUD1/policies/1001",
        "name": "SAM Authentication",
        "description": "",
        "path": "Policies\\Auditing",
        "guid": "b3d5397b-ef67-4d72-860c-4efa311ad37f",
        "isEnabled": false,
        "updatedAt": "2024-08-22T19:05:31.251",
        "xml": "<?xml version=\"1.0\" encoding=\"utf-16\"?>\r\n<AdConfigPolicy xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" id=\"1001\" enabled=\"false\" name=\"SAM Authentication\" path=\"Policies\\Auditing\" builtIn=\"false\" odbcEnabled=\"true\" syslogEnabled=\"false\" emailAlertingEnabled=\"false\" emailLimiterEnabled=\"true\" emailLimiterMode=\"1\" emailLimiterInterval=\"15\" createdBy=\"SAM\" createdOn=\"2024-08-21T19:14:26.730\" modifiedBy=\"KDDC01$\" modifiedOn=\"2024-08-22T19:05:31.251\" owner=\"KDDC01$\" guid=\"b3d5397b-ef67-4d72-860c-4efa311ad37f\" description=\"\" templateCategory=\"\" policyType=\"kNvMonitor\" ldapPolicyRunDateUtc=\"0001-01-01T00:00:00.000\" ldapPolicyEndDateUtc=\"0001-01-01T00:00:00.000\" ldapPolicyStarted=\"false\" eventSinks=\"{'SAM':{'url':'amqp://localhost:4499','login':'G59/xvKl2Guna0By1UCduG3otKlbUBJD','password':'9TCPAXDkl6IIyx+SvmBNlw=='}}\" eventConsumers=\"\">\r\n  <linkedReports />\r\n  <schedule enabled=\"false\" origin=\"Server\" />\r\n  <registration eventSource=\"AD\" enabled=\"false\" name=\"Authentication Monitor\" description=\"\" erTypeIds=\"1409\">\r\n    <filter type=\"successFailure\" success=\"true\" failure=\"true\" />\r\n    <filter type=\"authProtocol\" protocol=\"0\" n2password=\"false\" remote_login=\"false\" local_login=\"false\" password_expired=\"false\" />\r\n    <filter type=\"windowsPerpetrator\">\r\n      <enableForgedPAC>false</enableForgedPAC>\r\n      <includeList />\r\n      <excludeList />\r\n      <includeRIDs>\r\n        <item rid=\"512\" />\r\n        <item rid=\"518\" />\r\n        <item rid=\"519\" />\r\n      </includeRIDs>\r\n    </filter>\r\n    <filter type=\"hostTo\">\r\n      <includeList />\r\n      <excludeList />\r\n    </filter>\r\n    <filter type=\"hostFrom\">\r\n      <includeList />\r\n      <excludeList />\r\n    </filter>\r\n    <filter type=\"ipAddressTo\">\r\n      <includeList />\r\n      <excludeList />\r\n    </filter>\r\n    <filter type=\"ipAddressFrom\">\r\n      <includeList />\r\n      <excludeList />\r\n    </filter>\r\n    <filter type=\"windowsDomain\">\r\n      <includeList />\r\n      <excludeList />\r\n    </filter>\r\n  </registration>\r\n</AdConfigPolicy>"
    },
    {
        "id": "1002",
        "url": "https://127.0.0.1:4494/api/v1/domains/KDUD1/policies/1002",
        "name": "SAM Ldap Monitor",
        "description": "",
        "path": "Policies\\Auditing",
        "guid": "b119a08c-5304-45b1-b981-22023a113690",
        "isEnabled": false,
        "updatedAt": "2024-08-22T19:05:31.251",
        "xml": "<?xml version=\"1.0\" encoding=\"utf-16\"?>\r\n<AdConfigPolicy xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" id=\"1002\" enabled=\"false\" name=\"SAM Ldap Monitor\" path=\"Policies\\Auditing\" builtIn=\"false\" odbcEnabled=\"true\" syslogEnabled=\"false\" emailAlertingEnabled=\"false\" emailLimiterEnabled=\"true\" emailLimiterMode=\"1\" emailLimiterInterval=\"15\" createdBy=\"SAM\" createdOn=\"2024-08-21T19:14:26.732\" modifiedBy=\"KDDC01$\" modifiedOn=\"2024-08-22T19:05:31.251\" owner=\"KDDC01$\" guid=\"b119a08c-5304-45b1-b981-22023a113690\" description=\"\" templateCategory=\"\" policyType=\"kNvMonitor\" ldapPolicyRunDateUtc=\"0001-01-01T00:00:00.000\" ldapPolicyEndDateUtc=\"0001-01-01T00:00:00.000\" ldapPolicyStarted=\"false\" eventSinks=\"{'SAM':{'url':'amqp://localhost:4499','login':'G59/xvKl2Guna0By1UCduG3otKlbUBJD','password':'9TCPAXDkl6IIyx+SvmBNlw=='}}\" eventConsumers=\"\">\r\n  <linkedReports />\r\n  <schedule enabled=\"false\" origin=\"Server\" />\r\n  <registration eventSource=\"LDAP\" enabled=\"false\" name=\"LDAP Monitoring\" description=\"\" erTypeIds=\"1701\">\r\n    <filter type=\"ldapmQuerry\">\r\n      <includeList />\r\n    </filter>\r\n    <filter type=\"successFailure\" success=\"true\" failure=\"true\" />\r\n    <filter type=\"windowsPerpetrator\">\r\n      <enableForgedPAC>false</enableForgedPAC>\r\n      <includeList />\r\n      <excludeList />\r\n      <includeRIDs />\r\n    </filter>\r\n    <filter type=\"ldapmResult\">\r\n      <includeList />\r\n    </filter>\r\n    <filter type=\"hostFrom\">\r\n      <includeList />\r\n      <excludeList />\r\n    </filter>\r\n    <filter type=\"LdapRule\">\r\n      <overrideRule>false</overrideRule>\r\n    </filter>\r\n    <filter type=\"windowsDomain\">\r\n      <includeList />\r\n      <excludeList />\r\n    </filter>\r\n  </registration>\r\n</AdConfigPolicy>"
    },
    {
        "id": "1003",
        "url": "https://127.0.0.1:4494/api/v1/domains/KDUD1/policies/1003",
        "name": "SAM LSASS Guardian",
        "description": "",
        "path": "Policies\\Auditing",
        "guid": "409b77be-f0c2-4ba9-9fb9-d17d2c19084a",
        "isEnabled": false,
        "updatedAt": "2024-08-22T19:05:31.251",
        "xml": "<?xml version=\"1.0\" encoding=\"utf-16\"?>\r\n<AdConfigPolicy xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" id=\"1003\" enabled=\"false\" name=\"SAM LSASS Guardian\" path=\"Policies\\Auditing\" builtIn=\"false\" odbcEnabled=\"true\" syslogEnabled=\"false\" emailAlertingEnabled=\"false\" emailLimiterEnabled=\"true\" emailLimiterMode=\"1\" emailLimiterInterval=\"15\" createdBy=\"SAM\" createdOn=\"2024-08-21T19:14:26.733\" modifiedBy=\"KDDC01$\" modifiedOn=\"2024-08-22T19:05:31.251\" owner=\"KDDC01$\" guid=\"409b77be-f0c2-4ba9-9fb9-d17d2c19084a\" description=\"\" templateCategory=\"\" policyType=\"kNvMonitor\" ldapPolicyRunDateUtc=\"0001-01-01T00:00:00.000\" ldapPolicyEndDateUtc=\"0001-01-01T00:00:00.000\" ldapPolicyStarted=\"false\" eventSinks=\"{'SAM':{'url':'amqp://localhost:4499','login':'G59/xvKl2Guna0By1UCduG3otKlbUBJD','password':'9TCPAXDkl6IIyx+SvmBNlw=='}}\" eventConsumers=\"\">\r\n  <linkedReports />\r\n  <schedule enabled=\"false\" origin=\"Server\" />\r\n  <registration eventSource=\"AD\" enabled=\"false\" name=\"LSASS Guardian - Monitor\" description=\"\" erTypeIds=\"1802\">\r\n    <filter type=\"windowsPerpetrator\">\r\n      <enableForgedPAC>false</enableForgedPAC>\r\n      <includeList />\r\n      <excludeList />\r\n      <includeRIDs />\r\n    </filter>\r\n    <filter type=\"windowsProcess\">\r\n      <includeList />\r\n      <excludeList>\r\n        <item>MsMpEng.exe</item>\r\n        <item>svchost.exe</item>\r\n        <item>VsTskMgr.exe</item>\r\n        <item>WmiPrvSE.exe</item>\r\n        <item>scan64.exe</item>\r\n        <item>mcshield.exe</item>\r\n      </excludeList>\r\n    </filter>\r\n    <filter type=\"windowsOpenProcessFlags\">3</filter>\r\n    <filter type=\"windowsDomain\">\r\n      <includeList />\r\n      <excludeList />\r\n    </filter>\r\n  </registration>\r\n</AdConfigPolicy>"
    },
    {
        "id": "1004",
        "url": "https://127.0.0.1:4494/api/v1/domains/KDUD1/policies/1004",
        "name": "SAM Replication",
        "description": "",
        "path": "Policies\\Auditing",
        "guid": "e6feb176-8a14-4a61-914b-6c864babd55a",
        "isEnabled": false,
        "updatedAt": "2024-08-22T19:05:31.251",
        "xml": "<?xml version=\"1.0\" encoding=\"utf-16\"?>\r\n<AdConfigPolicy xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" id=\"1004\" enabled=\"false\" name=\"SAM Replication\" path=\"Policies\\Auditing\" builtIn=\"false\" odbcEnabled=\"true\" syslogEnabled=\"false\" emailAlertingEnabled=\"false\" emailLimiterEnabled=\"true\" emailLimiterMode=\"1\" emailLimiterInterval=\"15\" createdBy=\"SAM\" createdOn=\"2024-08-21T19:14:26.734\" modifiedBy=\"KDDC01$\" modifiedOn=\"2024-08-22T19:05:31.251\" owner=\"KDDC01$\" guid=\"e6feb176-8a14-4a61-914b-6c864babd55a\" description=\"\" templateCategory=\"\" policyType=\"kNvMonitor\" ldapPolicyRunDateUtc=\"0001-01-01T00:00:00.000\" ldapPolicyEndDateUtc=\"0001-01-01T00:00:00.000\" ldapPolicyStarted=\"false\" eventSinks=\"{'SAM':{'url':'amqp://localhost:4499','login':'G59/xvKl2Guna0By1UCduG3otKlbUBJD','password':'9TCPAXDkl6IIyx+SvmBNlw=='}}\" eventConsumers=\"\">\r\n  <linkedReports />\r\n  <schedule enabled=\"false\" origin=\"Server\" />\r\n  <registration eventSource=\"AD\" enabled=\"false\" name=\"AD Replication Monitoring\" description=\"\" erTypeIds=\"1801\">\r\n    <filter type=\"hostFrom\">\r\n      <includeList />\r\n      <excludeList />\r\n    </filter>\r\n    <filter type=\"windowsPerpetrator\">\r\n      <enableForgedPAC>false</enableForgedPAC>\r\n      <includeList />\r\n      <excludeList />\r\n      <includeRIDs />\r\n    </filter>\r\n    <filter type=\"windowsDomain\">\r\n      <includeList />\r\n      <excludeList />\r\n    </filter>\r\n  </registration>\r\n</AdConfigPolicy>"
    }
]