Overview
This article provides detailed descriptions of all file event metadata captured by Incydr. File event metadata appears in many places, including Forensic Search, Cases, Alerts, and the Code42 API.
File event metadata provides detailed visibility about insider risks caused by files:
- Stored on user devices
- Stored in corporate cloud storage services, such as Google Drive and Microsoft OneDrive
- Synced to personal cloud storage services, such as Box, Dropbox, iCloud, and OneDrive
- Uploaded via web browsers
- Moved to removable media
- Sent as email attachments in Microsoft Office 365 and Gmail
- Sent to printers
Considerations
- Available file event metadata varies based on which detection types and data connections are enabled in your Code42 environment.
- No single file event contains data for all categories and all fields listed below. The metadata applicable to each event varies based on the specifics of the file activity.
- Some fields use different labels in the Code42 console, the Forensic Search CSV export, and the Code42 API JSON output. See the field name mapping section below for more details.
- File event metadata appears throughout Incydr, but the images below show examples from Forensic Search.
File event metadata
File event metadata is grouped by category. The sections below provide details about the individual fields in each of these categories:
- Risk
- Response controls
- Event
- User
- File
- Source
- Git
- Destination
- Process
- Report
Risk
The Risk section displays the overall risk severity for the event, the PRISM score, and all associated risk indicators. To learn more about risk indicators and the PRISM score is calculated, see Risk settings reference.
Item | Description |
---|---|
Risk severity |
The file event's overall risk severity, based on the following scoring ranges: |
PRISM score |
The PRISM score is based on the sum of all risk indicators applied to an event. A higher score denotes higher risk severity. There is a limit to how much each risk indicator type (File, Source, Destination, and User) contributes to the PRISM score. This helps prevent a single risk indicator from having a disproportionate effect on the event's severity. In addition, the total PRISM score is limited to 10. As a result of these limits, the PRISM score may be lower than the sum of all individual risk indicators.
Scoring limits started July 18, 2024
Limits did not apply to file activity before July 18, 2024, so older events may have higher scores. |
Risk indicators |
List of risks that determine the overall severity and PRISM score for this event. For a list of all risk indicators, sign in to the Code42 console and select Risk settings. |
Trusted activity |
Indicates if this is activity you trust, as defined by your Data Preferences and any cloud data connections configured for monitoring by Incydr. (The Forensic Search filter shows the options Include and Exclude, and the file event details display the values True and False.)
|
Untrusted values |
Lists values that do not match an entry in your list of Trusted activity. Depending on the details of the event, one or more of the following may appear:
Values are obtained from related metadata for the event. Click the add trust icon to quickly add the value to your list of trusted activity. Only applies to event types that are evaluated for trust. |
Response controls
The Response controls section displays event details for users on a watchlist with preventative controls enabled.
Item | Description |
---|---|
Preventative control |
Indicates if the file activity was allowed or blocked:
|
User justification |
When a user allows the activity, indicates the reason they selected:
|
Event
The Event section provides summary information about the event, including date observed, event type, and event source.
Item | Description |
---|---|
Endpoint file activity File activity can be detected in two ways:
Cloud file activity Date and time that Code42 detected activity in the cloud service. This may not be the exact time the activity occurred, but should be within 5 minutes. The time is reported in Coordinated Universal Time (UTC). Email file activity Gmail and Microsoft Office 3651: Date and time Code42 was notified that an email was sent with an attachment2. This may not be the exact time the email was sent, but should typically be within 5 minutes. The time is reported in Coordinated Universal Time (UTC). |
|
Event ID |
A unique identifier for the event. Click the menu icon next to the Event ID at the top of the the file event details and choose:
|
Event action |
Cloud or endpoint
Cloud sync
Git
Requires a supported product plan.
Preventative controls
Removable media file activity
Removable media volume activity
Unexpected Modified events for removable media
Due to how different operating systems record file system activity, Incydr can sometimes report unexpected Modified file events (especially for files moved to removable media). See Unexpected file events on removable media for more information on the cause of these events and how to identify previous file activity for the files involved. |
Event observer |
The data source that captured the file event:
This field appears only if you are licensed for more than one data source. |
Share type |
Identifies sharing permission changes associated with the file event:
Click View sharing or View and manage sharing to view a list of users the file is shared with. Code42 then requests the file's list of sharing permissions from the vendor and displays it in a new tab. If you have the Insider Risk Admin or Insider Risk Respond role, you can also revoke the file's sharing permissions on that tab to remove those users' access to the file. |
1 Requires configuration of an email data connection.
2 In some cases, email signatures with attached images may generate unexpected file events.
User
The User section provides details about the user associated with the event.
Item | Description |
---|---|
Username |
Indicates the user associated with the event for the following Event observer types:
If the Username matches a Code42 user, a View profile link is included. Click to review the User Profile, which highlights file activity for this user over the past 90 days that may indicate a file exfiltration risk. |
Watchlist members |
Returns all file events for users currently on the specified watchlist. Search filter only. Does not appear in file event details. |
User ID |
Unique identifier for the user of the Code42 agent on the device. Applies only to Endpoint events. |
File
The File section provides a link to download the file, along with details such as the file's name, path, owner, and other metadata.
Item | Description |
---|---|
Archive ID |
Unique identifier for files identified as an archive, such as .zip files. This ID represents a specific exfiltration instance of the archive. If an archive is exfiltrated more than once, the Archive ID will be unique each time. |
Directory ID |
Unique identifier of the cloud drive or folder that contains the file. Search by this ID to find events for files within the same drive or folder. Google Drive files that exist at the root level of the cloud drive display the value None. Some cloud services allow users to add a file to multiple folders, so Directory ID may display a list of values. Applies only to Cloud events. |
Filename |
The name of the file, including the file extension. If applicable, a link to download the file appears below the filename. To troubleshoot events where the file is unavailable, see "No file available for download" reasons.
File download risks
Incydr does not validate the contents of user-generated files. Use caution when downloading and interacting with these files. Endpoint file activity
You must be signed in as a user with the Security Center - Restore or Security Center - Restore - Endpoint role to download files. Cloud file activity Click Copy link to copy the URL to the shared file. You may be able to use this link to open the file in the respective cloud service's file viewer. Access to the file depends on the following:
Email file activity Click Download file to download the attached file. Applies to Salesforce report downloads Displays the predicted filename based on Salesforce naming conventions. The Filename reported by Incydr may not exactly match the filename reported by Salesforce if:
Delete file contents
From the options menu , select Delete file contents to remove the file contents from the file event details. This enables you to prevent other users in your organization (who have permission to view file event activity) from accessing particularly sensitive files. Limitations
|
File path |
The file location on the user's device. Endpoint file events only. Cloud and email events do not include a file path. |
File category | The type of file, as determined by the file extension and file contents. For example, .gif, .jpg, and .png files are categorized as Image files. For a complete list of file categories and the specific file types in each category, see Incydr file categories. |
File size |
Size of the file. Not available for Google file types (for example, Google Sheets or Google Docs) or Salesforce reports downloaded to an unmonitored device. |
File owner |
The name of the user who owns the file, as reported by the device's file system (for endpoint events) or the cloud service (for cloud events). For files stored in a Google Shared Drive, the File owner reports the name of the drive and appends "(Shared Drive)." For example: Product Management (Shared Drive). |
MD5 hash |
The MD5 hash of the file contents. If the file cannot be hashed, an error message explains why. Not available for:
|
SHA256 hash |
The SHA256 hash of the file contents. If the file cannot be hashed, an error message explains why. Not available for:
|
File created |
File creation timestamp as reported by the device's operating system or the data connection. This appears in Coordinated Universal Time (UTC). Mac and Windows NTFS devices only. |
File modified |
File modification timestamp as reported by the device's operating system or the data connection. For endpoints, this only indicates changes to file contents. Changes to file permissions, file owner, or other metadata are not reflected in this timestamp. For cloud data connections, this timestamp reflects when the file's contents, sharing permissions, name, or storage location changed. This timestamp is not supported for for email data connections. This appears in Coordinated Universal Time (UTC). |
File classification (not pictured) |
File classification data, as reported by your external data classification vendor. Classification data contains two values:
A single file may have more than one classification. If Microsoft co-authoring is enabled, Incydr cannot detect file classification data. |
File acquired from |
Indicates where the file was acquired from. Click to view more details about the source, including:
If the same file was downloaded more that once, multiple sources may be listed. 1 Available as search filters in Forensic Search. For example, use the search filter File > File acquired from: Source domain in combination with other filters (such as Risk severity or Event action) to identify potential risk for files that came from a specific domain. |
Parent archive ID |
For files contained within an archive (such as a .zip file), the unique identifier for that archive; searching by Parent archive ID returns events for all files contained within that archive. |
Password protected |
For files contained within an archive (such as a .zip file), indicates if the archive is password protected. |
Source
The Source section provides details about the origin of a file. Source details vary based on the event type. For example, the Source name for an upload event indicates the hostname of the user's device, while the Source name for a download event indicates the location where the download originated (for example, "Dropbox").
No single event contains values for all items in the table below. For example, the image above does not include removable media metadata, because this event occurred in a web browser, not on removable media.
Available values vary based on the device manufacturer. In some cases, one or more values may not be supplied by the manufacturer or provided by the device's operating system.
That's why we provide multiple pieces of information for removable media events. For example, if a drive does not report a serial number, you may be able to reference a combination of Capacity, Device Partition ID, and other unique fields to confirm the drive's identity during an investigation.
Item | Description | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Source category |
The general category of where the downloaded file originated. To view all categories, select the Source > Source category filter in Forensic Search and review the list of possible values. A few of the most common categories are listed below as examples.
If the user accessed more than one tab while downloads were in progress, the source category may indicate Multiple possibilities. Review the Active tab titles and URLs (below) to identify all possible sources. |
||||||||||||||||
Source name |
Endpoint events The hostname of the device, as reported by the device's operating system. The hostname may be different than the device name in the Code42 console. To search for a hostname, you must enter the complete hostname. Wildcard searches are not supported. Download events The specific location where the file downloaded originated. Example names for some categories are listed below, but this is not a complete list:
If the user accessed more than one tab while downloads were in progress, the source name may indicate Multiple possibilities. Review the Active tab titles and URLs (below) to identify all possible sources. |
||||||||||||||||
Active tab titles and URLs |
The name of the browser tab or title of the application window active at the time the file is read by the browser or other app. For web browsers, the URL of the active tab may also be included. This information helps determine the source of a downloaded file.
If the tab title or URL cannot be captured, it is listed as Unavailable and may also display one of these reasons:
|
||||||||||||||||
Domain | Fully qualified domain name (FQDN) for the user's device at the time the event is recorded. If the device is unable to resolve the domain name of the host, it reports the IP address of the host. | ||||||||||||||||
Email from |
The display name of the sender, as it appears in the "From" field in the email. In many cases, this is the same as Email sender, but it can be different if the message is sent by a server or other mail agent on behalf of someone else. Applies only to Emailed events. Visible only with licensing for one or more email data sources. Email details do not apply to endpoint or cloud events. |
||||||||||||||||
Email sender |
The address of the entity responsible for transmitting the message. In many cases, this is the same as Email from, but it can be different if the message is sent by a server or other mail agent on behalf of someone else. Applies only to Emailed events. Visible only with licensing for one or more email data sources. Email details do not apply to endpoint or cloud events. |
||||||||||||||||
IP address (public) |
The external IP address of the user's device, as seen by Code42 via the device's outbound connection to the Code42 cloud. If the IP address is not included in your list of in-network IP addresses, the Remote risk indicator is applied. |
||||||||||||||||
IP address (private) |
The IP address of the user's device on your internal network. This includes:
If there is more than one active network interface, this displays a list. |
||||||||||||||||
Operating system |
Indicates the operating system of the device associated with the file event. Applies only to endpoint events. |
||||||||||||||||
Removable media bus type |
The type of removable media connection. For example: USB, eSATA, Thunderbird. Applies only to removable media events. |
||||||||||||||||
Removable media capacity |
The storage capacity of the removable media. Applies only to removable media events. |
||||||||||||||||
Removable media vendor name |
The brand name of the removable media. For example: Lexar, SanDisk, Seagate. Applies only to removable media events. |
||||||||||||||||
Removable media device name |
The volume name of the removable media. Applies only to removable media events. |
||||||||||||||||
Removable media device media name |
The media name of the device, as reported by the vendor/device. This is usually very similar to the Device Name, but can vary based on the type of device. For example, if the device is a hard drive in a USB enclosure, this may be the combination of the drive model and the enclosure model. This value is not provided by all devices, so it may be null in some cases. Applies only to removable media events. |
||||||||||||||||
Removable media device volume name |
The name assigned to the volume when it was formatted, as reported by the device's operating system. This is also frequently called the "partition" name. Applies only to removable media events. |
||||||||||||||||
Removable media device partition ID |
A unique identifier assigned to the volume/partition when it was formatted. Windows devices refer to this as the Applies only to removable media events. |
||||||||||||||||
Removable media serial number |
Serial number of the connected hardware, as reported by the device's operating system. Applies only to removable media events. |
||||||||||||||||
Source account name |
For cloud sync apps installed on user devices, indicates the name of the account where the file activity occurred. The account name can help you better identify risk by indicating if the activity occurred in your corporate cloud account, or in a personal account you don't control. Applies only to OneDrive and Dropbox events. |
||||||||||||||||
Source account type |
For cloud sync apps installed on user devices, indicates the type of the account where the activity occurred.
Applies only to OneDrive and Dropbox events. |
||||||||||||||||
Source identifier |
A key:value pair used internally by Incydr to enable specific search queries. For example, in the Source Code dashboard, clicking the link to investigate in Forensic Search may automatically populate the Source identifier to return specific results. In most cases, you do not need to manually define values for this filter. |
||||||||||||||||
Source user |
For cloud sync apps installed on user devices, the name of the signed-in user. This additional context can help you determine whether the file is synced with an approved cloud service. For example, the Source user could indicate if a file synced with Google Drive is being stored in your corporate Google Workspace, or in an unsanctioned personal Google account.
|
Git
Git detection requires the insider risk agent and a supported product plan.
The Git section provides details about the Git activity associated with the event.
Item | Description |
---|---|
Git event ID |
A global unique identifier (GUID) generated by Incydr for this Git event. All files associated with this event have the same Git event ID. A single Git event can be associated with multiple file events. |
Last commit hash |
Hash value from the most recent commit in this Git event. |
Repository URI | Uniform Resource Identifier (URI) for the Git repository. |
Repository user | The username specified by the user who performed the Git event. This is a user-defined value and may differ from the credentials used to sign in to Git. |
Repository email | The email address specified by the user who performed the Git event. This is a user-defined value and may differ from the credentials used to sign in to Git. |
Repository endpoint path |
File path of the local Git repository on the user’s endpoint. |
Destination
The Destination section provides details about the where a file was sent or moved. Destination details vary based on the event type.
No single event contains values for all items in the table below. For example, the image above does not include removable media metadata, because this event occurred in cloud storage, not on removable media.
Available values vary based on the device manufacturer. In some cases, one or more values may not be supplied by the manufacturer or provided by the device's operating system.
That's why we provide multiple pieces of information for removable media events. For example, if a drive does not report a serial number, you may be able to reference a combination of Capacity, Device Partition ID, and other unique fields to confirm the drive's identity during an investigation.
Item | Description | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
The name of the browser tab or title of the application window active at the time the file is read by the browser or other app. For web browsers, the URL of the active tab may also be included. This information helps determine the destination of an uploaded file.
If the tab title or URL cannot be captured, it is listed as Unavailable and may also display one of these reasons:
Applies only to Browser or app read events. |
|||||||||||||||
Destination account name | For cloud sync apps installed on user devices, indicates the name of the account where the file activity occurred. The account name can help you better identify risk by indicating if the activity occurred in your corporate cloud account, or in a personal account you don't control. Applies only to OneDrive and Dropbox events. |
||||||||||||||
Destination account type |
For cloud sync apps installed on user devices, indicates the type of the account where the activity occurred.
Applies only to OneDrive and Dropbox events. |
||||||||||||||
Destination category |
The general category of where the file was sent. To view all categories, select the Destination > Destination category filter in Forensic Search and review the list of possible values. A few of the most common categories are listed below as examples.
If the user accessed more than one tab while uploads were in progress, the destination category may indicate Multiple possibilities. Review the Active tab titles and URLs to identify all possible destinations. Applies to Browser or app read and Cloud storage upload events. |
||||||||||||||
Destination name |
The specific location where the file was sent. Example names for some categories are listed below, but this is not a complete list:
If the user accessed more than one tab while uploads were in progress, the destination name may indicate Multiple possibilities. Review the Active tab titles and URLs to identify all possible destinations. Applies to Browser or app read and Cloud storage upload events. |
||||||||||||||
Destination user |
For endpoint sync folder events (occurred in a folder that is syncing with a cloud service): The name of the user signed in to the cloud sync application on the device. This additional context can help you determine whether the file is synced with an approved cloud service. For example, the User could indicate if a file synced with Google Drive is being stored in your corporate Google Workspace, or in an unsanctioned personal Google account.
For cloud events: The list of users granted to access the file by this event. Users who were granted access to the file prior to this event are not included. Click View to display a searchable list of usernames. This only includes users the file is explicitly shared with. It does not capture users who only accessed a shared link. This list can include:
Google Drive users without email addresses (for example, service or integration accounts with sharing permissions) are not listed. |
||||||||||||||
Destination identifier |
A key:value pair used internally by Incydr to enable specific search queries. For example, in the Source Code dashboard, clicking the link to investigate in Forensic Search may automatically populate the Destination identifier to return specific results. In most cases, you do not need to manually define values for this filter. |
||||||||||||||
Email recipients |
The email addresses of those who received the email. Includes the To, Cc, and Bcc recipients. Applies only to Emailed events. Visible only with licensing for one or more email data sources. Email details do not apply to endpoint or cloud events. |
||||||||||||||
Email subject |
The subject of the email message. Applies only to Emailed events. Visible only with licensing for one or more email data sources. Email details do not apply to endpoint or cloud events. |
||||||||||||||
IP address (public) |
The external IP address of the device that downloaded the file, as reported by the device's outbound connection to the Code42 cloud. If the IP address is not included in your list of in-network IP addresses, the Remote risk indicator is applied. Applies only to Downloaded events. |
||||||||||||||
IP address (private) |
The IP address of the device that downloaded the file on your internal network. This includes:
If there is more than one active network interface, this displays a list. Applies only to Downloaded events. |
||||||||||||||
Operating system |
Indicates the operating system of the device associated with the file event. Applies only to endpoint events. |
||||||||||||||
Printer name |
The name of the printer. Applies only to Printed events. |
||||||||||||||
Print job name |
The name of the print job. This is often the name of the printed document. Click Download file to download an image of the printed file. Applies only to Printed events. |
||||||||||||||
Remote hostname | The IP address or domain destination for files moved via file transfer tools, such as SFTP, SCP, FTP, and cURL. | ||||||||||||||
Removable media bus type |
The type of removable media connection. For example: USB, eSATA, Thunderbird. Applies only to removable media events. |
||||||||||||||
Removable media capacity |
he storage capacity of the removable media. Applies only to removable media events. |
||||||||||||||
Removable media device media name |
The media name of the device, as reported by the vendor/device. This is usually very similar to the Removable media device name, but can vary based on the type of device. For example, if the device is a hard drive in a USB enclosure, this may be the combination of the drive model and the enclosure model. This value is not provided by all devices, so it may be null in some cases. Applies only to removable media events. |
||||||||||||||
Removable media device name |
The volume name of the removable media. Applies only to removable media events. |
||||||||||||||
Removable media device partition ID |
A unique identifier assigned to the volume/partition when it was formatted. Windows devices refer to this as the Applies only to removable media events. |
||||||||||||||
Removable media device serial number |
Serial number of the connected hardware, as reported by the device's operating system. Applies only to removable media events. |
||||||||||||||
Removable media device vendor |
The brand name of the removable media. For example: Lexar, SanDisk, Seagate. Applies only to removable media events. |
||||||||||||||
Removable media device volume name |
The name assigned to the volume when it was formatted, as reported by the device's operating system. This is also frequently called the "partition" name. Applies only to removable media events. |
Process
The Process section provides details about the application and user associated with the file event.
Item | Description |
---|---|
Active tab signed-in user (not pictured) |
The user signed in to the active tab where the event occurred. For example, the user signed in to Gmail. This may differ from the user account signed in to the browser itself. Requires the Incydr browser extension. |
Executable name |
The path on disk of the executable, for example: \Device\Volume\Program Files\Google\Chrome\Application\chrome.exe On Mac devices, AirDrop activity is indicated by the process name /usr/libexec/sharingd. |
Incydr extension version (not pictured) |
The version of the Code42 Incydr extension installed when the event occurred. |
Process user |
The username of the process owner, as reported by the device's operating system. |
Web browser name (not pictured) |
The web browser in which the event occurred. Requires the Incydr browser extension. |
Salesforce report
The Salesforce report section provides details about reports downloaded from Salesforce.
Visible only with licensing for the Salesforce data connection.
Item | Description |
---|---|
Report name |
The display name of the report.
For details about the name of the downloaded file, see the Filename > Report activity section above. |
Report description |
The description of the report. Does not apply to ad hoc reports. |
Report column headers |
List of all column headers in the report. If there are more than 10 columns, a Show all link appears to display all columns. User-created custom bucket fields for public reports are reported in the format: Source column ("user label"). For example, if a user creates a bucket column named "Size" to categorize customers based on the EMPLOYEE_COUNT field, Report column headers displays the value EMPLOYEE_COUNT ("Size"). The source column and user-defined label for custom bucket fields are unavailable for private reports saved in a user's personal folder in Salesforce. In this case, Salesforce's default identifier for the column (such as BucketField_12345678) appears instead. |
Number of rows | The total number of rows returned in the report. |
Report type |
Indicates if the report is Ad-hoc or Saved:
|
Report ID |
The ID of the report associated with this event. Salesforce uses a 15-character ID for the Classic experience and an 18-character ID for the Lightning experience. Does not apply to ad hoc reports. |