Process_Open_Sockets v/s Socket_Events
This article explains the difference between socket information captured by Process_open_sockets and socket_events.
The article is also applicable in case of processes i.e process information captured by table 'Processes' and table 'Process_events'
Process_Open_sockets | Socket_events |
- A Scheduled Query
- Captures all sockets opened by all running processes when the query runs,.
- It will the miss the process that was opened and closed between query intervals.
| - Captures all Connect, Accept, Bind and listen System calls.
- Will Not miss any sockets that is created.
|
With socket events enabled, process_open_sockets is less useful, any process started before osquery started will captured by process_open_sockets.
With socket_events enabled, the frequency of collection of process_open_sockets can be decreased.
Please contact support@uptycs.com for any issues.
Related Articles
Tracing command execution back to a user across an ssh session
Some IT shops have sysadmins logging into a Jumpbox or Bastion host (with their individual id’s) then logging into production servers as root and running commands. In such a case it can be difficult to trace command execution back to the sysadmin who ...
Query to find Inbound / Outbound connections on Mac
Query WITH mac_assets AS (SELECT t.upt_asset_id FROM upt_asset_tags t WHERE t.key = 'upt-mac-edr') SELECT DISTINCT pos.upt_asset_id, ps.name, pos.pid, pos.local_address, pos.remote_address, pos.local_port, pos.remote_port, CASE WHEN pos.pid = lp.pid ...
Query to find the Process Tree
Query WITH pstree AS (SELECT 0 AS LEVEL, pid, name, parent, Cast(pid AS TEXT) AS ppid, name AS pparent FROM processes WHERE parent = 0 UNION ALL SELECT LEVEL + 1, t.pid, t.name, t.parent, pstree.ppid || ', ' || Cast(t.pid AS TEXT), pstree.pparent || ...
Windows Forensic Analysis queries
This article includes a list of queries to conduct forensic analysis on Windows systems. These are categorized into sections as - processes, services, file system activities, user login/session activities, network traffic. ...
Query for CVE-2020-1350 Vulnerability for Windows Domain Name Systems
Microsoft released an update on July 14 2020 for CVE-2020-1350 , a Critical Remote Code Execution (RCE) vulnerability in Windows DNS Server that is classified as a ‘wormable’ vulnerability and has a CVSS base score of 10.0. This issue results from a ...