search cancel

A SEDR event user_name can be inconsistent


Article ID: 227784


Updated On:


Advanced Threat Protection Platform Endpoint Detection and Response


In process launch events, the top level "user_name" field is expected to contain the user name from Occasionally, it contains the target process' user name.


This data is taken directly from the Windows Operating System via the Symantec Endpoint Protection agent.  It happens in specific parent-child combinations, e.g. the svchost.exe system service starts savui.exe user process.

The top level user_name is the same as the (DOMAIN\Administrator) but not equal to the (SYSTEM).


"Process A launches process B”
There is an actor user name (ActorUserName) in this event. This user name is from the SID of the thread in process A that launches process B. That SID is not necessarily the same as process A's user name, e.g. in the case of impersonation.
In this event, process B will have a user name (TargetUserName). 

Later if Process B does some action, in that event,
There will be an actor user name(ActorUserName) also, and this user name is not necessarily the same as the user name of process B in the previous launching event.

For actor user names, we use the thread level user names to cover impersonation cases.


Release : 4.6

Component : Event schema, reporting


The unexpected data comes directly from the Windows Operating System and shows how 'impersonation' works. The system service will launch child process on behalf of the logon user account.