SourcesSource TypesAirlock Digital

Airlock Digital Application Control Logs

Airlock Digital provides application control and allowlisting with comprehensive execution history and server activity logging. These logs capture information such as blocked executions, trusted path events, publisher-based approvals, and administrative actions. They help administrators monitor endpoint security posture, track application control policy effectiveness, and audit changes for compliance.

Ingest Methods

Setup the ingestion of this source using one of the following guides.

API Polling

Airlock Digital supports API polling to collect execution history and server activity logs from your Airlock server.

Setup

  1. Go to Sources in RunReveal
  2. Click the Airlock Digital source tile
  3. Give it a name and click Connect Source
  4. Fill in the required fields with your Airlock server address and API key

Airlock Digital API Key Configuration

To generate an API key for RunReveal:

Prerequisites:

  • Airlock Digital server version v6.1 or later
  • A user account in a Permission Group with the following REST API Roles enabled:
    • logging/exechistories
    • logging/svractivities

Creating the API Key:

  1. Sign in to your Airlock Digital management console
  2. Navigate to My Profile
  3. Click Generate API Key
  4. Copy the API key and paste it into the RunReveal source configuration form
⚠️

Network Access Required: Airlock Digital uses port 3129 for REST API access. Ensure your firewall rules allow outbound HTTPS connections from RunReveal to your Airlock server on port 3129.

Airlock Digital Event Types

The Airlock Digital integration collects two categories of logs from your Airlock server.

Execution History Events

Execution history events track all application execution decisions made by Airlock on your endpoints.

Type IDEvent NameDescription
0Trusted ExecutionApplication ran and was explicitly trusted via hash approval
1Blocked ExecutionApplication was blocked from running by policy
2Untrusted Execution [Audit]Application ran in audit mode (would be blocked in enforcement)
3Untrusted Execution [OTP]Application ran via one-time password override
4Trusted Path ExecutionApplication ran from a trusted path location
5Trusted Publisher ExecutionApplication ran because its publisher certificate is trusted
6Blocklist ExecutionApplication matched an explicit blocklist rule and was blocked
7Blocklist Execution [Audit]Application matched a blocklist rule in audit mode
8Trusted Process ExecutionApplication ran as a child of a trusted process

Server Activity Events

Server activity events capture administrative actions performed on the Airlock management server, including policy changes, user management, and configuration updates.

Event Data Structure

Each execution history event includes:

  • Hostname - The endpoint where the execution occurred
  • Filename - Full path of the executed file
  • Parent Process - The process that launched the execution
  • SHA256 Hash - Cryptographic hash of the executed file
  • Publisher - Code signing certificate publisher name
  • Event Type - Numeric type ID indicating the execution decision

Data Collection

  • Collection Method: API polling every 60 seconds
  • Data Format: JSON with normalized fields for consistent querying
  • Endpoints Polled: Execution history and server activity logs
  • Real-time Updates: New events appear in RunReveal within 1-2 minutes

Schema

The following columns are exposed for this source. RunReveal applies schema normalization across all sources, ensuring uniform field names and data types for cross-source queries and reusable detection logic.

Table: airlock_logs (43 columns)

ColumnType
workspaceIDString
sourceIDString
sourceTypeString
sourceTTLUInt32
receivedAtDateTime
idString
eventTimeDateTime
eventNameString
eventIDString
srcIPString
srcASCountryCodeString
srcASNumberUInt32
srcASOrganizationString
srcCityString
srcConnectionTypeString
srcISPString
srcLatitudeFloat64
srcLongitudeFloat64
srcUserTypeString
dstIPString
dstASCountryCodeString
dstASNumberUInt32
ColumnType
dstASOrganizationString
dstCityString
dstConnectionTypeString
dstISPString
dstLatitudeFloat64
dstLongitudeFloat64
dstUserTypeString
actorMap(String, String)
tagsMap(String, String)
resourcesArray(String)
serviceNameString
enrichmentsArray(Tuple(data Map(String, String), name String, provider String, type String, value String))
readOnlyBool
rawLogString
eventTypeIDUInt8
hostnameString
filenameString
parentProcessString
sha256HashString
publisherString
checkpointString