pub enum SystemProvider {
Process,
Registry,
Network,
FileIo,
ImageLoad,
}Expand description
System-level event sources for kernel tracing.
Each variant represents a category of events emitted by the Windows kernel. Because these providers operate inside the kernel, they capture activity from all processes on the machine without any instrumentation in the target application.
§Privileges
Enabling any SystemProvider requires Administrator privileges. The
underlying trace session uses the NT Kernel Logger — a Windows-reserved
name for kernel providers — so only one kernel session can be active at a time.
Variants§
Process
Process and thread creation/termination events.
Emits an event whenever any process or thread starts or stops system-wide.
Registry
Registry key and value operations.
Emits an event for every registry read, write, create, and delete across all processes. Can be high-volume on busy systems.
Network
TCP/IP network connections and data transfer.
Emits events for TCP connections, UDP sends/receives, and connection failures. Covers both IPv4 and IPv6.
FileIo
File I/O operations (create, read, write, delete).
Emits an event for every file system operation. Very high volume —
consider using next_batch_with_filter to focus on relevant paths.
ImageLoad
DLL and EXE image load/unload events.
Emits an event whenever any executable or library is mapped into or unmapped from a process. Useful for detecting code injection.
Trait Implementations§
Source§impl Clone for SystemProvider
impl Clone for SystemProvider
Source§fn clone(&self) -> SystemProvider
fn clone(&self) -> SystemProvider
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read more