Field Name
Type
General Field
Description
Example
Products
act
  • dynamic
-
The action
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • Third Party Log Collector
actResult
  • dynamic
-
The result of an action
  • -
  • -
  • -
  • Third Party Log Collector
action
  • string
-
The traffic processing action
  • ACCEPT
  • REJECT
  • Third Party Log Collector
actionName
  • string
-
The user or service action
  • ConnectionSuccess
  • Third Party Log Collector
additionalEventData
  • dynamic
-
The additional event information that was not part of the request or response
  • {"SignatureVersion":"SigV4","CipherSuite":"ECDHE-RSA-AES128-GCM-SHA256"}
  • Third Party Log Collector
alertCategories
  • dynamic
-
The list of alert categories
  • -
  • Third Party Log Collector
alertTitle
  • string
-
The alert title
  • FIREWALL_ACTIVITY_LOG
  • TRAFFIC
  • Suspicious PowerShell command line
  • Third Party Log Collector
apiVersion
  • string
-
The API version associated with the AwsApiCall eventType value
  • 2012-08-10
  • Third Party Log Collector
app
  • string
-
The network protocol
  • DNS Response
  • TCP
  • HTTP
  • tcp
  • Third Party Log Collector
application
  • string
-
The name of the requested application
  • Microsoft Account
  • Microsoft Services
  • Office Online
  • update.googleapis.com
  • Third Party Log Collector
applicationId
  • string
-
The application ID
  • 11111111-1111-1111-1111-111111111111
  • Third Party Log Collector
awsRegion
  • string
-
The AWS region the request was made to
  • us-east-1
  • us-east-2
  • us-west-1
  • Third Party Log Collector
azId
  • string
-
The Availability Zone ID
  • apse2-az3
  • Third Party Log Collector
bytes
  • string
-
The number of transmitted data bytes
  • 15044
  • Third Party Log Collector
category
  • string
-
The event category
  • Exploits
  • Reconnaissance
  • Vulnerabilities
  • Security Policy
  • utm:ips
  • Third Party Log Collector
cloudAccountId
  • string
-
The owner AWS account ID of the source network interface (account-id)
  • 123456789012
  • Third Party Log Collector
cloudTrailEventId
  • string
-
The GUID generated by AWS CloudTrail to identify events
  • 11111111-1111-1111-1111-111111111111
  • Third Party Log Collector
cnt
  • string
-
The total number of logs
  • 1
  • 2
  • 3
  • Third Party Log Collector
dOSName
  • string
-
The destination OS
  • Windows
  • Third Party Log Collector
dUser1
  • string
  • UserAccount
The latest sign-in user of the destination
  • N/A
  • empty
  • bob
  • sample_email@trendmicro.com
  • sip:service@10.10.10.10:5060
  • Third Party Log Collector
dhost
  • string
  • DomainName
The destination hostname
  • sw_us-east-1c_10-124-21-139
  • 10.10.10.10
  • www.sample.org
  • Third Party Log Collector
direction
  • string
-
The direction
  • Inbound
  • Incoming
  • Outgoing
  • Unknown
  • client-to-server
  • server-to-client
  • Third Party Log Collector
dmac
  • string
-
The destination MAC address
  • 00:00:00:ff:ff:ff
  • Third Party Log Collector
dnsQueryType
  • string
-
The record type requested by the DNS protocol
  • A
  • Third Party Log Collector
dpt
  • int
  • Port
The destination port
  • 0
  • 445
  • 80
  • Third Party Log Collector
dst
  • dynamic
  • IPv4
  • IPv6
The destination IP
  • -
  • Third Party Log Collector
dstEndpointGuid
  • string
-
The destination host GUID on which the event was detected
  • 11111111-1111-1111-1111-111111111111
  • Third Party Log Collector
dstEndpointHostName
  • string
-
The destination endpoint hostname on which the event was detected
  • PHILIPSIBE09
  • WHAM6WK8XG2
  • MacBook-Pro-del-Meno
  • Third Party Log Collector
dstIpType
  • string
-
The destination IP address type
  • Public
  • Third Party Log Collector
dstLocation
  • string
-
The destination country
  • Japan
  • Third Party Log Collector
dstZone
  • string
-
The destination zone of the session
  • wan
  • dmz
  • undefined
  • Internal
  • nat-trust
  • nat-untrust
  • Third Party Log Collector
duser
  • dynamic
  • EmailRecipient
The email recipient
  • -
  • -
  • -
  • -
  • Third Party Log Collector
dvc
  • dynamic
-
The device IP
-
  • undefined
dvchost
  • string
-
The network device hostname
  • my-company-xns
  • my-ddi
  • VLAB-PA440
  • FG-50E
  • Third Party Log Collector
endpointHostName
  • string
  • EndpointName
The hostname of the device on which the event was detected
  • usportal
  • Third Party Log Collector
errorCode
  • string
-
The AWS service error code
  • ThrottlingException
  • InvalidParameterValueException
  • NoSuchLifecycleConfiguration
  • Third Party Log Collector
errorMessage
  • string
-
The error description
  • The specified bucket does not have a website configuration
  • An unknown error occurred
  • The lifecycle configuration does not exist
  • Third Party Log Collector
eventCase
  • string
-
The AWS service that the request was made to
  • workspaces.amazonaws.com
  • sts.amazonaws.com
  • kms.amazonaws.com
  • All products
eventCategory
  • string
-
The event category used in LookupEvents calls
  • Management
  • Data
  • Insight
  • AlertEvidence
  • DeviceProcessEvents
  • Third Party Log Collector
eventDataLogonType
  • string
-
The sign-in type of Windows Event 4624 (successful sign-in attempt)
  • Network
  • Third Party Log Collector
eventId
  • string
-
The event ID
  • 200138
  • 100119
  • Third Party Log Collector
eventName
  • string
-
The log type
  • FIREWALL_ACTIVITY_LOG
  • TRAFFIC
  • Third Party Log Collector
eventSource
  • string
-
The AWS service the request was made to
  • s3.amazonaws.com
  • dynamodb.amazonaws.com
  • xray.amazonaws.com
  • Third Party Log Collector
eventSubName
  • string
-
The event type sub-name
  • start
  • end
  • drop
  • deny
  • url
  • ml-virus
  • file
  • vulnerability
  • wildfire
  • Third Party Log Collector
eventTime
  • real
-
The time the agent or product detected the event
  • 1656324260000
  • Third Party Log Collector
  • All products
eventType
  • string
-
The type of event that generated the event record
  • AwsApiCall
  • AwsServiceEvent
  • AwsConsoleAction
  • Third Party Log Collector
eventVersion
  • string
-
The log event format version
  • 1.08
  • Third Party Log Collector
fileHash
  • string
  • FileSHA1
The SHA-1 of the file
  • DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F
  • 3AD1F4E7CAA11E5199EE80B8983677ADDD065450
  • Third Party Log Collector
fileHashMd5
  • string
  • FileMD5
The MD5 of the file
  • d5120786925038601a77c2e1eB9a3a0a
  • Third Party Log Collector
fileHashSha256
  • string
  • FileSHA2
The SHA-256 of the file
  • 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB
  • BFF703FF836196644586014DA13A097C2EE9A08E4D596DFB7C8E0F685FE01294
  • 12327F460AC9CBBC34D39EB3CF89C7FECCA37F08773A04566840F73F6ECC4104
  • Third Party Log Collector
fileName
  • dynamic
  • FileName
The file name
  • -
  • -
  • -
  • -
  • Third Party Log Collector
fileOriginIP
  • string
-
The IP address from where the file was downloaded
  • 10.10.10.10
  • Third Party Log Collector
fileOriginUrl
  • string
-
The URL from where the file was downloaded
  • http://www.example.com
  • Third Party Log Collector
filePath
  • string
  • FileFullPath
The file path
  • security
  • /var/log/audit/audit.log
  • application
  • Third Party Log Collector
fileSize
  • string
-
The file size
  • 1209
  • Third Party Log Collector
fileType
  • string
-
The file type
  • EXE
  • LNK
  • MIME
  • linux
  • Third Party Log Collector
filterRiskLevel
  • string
-
The top level filter risk of the event
  • info
  • low
  • medium
  • All products
flowDirection
  • string
-
The network interface traffic direction
  • ingress
  • egress
  • Third Party Log Collector
flowId
  • string
-
The connection ID
  • 101766
  • 440
  • 20518968
  • Third Party Log Collector
flowType
  • string
-
The type of traffic (type)
  • IPv4
  • IPv6
  • EFA
  • Third Party Log Collector
groupId
  • string
-
The group ID for the management scope filter
  • 11111111-1111-1111-1111-111111111111
  • All products
hostName
  • string
  • DomainName
  • HostDomain
The hostname
  • NJ-EFFY-ZHAO1
  • trendmicro.com
  • SMC User
  • Third Party Log Collector
httpReferer
  • string
  • URL
The HTTP referer
  • http://10.10.10.10/
  • http://fake/home/
  • http://fake.com/page/Test.jsp
  • Third Party Log Collector
httpRespContentType
  • string
-
The HTTP response data content type
  • Application/json
  • application/octet-stream
  • Third Party Log Collector
httpXForwardedFor
  • string
-
The HTTP X-Forwarded-For header
  • 10.10.10.10, 10.10.10.11, 10.10.10.12
  • Third Party Log Collector
instanceId
  • string
-
The instance ID
  • i-01234567890abcdef
  • Third Party Log Collector
ipProto
  • int
-
The protocol number (protocol)
  • 6
  • 17
  • Third Party Log Collector
isLocalAdmin
  • bool
-
Whether the user is a local administrator on the device
  • true
  • Third Party Log Collector
logReceivedTime
  • long
-
The time when the XDR log was received
  • 1656324260000
  • All products
logStatus
  • string
-
The VPC Flow Log status
  • OK
  • NODATA
  • SKIPDATA
  • Third Party Log Collector
logonUser
  • dynamic
  • UserAccount
The sign-in user name
  • -
  • Third Party Log Collector
mailMsgSubject
  • string
  • EmailSubject
The email subject
  • Administrator Login
  • Administrator Logout
  • hello_world2
  • Suspicious Email Detected
  • Third Party Log Collector
malFamily
  • string
-
The threat family
  • Emotet
  • Third Party Log Collector
malName
  • string
-
The name of the detected malware
  • EICAR_TEST_FILE
  • Third Party Log Collector
managementEvent
  • bool
-
The management event
  • true
  • false
  • Third Party Log Collector
networkInterfaceId
  • string
-
The network interface ID (interface-id)
  • eni-01234567890abcdef
  • Third Party Log Collector
objectCmd
  • dynamic
  • CLICommand
The command line entry of the target process
  • -
  • -
  • -
  • -
  • -
  • Third Party Log Collector
objectFileHashSha1
  • string
  • FileSHA1
The SHA-1 hash of the target process image or target file
  • DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • Third Party Log Collector
objectFileHashSha256
  • string
  • FileSHA2
The SHA-256 hash of the target process image or target file
  • 6A6EB2D717CEA041B4444193B45EDFB6CA1287518203B7230B3C4B8FFB031EAB
  • Third Party Log Collector
objectFileName
  • string
  • FileName
The object file name
  • powershell.exe
  • wmiprvse.exe
  • dismhost.exe
  • Third Party Log Collector
objectFilePath
  • string
  • FileFullPath
  • FileName
The file path of the target process image or target file
  • c:\windows\system32\windowspowershell\v1.0\powershell.exe
  • zwwritevirtualmemory
  • c:\windows\system32\wbem\wmiprvse.exe
  • Third Party Log Collector
objectIps
  • dynamic
  • IPv4
  • IPv6
The IP address resolved by the DNS protocol
  • -
  • Third Party Log Collector
objectPid
  • int
-
The object process PID
  • 11360
  • Third Party Log Collector
objectRegistryData
  • string
  • RegistryValueData
The registry data contents
  • 3
  • Third Party Log Collector
objectRegistryKeyHandle
  • string
  • RegistryKey
The registry key path
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
  • Third Party Log Collector
objectRegistryOriginalData
  • string
-
The original registry value data before modification
  • 2
  • Third Party Log Collector
objectRegistryOriginalKeyHandle
  • string
-
The original registry key before modification
  • HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
  • HKLM\system\currentcontrolset\services\w32time\config
  • HKLM\system\currentcontrolset\services\tcpip\parameters
  • Third Party Log Collector
objectRegistryOriginalValue
  • string
-
The original registry value name before modification
  • Start
  • Third Party Log Collector
objectRegistryValue
  • string
  • RegistryValue
The registry value name
  • AdobeUpdater
  • Third Party Log Collector
objectRegistryValueType
  • int
-
The Windows Registry Type ID
  • 4
  • Third Party Log Collector
objectSessionIp
  • string
  • IPv4
  • IPv6
The remote device IP address
  • 10.10.10.10
  • fe80::ffff:ffff:0000:0000
  • Third Party Log Collector
objectSigner
  • dynamic
-
The list of object process signers
  • -
  • Third Party Log Collector
objectSignerValid
  • dynamic
-
Whether each signer of the object process is valid
  • -
  • -
  • Third Party Log Collector
objectType
  • string
-
The object type
  • Device
  • Third Party Log Collector
objectVersionInfoOriginalFileName
  • string
  • FileName
The original file name from the version information of the object image
  • msedgeupdate.dll
  • Third Party Log Collector
oldFileHash
  • string
  • FileSHA1
The old file hash
  • DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • 89CE26EAD139D52B8A6B61BFFC6AF89AF246580F
  • 57247B810B0EE61DD86CE24AC14097B9B5405EEC
  • Third Party Log Collector
pComp
  • string
-
The component that made the detection
  • Microsoft Defender for Office 365
  • Third Party Log Collector
packets
  • string
-
The number of transmitted data packets
  • 14
  • Third Party Log Collector
parentFileName
  • string
-
The parent process name
  • explorer.exe
  • Third Party Log Collector
parentPid
  • int
-
The PID of the parent process
  • 10035
  • Third Party Log Collector
pktDstAddr
  • string
  • IPv4
  • IPv6
The packet level destination IP
  • 10.10.10.10
  • Third Party Log Collector
pktDstCloudServiceName
  • string
-
The subset IP address range name for the cloud service destination IP (pkt-dst-aws-service)
  • AMAZON
  • EC2
  • ROUTE53
  • Third Party Log Collector
pktSrcAddr
  • string
  • IPv4
  • IPv6
The packet level source IP
  • 10.10.10.10
  • Third Party Log Collector
pktSrcCloudServiceName
  • string
-
The subset IP address range name for the cloud service source IP (pkt-src-aws-service)
  • AMAZON
  • EC2
  • ROUTE53
  • Third Party Log Collector
pname
  • string
-
The product name
  • PAN-OS
  • Fortigate
  • Microsoft Defender for Endpoint
  • Third Party Log Collector
policyName
  • string
-
The name of the triggered policy
  • TLC-to-nat-untrust
  • TLC-to-nat-trust
  • default
  • g-default
  • Unified-Policy
  • Third Party Log Collector
policyTreePath
  • string
-
The policy tree path
  • policyname1/policyname2/policyname3
  • All products
policyUuid
  • string
-
The policy UUID
  • 11111111-1111-1111-1111-111111111111
  • Third Party Log Collector
previousObjectFileName
  • string
  • FileName
The previous object file name
  • powershell.exe
  • wmiprvse.exe
  • dismhost.exe
  • Third Party Log Collector
previousObjectFilePath
  • string
  • FileFullPath
  • FileName
The previous file path of the target process image or target file
  • /usr/tmp/powershell.exe
  • Third Party Log Collector
principalName
  • string
-
The user principal name used to sign in to the proxy
  • sample_email@trendmicro.com
  • Third Party Log Collector
processCmd
  • string
  • CLICommand
The subject process command line
  • \"cmd.exe-\" /c powershell.exe -Command
  • Third Party Log Collector
processFileHashSha1
  • string
  • FileSHA1
The SHA-1 of the subject process
  • DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • Third Party Log Collector
processFilePath
  • string
  • ProcessFullPath
  • ProcessName
  • FileFullPath
  • FileName
The file path of the subject process
  • c:\\windows\\system32\\cmd.exe
  • Third Party Log Collector
processFileRemoteAccess
  • bool
-
The remote access to the process file
  • true
  • Third Party Log Collector
processName
  • string
  • ProcessName
The image name of the process that triggered the event
  • cmd.exe
  • Third Party Log Collector
processPid
  • int
-
The PID of the subject process
  • 10035
  • Third Party Log Collector
processRemoteSessionDeviceName
  • string
-
The remote device name of the process
  • user2
  • Third Party Log Collector
processRemoteSessionIp
  • string
  • IPv4
  • IPv6
The remote device IP address of the process
  • 10.10.10.10
  • Third Party Log Collector
processUser
  • string
  • UserAccount
The user name of the process or the file creator
  • user2
  • Third Party Log Collector
processUserDomain
  • string
-
The owner domain of the subject process image
  • nt authority
  • Third Party Log Collector
processVersionInfoOriginalFileName
  • string
  • FileName
The original file name from the version information of the process image
  • cmd.exe
  • Third Party Log Collector
productCode
  • string
-
The internal product code
  • tlc
  • Third Party Log Collector
  • All products
profile
  • string
-
The name of the triggered Threat Protection template or Data Loss Prevention profile
  • default
  • g-default
  • Third Party Log Collector
proto
  • string
-
The transport network protocol
  • 6
  • TCP
  • 17
  • Third Party Log Collector
pver
  • string
-
The product version
  • v6.0.3
  • 10.1.12
  • Third Party Log Collector
rating
  • string
-
The credibility level
  • any
  • Unknown
  • Dangerous
  • computer-and-internet-info
  • Third Party Log Collector
readOnly
  • bool
-
Whether the operation is read-only
  • true
  • false
  • Third Party Log Collector
recipientAccountId
  • string
-
The Account ID that received the event
  • 123456789012
  • Third Party Log Collector
regionCode
  • string
-
The network interface AWS Region
  • ap-southeast-2
  • Third Party Log Collector
reqDataSize
  • string
-
The data volume transmitted over the transport layer by the client (in bytes)
  • 15688
  • Third Party Log Collector
requestClientApplication
  • string
-
The HTTP user agent
  • Firefox/126.0
  • Other: Wget/1.19.1 (mingw32)
  • MICROSOFT_DEVICE_METADATA_RETRIEVAL_CLIENT
  • LIBCURL
  • Third Party Log Collector
requestID
  • string
-
The request ID generated by the service this value)
  • 11111111-1111-1111-1111-111111111111
  • Third Party Log Collector
requestMethod
  • string
-
The network protocol request method
  • POST
  • get
  • Third Party Log Collector
requestParameters
  • dynamic
-
The parameters sent with the request
  • {"durationSeconds": 3600, "roleSessionName":"BackplaneAssumeRoleSession"}
  • Third Party Log Collector
requests
  • dynamic
  • URL
The URLs of the request
  • -
  • -
  • Third Party Log Collector
resources
  • dynamic
-
The resources accessed in the event
  • [{"type":"AWS::S3::Object","ARN":"arn:aws:s3:::your-bucket/file.txt"}]
  • Third Party Log Collector
respDataSize
  • string
-
The data volume transmitted over the transport layer by the server (in bytes)
  • 7856
  • Third Party Log Collector
responseElements
  • dynamic
-
The response elements for create, update, and delete actions
  • {"user":{"createDate":"Mar 24, 2014 9:11:59 PM","userName":"Bob","arn":"arn:aws:iam::123456789012:user/Bob","path":"/","userId":"EXAMPLEUSERID"}}
  • Third Party Log Collector
ruleId
  • int
-
The rule ID
  • 1002795
  • 1003802
  • Third Party Log Collector
ruleName
  • string
-
The name of the rule that triggered the event
  • ETL_Access Rules_Web_Host
  • block_wiki_for_guest
  • Third Party Log Collector
sOSName
  • string
-
The source OS
  • Windows 10
  • Third Party Log Collector
sUser1
  • string
  • UserAccount
The latest sign-in user of the source
  • sample_email@trendmicro.com
  • sip:sipp@10.10.10.10:5060
  • Third Party Log Collector
service
  • string
-
The Microsoft 365 service where the activity occurred
  • Microsoft Defender for Office 365
  • Third Party Log Collector
serviceEventDetails
  • dynamic
-
The service event details
  • {"lifecycleEventPolicy":{"policyVersion":1,"policyId":"11111111-1111-1111-1111-111111111111"}}
  • Third Party Log Collector
sessionEnd
  • string
-
The session end time (in seconds)
  • 1575462989
  • Third Party Log Collector
sessionEndReason
  • string
-
The reason why a session was terminated
  • tcp-fin
  • tcp-rst-from-server
  • Third Party Log Collector
sessionStart
  • string
-
The session start name (in seconds)
  • 1575462989
  • Third Party Log Collector
severity
  • int
-
The severity of the event
  • 3
  • Third Party Log Collector
sharedEventID
  • string
-
The AWS CloudTrail GUID (from the same AWS action sent to different AWS accounts)
  • 11111111-1111-1111-1111-111111111111
  • Third Party Log Collector
shost
  • string
  • DomainName
The source hostname
  • sw_us-east-1a_10-124-17-69
  • sw_us-east-1c_10-124-21-139
  • WIN-FBUB1O9TU4U
  • TW-STEVENLIN
  • Third Party Log Collector
smac
  • string
-
The source MAC address
  • 00:00:00:ff:ff:ff
  • Third Party Log Collector
sourceIPAddress
  • string
  • IPv4
  • IPv6
The request IP address (for service console actions: the customer resource, for AWS services: the DNS name)
  • 10.10.10.10
  • apigateway.amazonaws.com
  • config.amazonaws.com
  • Third Party Log Collector
spt
  • int
  • Port
The source port
  • 53
  • 0
  • 7680
  • 50006
  • 52068
  • Third Party Log Collector
src
  • dynamic
  • IPv4
  • IPv6
The source IP
  • -
  • Third Party Log Collector
srcEndpointGuid
  • string
-
The source endpoint GUID on which the event was detected
  • 11111111-1111-1111-1111-111111111111
  • Third Party Log Collector
srcEndpointHostName
  • string
-
The source endpoint hostname on which the event was detected
  • PHILIPSIBE09
  • WHAM6WK8XG2
  • MacBook-Pro-del-Meno
  • Third Party Log Collector
srcIpType
  • string
-
The source IP type
  • Private
  • Third Party Log Collector
srcLocation
  • string
-
The source country
  • Japan
  • Reserved
  • Third Party Log Collector
srcZone
  • string
-
The source zone of the session
  • wan
  • dmz
  • undefined
  • TLC
  • Third Party Log Collector
sslCertIssuerCommonName
  • string
-
The issuer common name
  • Microsoft Code Signing PCA 2011
  • Third Party Log Collector
subLocationId
  • string
-
The sub-location ID
  • lz-0abcd123efg4567h
  • op-0abcd123efg4567h
  • wz-0abcd123efg4567h
  • Third Party Log Collector
subLocationType
  • string
-
The sub-location type
  • wavelength
  • outpost
  • localzone
  • Third Party Log Collector
subnetId
  • string
-
The subnet ID
  • subnet-01234567890abcdef
  • Third Party Log Collector
suid
  • string
  • UserAccount
The user name or mailbox
  • root
  • NT AUTHORITY\SYSTEM
  • sample_email@trendmicro.com
  • Third Party Log Collector
suser
  • dynamic
  • EmailSender
The email sender
  • -
  • -
  • Third Party Log Collector
tags
  • dynamic
  • Technique
  • Tactic
The detected Technique ID based on the alert filter
  • -
  • -
  • -
  • All products
tcpFlags
  • int
-
The bitmask value of the FIN/SYN/RST/SYN-ACK TCP flags
  • 1
  • 2
  • 4
  • 18
  • Third Party Log Collector
techniqueId
  • dynamic
  • Technique
The Technique ID detected by the product agent based on a detection rule
  • -
  • Third Party Log Collector
tlsDetails
  • dynamic
-
The TLS details
  • {"tlsVersion":"TLSv1.2","cipherSuite":"ECDHE-RSA-AES128-GCM-SHA256"}
  • Third Party Log Collector
trafficPath
  • int
-
The egress traffic path number
  • 1
  • 2
  • 8
  • Third Party Log Collector
urlCat
  • dynamic
-
The requested URL category
  • -
  • -
  • -
  • -
  • Third Party Log Collector
userAgent
  • string
  • CLICommand
The user agent or the agent through which the request was made
  • signin.amazonaws.com
  • console.amazonaws.com
  • aws-cli/1.3.23 Python/2.7.6 Linux/2.6.18-164.el5
  • Third Party Log Collector
userDomain
  • dynamic
  • EndpointName
  • DomainName
  • AccountDomain
The user domain
  • -
  • Third Party Log Collector
userIdentity
  • dynamic
-
The information about a user who made a request
  • {"type":"AWSService","invokedBy":"apigateway.amazonaws.com"}
  • {"type":"AWSService","invokedBy":"lambda.amazonaws.com"}
  • Third Party Log Collector
uuid
  • string
-
The unique key of the log entry
  • 11111111-1111-1111-1111-111111111111
  • Third Party Log Collector
  • All products
vendor
  • string
-
The device vendor
  • Fortinet
  • Check Point
  • Palo Alto Networks
  • Microsoft
  • Third Party Log Collector
vendorDeviceId
  • string
-
The device ID
  • f334c467a471269d55564aa08421b751ae1d3bde
  • 00000000-0000-0000-0000-000000000000
  • Third Party Log Collector
vendorLogId
  • string
-
The vendor event log ID
  • 11
  • 211008192
  • 98
  • 1234567890-abcd-abcd-abcd-abcdef123456_1
  • Third Party Log Collector
vendorParsed
  • dynamic
-
The normalized event log (JSON format)
{"cefHeader": { "cefVersion": "0", "deviceVendor": "Palo Alto Networks","deviceProduct": "PAN-OS","deviceEventClassId": "Machine Learning found virus(599805)"},"cefExtension": "rt":".."}
  • Third Party Log Collector
vendorRaw
  • string
-
The original event log string
CEF:0|Palo Alto Networks|PAN-OS|10.2.9-h1|end|TRAFFIC|1|rt=Aug 12 2024 15:31:19 GMT deviceExternalId=021201072197 src=10.10.10.10 dst=10.10.10.11 sourceTranslatedAddress=0.0.0.0 destinationTranslatedAddress=0.0.0.0 cs1Label=Rule cs1=TLC-to-nat-trust suser= duser= app=ping cs3Label=Virtual System cs3=vsys1 cs4Label=Source Zone cs4=TLC cs5Label=Destination Zone cs5=nat-trust deviceInboundInterface=ethernet1/6 deviceOutboundInterface=ethernet1/8 cs6Label=LogProfile cs6=PA440_to_Panorama cn1Label=SessionID cn1=19120 cnt=1 spt=0 dpt=0 sourceTranslatedPort=0 destinationTranslatedPort=0 flexString1Label=Flags flexString1=0x100019 proto=icmp act=allow flexNumber1Label=Total bytes flexNumber1=98 in=98 out=0 cn2Label=Packets cn2=1
  • Third Party Log Collector
vpcEndpointId
  • string
-
The VPC endpoint in which requests were made from a VPC to another AWS service
  • vpce-01234567890abcdef
  • Third Party Log Collector
vpcId
  • string
-
The VPC ID
  • vpc-01234567890abcdef
  • Third Party Log Collector
vsysName
  • string
-
The virtual system of the session
  • vsys1
  • root
  • vdom1
  • Third Party Log Collector