In this type of syslog content mapping, provide the CEF
Keys field in the format of {CEF Key 1}|{CEF Key 2}|...|{CEF Key
n}, separated by a "|".
The following table outlines the syslog content mapping between predefined/custom
extension
CEF keys and Trend Micro Web Security log output (value).
CEF Access Logs
CEF Key
|
Description
|
Value
|
||
Header (logVer)
|
CEF format version
|
CEF: 0
|
||
Header (vendor)
|
Appliance vendor
|
Trend Micro
|
||
Header (pname)
|
Appliance product name
|
Trend Micro Web Security
|
||
Header (pver)
|
Appliance version
|
Example: 3.0.0.2042
|
||
Header (eventid)
|
Signature ID
|
Example: 100000
|
||
Header (eventName)
|
Description
|
Access Log
|
||
Header (severity)
|
Risk level
|
|
||
rt
|
UTC timestamp
|
Example: Jul 05 2018 07:54:15 +0000
|
||
logType
|
Log type
|
|
||
companyID
|
Company ID
|
Example: 7800fcab-7611-416c-9ab4-721b7bd6b076
|
||
adDomain
|
AD domain
|
Example: trendmicro.com.cn
|
||
userName
|
User name or client IP
|
Example: 10.204.214.188
|
||
groupName
|
Group name
|
Example: testgroup1
|
||
userDepartment
|
User department
|
Example: finance department
|
||
gatewayName
|
Gateway name
|
Example: on-premise-2051
|
||
app
|
Protocol used
|
|
||
transportBytes
|
Body size of a request or response
|
Example: 221030
|
||
dst
|
Destination IP address of a request
|
Example: 54.231.184.240
|
||
src
|
Source IP address of a request
|
Example: 10.204.214.188
|
||
upStreamSize
|
Upstream payload from Trend Micro Web Security to server,
unit bytes
|
Example: 501
|
||
downStreamSize
|
Downstream payload from server to Trend Micro Web Security,
unit bytes
|
Example: 220529
|
||
domainName
|
URL domain
|
Example: clients4.google.com
|
||
scanType
|
Scan type
|
|
||
policyName
|
Policy name
|
Example: default
|
||
profileName
|
Profile name
|
Example: default
|
||
severity
|
WRS score threshold
|
|
||
principalName
|
Principal name
|
Example: testuser@trendmicro.com.cn
|
||
cat
|
URL category
|
Example: Search Engines/Portals
|
||
appName
|
Application name
|
Example: Google
|
||
wrsScore
|
WRS score
|
Example: 81
|
||
malwareType
|
Malware type
|
|
||
malwareName
|
Malware name
|
Example: HEUR_OLEXP.B
|
||
fname
|
File name
|
Example: sample_nice_dda_heurb_1177077.ppt-1
|
||
filehash
|
SHA-1
|
Example: 3f21be4521b5278fb14b8f47afcabe08a17dc504
|
||
act
|
Action
|
|
||
httpTrans
|
HTTP transaction
|
JSON format. Example:{"http_req":{
"method":"GET","scheme":"http","path":"index.html","host":www.sina.com.cn,"headers":{"header_1":"value_1",
...}},"http_response":{"status_code":"200","headers":{...}}}
|
||
macAddress
|
MAC address of the Windows endpoint with the Enforcement Agent installed
|
Example: 00-50-56-89-02-14
|
Access log output sample 1:
CEF:0|Trend Micro|Trend Micro Web Security|3.0.0.2040|100000|Access Log|0| wrsScore=81 macAddress=00-50-56-89-02-14 companyID=7800fcab-7611-416c-9ab4-721b7bd6b076 app=2 upStreamSize=1064 userDepartment= scanType=0 malwareType=0 httpTrans={"http_req":{"headers":{"host":"clients4.google.com:443", "proxy-connection":"keep-alive","user-agent":"Chrome WIN 67.0.3396.99 (a337fbf3c2ab8ebc6b64b0bfdce73a20e2e2252b-refs/branch-heads/3396@{#790}) channel(stable)"}, "host":"clients4.google.com","method":"CONNECT","path":"","scheme":"https"}, "http_response":{"headers":{"content-length":"0"},"status_code":200},"ver":"1.0"} malwareName= rt=Jul 29 2018 19:34:11 +0000 policyName=default severity=65 filehash= logType=1 dst=172.217.24.206 appName=Google groupName= fname= adDomain= gatewayName=on-premise-2040 principalName= downStreamSize=4607 profileName= userName=10.204.214.188 src=10.204.214.188 transportBytes=5787 domainName=clients4.google.com cat=Search Engines/Portals act=allow
Access log output sample 2:
CEF:0|Trend Micro|Trend Micro Web Security|3.0.0.2051|100000|Access Log|0| wrsScore=49 macAddress=00-50-56-89-02-14 companyID=7800fcab-7611-416c-9ab4-721b7bd6b076 app=1 upStreamSize=501 userDepartment= scanType=70 malwareType=8 httpTrans={"http_req":{"headers":{"accept-encoding":"gzip,deflate", "host":"s3-us-west-2.amazonaws.com","user-agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36","x-forwarded-for":"10.204.214.188"},"host":"s3-us-west-2.amazonaws.com", "method":"GET","path":"dda-demo-samples/SAMPLE_NICE_DDA_HEURB_1177077.ppt-1", "scheme":"http"},"http_response":{"headers":{"content-length":"220160", "content-type":"binary/octet-stream"},"status_code":200},"ver":"1.0"} malwareName=HEUR_OLEXP.B rt=Aug 06 2018 02:24:15 +0000 policyName=default severity=0 filehash=3f21be4521b5278fb14b8f47afcabe08a17dc504 logType=1 dst=54.231.184.240 appName=Amazon Web Services (AWS) groupName= fname=sample_nice_dda_heurb_1177077.ppt-1 adDomain= gatewayName=on-premise-2051 principalName= downStreamSize=220529 profileName=default userName=10.204.214.188 src=10.204.214.188 transportBytes=221030 domainName=s3-us-west-2.amazonaws.com cat=Malware Accomplice act=analyze
CEF Audit Logs
CEF Key
|
Description
|
Value
|
Header (logVer)
|
CEF format version
|
CEF: 0
|
Header (vendor)
|
Appliance vendor
|
Trend Micro
|
Header (pname)
|
Appliance product name
|
Trend Micro Web Security
|
Header (pver)
|
Appliance version
|
Example: 3.4.1.5449
|
Header (eventid)
|
Signature ID
|
Example: 100001
|
Header (eventName)
|
Description
|
Audit Log
|
Header (severity)
|
Risk level
|
0
|
rt
|
UTC timestamp
|
Example: Nov 04 2020 02:15:06 +0000
|
userName
|
Email address
|
Example: user@example.com
|
companyID
|
Company ID
|
Example: 7800fcab-7611-416c-9ab4-721b7bd6b076
|
logType
|
Log type
|
3: Audit Log
|
act
|
Administrative operation
|
Example: Administrator Log On
|
httpTrans
|
Detailed operation information
|
See the output samples below
|
NoteThe other CEF keys not listed in the table are not available for audit logs.
Therefore, they will not be in the output if configured in CEF
keys.
|
Audit log output sample 1:
Nov 20 07:59:31 10.206.197.118 CEF: 0|Trend Micro|Trend Micro Web Security| 3.4.1.5478|100001|Audit Log|0|userName=admin@trendmicro.com.cn rt=Nov 20 2020 07:58:15 +0000 companyID=d528b12f-08df-4c1f-be10-8ab6c74bf3e2 httpTrans={"userName": "test2", "role": "admin", "groups": [], "department": "H:5fa006fc-02e0-11eb-8042-005056897f14", "password": "******", "email": "test2@trendmicro.com.cn"} logType=3 act=Add Hosted User
Audit log output sample 2:
Nov 20 07:49:32 10.206.197.118 CEF: 0|Trend Micro|Trend Micro Web Security| 3.4.1.5478|100001|Audit Log|0|userName=admin@trendmicro.com.cn rt=Nov 20 2020 07:47:50 +0000 companyID=d528b12f-08df-4c1f-be10-8ab6c74bf3e2 httpTrans={"password": "******", "userId": "admin@trendmicro.com.cn", "tenantId": "tm"} logType=3 act=Administrator Log On