When published to Amazon SNS, events are sent in the SNS
Message
as an
array of JSON objects that are encoded as strings. Each object in the array is one
event.Valid properties vary by the type of event. For example,
MajorVirusType
is
a valid property only for Server & Workload Protection Anti-Malware events,
not system events etc. Valid property values vary for each property. For examples,
see Example events in JSON format.Event property values can be used to filter which events are published to the SNS
topic.
For details, see SNS configuration in JSON format.
Valid event properties
NoteSome events don't have all of the properties that usually apply to their event type.
|
Property Name
|
Description
|
Applies To Event Type(s)
|
|
ACRulesetID
|
Integer
|
The unique identifier of the Application Control Ruleset applied to the
computer where the event was detected.
|
Application Control events
|
Action
|
String (enum)
|
Action taken for the application control event, such as "Execution of
Software Blocked by Rule", "Execution of Unrecognized Software Allowed" (due to
detect-only mode) or "Execution of Unrecognized Software Blocked".
|
Application Control events
|
Action
|
Integer (enum)
|
Action taken for the firewall event. "Detect Only" values show what would
have happened if the rule had been enabled. 0=Unknown, 1=Deny, 6=Log Only,
0x81=Detect Only: Deny.
|
Firewall events
|
Action
|
Integer (enum)
|
Action taken for the Intrusion Prevention event. 0=Unknown, 1=Deny, 2=Reset,
3=Insert, 4=Delete, 5=Replace, 6=Log Only, 0x81=Detect Only: Deny, 0x82=Detect
Only: Reset, 0x83=Detect Only: Insert, 0x84=Detect Only: Delete, 0x85=Detect Only:
Replace.
|
Intrusion Prevention events
|
ActionBy
|
String
|
Name of the Server & Workload Protection user who performed
the event, or "System" if the event was not generated by a user.
|
System events
|
ActionReasonDesc
|
String
|
The reason the Action was blocked.
|
Application Control events
|
ActionString
|
String
|
Conversion of Action to a readable string.
|
Firewall events, Intrusion Prevention events
|
AdministratorID
|
Integer
|
Unique identifier of the Server & Workload Protection user
who performed an action. Events generated by the system and not by a user will not
have an identifier.
|
System events
|
AggregationType
|
Integer (enum)
|
Whether or not the Application Control event occurred repeatedly. If
"AggregationType" is not "0", then the number of occurrences is in "RepeatCount."
0=Not aggregated, 1=Aggregated based on file name, path and event type,
2=Aggregated based on event type
|
Application Control events
|
AMTarget
|
String
|
The file, process, or registry key (if any) that the malware was trying to
affect. If the malware was trying to affect more than one, this field will contain
the value "Multiple."
|
Anti-Malware events
|
AMTargetCount
|
Integer
|
The number of target files.
|
Anti-Malware events
|
AMTargetType
|
Integer
|
The numeric code for the type of system resources that this malware was
trying to affect. For the descriptive version, see AMTargetTypeString. 0=Unknown,
1=Process, 2=Registry, 3=File System, 4=Invoke, 5=Exploit, 6=API, 7=Memory,
8=Network Connection, 9=Uncategorized
|
Anti-Malware events
|
AMTargetTypeString
|
String
|
The type of system resource that this malware was trying to affect, such as
the file system, a process, or Windows registry.
|
Anti-Malware events
|
ATSEDDetectionLevel
|
Integer
|
The detection level of document exploit protection.
|
Anti-Malware events
|
ApplicationType
|
String
|
Name of the network application type associated with the Intrusion
Prevention rule, if available.
|
Intrusion Prevention events
|
BehaviorRuleId
|
String
|
The behavior monitoring rule ID for internal malware case
tracking.
|
Anti-Malware events
|
BehaviorType
|
String
|
The type of behavior monitoring event detected.
|
Anti-Malware events
|
BlockReason
|
Integer (enum)
|
A reason that corresponds to the Action. 0=Unknown, 1=Blocked due to rule,
2=Blocked due to unrecognized
|
Application Control events
|
Change
|
Integer (enum)
|
What type of change was made to a file, process, registry key, etc. for an
Integrity Monitoring event. 1=Created, 2=Updated, 3=Deleted,
4=Renamed.
|
Integrity Monitoring events
|
ChangeString
|
String
|
What type of change was made to a file, process, registry key, etc. for an
Integrity Monitoring event: Created, Updated, Deleted, or Renamed.
|
Integrity Monitoring events
|
CloudOneAccountID
|
String
|
The ID of the Cloud One Account.
|
All event types
|
CommandLine
|
String
|
The commands that the subject process executed.
|
Anti-Malware events
|
ContainerID
|
String
|
ID of the container where the event occurred.
|
Anti-Malware events, Intrusion Prevention events, Firewall
events
|
ContainerImageName
|
String
|
Image name of the Docker container where the malware was found.
|
Anti-Malware events
|
ContainerName
|
String
|
Name of the container where the event occurred.
|
Anti-Malware events, Intrusion Prevention events, Firewall
events
|
CreationTime
|
String (Date)
|
The creation time of the infected file.
|
Anti-Malware events
|
Cve
|
String
|
The CVE information, if the process behavior is identified in one of Common
Vulnerabilities and Exposures.
|
Anti-Malware events
|
DataIndex
|
Integer
|
A unique ID for packet data.
|
Intrusion Prevention events
|
Description
|
String
|
Description of the change made to the entity (created, deleted, updated)
along with details about the attributes changed.
|
Integrity Monitoring events
|
Description
|
String
|
Brief description of what happened during an event.
|
System events
|
DestinationIP
|
String (IP)
|
The IP address of the destination of a packet.
|
Firewall events, Intrusion Prevention events
|
DestinationMAC
|
String (MAC)
|
The MAC address of the destination of a packet.
|
Firewall events, Intrusion Prevention events
|
DestinationPort
|
Integer
|
The network port number a packet was
sent to.
|
Firewall events, Intrusion Prevention events
|
DetectionCategory
|
Integer (enum)
|
The detection category for a web reputation event. 12=User Defined,
13=Custom, 91=Global.
|
Web Reputation events
|
DetectOnly
|
Boolean
|
Whether or not the event was returned with the Detect Only flag turned on.
If true, this indicates that the URL was not blocked, but access was
detected.
|
Web Reputation events
|
Direction
|
Integer (enum)
|
Network packet direction. 0=Incoming, 1=Outgoing.
|
Firewall events, Intrusion Prevention events
|
DirectionString
|
String
|
Conversion Direction to a readable string.
|
Firewall events, Intrusion Prevention events
|
DriverTime
|
Integer
|
The time the log was generated as recorded by the driver.
|
Firewall events, Intrusion Prevention events
|
EndLogDate
|
String (Date)
|
The last log date recorded for repeated events. Will not be present for
events that did not repeat.
|
Firewall events, Intrusion Prevention events
|
EngineType
|
Integer
|
The Anti-Malware engine type.
|
Anti-Malware events
|
EngineVersion
|
String
|
The Anti-Malware engine version.
|
Anti-Malware events
|
EntityType
|
String (enum)
|
The type of entity an integrity monitoring event applies to: Directory,
File, Group, InstalledSoftware, Port, Process, RegistryKey, RegistryValue,
Service, User, or Wql
|
Integrity Monitoring events
|
ErrorCode
|
Integer
|
Error code for malware scanning events. If non-zero the scan failed, and the
scan action and scan result fields contain more details.
|
Anti-Malware events
|
EventID
|
Integer
|
DEPRECATED. Use UniqueID instead. The value of this field will always be 0
on or after January 1, 2021.
|
All event types
|
EventType
|
String (enum)
|
The type of the event. One of: "SystemEvent", "PacketLog", "PayloadLog",
"AntiMalwareEvent", "WebReputationEvent", "IntegrityEvent", "LogInspectionEvent",
"AppControlEvent".
|
All event types
|
FileName
|
String
|
File name of the software that was allowed or blocked, such as "script.sh".
(The full path is separate, in "Path".)
|
Application Control events
|
FileSHA1
|
String
|
The filesha1 (Secure Hash Algorithm 1 result) of the infected
file.
|
Anti-Malware events
|
FileSize
|
Integer
|
File size of the software that was allowed or blocked
|
Application Control events
|
Flags
|
String
|
Flags recorded from a network packet; a space-separated list of
strings.
|
Firewall events, Intrusion Prevention events
|
Flow
|
Integer (enum)
|
Network connection flow. Possible values: -1=Not Applicable, 0=Connection
Flow, 1=Reverse Flow
|
Firewall events, Intrusion Prevention events
|
FlowString
|
String
|
Conversion of Flow to a readable string.
|
Firewall events, Intrusion Prevention events
|
ForwardedSrc
|
Array (Byte)
|
The source information of a forwarded packet
|
Intrusion Prevention events
|
Frame
|
Integer (enum)
|
Frame type. -1=Unknown, 2048=IP, 2054=ARP, 32821=REVARP, 33169=NETBEUI,
0x86DD=IPv6
|
Firewall events, Intrusion Prevention events
|
FrameString
|
String
|
Conversion of Frame to a readable string.
|
Firewall events, Intrusion Prevention events
|
GroupID
|
String
|
The group ID, if any, of the user account that tried to start the software,
such as "0".
|
Application Control events
|
GroupName
|
String
|
The group name, if any, of the user account that tried to start the
software, such as "root".
|
Application Control events
|
HostAgentVersion
|
String
|
The version of the agent that was protecting the computer where the event
was detected.
|
Application Control events, Anti-Malware events, Web Reputation events,
Integrity Monitoring events, Log Inspection events, Firewall events, Intrusion
Prevention events
|
HostAgentGUID
|
String
|
The global unique identifier (GUID) of the agent when activated with Server & Workload Protection.
|
Anti-Malware events, Application Control events, Firewall events, Integrity
Monitoring events, Intrusion Prevention events, Log Inspection events, Web
Reputation events
|
HostAssetValue
|
Integer
|
The asset value assigned to the computer at the time the event was
generated.
|
Anti-Malware events, Web Reputation events, Integrity Monitoring events, Log
Inspection events, Firewall events, Intrusion Prevention events, Application
Control events
|
HostCloudType
|
String
|
The cloud service provider where the Deep Security Agent is
hosted.
|
Anti-Malware events, Application Control events, Firewall events, Integrity
Monitoring events, Intrusion Prevention events, Log Inspection events, Web
Reputation events
|
HostGUID
|
String
|
The global unique identifier (GUID) of the Deep Security Agent.
|
Anti-Malware events, Application Control events, Firewall events, Integrity
Monitoring events, Intrusion Prevention events, Log Inspection events, Web
Reputation events
|
HostGroupID
|
Integer
|
The unique identifier of the Computer Group of the computer where the event
was detected.
|
Application Control events, Anti-Malware events, Web Reputation events,
Integrity Monitoring events, Log Inspection events, Firewall events, Intrusion
Prevention events
|
HostGroupName
|
String
|
The name of the Computer Group of the computer where the event was detected.
Note that Computer Group names may not be unique.
|
Application Control events, Anti-Malware events, Web Reputation events,
Integrity Monitoring events, Log Inspection events, Firewall events, Intrusion
Prevention events
|
HostID
|
Integer
|
Unique identifier of the computer where the event occurred.
|
Anti-Malware events, Web Reputation events, Integrity Monitoring events, Log
Inspection events, Firewall events, Intrusion Prevention events, Application
Control events
|
HostInstanceID
|
String
|
The cloud instance ID of the computer where the event was detected. This
property will only be set for computers synchronized with a Cloud
Connector.
|
Application Control events, Anti-Malware events, Web Reputation events,
Integrity Monitoring events, Log Inspection events, Firewall events, Intrusion
Prevention events
|
HostLastIPUsed
|
String (IP)
|
The latest IP address updated from the agent when communicated to Deep
Security Manager.
|
Anti-Malware events, Application Control events, Firewall events, Integrity
Monitoring events, Intrusion Prevention events, Log Inspection events, Web
Reputation events
|
Hostname
|
String
|
Hostname of the computer on which the event was generated.
|
Anti-Malware events, Web Reputation events, Integrity Monitoring events, Log
Inspection events, Firewall events, Intrusion Prevention events, Application
Control events
|
HostOS
|
String
|
The operating system of the computer where the event was
detected.
|
Anti-Malware events, Web Reputation events, Integrity Monitoring events, Log
Inspection events, Firewall events, Intrusion Prevention events, Application
Control events
|
HostOwnerID
|
String
|
The cloud account ID of the computer where the event was detected. This
property will only be set for computers synchronized with a Cloud Connector.
|
Application Control events, Anti-Malware events, Web Reputation events,
Integrity Monitoring events, Log Inspection events, Firewall events, Intrusion
Prevention events
|
HostSecurityPolicyID
|
Integer
|
The unique identifier of the Server & Workload Protection
policy applied to the computer where the event was detected.
|
Anti-Malware events, Web Reputation events, Integrity Monitoring events, Log
Inspection events, Firewall events, Intrusion Prevention events, Application
Control events
|
HostSecurityPolicyName
|
String
|
The name of the Server & Workload Protection policy applied
to the computer where the event was detected. Note that security policy names may
not be unique.
|
Anti-Malware events, Web Reputation events, Integrity Monitoring events, Log
Inspection events, Firewall events, Intrusion Prevention events, Application
Control events
|
HostVCUUID
|
String
|
The vCenter UUID of the computer the event applies to, if known.
|
Application Control events, Anti-Malware events, Web Reputation events,
Integrity Monitoring events, Log Inspection events, Firewall events, Intrusion
Prevention events
|
ImageDigest
|
String
|
A unique summary of data used to identify the container image.
|
Intrusion Prevention events, Firewall events
|
ImageID
|
String
|
Image ID of the Docker container where the event occurred
|
Intrusion Prevention events
|
ImageName
|
String
|
Image name that was used to create the container where the event
occurred.
|
Intrusion Prevention events, Firewall events
|
InfectedFilePath
|
String
|
Path of the infected file in the case of malware detection.
|
Anti-Malware events
|
InfectionSource
|
String
|
The name of the computer that's the source of a malware infection, if
known.
|
Anti-Malware events
|
Interface
|
String (MAC)
|
MAC address of the network interface sending or receiving a
packet.
|
Firewall events, Intrusion Prevention events
|
InterfaceType
|
String
|
Container interface type. 0=physical interfaces belong to host that can be
controlled separately in Server & Workload Protection, 1=all
virtual interfaces, 7=unknown type (typically the host interface).
|
Intrusion Prevention events, Firewall events
|
IPDatagramLength
|
Integer
|
The length of the IP datagram.
|
Intrusion Prevention events
|
IsHash
|
String
|
The SHA-1 content hash (hexadecimal encoded) of the file after it was
modified.
|
Integrity Monitoring events
|
Key
|
String
|
The file or registry key an integrity event refers to.
|
Integrity Monitoring events
|
LogDate
|
String (Date)
|
The date and time when the event was recorded. For agent-generated events
(Firewall, IPS, etc.), the time is when the event was recorded by the agent, not
when the event was received by Server & Workload Protection.
|
All event types
|
MajorVirusType
|
Integer (enum)
|
The classification of malware detected. 0=Joke, 1=Trojan, 2=Virus, 3=Test,
4=Spyware, 5=Packer, 6=Generic, 7=Other
|
Anti-Malware events
|
MajorVirusTypeString
|
String
|
Conversion of MajorVirusType to a readable string.
|
Anti-Malware events
|
MalwareName
|
String
|
The name of the malware detected.
|
Anti-Malware events
|
MalwareType
|
Integer (enum)
|
The type of malware detected. 1=General malware, 2=Spyware. General malware
events will have an InfectedFilePath, spyware events will not.
|
Anti-Malware events
|
ManagerNodeID
|
Integer
|
Unique identifier of the Server & Workload Protection Node
where the event was generated.
|
System events
|
ManagerNodeName
|
String
|
Name of the Server & Workload Protection Node where the
event was generated.
|
System events
|
MD5
|
String
|
The MD5 checksum (hash) of the software, if any.
|
Application Control events
|
Mitre
|
String
|
The MITRE information, if the process behavior is identified in one of MITRE
attack scenarios.
|
Anti-Malware events
|
ModificationTime
|
String (Date)
|
The modification time of the infected file.
|
Anti-Malware events
|
Note
|
Array (Byte)
|
Encoded note about the packet where the event occurred.
|
Intrusion Prevention events
|
Number
|
Integer
|
System events have an additional ID that identifies the event. Note that in
Server & Workload Protection, this property appears as "Event
ID".
|
System events
|
Operation
|
Integer (enum)
|
0=Unknown, 1=Allowed due to detect-only mode, 2=Blocked
|
Application control
|
OperationDesc
|
String
|
Describes the Operation value
|
Application Control events
|
Origin
|
Integer (enum)
|
The origin of the event. -1=Unknown, 0=Agent, 3=Server & Workload Protection
|
All event types
|
OriginString
|
String
|
Conversion of Origin to a human-readable string.
|
All event types
|
OSSEC_Action
|
String
|
OSSEC action
|
Log Inspection events
|
OSSEC_Command
|
String
|
OSSEC command
|
Log Inspection events
|
OSSEC_Data
|
String
|
OSSEC data
|
Log Inspection events
|
OSSEC_Description
|
String
|
OSSEC description
|
Log Inspection events
|
OSSEC_DestinationIP
|
String
|
OSSEC dstip
|
Log Inspection events
|
OSSEC_DestinationPort
|
String
|
OSSEC dstport
|
Log Inspection events
|
OSSEC_DestinationUser
|
String
|
OSSEC dstuser
|
Log Inspection events
|
OSSEC_FullLog
|
String
|
OSSEC full log
|
Log Inspection events
|
OSSEC_Groups
|
String
|
OSSEC groups result (e.g. syslog,authentication_failure)
|
Log Inspection events
|
OSSEC_Hostname
|
String
|
OSSEC hostname. This is the name of the host as read from a log entry, which
is not necessarily the same as the name of the host on which the event was
generated.
|
Log Inspection events
|
OSSEC_ID
|
String
|
OSSEC id
|
Log Inspection events
|
OSSEC_Level
|
Integer (enum)
|
OSSEC level. An integer in the range 0 to 15 inclusive. 0-3=Low severity,
4-7=Medium severity, 8-11=High severity, 12-15=Critical severity.
|
Log Inspection events
|
OSSEC_Location
|
String
|
OSSEC location
|
Log Inspection events
|
OSSEC_Log
|
String
|
OSSEC log
|
Log Inspection events
|
OSSEC_ProgramName
|
String
|
OSSEC program_name
|
Log Inspection events
|
OSSEC_Protocol
|
String
|
OSSEC protocol
|
Log Inspection events
|
OSSEC_RuleID
|
Integer
|
OSSEC rule id
|
Log Inspection events
|
OSSEC_SourceIP
|
Integer
|
OSSEC srcip
|
Log Inspection events
|
OSSEC_SourcePort
|
Integer
|
OSSEC srcport
|
Log Inspection events
|
OSSEC_SourceUser
|
Integer
|
OSSEC srcuser
|
Log Inspection events
|
OSSEC_Status
|
Integer
|
OSSEC status
|
Log Inspection events
|
OSSEC_SystemName
|
Integer
|
OSSEC systemname
|
Log Inspection events
|
OSSEC_URL
|
Integer
|
OSSEC url
|
Log Inspection events
|
PacketData
|
Integer
|
Hexadecimal encoding of captured packet data, if the rule was configured to
capture packet data.
|
Intrusion Prevention events
|
PacketSize
|
Integer
|
The size of the network packet.
|
Firewall events
|
Path
|
String
|
Directory path of the software file that was allowed or blocked, such as
"/usr/bin/". (The file name is separate, in "FileName".)
|
Application Control events
|
PatternVersion
|
Integer (enum)
|
The malware detection pattern version.
|
Anti-Malware events
|
PayloadFlags
|
Integer
|
Intrusion Prevention Filter Flags. A bitmask value that can include the
following flag values: 1 - Data truncated - Data could not be logged. 2 - Log
Overflow - Log overflowed after this log. 4 - Suppressed - Logs threshold
suppressed after this log. 8 - Have Data - Contains packet data. 16 - Reference
Data - References previously logged data.
|
Intrusion Prevention events
|
PodID
|
String
|
Pod unique ID (UID)
|
Intrusion Prevention events, Firewall events
|
PosInBuffer
|
Integer
|
Position within packet of data that triggered the event.
|
Intrusion Prevention events
|
PosInStream
|
Integer
|
Position within stream of data that triggered the event.
|
Intrusion Prevention events
|
Process
|
String
|
The name of the process that generated the event, if available.
|
Integrity Monitoring events
|
Process
|
String
|
The process name of behavior monitoring event detected.
|
Anti-Malware events
|
ProcessID
|
Integer
|
The identifier (PID) of the process that generated the event, if
available.
|
Application Control events, Intrusion Prevention events, Firewall
events
|
ProcessName
|
String
|
The name of the process that generated the event, if available, such as
"/usr/bin/bash".
|
Application Control events, Intrusion Prevention events, Firewall
events
|
Protocol
|
Integer (enum)
|
The numerical network protocol identifier. -1=Unknown, 1=ICMP, 2=IGMP,
3=GGP, 6=TCP, 12=PUP, 17=UDP, 22=IDP, 58=ICMPv6, 77=ND, 255=RAW
|
Firewall events, Intrusion Prevention events
|
Protocol
|
Integer
|
The numerical value for the file scan protocol. 0=Local file
|
Anti-Malware events
|
ProtocolString
|
String
|
Conversion of Protocol to a readable string.
|
Firewall events, Intrusion Prevention events
|
Rank
|
Integer
|
The numerical rank of the event; the product of the computer's assigned
asset value and the severity value setting for an event of this
severity.
|
Integrity Monitoring events, Log Inspection events, Firewall events,
Intrusion Prevention events
|
Reason
|
String
|
Name of the Server & Workload Protection rule or
configuration object that triggered the event, or (for Firewall and Intrusion
Prevention) a mapping of Status to String if the event was not triggered by a
rule. For Application Control, "Reason" may be "None"; see "BlockReason"
instead.
|
Firewall, Intrusion Prevention, Integrity Monitoring, Log Inspection,
Anti-Malware, and Application Control events
|
RepeatCount
|
Integer
|
The number of times this event occurred repeatedly. A repeat count of 1
indicates the event was only observed once and did not repeat.
|
Firewall events, Intrusion Prevention events, Application Control
events
|
Risk
|
Integer (enum)
|
Translated risk level of the URL accessed. 2=Suspicious, 3=Highly
Suspicious, 4=Dangerous, 5=Untested, 6=Blocked by Administrator
|
Web Reputation events
|
RiskLevel
|
Integer
|
The raw risk level of the URL from 0 to 100. Will not be present if the URL
was blocked by a block rule.
|
Web Reputation events
|
RiskString
|
String
|
Conversion of Risk to a readable string.
|
Web Reputation events
|
ScanAction1
|
Integer
|
Scan action 1. Scan action 1 & 2 and scan result actions 1 & 2 and
ErrorCode are combined to form the single "summaryScanResult".
|
Anti-Malware events
|
ScanAction2
|
Integer
|
Scan action 2.
|
Anti-Malware events
|
ScanResultAction1
|
Integer
|
Scan result action 1.
|
Anti-Malware events
|
ScanResultAction2
|
Integer
|
Scan result action 2.
|
Anti-Malware events
|
ScanResultString
|
String
|
Malware scan result, as a string. A combination of ScanAction 1 and 2,
ScanActionResult 1 and 2, and ErrorCode.
|
Anti-Malware events
|
ScanType
|
Integer (enum)
|
Malware scan type that created the event. 0=Real-Time, 1=Manual,
2=Scheduled, 3=Quick Scan
|
Anti-Malware events
|
ScanTypeString
|
String
|
Conversion of ScanType to a readable string.
|
Anti-Malware events
|
Severity
|
Integer
|
1=Info, 2=Warning, 3=Error
|
System events
|
Severity
|
Integer (enum)
|
1=Low, 2=Medium, 3=High, 4=Critical
|
Integrity Monitoring events, Intrusion Prevention events
|
SeverityString
|
String
|
Conversion of Severity to a human-readable string.
|
System events, Integrity Monitoring events, Intrusion Prevention
events
|
SeverityString
|
String
|
Conversion of OSSEC_Level to a human-readable string.
|
Log Inspection events
|
SHA1
|
String
|
The SHA-1 checksum (hash) of the software, if any.
|
Application Control events
|
SHA256
|
String
|
The SHA-256 checksum (hash) of the software, if any.
|
Application Control events
|
SourceIP
|
String (IP)
|
The source IP address of a packet.
|
Firewall events, Intrusion Prevention events
|
SourceMAC
|
String (MAC)
|
The source MAC Address of the packet.
|
Firewall events, Intrusion Prevention events
|
SourcePort
|
Integer
|
The network source port number of the packet.
|
Firewall events, Intrusion Prevention events
|
Status
|
Integer
|
If this event was not generated by a specific Firewall rule, then this
status is one of approximately 50 hard-coded rules, such as 123=Out Of Allowed
Policy
|
Firewall events
|
Status
|
Integer
|
If this event was not generated by a specific IPS rule, then this status is
one of approximately 50 hard-coded reasons, such as -504=Invalid UTF8
encoding
|
Intrusion Prevention events
|
Tags
|
String
|
Comma-separated list of tags that have been applied to the event. This list
will only include tags that are automatically applied when the event is
generated.
|
All event types
|
TagSetID
|
Integer
|
Identifier of the group of tags that was applied to the event.
|
All event types
|
TargetID
|
Integer
|
Unique identifier of the target of the event. This identifier is unique for
the targets of the same type within a tenant. It is possible for target IDs to be
reused across different types, for example, both a Computer and a Policy may have
target ID 10.
|
System events
|
TargetIP
|
String (IP)
|
IP Address that was being contacted when a Web Reputation Event was
generated.
|
Web Reputation events
|
TargetName
|
String
|
The name of the target of the event. The target of a system event can be
many things, including computers, policies, users, roles, and tasks.
|
System events
|
TargetType
|
String
|
The type of the target of the event.
|
System events
|
TenantGUID
|
String
|
The global unique identifier (GUID) of the tenant associated with the
event.
|
All event types
|
TenantID
|
Integer
|
Unique identifier of the tenant associated with the event.
|
All event types
|
TenantName
|
String
|
Name of the tenant associated with the event.
|
All event types
|
ThreadID
|
String
|
ID of the thread (from the container) that caused the event.
|
Intrusion Prevention events, Firewall events
|
Title
|
String
|
Title of the event.
|
System events
|
UniqueID
|
Integer
|
The globally unique identifier of the event. The field that uniquely
identifies the event across all platforms, services, and storage
types.
|
All event types
|
URL
|
String (URL)
|
The URL being accessed that generated the event.
|
Web Reputation events
|
User
|
String
|
The user account that was the target of an integrity monitoring event, if
known.
|
Integrity Monitoring events
|
UserID
|
String
|
The user identifier (UID), if any, of the user account that tried to start
the software, such as "0".
|
Application Control events
|
UserName
|
String
|
For Anti-Malware events, this is the user account name who triggered the event.
For Application Control events, this is the user name, if any, of the user
account that tried to start the software, such as "root".
|
Anti-Malware events, Application Control events
|
Data types of event properties
Events forwarded as JSON usually use strings to encode other data types.
Data Type
|
Description
|
||
Array (Byte)
|
JSON
array, composed of byte values. |
||
Boolean
|
JSON
trueor false. |
||
Integer
|
JSON
int. Server & Workload Protection does not output floating point numbers in events.
|
||
Integer (enum)
|
JSON
int, restricted to a set of enumerated
values. |
||
String
|
JSON
string. |
||
String (Date)
|
JSON
string, formatted as a date and time in the pattern YYYY-MM-DDThh:mm:ss.sssZ (ISO 8601). 'Z' is the time zone. 'sss' are the three digits for sub-seconds. See also the W3C note on date and time formats. |
||
String (IP)
|
JSON
string, formatted as an IPv4 or IPv6 address. |
||
String (MAC)
|
JSON
string, formatted as a network MAC address. |
||
String (URL)
|
JSON
string, formatted as a URL. |
||
String (enum)
|
JSON
string, restricted to a set of enumerated values. |
Example events in JSON format
System event
{ "Type" : "Notification", "MessageId" : "123abc-123-123-123-123abc", "TopicArn" : "arn:aws:sns:us-west-2:123456789:DS_Events", "Message" : "[ { "ActionBy":"System", "CloudOneAccountID": "012345678900" "Description":"Alert: New Pattern Update is Downloaded and Available\\nSeverity: Warning\", "EventID":6813, "EventType":"SystemEvent", "LogDate":"2018-12-04T15:54:24.086Z", "ManagerNodeID":123, "ManagerNodeName":"job7-123", "Number":192, "Origin":3, "OriginString":"Manager", "Severity":1, "SeverityString":"Info", "Tags":"\", "TargetID":1, "TargetName":"ec2-12-123-123-123.us-west-2.compute.amazonaws.com", "TargetType":"Host", "TenantID":123, "TenantName":"Umbrella Corp.", "Title":"Alert Ended" "UniqueID": "2e447b1889e712340f6d071cebd92ea9" } ]", "Timestamp" : "2018-12-04T15:54:25.130Z", "SignatureVersion" : "1", "Signature" : "500PER10NG5!gnaTURE==", "SigningCertURL" : "https://sns.us-west-2.amazonaws.com/SimpleNotificationService-abc123.pem", "UnsubscribeURL" : "https://sns.us-west-2.amazonaws.com/?Action=Unsubscribe&SubscriptionArn=arn:aws:sns:us-west-2:123456:DS_Events:123abc-123-123-123-123abc" }
Anti-Malware events
Multiple virus detection events can be in each SNS
Message
. (For brevity,
repeated event properties are omitted below, indicated by "...".){ "Type" : "Notification", "MessageId" : "123abc-123-123-123-123abc", "TopicArn" : "arn:aws:sns:us-west-2:123456789:DS_Events", "Message" : "[ { "AMTarget": "VDSO memory", "AMTargetCount": 1, "AMTargetType": 7, "AMTargetTypeString": "Memory", "ATSEDetectionLevel": 0, "BehaviorRuleId": "DIRTYCOW_MADVISE_EXPL", "BehaviorType": "Exploit_Detection", "CloudOneAccountID": "012345678900" "CommandLine": "/tmp/demo -f esiv [xxxx]", "Cve": "CVE-2016-5195", "ErrorCode": 0, "EventID": 1179519, "EventType": "AntiMalwareEvent", "FileSHA1": "CEF4644713633C0864D4283FEFA0CE174D48F115", "HostAgentGUID": "FF8162DF-4CB5-B158-DE42-EBD52967FCF7", "HostAgentVersion": "20.0.0.1685", "HostGUID": "9089E800-41D3-2CA9-FF0B-3A30A42ED650", "HostID": 38, "HostLastIPUsed": "172.31.21.47", "HostOS": "Red Hat Enterprise 7 (64 bit) (3.10.0-957.12.2.el7.x86_64)", "HostSecurityPolicyID": 11, "HostSecurityPolicyName": "Linux_AM_Sensor", "Hostname": "ec2-3-131-151-239.us-east-2.compute.amazonaws.com", "InfectedFilePath": "/tmp/demo", "LogDate": "2021-01-07T10:32:11.000Z", "MajorVirusType": 14, "MajorVirusTypeString": "Suspicious Activity", "MalwareName": "TM_MALWARE_BEHAVIOR", "MalwareType": 4, "Mitre": "T1068", "Origin": 0, "OriginString": "Agent", "PatternVersion": "1.2.1189", "Process": "testsys_m64", "Protocol": 0, "Reason": "Default Real-Time Scan Configuration", "ScanAction1": 1, "ScanAction2": 0, "ScanResultAction1": 0, "ScanResultAction2": 0, "ScanResultString": "Passed", "ScanType": 0, "ScanTypeString": "Real Time", "Tags": "", "TenantGUID": "", "TenantID": 0, "TenantName": "Primary", "UniqueID": "2e447b1889e712340f6d071cebd92ea9" "UserName": "root" } ]", "Timestamp" : "2018-12-04T15:57:50.833Z", "SignatureVersion" : "1", "Signature" : "500PER10NG5!gnaTURE==", "SigningCertURL" : "https://sns.us-west-2.amazonaws.com/SimpleNotificationService-abc123.pem", "UnsubscribeURL" : "https://sns.us-west-2.amazonaws.com/?Action=Unsubscribe&SubscriptionArn=arn:aws:sns:us-west-2:123456:DS_Events:123abc-123-123-123-123abc" }