Axon Log Parsing Guide
The following guide describes how fields are commonly parsed into Axon schema as part of message processing. This guide is intended to aid an Axon Analyst or an Axon content creator to show commonly used fields and common event assignments with examples for the purpose of investigation, message processing policy creation, and analytics rule creation. It is important that different technologies consistently extract logs to common fields for consistent threat detection.
The tables on this page contain lots of columns/data to help you understand how logs from different sources are parsed in Axon. Depending on your monitor/screen resolution, these tables may not show in their entirety. To view any of the tables on this page in fullscreen, click the “expand” button at the top-right of a table.
Standardization by Field Type
General Fields
General fields are applicable to nearly all log sources. The following pieces of information are key in general fields:
Log Gen Time / vendor_information.log_generation_time - Most logs include a reference to the time when the log was generated. This should be mapped to the log_gen_time field for all logs in the Policy Builder. If this field is not populated, Axon uses the processing time. If the time zone is not specified in the time format, Axon assumes GMT.
Standard Time / general_information.standard_message_time - This field is derived from log_gen_time. If log_gen_time is not populated, Axon uses general_information.processing_start_time.
Log Type - Most of the categories of the logs.
S.No. | Example Technology | Examples - Vendor Fields in Raw Log | Schema Field | Axon Display Name | Data Samples |
---|---|---|---|---|---|
1 | Windows | TimeCreated | vendor_information.log_generation_time | Log Gen Time | 1/22/2021 13:45 UTC |
AWS | eventTime | 2018-08-02T17:07:00.094207600Z (UTC Time) | |||
Azure | time | 2024-01-27T19:27:04Z | |||
Fortigate Firewall | FTNTFGTeventtime | 12/1/2020 17:01 | |||
Palo Alto NGFW | Timestamp | 1683889190121 (EPOCH Time) | |||
2 | Windows | Channel | vendor_information.log_type | Vendor Log Type | Security / Application / System / Powershell etc. |
AWS | eventCategory | Management / Insight | |||
Azure | category | ApplicationManagement / Administrative / Policy | |||
Fortigate Firewall | type | Threat / Traffic etc. | |||
Palo Alto NGFW | Type (type) | Authentication/ Config etc. |
Origin, Target, Observer Fields
These fields are top-level groups that have common host and identity fields under them. They are populated based on the context of the activity in the log.
Top Level Fields | Description |
---|---|
Origin | This container of fields corresponds to data referencing the originator, or source, as described in a signal message. For example, the source host in a network traffic log message or the user account modifying AD group membership. |
Target | This container of fields corresponds to data referencing the target, or destination, as described in a signal message. For example, the destination host in a network traffic log or the user account is added to an AD group. |
Observer | This container of fields corresponds to data referencing an observer as described in the signal message. An observer is an actor that is neither the origin nor target of the described action. An observer is a host or account witnessing, or observing, the transaction and potentially the host or account executing the action as described in the log message. An example of an observer is a firewall observing a network transaction and taking the action of allowing or denying the traffic based on configured rule logic. |
Account Fields
Axon Display Name | Schema Field | Description | Data Samples |
---|---|---|---|
Origin Account Name | origin.account.name | The account name is documented within a signal message. This could be a named user account, computer account, or another account. | admin |
Origin Account ID | origin.account.id | A unique ID number is associated with an account. This is separate from the account name or other attributes and should not be confused with them. | S-1-5-21-3457937927-2839227994-823803824-1104 |
Origin Account UPN | origin.account.user_principal_name | An account's User Principal Name. This is commonly seen in Microsoft Active Directory both in local and Azure environments. They are formatted like email addresses and should not be confused contextually. | john.doe@logrhythm.com |
Origin Account DN | origin.account.distinguished_name | This field represents the Distinguished Name (DN) of the account. A DN is a structured descriptor for a specific object. The DN concept is referenced in RFC2253. | CN=john.doe,OU=Users,DC=logrhythm,DC= |
Origin Account Domain | origin.account.domain | The domain associated with the identified account. | LOGRHYTHM |
Origin Account Display Name | origin.account.display_name | The display_name field determines the name of the user account, not specifically a named user account, computer account, or another account. | John Doe |
Host Fields
Axon Display Name | Schema Field | Description | Data Samples |
---|---|---|---|
Origin Host Name | origin.host.name | This field represents the name of the host as described within the signal message. This is not to be confused with the name of the identity. | workstation1 |
Origin Host ID | origin.host.id | This field represents a unique identifier for a host as described within the signal message. This is not to be confused with Identity information. | 20456b14-3d9a-446a-8f22-83887c809eff |
Origin Host IP | origin.host.ip_address.value | This field represents an IP address. It can be in Version 4 or Version 6 format. | 10.1.1.2 |
Origin Host MAC | origin.host.mac_address | This field represents the MAC address associated with the host as described within the signal message. This value is normalized to a standard format by the signal processing engine. This field is not applicable to the Observer context. | 02:1A:C5:14:59:C9 |
Origin Host Serial | origin.host.serial_number | This field represents any serial number associated with the host as described within the signal message. | 123456Fg234a |
Origin Host DN | origin.host.distinguished_name | This field represents the Distinguished Name (DN) of the account. A DN is a structured descriptor for a specific object. The DN concept is referenced in RFC2253. | CN=workstation1,OU=computers,DC=logrhythm,DC= |
Origin Host Domain | origin.host.domain | The domain name of the identified Host. | LOGRHYTHM |
Common Windows Fields
These fields are applicable to nearly all Windows Event logs.
Axon Display Name | Schema Field | Technology Field | Technology Description | Example Data | Mandatory/Optional Fields |
---|---|---|---|---|---|
Vendor Log Subtype | vendor_information.log_subtype | ProviderName | Determines the provider's name, which can uniquely identify the log of a particular provider. | Microsoft-Windows-Security-Auditing / Microsoft-Windows-PerfNet / Microsoft-Windows-WinRM | Mandatory |
Log Gen Time | vendor_information.log_generation_time | TimeCreated | The time when the event was logged. | SystemTime='2018-08-01T08:25:23.000000000Z' | Mandatory |
Vendor Severity | vendor_information.severity | Level | The severity level defined in the event, such as Error, Warning, Information, etc. | Error / Information / Critical / Warning | Mandatory |
Vendor Message ID | vendor_information.id | EventID | The unique identifier number that specifies the event that occurred. | Any Integer like 4624, 4625 etc. | Mandatory |
Vendor Log Type | vendor_information.log_type | Channel | The channel to which the event was logged. | Security | Mandatory |
Observer Host Name | observer.host.name | Computer | The name of the computer on which the event occurred. | DC01.logrhythm.com | Mandatory |
Target Host Name | target.host.name | Host name of the machine on which an activity was performed, such as successful logon, user created etc. | Mandatory | ||
Vendor Description | vendor_information.description | Task | The task is defined in the event. | None / Info / Kerberos Service Ticket Operations / 0 | Mandatory |
Result Message | action.result.message | Keywords | The output of activity. | Audit Success / Audit Failure / Classic / 0x80000000000000 | Mandatory |
Origin Host IP | origin.host.ip_address.value | IpAddress | IP address of the machine from which an activity was performed, such as logon, access attempt, etc. | 10.1.1.1 | Optional |
Origin Host IP Port | origin.host.network_port.value | IpPort | Source port of the machine from which an activity was performed, such as logon, access attempt etc. | 80 | Optional |
Target Host IP | target.host.ip_address.value | DestAddress | IP address to which the connection was received. | 10.1.1.2 | Optional |
Target Host IP Port | target.host.network_port.value | Destport | Port on which the connection was received. | 443 | Optional |
Result Code | action.result.code | Status | Result code for the activity that occurred. | 0x0 / 0x10 | Optional |
Action Session Type | action.session.type | logon type | The type of logon that was performed. | 2 | Optional |
Origin Account ID | origin.account.id | SubjectUserSid | SID of the user who has performed the activity. | S-1-5-21-3457937927-2839227994-823803824-1104 | Optional |
Origin Account Name | origin.account.name | SubjectUserName | Account name of the user who has performed the activity. | user1 | Optional |
Origin Account Domain | origin.account.domain | SubjectDomainName | Domain name of the user who has performed the activity. | LOGRHYTHM | Optional |
Action Session ID | action.session.id | SubjectLogonId | The user's session ID, in hexadecimal format. | 0x55cd1d | Optional |
Target Account Name | target.account.name | TargetUserName | Impacted user name. | user2 | Optional |
Target Account Domain | target.account.domain | TargetDomainName | Domain name of the impacted user. | LOGRHYTHM | Optional |
Common Endpoint Protection Logs
These fields apply to nearly all Endpoint protection products. Common Event assignment for Endpoint Protection generally falls in the Threat Detection group of Common Events.
Axon Display Name | Schema Field | Technology | Technology Field | Technology Description | Data Samples |
---|---|---|---|---|---|
Vendor Log Type | vendor_information.log_type | Carbon Black Cloud | type | Type of alert - CB_ANALYTICS, DEVICE_CONTROL WATCHLIST, etc. | WATCHLIST |
Crowdstrike Events | metadata.eventType | Name of the event. | DetectionSummaryEvent | ||
SentinelOne CEF | cat | Name of the category in the log. | EndpointDeviceControlEvent | ||
Sophos Central | type | Describes the type of device on which alert was generated. | Event::Endpoint::CoreRemoteDetection, Event::Endpoint::WebControlViolation | ||
Microsoft Windows Defender | Channel | The channel to which the event was logged. In Progress | Microsoft-Windows-Windows Defender/Operational | ||
Microsoft Defender Advanced Hunting | category | Determines the log category. | AdvancedHunting-CloudAppEvents, AdvancedHunting-DeviceFileEvents, AdvancedHunting-EmailAttachmentInfo | ||
Vendor Log Subtype | vendor_information.log_subtype | Carbon Black Cloud | category | The category of the alert - THREAT, MONITORED, etc. | THREAT |
Crowdstrike Events | event.OperationName | Event operation name. | detection_update, activateUser, create_policy, twoFactorAuthenticate | ||
SentinelOne CEF | No vendor field is present | No vendor field is present in the log. | N/A | ||
Sophos Central | No vendor field is present | No vendor field is present in the log. | N/A | ||
Microsoft Windows Defender | Provider Name | Determines the provider's name, which can uniquely identify the log of a particular provider. | Microsoft-Windows-Windows Defender | ||
Microsoft Defender Advanced Hunting | No vendor field is present | No vendor field is present in the log. | N/A | ||
Threat Severity | threat.severity | Carbon Black Cloud | severity | The threat ranking of the alert, from 1-10. | 8 |
Crowdstrike Events | event.Severity | (N/A), | 2 | ||
SentinelOne CEF | threatConfidenceLevel | Threat confidence level. | malicious | ||
Sophos Central | severity | The severity for this alert. | LOW, MEDIUM, HIGH | ||
Microsoft Windows Defender | Severity | Determines the severity of the threat event. | Low, Moderate, High, or Severe | ||
Microsoft Defender Advanced Hunting | properties.severity, properties.VulnerabilitySeverityLevel | properties.severity indicates the potential impact (high, medium, or low) of the threat indicator or breach activity identified by the alert. properties.VulnerabilitySeverityLevel is the severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape. | Medium | ||
Threat Category | threat.category | Carbon Black Cloud | blocked_threat_category | The category of threat on which action was able to be taken. | UNKNOWN |
Crowdstrike Events | event.IncidentType | Gives information about the type of incident. Possible values and their meanings: | DOMAIN_COMPROMISE, 1 | ||
SentinelOne CEF | threatClassifier | Classifier of the threat. In Progress | LOGIC | ||
Sophos Central | No vendor field is present | No vendor field is present in the log. | N/A | ||
Microsoft Windows Defender | Category | Determines the category of the threat event. | Virus | ||
Microsoft Defender Advanced Hunting | properties.ThreatFamily, properties.Category/properties. properties.AdditionalFields.category, properties.ThreatTypes | properties.ThreatFamily is the malware family under which the suspicious or malicious file or process has been classified. properties.Category/properties.Categories is the type of threat indicator or breach activity identified by the behavior. properties.ThreatTypes is the verdict from the email filtering stack on whether the email contains malware, phishing, or other threats. | null | ||
Threat ID | threat.id | Carbon Black Cloud | threat_id | The identifier of a threat to which this alert belongs. Threats are a combination of factors that can be repeated across devices. | 4b379b7c5d0003a89fccc9e719da3659 |
Crowdstrike Events | event.DetectId, event.IncidentID | The Detection ID for the detection. It can be used in other APIs, such as Detection Resolution and ThreatGraph. For example: | 58cdxxx4a65f45b18a57cca04f10d338:ind:58cdb954a65f45b18a57cca04f10d338:B33C156F-0F3C-424A-8BCD-6D2EFBEE96C5, inc:c62dc78f88304c10b9b7c3aa4c48d4c6:2cb39927dead48adbbeef6edd899713e | ||
SentinelOne CEF | threatID | The threat ID assigned by the vendor. | 1886001251971213386 | ||
Sophos Central | No vendor field is present | No vendor field is present in the log. | N/A | ||
Microsoft Windows Defender | ID | Determines ID of the threat event. | 2147726038 | ||
Microsoft Defender Advanced Hunting | No vendor field is present | No vendor field is present in the log. | N/A | ||
Threat Name | threat.name | Carbon Black Cloud | No vendor field is present | No vendor field is present in the log. | N/A |
Crowdstrike Events | event.ScanResults.ResultName, event.DetectName | Malware name. | Security Vulnerability CVE-2016-0636 in Oracle JDK, Unusual login to an endpoint | ||
SentinelOne CEF | threatClassification | Classification of the threat. In Progress | Ransomware | ||
Sophos Central | threat | The name of the threat responsible for the generation of alert. | ML/PE-A | ||
Microsoft Windows Defender | Name, ThreatName | It determines the name of the threat. | Virus:DOS/EICAR_Test_File, HackTool:PowerShell/PsAttack.B | ||
Microsoft Defender Advanced Hunting | properties.ThreatNames | Detection name for malware or other threats found. | null | ||
Threat Source | threat.source | Carbon Black Cloud | threat_cause_vector | The source of the threat caused. | EMAIL, WEB, GENERIC_SERVER, GENERIC_CLIENT, REMOTE_DRIVE, REMOVABLE_MEDIA, UNKNOWN, APP_STORE, THIRD_PARTY |
Crowdstrike Events | No vendor field is present | No vendor field is present in the log. | N/A | ||
SentinelOne CEF | threatClassificationSource | The source of the identified threat. In Progress | Static | ||
Sophos Central | No vendor field is present | No vendor field is present in the log. | N/A | ||
Microsoft Windows Defender | Detection Source | It determines source of the detection. In Progress | User: user initiated, System: system initiated, Real-time: real-time component initiated | ||
Microsoft Defender Advanced Hunting | properties.DetectionSource | Detection technology or sensor that identified the notable component or activity. In Progress to map it to threat.source for "AlertEvidence". | Microsoft Defender for Identity | ||
Threat Description | threat.description | Carbon Black Cloud | reason | Description of the alert. In Progress. | Process chrome.exe was detected by the report \"badfile.exe.exe\" in watchlist \"test watchlist1\" |
Crowdstrike Events | event.DetectDescription, event.IncidentDescription | event.DetectDescription is a description of what an adversary was trying to do in the environment and guidance on how to begin an investigation. event.IncidentDescription is a description of the identity-based incident. | Terminated a process related to the deletion of backups, which is often indicative of ransomware activity. | ||
SentinelOne CEF | No vendor field is present | No vendor field is present in the log. | N/A | ||
Sophos Central | name, description | The description of the alert that was generated. | Malware 'ML/PE-A' detected in network location '\\\\bd-dml\\Everyone\\ | ||
Microsoft Windows Defender | Description of the Event | Determines the description of the event. In Progress | The antimalware platform encountered a critical error when trying to take action on malware or other potentially unwanted software. | ||
Microsoft Defender Advanced Hunting | properties.VulnerabilityDescription | The description of vulnerability and associated risks. | N/A | ||
Origin Host Name | origin.host.name | Carbon Black Cloud | device_name | The hostname of the device associated with the alert. | workstation1 |
Crowdstrike Events | event.ComputerName, event.HostnameField, event.SourceEndpointHostName | Host name. | XXX-4XV0VG3.xxx.LOCAL, hostname1 | ||
SentinelOne CEF | sourceHostName | Hostname of the source associated with the alert. | Hostname1 | ||
Sophos Central | No vendor field is present | No vendor field is present in the log. | N/A | ||
Microsoft Windows Defender | No vendor field is present | No vendor field is present in the log. | N/A | ||
Microsoft Defender Advanced Hunting | properties.DeviceName | Fully qualified domain name (FQDN) of the machine. | workstation1. | ||
Origin Account Name | origin.account.name | Carbon Black Cloud | device_username | The username of the logged-on user during the alert. If the user is not available, then this may populate the device owner. | user1@logrhythm. |
Crowdstrike Events | event.UserId, event.UserName, event.SourceAccountName | User that performed the operation, e.g. the person that performed the operation to create a new user account. | user1@logrhythm. | ||
SentinelOne CEF | sourceUserName | Username associated with the alert. | user1 | ||
Sophos Central | source | Describes the source from alert was generated. Will be mapped TBD. | NEW_MILL\\HackettC | ||
Microsoft Windows Defender | User | User: Domain\User | NT AUTHORITY\SYSTEM | ||
Microsoft Defender Advanced Hunting | properties.AccountDisplayName, properties.AccountName, properties.InitiatingProcessAccountName | properties.AccountDisplayName is the name of the account user displayed in the address book. Typically a combination of a given or first name, a middle initial, and a last name or surname. In Progress properties.AccountName is the user name of the account. properties.InitiatingProcessAccount | User Name1, UserName1, system | ||
Action State | action.state | Carbon Black Cloud | state | State supports open and dismissed | OPEN |
Crowdstrike Events | event.state, event.status, event.disposition | event.state is an identity-based incident status: NEW, IN_PROGRESS, DISMISS, RESOLVED, AUTO_RESOLVED. event.state shows a value of open or closed, depending on whether the incident is still active. event.status is an integer representing the state of the execution, with 1 representing “Done” (successful execution), 2 representing “Failed”, and 3 representing “No Data”. event.disposition is the disposition of this event (Failed/Passed). | NEW, 1, open, Failed | ||
SentinelOne CEF | SourceNetworkState | Network event status. | connected | ||
Sophos Central | No vendor field is present | No vendor field is present in the log. | N/A | ||
Microsoft Windows Defender | Status, Action Status, Post Clean Status | Description of other action's status. | No additional actions required | ||
Microsoft Defender Advanced Hunting | properties.RiskState, properties.EvidenceRole, properties.EntityRole,z properties.RawEventData.ResultStatus, properties.NetworkAdapterStatus, properties.IsCompliant, properties.EndOfSupportStatus, properties.IsAccountEnabled, | properties.RiskState indicates a risky user state. Possible values: properties.EvidenceRole describes how the entity is involved in an alert, indicating whether it is impacted or is merely related. properties.EntityRole indicates whether the entity is impacted or merely related. properties.NetworkAdapterStatus is the operational status of the network adapter. properties.IsCompliant indicates whether the configuration or policy is properly configured. In Progress Common events assignment. properties.EndOfSupportStatus indicates the lifecycle stage of the software product relative to its specified end-of-support (EOS) or end-of-life (EOL) date. properties.IsAccountEnabled indicates whether or not the account is enabled. | properties.RiskState: 1 properties.Evidence properties.RawEvent properties.Network | ||
Action Message | action.message | Carbon Black Cloud | sensor_action | The action taken by the sensor, according to the rule of the policy. | POLICY_NOT_APPLIED, ALLOW, ALLOW_AND_LOG, TERMINATE, DENY |
Crowdstrike Events | event.EventAction, event.PatternDispositionDescription, event.RuleAction | event.PatternDispositionDescription is the description of the pattern associated to the action taken on the behavior. event.RuleAction is the action taken on the activity: For example, the rule specifies traffic on a non-existent disk drive. | AuthorizeSecurity | ||
SentinelOne CEF | eventDesc | Description of the alert. | SentinelOne: Device Control Allowed USB Apple Inc. Apple Internal Keyboard / Trackpad on Sheldon-MBP19 (ABC), Threat marked as resolved. | ||
Sophos Central | No vendor field is present | No vendor field is present in the log. | N/A | ||
Microsoft Windows Defender | Action | Determines the action taken by MS Defender on the threat. | Quarantine | ||
Microsoft Defender Advanced Hunting | properties.Description, properties.InitiatingProcessVersionInfoFile properties.Context, properties.RecommendedSecurityUpdate, properties.EmailAction, properties.Action, | properties.Description provides a description of the behavior. properties.InitiatingProcessVersionInfoFile properties.Context provides additional contextual information about the configuration or policy. properties.RecommendedSecurity properties.EmailAction gives the final action taken on the email based on filter verdict, policies, and user actions. properties.Action gives the action taken on the entity. | properties.InitiatingProcessVersionInfoFile properties.EmailAction: Move message to junk mail folder, Modify subject, Redirect message. | ||
Policy ID | object.policy.id | Carbon Black Cloud | policy_id | The identifier for the policy associated with the device at the time of the alert. | 32064 |
Crowdstrike Events | event.PolicyId | The unique ID of the firewall policy matched. | a8bdd37d5cbc48b29bda1e2e767c308e, 212 | ||
SentinelOne CEF | No vendor field is present | No vendor field is present in the log. | N/A | ||
Sophos Central | No vendor field is present | No vendor field is present in the log. | N/A | ||
Microsoft Windows Defender | No vendor field is present | No vendor field is present in the log. | N/A | ||
Microsoft Defender Advanced Hunting | properties.ConditionalAccessStatus, properties.ConfigurationId | properties.ConditionalAccessStatus gives the status of the conditional access policies applied to the sign-in. Possible values: properties.ConfigurationId gives a unique identifier for a specific configuration. In Progress | 0, 1, 2 | ||
Policy Name | object.policy.name | Carbon Black Cloud | policy_name | The name of the policy associated with the device at the time of the alert. | test |
Crowdstrike Events | event.PolicyStatement, event.PolicyName | event.PolicyStatement is the statement of the associated policy. event.PolicyName is the name of the firewall policy matched. | EC2 security group modified to allow egress to the public internet | ||
SentinelOne CEF | No vendor field is present | No vendor field is present in the log. | N/A | ||
Sophos Central | No vendor field is present | No vendor field is present in the log. | N/A | ||
Microsoft Windows Defender | No vendor field is present | No vendor field is present in the log. | N/A | ||
Microsoft Defender Advanced Hunting | properties.ConfigurationName, properties.EmailActionPolicy | properties.ConfigurationName gives the display name of the configuration. properties.EmailActionPolicy gives the action policy that took effect. | properties.EmailAction |
Firewall Logs
Applicable to nearly all network and host-based Firewall products. Common Event assignment for firewalls generally falls in the General Network Traffic group of Common Events.
Axon Display Name | Schema Field | Technology | Technology field | Technology Description | Data Samples |
---|---|---|---|---|---|
Vendor Description | vendor_information.description | Cisco ASA | DeviceProduct | Name of the product from Cisco. | ASA |
Palo Alto NGFW | Description (opaque) | Detailed description of the event, up to a maximum of 512 bytes. | dns-signature cloud service connection refused. | ||
Vendor Severity | vendor_information.severity | Cisco ASA | Severity level | Determines the severity level as described in the signal message. | 6 |
Palo Alto NGFW | Severity (severity) | Severity associated with the event. Values are informational, low, medium, high, critical. | informational | ||
Vendor Message ID | vendor_information.id | Cisco ASA | Event ID | Event ID as denoted in the signal message. | 106015 |
Palo Alto NGFW | No vendor field is present | No vendor field is present in the log. | N/A | ||
Vendor Log Type | vendor_information.log_type | Cisco ASA | No vendor field is present | No vendor field is present in the log. | N/A |
Palo Alto NGFW | Type (type) | Specifies the type of log. | CORRELATION, DECRYPTION, THREAT, SYSTEM, GLOBALPROTECT, SCTP etc. | ||
Vendor Log Subtype | vendor_information.log_subtype | Cisco ASA | No vendor field is present | No vendor field is present in the log. | N/A |
Palo Alto NGFW | Threat/Content Type (subtype), | Specifies the subtype of log. | auth, ddns, dhcp, vpn, data, file, flood, ml-virus, vulnerability, wildfire, wildfire-virus etc. | ||
Log Gen Time | vendor_information.log_generation_time | Cisco ASA | Syslog header timestamp | Timestamp observed in the syslog header portion of the log. In Progress For example: <161>Apr 16 2024 12:58:27 10.1.1.1 : %ASA-1-106021: Deny TCP reverse path check from 10.1.1.2 to 10.1.1.3 on interface Router\par In this example, Apr 16 2024 12:58:27 is the Log Gen Time. | Apr 16 2024 12:58:27 |
Palo Alto NGFW | Generated Time (time_generated or cef-formatted-time_generated), Generate Time (time_generated) | Time the log was generated on the data plane. In Progress | 2021/11/30 15:40:55 | ||
Observer Host IP | observer.host.ip_address.value | Cisco ASA | Syslog header host IP | It represents the IP address associated with the host that observed the action as described within the signal message. In Progress The Observer context is for Accounts or Hosts that witnessed the Action described within the message. For example: <161>Apr 16 2024 12:58:27 10.1.1.1 : %ASA-1-106021: Deny TCP reverse path check from 10.1.1.2 to 10.1.1.3 on interface Router\par In this example, 10.1.1.1 is the Observer IP in the syslog header portion. | 10.1.1.1 |
Palo Alto NGFW | No vendor field is present | No vendor field is present in the log. | N/A | ||
Observer Host Name | observer.host.name | Cisco ASA | Syslog header hostname | Represents the name of the host that observed the action as described within the signal message. In Progress Note: The Observer context is for Accounts or Hosts that witnessed the Action described within the message. For example: <161>Apr 16 2024 12:58:27 firewall01 : %ASA-1-106021: Deny TCP reverse path check from 10.1.1.2 to 10.1.1.3 on interface Router\par In this example, firewall01 is the Observer hostname in the syslog header portion. | firewall01 |
Palo Alto NGFW | Device Name (device_name) | The hostname of the firewall on which the session was logged. | FW1 | ||
Observer Host Serial | observer.host.serial_number | Cisco ASA | No vendor field is present | No vendor field is present in the log. | N/A |
Palo Alto NGFW | Serial Number (serial) | The serial number of the firewall that generated the log. | 13201019325 | ||
Observer Host Ingress Int | observer.host.ingress_interface | Cisco ASA | No vendor field is present | No vendor field is present in the log. | N/A |
Palo Alto NGFW | Inbound Interface (inbound_if) | Interface from which the session was sourced. | ethernet1/5 | ||
Observer Host Egress Int | observer.host.egress_interface | Cisco ASA | No vendor field is present | No vendor field is present in the log. | N/A |
Palo Alto NGFW | Outbound Interface (outbound_if) | Interface that the session was destined to | ethernet1/1 | ||
Origin Host Name | origin.host.name | Cisco ASA | No vendor field is present | No vendor field is present in the log. | N/A |
Palo Alto NGFW | Machine Name (machinename), Source Hostname (src_host) | Machine Name (machinename) is the name of the user’s machine. Source Hostname (src_host) is the hostname of the device that Device-ID identifies as the source of the traffic. | workstation1 | ||
Origin Host IP | origin.host.ip_address.value | Cisco ASA | Source IP | This value has been extracted from the actual message of the log corresponding to its Event ID. For example: <161>Apr 16 2024 12:58:27 10.1.1.5 : %ASA-6-106015: Deny TCP (no connection) from 10.1.1.1/64580 to 10.1.1.2/443 flags RST on interface CRMP\par In this example, 10.1.1.1 is the Source IP. | 10.1.1.1 |
Palo Alto NGFW | Source IP (IP), Host (host), Source Address (src), Public IP (public_ip) | Source IP (ip) is the original session source IP address. Host (host) is the hostname or IP address of the client machine. Source Address (src) is the IP address of the user who initiated the event. Public IP (public_ip) is the public IP address for the user who initiated the session. | 10.1.1.1 | ||
Origin Host NAT IP | origin.host.ip_address.nat_value | Cisco ASA | No vendor field is present | No vendor field is present in the log. | N/A |
Palo Alto NGFW | NAT Source IP (natsrc), Private IP (private_ip) | NAT Source IP (natsrc) - displays the post-NAT Source IP address if Source NAT was performed. Private IP (private_ip) is the private IP address for the user who initiated the session. | 10.1.1.1 | ||
Origin Host IP Port | origin.host.network_port.value | Cisco ASA | Source Port | This value has been extracted from the actual message of the log corresponding to its Event ID. For example: <161>Apr 16 2024 12:58:27 10.1.1.5 : %ASA-6-106015: Deny TCP (no connection) from 10.1.1.1/64580 to 10.1.1.2/443 flags RST on interface CRMP\par In this example, 64580 is the Source Port. | 64580 |
Palo Alto NGFW | Source Port (sport) | Source port utilized by the session. | 60453 | ||
Origin Host NAT IP Port | origin.host.network_port.nat_value | Cisco ASA | No vendor field is present | No vendor field is present in the log. | N/A |
Palo Alto NGFW | NAT Source Port (natsport) | Post-NAT source port. | 57602 | ||
Origin Host Interface Name | origin.host.interface.name | Cisco ASA | Source Interface | This value has been extracted from the actual message of the log corresponding to its Event ID. For example: <161>Apr 16 2024 12:58:27 10.1.1.5 : %ASA-3-324005: Unable to create tunnel from interface1 :10.1.1.1 /64580 to interface2 :10.1.1.2 /443 In this example, interface1 is the Source Interface. | interface1 |
Palo Alto NGFW | No vendor field is present | No vendor field is present in the log. | N/A | ||
Target Host Name | target.host.name | Cisco ASA | No vendor field is present | No vendor field is present in the log. | N/A |
Palo Alto NGFW | Destination Hostname (dst_host) | The hostname of the device that Device-ID identifies as the destination for the traffic. | workstation2 | ||
Target Host IP | target.host.ip_address.value | Cisco ASA | Target IP | This value has been extracted from the actual message of the log corresponding to its Event ID. For example: <161>Apr 16 2024 12:58:27 10.1.1.5 : %ASA-6-106015: Deny TCP (no connection) from 10.1.1.1/64580 to 10.1.1.2/443 flags RST on interface CRMP\par In this example, 10.1.1.2 is the Target IP. | 10.1.1.2 |
Palo Alto NGFW | Destination Address (dst) | Original session destination IP address. | 10.1.1.1 | ||
Target Host NAT IP | target.host.ip_address.nat_value | Cisco ASA | No vendor field is present | No vendor field is present in the log. | N/A |
Palo Alto NGFW | NAT Destination IP (natdst) | If Destination NAT performed, the post-NAT Destination IP address. | 10.1.1.1 | ||
Target Host IP Port | target.host.network_port.value | Cisco ASA | Target Port | This value has been extracted from the actual message of the log corresponding to its Event ID. For example: <161>Apr 16 2024 12:58:27 10.1.1.5 : %ASA-6-106015: Deny TCP (no connection) from 10.1.1.1/64580 to 10.1.1.2/443 flags RST on interface CRMP\par In this example, 443 is the Target Port. | 443 |
Palo Alto NGFW | Destination Port (dport) | Destination port utilized by the session. | 25 | ||
Target Host NAT IP Port | target.host.network_port.nat_value | Cisco ASA | No vendor field is present | No vendor field is present in the log. | N/A |
Palo Alto NGFW | NAT Destination Port (natdport) | Post-NAT destination port | 80 | ||
Target Host Interface Name | target.host.interface.name | Cisco ASA | Target Interface | This value has been extracted from the actual message of the log corresponding to its Event ID. For example: <161>Apr 16 2024 12:58:27 10.1.1.5 : %ASA-3-324005: Unable to create tunnel from interface1 :10.1.1.1 /64580 to interface2 :10.1.1.2 /443 In this example, interface2 is the Target Interface. | interface2 |
Palo Alto NGFW | No vendor field is present | No vendor field is present in the log. | N/A | ||
Action Message | action.message | Cisco ASA | Message | Actual message part of the log. In Progress to map the complete message portion to "Action Message". | >Deny TCP (no connection) from 10.1.1.1/64580 to 10.1.1.2/443 flags RST on interface CRMP\par >No matching connection for ICMP error message: icmp src Users:10.1.1.1 dst Servers:10.1.1.2 (type 3, code 3) on Users interface. Original IP payload: udp src 10.1.1.2/53 dst 10.1.1.1/59602.\par |
Palo Alto NGFW | Action (action) | The action taken for the session. Values are alert, allow, deny, drop, drop-all-packets, reset-client, reset-server, reset-both, block-url. | reset-both | ||
Action Type | action.type | Cisco ASA | connection type, message type, action type | For a few Event IDs, connection type, message type, and action type are mapped to "Action Type". | SSL, |
Palo Alto NGFW | Event ID (eventid) | String showing the name of the event. In Progress | connect-ldap-sever-failure, ipsec-key-delete | ||
Network Proto Name | action.network.protocol.name | Cisco ASA | protocol name | This value has been extracted from the actual message of the log corresponding to its Event ID. For example: <161>Apr 16 2024 12:58:27 192.168.21.1 : %ASA-4-500004: Invalid transport field for protocol=tcp , from 10.1.1.1 /64580 to 10.1.1.2 /443 In this example, tcp is the Protocol name. | tcp |
Palo Alto NGFW | IP Protocol (proto) | IP protocol associated with the session. | tcp, sctp | ||
Threat Severity | threat.severity | Cisco ASA | level_value | This value has been extracted from the actual message of the log corresponding to its Event ID. For example: <161>Apr 16 2024 12:58:27 192.168.21.1 : %ASA-4-338003: Dynamic filter monitored blacklisted protocol traffic from in_interface :src_ip_addr /src_port (mapped-ip /mapped-port) to out_interface :dest_ip_addr /dest_port , (mapped-ip /mapped-port), source malicious address resolved from local or dynamic list: ip address/netmask, threat-level: level_value, category: category_name In this example, level_value is the Threat Severity. | none, very-low, low, moderate, high, and very-high |
Palo Alto NGFW | Severity (severity) | Severity associated with the threat; values are informational, low, medium, high, critical. "Severity" is mapped to "threat.severity" for Threat logs and "vendor_information.severity" for other logs from Palo Alto NGFW. | medium | ||
Threat Name | threat.name | Cisco ASA | No vendor field is present | No vendor field is present in the log. | N/A |
Palo Alto NGFW | Threat/Content Name (threatid) | Palo Alto Networks identifier for the threat. It is a description string followed by a 64-bit numerical identifier in parentheses for some Subtypes. | TrickBot.Gen Command and Control Traffic(18087) | ||
Threat ID | Cisco ASA | No vendor field is present | No vendor field is present in the log. | N/A | |
Palo Alto NGFW | (threatid) | Description of the threat followed by a 64-bit numerical identifier in parentheses for some Subtypes. | (18087) | ||
Threat Category | threat.category | Cisco ASA | category_name | This value has been extracted from the actual message of the log corresponding to its Event ID. For example: <161>Apr 16 2024 12:58:27 192.168.21.1 : %ASA-4-338003: Dynamic filter monitored blacklisted protocol traffic from in_interface :src_ip_addr /src_port (mapped-ip /mapped-port) to out_interface :dest_ip_addr /dest_port , (mapped-ip /mapped-port), source malicious address resolved from local or dynamic list: ip address/netmask, threat-level: level_value, category: category_name In this example, category_name is the Threat Category. | botnet, Trojan, spyware |
Palo Alto NGFW | Threat Category (thr_category) | Describes threat categories used to classify different types of threat signatures. | botnet, flood, scan | ||
Threat Description | threat.description | Cisco ASA | No vendor field is present | No vendor field is present in the log. | N/A |
Palo Alto NGFW | Application Characteristic (characteristic_of_app) | Comma-separated list of applicable characteristics of the application. | "able-to-transfer-file,has-known-vulnerability,is-saas,is-hipaa,is-soc2,is-ip-based-restrictions", "used-by-malware,able-to-transfer-file,has-known-vulnerability, |
Cloud Logs
Common fields are used in nearly every AWS log.
Device Name | Device Category | Schema Field | Technology Field |
---|---|---|---|
AWS | Cloud | action.session.type → In Progress | userIdentity.Type |
AWS | Cloud | origin.account.name | userIdentity.userName |
AWS | Cloud | origin.account.id | userIdentity.accountId |
AWS | Cloud | origin.account.name → In Progress | userIdentity.sessionConext.sessionIssuer.userName |
AWS | Cloud | vendor_information.log_generation_time | eventTime |
AWS | Cloud | vendor_information.description | eventSource |
AWS | Cloud | action.message | eventName |
AWS | Cloud | origin.host.ip_address.value | sourceIPAddress |
AWS | Cloud | action.user_agent | userAgent |
AWS | Cloud | action.result.code | errorCode |
AWS | Cloud | action.result.message | errorMessage |
AWS | Cloud | action.result.code | responseElements.errorCode |
AWS | Cloud | action.result.message | responseElements.errorMessage |
AWS | Cloud | action.type → In Progress | eventType |
AWS | Cloud | observer.account.id | recipientAccountId |
AWS | Cloud | vendor_information.log_type | eventCategory |