Cortex Alert Messages
Vendor Documentation
Classification
Rule Name | Rule Type | Common Event | Classification |
|---|---|---|---|
| Cortex Alert Messages | Base Rule | General Security | Other Security |
| Command And Control Detected | Sub Rule | Suspicious Activity | Suspicious |
| Discovery Detected | Sub Rule | Suspicious Activity | Suspicious |
| Persistence Detected | Sub Rule | Suspicious Activity | Suspicious |
| Execution Detected | Sub Rule | Arbitrary Code Execution | Attack |
| Impact Detected | Sub Rule | Suspicious Activity | Suspicious |
| Lateral Movement Detected | Sub Rule | Suspicious Activity | Suspicious |
| Credential Access Detected | Sub Rule | Suspicious Activity | Suspicious |
| Defense Evasion Detected | Sub Rule | Suspicious Activity | Suspicious |
| Initial Access Detected | Sub Rule | Suspicious Activity | Suspicious |
| Collection Detected | Sub Rule | Suspicious Activity | Suspicious |
| Exfiltration Detected | Sub Rule | Suspicious Activity | Suspicious |
| Privilege Escalation Detected | Sub Rule | Unauthorized Activity | Misuse |
| Virus Detected | Sub Rule | Detected Virus Activity | Malware |
| Spyware Detected | Sub Rule | Detected Spyware Activity | Malware |
| Vulnerability Detected | Sub Rule | General Security Alert | Warning |
| URL Filtering Detected | Sub Rule | General WebFilter URLFilter Critical | Critical |
| File Blocking Detected | Sub Rule | Device Blocked | Warning |
| Zone Protection Detected | Sub Rule | Detected Spyware Activity | Malware |
| DoS Detected | Sub Rule | Network Denial Of Service | Denial Of Service |
| Data Filtering Detected | Sub Rule | Detected Spyware Activity | Malware |
| Wildfire Analysis Detected | Sub Rule | Suspicious Activity | Suspicious |
| Discovery Prevented | Sub Rule | Failed Suspicious Activity | Failed Suspicious |
| Command And Control Prevented | Sub Rule | Failed Suspicious Activity | Failed Suspicious |
| Persistence Prevented | Sub Rule | Failed Suspicious Activity | Failed Suspicious |
| Execution Prevented | Sub Rule | Failed Arbitrary Code Execution | Failed Attack |
| Impact Prevented | Sub Rule | Failed Suspicious Activity | Failed Suspicious |
| Lateral Movement Prevented | Sub Rule | Failed Suspicious Activity | Failed Suspicious |
| Credential Access Prevented | Sub Rule | Failed Suspicious Activity | Failed Suspicious |
| Defense Evasion Prevented | Sub Rule | Failed Suspicious Activity | Failed Suspicious |
| Initial Access Prevented | Sub Rule | Failed Suspicious Activity | Failed Suspicious |
| Collection Prevented | Sub Rule | Failed Suspicious Activity | Failed Suspicious |
| Exfiltration Prevented | Sub Rule | Failed Suspicious Activity | Failed Suspicious |
| Privilege Escalation Prevented | Sub Rule | Failed Unauthorized Activity | Failed Misuse |
| Virus Prevented | Sub Rule | Failed Virus Activity | Failed Malware |
| Spyware Prevented | Sub Rule | Failed Spyware Activity | Failed Malware |
| Vulnerability Prevented | Sub Rule | Failed Suspicious Activity | Failed Suspicious |
| URL Filtering Prevented | Sub Rule | Failed Suspicious Activity | Failed Suspicious |
| File Blocking Prevented | Sub Rule | Blocked Message | Failed Activity |
| Zone Protection Prevented | Sub Rule | Failed Suspicious Activity | Failed Suspicious |
| DoS Protection Prevented | Sub Rule | Failed Network Denial Of Service | Failed Denial of Service |
| Data Filtering Prevented | Sub Rule | Failed Suspicious Activity | Failed Suspicious |
| Wildfire Analysis Prevented | Sub Rule | Failed Suspicious Activity | Failed Suspicious |
Mapping with LogRhythm Schema
| Device Key in Log Message | LogRhythm Schema | Data Type | Schema Description |
| HEADER/Vendor | N/A | N/A | Device Vendor |
| HEADER/Device Product | N/A | N/A | Device Product |
| HEADER/Device Version | <version> | Text/String | Product Version |
| HEADER/Device Event Class ID | <vmid> | Text/String | Device Event Class ID |
| HEADER/name | <vendorinfo> | Text/String | Name of the event |
| HEADER/Severity | <severity> | Number | Severity: 0 - Unknown |
| end | N/A | N/A | Timestamp |
| shost | <sname> | Text/String | Source Host |
| suser | <domainorigin> <login> | Text/String | Source User |
| deviceFacility | N/A | N/A | N/A |
| cat | <threatname> | Text/String | Category |
| externalId | <threatid> | Number | N/A |
| request | <url> | Text/String/Number | Link to XDR alert page |
| cs1 | <process> | Text/String | The name of the process that initiated an activity such as a network connection or registry change. |
| cs1Label | N/A | N/A | N/A |
| cs2 | <command> | Text/String | Command-line used to initiate the process including any arguments. |
| cs2Label | N/A | N/A | N/A |
| cs3 | <status> | Text/String | Signing status of the process that initiated the activity: Unsigned |
| cs3Label | N/A | N/A | N/A |
| cs4 | <parentprocessname> | Text/String | The name of the process that started the causality chain based on Cortex XDR causality logic. |
| cs4Label | N/A | N/A | N/A |
| cs5 | N/A | N/A | Command-line arguments of the Causality Group Owner. |
| cs5Label | N/A | N/A | N/A |
| cs6 | N/A | N/A | Signing status of the CGO: Unsigned |
| cs6Label | N/A | N/A | N/A |
| dst | <dip> | IP Address | Destination IP |
| dpt | <dport> | Number | Destination Port |
| src | <sip> | IP Address | Source IP |
| spt | <sport> | Number | Source Port |
| app | <protname> | Text/String | Application Used |
| fileHash | <hash> | Text/String | Hash value of the file. |
| filePath | <object> | Text/String | When the alert triggered on a file (the Event Type is File) this is the path to the file on the endpoint. If not, then N/A. |
| targetprocesssignature | N/A | N/A | N/A |
| tenantname | N/A | N/A | N/A |
| tenantCDLid | N/A | N/A | N/A |
| CSPaccountname | N/A | N/A | N/A |
| initiatorSha256 | <hash> | Text/String | The SHA256 hash value of the initiator. |
| initiatorPath | N/A | N/A | Path of the initiating process. |
| cgoSha256 | N/A | N/A | The SHA256 value of the CGO that initiated the alert. |
| osParentName | N/A | N/A | N/A |
| osParentCmd | N/A | N/A | Command-line used to by the parent operating system to initiate the process including any arguments. |
| osParentSignature | N/A | N/A | Signing status of the operating system of the activity: Unsigned |
| osParentSigner | N/A | N/A | Parent operating system signer. |
| incident | <reason> | Number | The ID of the any incident that includes the alert. |
| act | <action> <tag1> | Text/String | Action taken by the alert sensor, either Detected or Prevented with action status displayed in parenthesis. |
| srcZoneName | N/A | N/A | Source Zone Name |
| dstZoneName | N/A | N/A | Destination Zone Name |
| fwName | N/A | N/A | Firewall Name |
| msg | <subject> | Text/String | Message |