Skip to main content
Skip table of contents

Exploit Attempt

Log Fields and Parsing

This section details the log fields available in this log message type, along with values parsed for both LogRhythm Default and LogRhythm Default v2.0 policies. A value of "N/A" (not applicable) means that there is no value parsed for a specified log field.

Log FieldLogRhythm Default

LogRhythm Default v2.0

N/A<severity>N/A
Action<action>, <command>N/A
Device Name<dname><dname>
Event Name<vmid><action>, <tag1>
Event Type<threatname><vmid>
IP Address<dip><dip>
Process ID<processid><processid>
Process Name<process><process>
User Name<login><login>
Violation Type<object><threatname>
Zone Names<group>N/A

Log Processing Settings

This section details log processing changes made from the LogRhythm Default policy to LogRhythm Default v2.0. In some cases, base rules are broken down into sub-rules to appropriately parse log message types by their event types.

LogRhythm Default

Regex IDRule NameRule TypeCommon EventsClassifications
1008123Exploit AttemptBase RuleSuspicious User ActivitySuspicious

LogRhythm Default v2.0

Regex IDRule NameRule TypeCommon EventsClassifications
1011405
V 2.0 : Cylance Protect : Memory Exploit EventsBase RuleGeneral Threat MessageActivity
V 2.0 : Cylance Protect : Exploit AllowedSub RuleGeneral Attack ActivityAttack
V 2.0 : Cylance Protect : Exploit BlockedSub RuleFailed General Attack ActivityFailed Attack
V 2.0 : Cylance Protect : Exploit AlertSub RuleGeneral Attack ActivityAttack
V 2.0 : Cylance Protect : Exploit TerminatedSub RuleFailed General Attack ActivityFailed Attack
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.