Skip to main content
Skip table of contents

LSO FortiGate - UTM : IPS

Vendor Documentation

Log Fields and Parsing

This section details the log fields available in this log message type, along with values parsed for both LogRhythm Default and LogRhythm Default v2.0 policies. A value of "N/A" (not applicable) means that there is no value parsed for a specified log field.

Log Field

LogRhythm Default

LogRhythm Default v2.0

Header: Severity

<severity>

N/A

date

N/A

N/A

time

N/A

N/A

logid

<vmid>
<tag1>

<vmid>

type

N/A

<vendorinfo>

subtype

N/A

N/A

eventtype

<object>

N/A

level

N/A

N/A

vd

N/A

N/A

eventtime

N/A

N/A

severity

<severity>

<severity>

srcip

<sip>

<sip>

srccountry

N/A

N/A

dstip

<dip>

<dip>

srcintf

<sinterface>

<sinterface>

srcintfrole

N/A

N/A

dstintf

<dinterface>

<dinterface>

dstintfrole

N/A

N/A

sessionid

<session>

<session>

action

<action>

<action>

proto

<protnum>

<protnum>

service

<protname>

<protname>

policyid

<policy>

<policy>

attack

<threatname>

<threatname>

srcport

<sport>

<sport>

dstport

<dport>

<dport>

hostname

<dname>

<sname>

url

<url>

N/A

direction

N/A

N/A

attackid

<threatid>

<threatid>

<user>

<domainorigin>
<login>

N/A

group

<group>

N/A

forwardedfor

<snatip>

N/A

profile

N/A

N/A

ref

N/A

<url>

incidentserialno

N/A

N/A

msg

<subject>
<objectname>

<subject>

crscore

<amount>

N/A

craction

<size>

N/A

crlevel

<status>

N/A

Log Processing Settings

This section details log processing changes made from the LogRhythm Default policy to LogRhythm Default v2.0. In some cases, base rules are broken down into sub-rules to appropriately parse log message types by their event types.

LogRhythm Default

Regex ID

Rule Name

Rule Type

Common Event

Classification

1010167

UTM : IPS

Base Rule

General IPS/IDS Message

Other Operations

IPS Signature ICMP

Sub Rule

General IPS/IDS Message

Other Operations

IPS Signature TCP UDP

Sub Rule

General Attack Activity

Attack

Attack Detected By Other Signature

Sub Rule

General Attack Activity

Attack

Attack Detected By A Malicious URL

Sub Rule

General Attack Activity

Attack

LogRhythm Default v2.0

Regex ID

Rule Name

Rule Type

Common Event

Classification

1013200

V 2.0 : UTM : IPS

Base Rule

General IPS Message

Information

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.