LSO : Syslog - Imperva Securesphere : Catch All : Level 4
Vendor Documentation
Log Fields and Parsing
This section details the log fields available in this log message type, along with values parsed for both LogRhythm Default and LogRhythm Default v2.0 policies. A value of "N/A" (not applicable) means that there is no value parsed for a specified log field.
Log Field | LogRhythm Default | LogRhythm Default v2.0 |
---|---|---|
N/A | <session> | N/A |
N/A | <threatname><tag1> | N/A |
N/A | <tag2>, <objecttype> | N/A |
N/A | <dname> | N/A |
N/A | <tag3> | N/A |
N/A | <tag4> | N/A |
N/A | <sip> | N/A |
N/A | <sport> | N/A |
N/A | <protname> | N/A |
N/A | <dip> | N/A |
N/A | <dport> | N/A |
N/A | <responsecode> | N/A |
Log Processing Settings
This section details log processing changes made from the LogRhythm Default policy to LogRhythm Default v2.0. In some cases, base rules are broken down into sub-rules to appropriately parse log message types by their event types.
LogRhythm Default
Regex ID | Rule Name | Rule Type | Common Event | Classification |
---|---|---|---|---|
1000725 | Catch All : Level 4 | Base Rule | General Firewall Alert | Warning |
Distributed MS-SQL Worm Propagation Attempt | Sub Rule | Detected Worm Activity | Malware | |
MS-SQL Worm Propagation Attempt | Sub Rule | Detected Worm Activity | Malware | |
Multiple URL Worm Attacks | Sub Rule | General Attack Activity | Attack | |
Web Worm Detected | Sub Rule | Detected Worm Activity | Malware | |
Distributed MS-SQL Worm Propagation Attempt | Sub Rule | Detected Worm Activity | Malware | |
Multiple Parameter Read Only Violation | Sub Rule | Suspicious Activity | Suspicious | |
General Signature Detection | Sub Rule | General Signature Detection | Warning | |
General Profile Detection | Sub Rule | General Profile Detection | Information | |
General Worm Detection | Sub Rule | Detected Worm Activity | Malware |
LogRhythm Default v2.0
N/A