V 2.0 Correlated Event Messages 1
Log Fields and Parsing
This section details the log fields available in this log message type, along with values parsed for both LogRhythm Default and LogRhythm Default v2.0 policies. A value of "N/A" (not applicable) means that there is no value parsed for a specified log field.
Log Field | LogRhythm Default | LogRhythm Default v2.0 |
---|---|---|
Header: Severity | <severity> | N/A |
Type (type) | N/A | <vmid> |
Content/Threat Type (subtype) | N/A | <vendorinfo> |
Source Address (src) | <sip> | <sip> |
Source User (srcuser) | N/A | <domainorigin> <login> |
Category (category) | <reason> <threatname> | <subject> |
Severity (severity) | N/A | <severity> |
Device Name (device_name) | N/A | <objectname> |
Object Name (objectname) | <object> | <threatname> |
Object ID (object_id) | N/A | <threatid> |
Evidence (evidence) | <subject> <quantity> | <reason> |
Log Processing Settings
This section details log processing changes made from the LogRhythm Default policy to LogRhythm Default v2.0. In some cases, base rules are broken down into sub-rules to appropriately parse log message types by their event types.
LogRhythm Default
Regex ID | Rule Name | Rule Type | Common Events | Classifications |
---|---|---|---|---|
1009371 | Correlation Suspicious Events | Base Rule | Suspicious Activity | Suspicious |
LogRhythm Default v2.0
Regex ID | Rule Name | Rule Type | Common Events | Classifications |
---|---|---|---|---|
1010893 | V 2.0 Correlated Event Messages | Base Rule | Suspicious Activity | Suspicious |