Skip to main content
Skip table of contents

V 2.0 : DLP Events

Vendor Documentation

Classification

Rule NameRule TypeCommon EventClassification
V 2.0: DLP EventsBase RuleGeneral DLP MessageInformation
V 2.0 DLP: AcceptSub RuleTraffic Allowed by DLPNetwork Allow
V 2.0 DLP: EncryptSub RuleEncrypt PacketNetwork Traffic
V 2.0 DLP: Ask UserSub RuleGeneral DLP MessageInformation
V 2.0 DLP: BlockSub RuleTraffic Denied by DLPNetwork Deny

Mapping with LogRhythm Schema

Device Key in Log MessageLogRhythm SchemaData TypeSchema Description
product<vmid>Text/StringProduct name
Action<action>
<tag1>
Text/StringN/A
OriginipN/AN/AIP of the log origin 
originN/AN/AName of the first Security Gateway that reported this event
SIP<sip>IP AddressSource IP
SPort<sport>NumberSource host port number
DIP<dip>IP AddressDestination IP
dport<dport>NumberN/A
protocol<protnum>NumberProtocol detected on the connection
ifnameN/AN/AThe name of the Security Gateway interface through which a connection traverses
ifdirectionN/AN/AN/A
proxy_src_ip<snatip>IP AddressSender source IP (even when using proxy)
userN/AN/ASource user name
src_user_name<login>Text/StringUser name connected to source IP
dst_user_name<account>Text/StringConnected user name on the destination IP
from<sender>Text/StringSource mail Address
ruleN/AN/AN/A
severity<severity>NumberThreat severity determined by ThreatCloud
Possible values:
0 - Informational
1 - Low
2 - Medium
3 - High
4 - Critical
user_statusN/AN/AN/A
portal_messageN/AN/AN/A
https_inspection_actionN/AN/AN/A
message_size<size>NumberMail/post size
matched_fileN/AN/AFingerprint: the file from FP repository that was matched by the traffic
dlp_file_name<object>Text/StringMatched file
dlp_recipients<recipient>Text/StringMail recipients 
dlp_word_listN/AN/APhrases matched by data type
dlp_template_scoreN/AN/ATemplate data type match score 
dlp_rule_nameN/AN/AMatched rule name
dlp_data_type_name<objecttype>Text/StringMatched data type
dlp_violation_descriptionN/AN/AViolation descriptions described in the rulebase
dlp_categoriesN/AN/AData type category
dlp_action_reason<reason>Text/StringAction chosen reason 
dlp_subject<subject>Text/StringMail subject
DLP_TransportN/AN/AN/A
dlp_addtional_actionN/AN/AWatermark/None
duplicateN/AN/ALog marked as duplicated, when mail is split and the Security Gateway sees it twice
incident_extensionN/AN/AFormat of original data
outgoing_url<url>Text/StringURL related to this log (for HTTP)
Incident_UIDN/AN/AN/A
Related_IncidentN/AN/AN/A
timeN/AN/AThe timestamp when the log was created
alertN/AN/AN/A
flagsN/AN/A131072
loguidN/AN/AUUID  of unified logs 
sequencenumN/AN/ANumber added to order logs with the same Linux timestamp and origin
versionN/AN/AN/A
__policy_id_tag<policy>Text/StringN/A
info<vendorinfo>Text/StringSpecial log message
origin_sic_nameN/AN/AMachine SIC
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.