Device Key in Log Message | LogRhythm Schema | Data Type | Schema Description |
Provider | N/A | N/A | Identifies the provider that logged the event. The Name and Guid attributes are included if the provider used an instrumentation manifest to define its events. The EventSourceName attribute is included if a legacy event provider (using the Event Logging API) logged the event. |
EventID | <vmid> | Number | The identifier that the provider used to identify the event. |
Version | N/A | N/A | The version number of the event's definition. |
Level | <severity> | String/Number/Text | The severity level defined in the event. |
Task | <vendorinfo> | Text/String | The task defined in the event. Task and Opcode are typically used to identify the location in the application from where the event was logged. |
Opcode | N/A | N/A | The opcode defined in the event. Task and Opcode are typically used to identify the location in the application from where the event was logged. |
Keywords | <result> | Text/String | A bitmask of the keywords defined in the event. Keywords are used to classify types of events (for example, events associated with reading data). |
TimeCreated | N/A | N/A | The time stamp that identifies when the event was logged. The time stamp will include either the SystemTime attribute or the RawTime attribute. |
EventRecordID | N/A | N/A | The record number assigned to the event when it was logged. |
Correlation | N/A | N/A | The activity identifiers that consumers can use to group related events together. |
Execution | N/A | N/A | Contains information about the process and thread that logged the event. |
Channel | N/A | N/A | The channel to which the event was logged. |
Computer | <dname> | Text/String | The name of the computer on which the event occurred. |
SubjectUserSid | N/A | N/A | The SID of account that requested the assign token to process operation. |
SubjectUserName | <login> | Text/String | The name of the account that requested the assign token to process operation. |
SubjectDomainName | <domainorigin> | Text/String | The subject’s domain or computer name. Formats vary, and include the following:
- Domain NETBIOS name example: CONTOSO
- Lowercase full domain name: contoso.local
- Uppercase full domain name: CONTOSO.LOCAL
- For some well-known security principals, such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is NT AUTHORITY.
- For local user accounts, this field will contain the name of the computer or device that this account belongs to.
|
SubjectLogonId | <session> | Text/String | A hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID. |
TargetUserSid | N/A | Text/String | The SID of target account. |
TargetUserName | <account> | Text/String | The name of the target account. |
TargetDomainName | <domainimpacted> | Text/String | The target's domain or computer name. Formats vary, and include the following:
- Domain NETBIOS name example: CONTOSO
- Lowercase full domain name: contoso.local
- Uppercase full domain name: CONTOSO.LOCAL
- For some well-known security principals, such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is NT AUTHORITY.
- For local user accounts, this field will contain the name of the computer or device that this account belongs to.
|
TargetLogonId | N/A | N/A | A hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID. |
TargetProcessid | <processid> | Number/Text/String | A hexadecimal Process ID of the new process with new security token. |
TargetProcessName | <process> | Text/String | The full path and the name of the executable for the new process. |
ProcessId | <parentprocessid> | Number/Text/String | A hexadecimal Process ID of the process which started the new process with the new security token. |
ProcessName | <parentprocessname> | Text/String | The full path and the name of the executable for the process which ran the new process with new security token. |