Log Fields and Parsing
This section details the log fields available in this log message type, along with values parsed for both LogRhythm Default and LogRhythm Default v2.0 policies. A value of "N/A" (not applicable) means that there is no value parsed for a specified log field.
| Log Field | LogRhythm Default | LogRhythm Default v2.0 |
|---|
| N/A | <severity> | <sname> |
| N/A | <sip> | <sip> |
| N/A | <dip> | <dip> |
| N/A | <vendorinfo> | <dname> |
| N/A | <dname> | <sport> |
| N/A | <sport> | N/A |
| N/A | <dport> | <dport> |
| N/A | <login> | <login> |
| N/A | <domainorigin> | <domainorigin> |
| N/A | <process> | <subject> |
| N/A | <smac> | <smac> |
| N/A | <dmac> | <dmac> |
| N/A | <protname> | <protname> |
| N/A | <threatname> | <threatname> |
| N/A | <threatid> | <threatid> |
| N/A | <url> | <hash> |
| N/A | <quantity> | <quantity> |
| N/A | <group> | <tag1> |
| N/A | <duration> | <tag2> |
| N/A | <tag1> | N/A |
Log Processing Settings
This section details log processing changes made from the LogRhythm Default policy to LogRhythm Default v2.0. In some cases, base rules are broken down into sub-rules to appropriately parse log message types by their event types.
LogRhythm Default
| Regex ID | Rule Name | Rule Type | Common Events | Classifications |
|---|
1001595
| Suspicious Activity | Base Rule | Suspicious Network Activity | Suspicious |
| Port Scan Detected | Sub Rule | Port Scan | Reconnaissance |
| Unsolicited Incoming ARP Reply Detected | Sub Rule | Suspicious Activity | Suspicious |
| Brute Force Remote Login | Sub Rule | Brute Force Activity | Attack |
| Category | Sub Rule | URL Logged - Category | Activity |
| Web Attack | Sub Rule | General Attack Activity | Attack |
| System Infected | Sub Rule | General Virus Infected Alert | Critical |
| OS Attack | Sub Rule | General Attack Activity | Attack |
| Attack | Sub Rule | General Attack Activity | Attack |
| Denial Of Service Attack | Sub Rule | Network Denial Of Service | Denial Of Service |
| Blocked Attack | Sub Rule | Threat Blocked | Failed Activity |
| Device Manager Allowed Device | Sub Rule | Device Allocated | Other Audit Success |
LogRhythm Default v2.0
| Regex ID | Rule Name | Rule Type | Common Events | Classifications |
|---|
| 1011181 | V 2.0 : Outbound SEP Malcious Activity Detected | Base Rule | General Attack Activity | Attack |