V 2.0 : SmartEvent Client Events
Vendor Documentation
Classification
| Rule Name | Rule Type | Common Event | Classification |
|---|---|---|---|
| V 2.0 : SmartEvent Client Events | Base Rule | General Information | Information |
| V 2.0 : SmartEvent Client : Action Failed | Sub Rule | Action Failure | Error |
| V 2.0 : SmartEvent Client : Action Started | Sub Rule | Start Action | Information |
Mapping with LogRhythm Schema
| Device Key in Log Message | LogRhythm Schema | Data Type | Schema Description |
|---|---|---|---|
| virtuallogsource | N/A | N/A | N/A |
| subproduct | N/A | N/A | Can be VPN or non-VPN |
| Product | <vmid> | Text/String | Product name |
| Originip | <dip> | IP Address | IP of the log origin |
| origin | N/A | N/A | Name of the first Security Gateway that reported this event |
| Action | <action> | Text/String | Description of detected malware activity |
| SIP | <sip> | IP Address | Source IP |
| SPort | <sport> | Number | Source host port number |
| DIP | N/A | N/A | Destination IP |
| dport | <dport> | Number | Destination host port number |
| protocol | <protnum> | Number | Protocol detected on the connection |
| ifname | <sinterface> | Text/String | The name of the Security Gateway interface through which a connection traverses |
| ifdirection | N/A | N/A | Connection direction |
| Reason | <reason> | Text/String | Information on the error occurred |
| Rule | N/A | N/A | Matched rule number |
| Info | N/A | N/A | Special log message |
| XlateSIP | <snatip> | IP Address | Source ipv4 after applying NAT |
| XlateSport | <snatport> | Number | Source port after applying hide NAT on source IP |
| XlateDIP | <dnatip> | IP Address | Destination ipv4 after applying NAT |
| XlateDPort | <dnatport> | Number | Destination port after applying NAT |
| User | N/A | N/A | Source user name |
| alert | N/A | N/A | Alert level of matched rule (for connection logs) |
| icmp-code | N/A | N/A | N/A |
| icmp-type | N/A | N/A | N/A |
| matched_category | N/A | N/A | Name of matched category |
| rule_name | N/A | N/A | Access rule name |
| Url | N/A | N/A | Matched URL |
| time | N/A | N/A | The time stamp when the log was created |
| Severity | <severity> | Number | Threat severity determined by ThreatCloud Possible values: 0 - Informational 1 - Low 2 - Medium 3 - High 4 - Critical |
| description | <vendorinfo> | Text/String | N/A |
| status | <status> <tag1> | Text/String | N/A |
| flags | N/A | N/A | Checkpoint internal field |
| loguid | N/A | N/A | UUID of unified logs |
| originsicname | N/A | N/A | Machine SIC |
| sequencenum | N/A | N/A | Number added to order logs with the same Linux timestamp and origin |
| version | N/A | N/A | N/A |
| comment | N/A | N/A | N/A |
| failure_impact | <result> | Text/String | The impact of update service failure |
| update_service | N/A | N/A | N/A |
| version | N/A | N/A | N/A |