Skip to main content
Skip table of contents

V 2.0 : Threat Emulation Events

Vendor Documentation

Classification

Rule NameRule TypeCommon EventClassification
V 2.0 : Threat Emulation EventsBase RuleGeneral Threat MessageActivity

Mapping with LogRhythm Schema

Device Key in Log MessageLogRhythm SchemaData TypeSchema Description
Product<vmid>Text/StringProduct name
OriginipN/AN/AIP of the log origin 
originN/AN/AName of the first Security Gateway that reported this event
Action<action>Text/StringDescription of detected malware activity
SIP<sip>IP AddressSource IP
SPort<sport>NumberSource host port number
DIP<dip>IP AddressDestination IP
dport<dport>NumberDestination host port number
protocol<protnum>NumberProtocol detected on the connection
ifname<sinterface>Text/StringThe name of the Security Gateway interface through which a connection traverses
ifdirectionN/AN/AConnection direction
proxy_src_ip<snatip>IP AddressSender source IP (even when using proxy) 
scope_ipN/AN/AN/A
Url<url>Text/StringMatched URL
Source_OSN/AN/AOS which generated the attack 
Confidence_LevelN/AN/AConfidence level determined by ThreatCloud
Possible values:
0 - N/A
1 - Low
2 - Medium-Low
3 - Medium
4 - Medium-High
5 - High
Severity<severity>NumberThreat severity determined by ThreatCloud
Possible values:
0 - Informational
1 - Low
2 - Medium
3 - High
4 - Critical
verdict<result>Text/StringTE engine verdict
Possible values: Malicious/Benign/Error
Protection_TypeN/AN/AType of protection used to detect the attack 
UserN/AN/ASource user name 
src_user_name<login>Text/StringUser name connected to source IP 
Query_snidN/AN/AN/A
src_machine_name<sname>Text/StringMachine name connected to source IP 
from<sender>Text/StringSender email address 
to<recipient>Text/StringRecipient email address 
Email_Subject<subject>Text/StringOriginal email subject 
email_scannedN/AN/AN/A
dst_user_name<account>Text/StringConnected user name on the destination IP 
web_client_type<useragent>Text/StringWeb client detected in the HTTP request (e.g., Chrome) 
UserCheckN/AN/AN/A
user_statusN/AN/AN/A
portal_messageN/AN/AN/A
file_name<object>Text/StringMalicious file name / Matched file size 
file_type<objecttype>Text/StringClassified file type 
file_size<size>NumberAttachment file size / Matched file size 
session_id<session>Text/StringLog UID
special_propertiesN/AN/AIf this field is set to '1,' the log will not be shown (in use for monitoring scan progress) 
update_statusN/AN/AN/A
scanned_filesN/AN/AN/A
malware_detectedN/AN/AN/A
scannedN/AN/AN/A
malware_action<vendorinfo>Text/StringDescription of detected malware activity 
file_md5<hash>Text/StringFile md5  
timeN/AN/AThe time stamp when the log was created
Protection_name<threatname>Text/StringSpecific signature name of the attack 
description<vendorinfo>Text/StringAdditional explanation how the security gateway enforced the connection 
reason<reason>Text/StringN/A
policynameN/AN/AN/A
alertN/AN/AAlert level of matched rule (for connection logs) 
client_nameN/AN/AN/A
generalinformationN/AN/AN/A
flagsN/AN/ACheck Point internal field
loguidN/AN/AUUID of unified logs  
sequencenumN/AN/ANumber added to order logs with the same Linux timestamp and origin
versionN/AN/AN/A
__policy_id_tag<policy>Text/StringN/A
client_versionN/AN/AN/A
event_typeN/AN/AN/A
host_typeN/AN/AN/A
installed_productsN/AN/AN/A
local_timeN/AN/AN/A
machine_guidN/AN/AN/A
os_nameN/AN/AN/A
os_versionN/AN/AN/A
policy_dateN/AN/AN/A
policy_numberN/AN/AN/A
product_familyN/AN/AN/A
user_nameN/AN/AN/A
user_sidN/AN/AN/A
analyzed_onN/AN/ACheck Point ThreatCloud / emulator name 
detected_onN/AN/ASystem and applications version on which the file was emulated
dst_countryN/AN/AN/A
emulated_onN/AN/AImages the files were emulated on 
errorsN/AN/AN/A
file_sha1N/AN/AFile sha1 
file_sha256N/AN/AFile sha256 
lastupdatetimeN/AN/AN/A
log_idN/AN/AUnique identity for logs includes: Type, Family, Product/Blade, or Category 
malware_rule_idN/AN/AThreat prevention rule ID  
malware_rule_nameN/AN/AThreat prevention rule name 
origin_sic_nameN/AN/AMachine SIC  
packet_capture_unique_idN/AN/AIdentifier of the packet capture files 
te_verdict_determined_byN/AN/AEmulators determined file verdict 
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.