Skip to main content
Skip table of contents

V 2.0 Vulnerability Threat Messages

Vendor Documentation

Classification

Rule NameRule TypeCommon EventClassification
V 2.0 Vulnerability Threat MessagesBase RuleVuln Medium Severity : FirewallVulnerability
V 2.0 Potential Vulnerability Exploit AlertSub RuleVuln Medium Severity : Information GatheringVulnerability
V 2.0 Potential Vulnerability Exploit AllowedSub RulePotential Vulnerability Exploit AllowedActivity
V 2.0 Vulnerability Exploit BlockedSub RuleFailed General Attack ActivityFailed Attack

Mapping with LogRhythm Schema  

Device Key in Log MessageLogRhythm SchemaData Type
N/A<vmid>Text/String
N/A<vendorinfo>Text/String
N/A<tag1>Text/String
N/A<sip>IP Address
N/A<dip>IP Address
N/A<snatip>IP Address
N/A<dnatip>IP Address
N/A<policy>Text/String/Number
N/A<domainorigin>Text/String/Number
N/A<login>Number/Text/String
N/A<domainimpacted>Text/String/Number
N/A<account>Text/String/Number
N/A<sinterface>Number/Text/String
N/A<dinterface>Text/String/Number
N/A<session>Text/String/Number
N/A<quantity>Text/String/Number
N/A<sport>Number
N/A<dport>Number
N/A<snatport>Text/String/Number
N/A<dnatport>Number
N/A<protname>Text/String
N/A<action>Text/String
N/A<tag2>Number/Text/String
N/A<object>Text/String
N/A<threatname>Text/String
N/A<threatid>Number
N/A<subject>Text/String
N/A<severity>Text/String

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.