Skip to main content
Skip table of contents

V 2.0 : WiFi Network Events

Vendor Documentation

Classification

Rule NameRule TypeCommon EventClassification
V 2.0 : WiFi Network EventsBase RuleGeneral InformationInformation

Mapping with LogRhythm Schema

Device Key in Log MessageLogRhythm SchemaData TypeSchema Description
virtuallogsourceN/AN/AN/A
subproductN/AN/ACan be VPN or non-VPN
Product<vmid>Text/StringProduct name
OriginipN/AN/AIP of the log origin 
originN/AN/AName of the first Security Gateway that reported this event
Action<action>Text/StringDescription of detected malware activity
SIP<sip>IP AddressSource IP
SPort<sport>NumberSource host port number
DIP<dip>IP AddressDestination IP
dport<dport>NumberDestination host port number
protocol<protnum>NumberProtocol detected on the connection
ifnameN/AN/AThe name of the Security Gateway interface through which a connection traverses
ifdirectionN/AN/AConnection direction
Reason<reason>Text/StringInformation on the error occurred
RuleN/AN/AMatched rule number
Info<subject>Text/StringSpecial log message
XlateSIPN/AN/ASource ipv4 after applying NAT
XlateSportN/AN/ASource port after applying hide NAT on source IP
XlateDIPN/AN/ADestination ipv4 after applying NAT
XlateDPortN/AN/ADestination port after applying NAT
User<login>Text/StringSource user name
alertN/AN/AAlert level of matched rule (for connection logs)
icmp-codeN/AN/AN/A
icmp-typeN/AN/AN/A
matched_categoryN/AN/AName of matched category
rule_nameN/AN/AAccess rule name
Url<url>Text/StringMatched URL
timeN/AN/AThe time stamp when the log was created
src_user_name<sname>Text/StringUser name connected to source IP
Severity<severity>NumberThreat severity determined by ThreatCloud
Possible values:
0 - Informational
1 - Low
2 - Medium
3 - High
4 - Critical
Protection_TypeN/AN/AType of protection used to detect the attack 
client_nameN/AN/AClient Application or Software Blade that detected the event
status<status>Text/StringN/A
flagsN/AN/ACheck Point internal field
loguidN/AN/AUUID of unified logs  
sequencenumN/AN/ANumber added to order logs with the same Linux timestamp and origin
version<version>NumberN/A
bssidN/AN/AN/A
calc_geo_locationN/AN/AN/A
client_versionN/AN/ABuild version of SandBlast Agent client installed on the computer
dashboard_event_idN/AN/AN/A
dashboard_origN/AN/AN/A
dashboard_timeN/AN/AN/A
default_device_messageN/AN/AN/A
device_identificationN/AN/AN/A
email_addressN/AN/AN/A
facilityN/AN/AN/A
hardware_modelN/AN/AN/A
host_typeN/AN/AN/A
incident_timeN/AN/AN/A
jailbreak_messageN/AN/AN/A
mdm_idN/AN/AN/A
network_certificateN/AN/AN/A
os_nameN/AN/AN/A
os_versionN/AN/AN/A
phone_numberN/AN/AN/A
ssidN/AN/AN/A
syslog_severityN/AN/AN/A
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.