V 2.0 : WiFi Network Events
Vendor Documentation
Classification
Rule Name | Rule Type | Common Event | Classification |
---|---|---|---|
V 2.0 : WiFi Network Events | Base Rule | General Information | Information |
Mapping with LogRhythm Schema
Device Key in Log Message | LogRhythm Schema | Data Type | Schema Description |
---|---|---|---|
virtuallogsource | N/A | N/A | N/A |
subproduct | N/A | N/A | Can be VPN or non-VPN |
Product | <vmid> | Text/String | Product name |
Originip | N/A | N/A | IP of the log origin |
origin | N/A | N/A | Name of the first Security Gateway that reported this event |
Action | <action> | Text/String | Description of detected malware activity |
SIP | <sip> | IP Address | Source IP |
SPort | <sport> | Number | Source host port number |
DIP | <dip> | IP Address | Destination IP |
dport | <dport> | Number | Destination host port number |
protocol | <protnum> | Number | Protocol detected on the connection |
ifname | N/A | N/A | The name of the Security Gateway interface through which a connection traverses |
ifdirection | N/A | N/A | Connection direction |
Reason | <reason> | Text/String | Information on the error occurred |
Rule | N/A | N/A | Matched rule number |
Info | <subject> | Text/String | Special log message |
XlateSIP | N/A | N/A | Source ipv4 after applying NAT |
XlateSport | N/A | N/A | Source port after applying hide NAT on source IP |
XlateDIP | N/A | N/A | Destination ipv4 after applying NAT |
XlateDPort | N/A | N/A | Destination port after applying NAT |
User | <login> | Text/String | Source user name |
alert | N/A | N/A | Alert level of matched rule (for connection logs) |
icmp-code | N/A | N/A | N/A |
icmp-type | N/A | N/A | N/A |
matched_category | N/A | N/A | Name of matched category |
rule_name | N/A | N/A | Access rule name |
Url | <url> | Text/String | Matched URL |
time | N/A | N/A | The time stamp when the log was created |
src_user_name | <sname> | Text/String | User name connected to source IP |
Severity | <severity> | Number | Threat severity determined by ThreatCloud Possible values: 0 - Informational 1 - Low 2 - Medium 3 - High 4 - Critical |
Protection_Type | N/A | N/A | Type of protection used to detect the attack |
client_name | N/A | N/A | Client Application or Software Blade that detected the event |
status | <status> | Text/String | N/A |
flags | N/A | N/A | Check Point internal field |
loguid | N/A | N/A | UUID of unified logs |
sequencenum | N/A | N/A | Number added to order logs with the same Linux timestamp and origin |
version | <version> | Number | N/A |
bssid | N/A | N/A | N/A |
calc_geo_location | N/A | N/A | N/A |
client_version | N/A | N/A | Build version of SandBlast Agent client installed on the computer |
dashboard_event_id | N/A | N/A | N/A |
dashboard_orig | N/A | N/A | N/A |
dashboard_time | N/A | N/A | N/A |
default_device_message | N/A | N/A | N/A |
device_identification | N/A | N/A | N/A |
email_address | N/A | N/A | N/A |
facility | N/A | N/A | N/A |
hardware_model | N/A | N/A | N/A |
host_type | N/A | N/A | N/A |
incident_time | N/A | N/A | N/A |
jailbreak_message | N/A | N/A | N/A |
mdm_id | N/A | N/A | N/A |
network_certificate | N/A | N/A | N/A |
os_name | N/A | N/A | N/A |
os_version | N/A | N/A | N/A |
phone_number | N/A | N/A | N/A |
ssid | N/A | N/A | N/A |
syslog_severity | N/A | N/A | N/A |