Information about the Entity and the product where the entity was created. Next Tag: 17
| JSON representation |
|---|
{ "productEntityId" : string , "collectedTimestamp" : string , "creationTimestamp" : string , "interval" : { object ( |
| Fields | |
|---|---|
productEntityId
|
A vendor-specific identifier that uniquely identifies the entity (e.g. a GUID, LDAP, OID, or similar). |
collectedTimestamp
|
GMT timestamp when the entity information was collected by the vendor's local collection infrastructure. Uses RFC 3339, where generated output will always be Z-normalized and use 0, 3, 6 or 9 fractional digits. Offsets other than "Z" are also accepted. Examples: |
creationTimestamp
|
GMT timestamp when the entity described by the productEntityId was created on the system where data was collected. Uses RFC 3339, where generated output will always be Z-normalized and use 0, 3, 6 or 9 fractional digits. Offsets other than "Z" are also accepted. Examples: |
interval
|
Valid existence time range for the version of the entity represented by this entity data. |
vendorName
|
Vendor name of the product that produced the entity information. |
productName
|
Product name that produced the entity information. |
feed
|
Vendor feed name for a threat indicator feed. |
productVersion
|
Version of the product that produced the entity information. |
entityType
|
Entity type. If an entity has multiple possible types, this specifies the most specific type. |
description
|
Human-readable description of the entity. |
threat[]
|
Metadata provided by a threat intelligence feed that identified the entity as malicious. |
sourceType
|
The source of the entity. |
sourceLabels[]
|
Entity source metadata labels. |
eventMetadata
|
Metadata field from the event. |
structuredFields
|
Structured fields extracted from the log. |
extracted
|
Flattened fields extracted from the log. |

