Collect Zscaler Deception logs
This document describes how you can export Zscaler Deception logs by setting up a BindPlane agent and how log fields map to Google SecOps Unified Data Model (UDM) fields.
For more information, see Data ingestion to Google SecOps .
A typical deployment consists of Zscaler Deception and the BindPlane agent configured to send logs to Google SecOps. Each customer deployment can differ and might be more complex.
The deployment contains the following components:
-  Zscaler Deception: The platform from which you collect logs. 
-  BindPlane Agent: The BindPlane agent fetches logs from Zscaler Deception and sends logs to Google SecOps. 
-  Google SecOps: Retains and analyzes the logs. 
An ingestion label identifies the parser which normalizes raw log data to structured UDM format. The information in this document applies to the parser with the ZSCALER_DECEPTION 
ingestion label.
Before you begin
- Ensure that you have access to the Zscaler Deception console. For more information, see Zscaler Deception Help
- Ensure that you are using Zscaler Deception 2024 or later.
- Ensure that all systems in the deployment architecture are configured with the UTC time zone.
- Ensure that the Service Connectoris configured that communicates with the Zscaler Deception Admin Portal and sends event logs. For more information about Service Connector, see About Service Connectors .
Configure a Service Connector to Forward Events to BindPlane Agent
Use the following steps to configure a Service Connector to forward events to a BindPlane Agent:
- In the Zscaler Deception Admin Portal, go to Orchestrate > SIEM Integrations.
- Click Add Integration, and select Syslogfrom the menu.
- In the Syslog Detailswindow, enter the details.
- Enter a name for the Syslog SIEM integration in the Namefield.
- Select Enableunder Enabledto activate SIEM integration.
- Select a Service Connectorfrom the menu: - If you select a Service Connectorthat is configured in the Zscaler Deception Administrator Portal, the administrator portal sends logs to Syslog.
- If you select a Service Connectorthat is configured on a Decoy Connector, the selected Decoy Connectorsends logs to Syslog.
 
- Select Eventsto forward Zscaler Deception events in the Type of logsmenu.
- Select enable in Include Safe Eventsto forward the events that are marked as safeto Syslog.
- In the Filterfield, enter a query to send only filtered event logs to Syslog. If left blank, all event logs are sent. To learn how to build queries, see Understanding and Building Queries .
- Enter the IP address of the Linux Virtual Machine in the Hostfield.
- Enter the port number that the Linux Virtual Machine is listening to in the Portfield.
- Select the protocol used to forward Zscaler Deception events in the Transportmenu.
- Select a facility code in the Facilitymenu. Each event is labeled with a facility code, indicating the type of software generating the event logs.
- Select a severity level in the Severitymenu. Each event is labeled with a severity, indicating the severity of the tool generating the event logs.
- Enter a log identifier in the App Namefield.
- Click Save. For more information about how to configure a Service Connector, see the SIEM Configuration Guide for Syslog .
Forward Logs to Google SecOps using BindPlane Agent
- Install and set up a Linux Virtual Machine.
- Install and configure the BindPlane Agent on Linux to forward logs to Google SecOps. For more information about how to install and configure the BindPlane Agent, see the BindPlane Agent installation and configuration instructions .
If you encounter issues when you create feeds, contact Google SecOps support .
Field mapping reference
Field mapping reference: Event Identifier to Event Type
The following table lists theZSCALER_DECEPTION 
log types and their corresponding UDM event types. | Event Identifier | Event Type | Security Category | 
|---|---|---|
| amqp | USER_RESOURCE_ACCESS |  | 
| aws | USER_STATS |  | 
| azure | USER_STATS |  | 
| credtheft |  | ACL_VIOLATION | 
| custom | USER_STATS |  | 
| email | EMAIL_TRANSACTION |  | 
| endpoint |  | NETWORK_MALICIOUS | 
| itdr |  | NETWORK_MALICIOUS | 
| ransomware |  | NETWORK_MALICIOUS | 
| filetheft | USER_RESOURCE_ACCESS | ACL_VIOLATION | 
| mitm | NETWORK_CONNECTION |  | 
| mongodb | USER_RESOURCE_ACCESS |  | 
| network |  | NETWORK_SUSPICIOUS | 
| postgresql | USER_RESOURCE_ACCESS |  | 
| QOS | USER_RESOURCE_ACCESS |  | 
| recon |  | NETWORK_RECON | 
| scada | USER_RESOURCE_ACCESS |  | 
| ssh |  |  | 
| telnet |  |  | 
| web |  |  | 
| windows |  | NETWORK_MALICIOUS | 
Field mapping reference: ZSCALER_DECEPTION - Common Fields
The following table lists common fields of the ZSCALER_DECEPTION 
log type and their corresponding UDM fields.
| Log field | UDM mapping | Logic | 
|---|---|---|
|  | metadata.product_name | Json dataendthe metadata.product_nameUDM field is set toDeception. | 
|  | metadata.vendor_name | The metadata.vendor_nameUDM field is set toZscaler. | 
| timestamp | metadata.event_timestamp | 
Field mapping reference: ZSCALER_DECEPTION - amqp
The following table lists the raw log fields for the amqp 
log type and their corresponding UDM fields.
| Log field | UDM mapping | Logic | 
|---|---|---|
| type | metadata.product_event_type | |
|  | network.application_protocol | If the typelog field value is equal toamqp, then thenetwork.application_protocolUDM field is set toAMQP. | 
| amqp.connection_id | network.session_id | |
| amqp.user | principal.user.userid | |
| amqp.vhost | target.hostname | |
| amqp.node | target.resource.name | |
|  | target.resource.resource_type | If the amqp.nodelog field value is not 
empty, then thetarget.resource.resource_typeUDM field is set toCLUSTER. | 
| amqp.channel | additional.fields[amqp_channel] | |
| amqp.exchange | additional.fields[amqp_exchange] | |
| amqp.payload | additional.fields[amqp_payload] | |
| amqp.queue | additional.fields[amqp_queue] | |
| amqp.routed_queues | additional.fields[amqp_routed_queues] | The amqp.routed_queueslog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| amqp.routing_keys | additional.fields[amqp_routing_keys] | The amqp.routing_keyslog field is mapped to theadditional.fields.value.string_valueUDM field. | 
Field mapping reference: ZSCALER_DECEPTION - aws
The following table lists the raw log fields for the aws 
log type and their corresponding UDM fields.
| Log field | UDM mapping | Logic | 
|---|---|---|
| type | metadata.product_event_type | |
| aws.event_id | metadata.product_log_id | |
| aws.user_agent | network.http.user_agent | |
| aws.error_message | security_result.description | |
| decoy.s3.dataset | security_result.rule_set | |
| aws.error_code | security_result.summary | |
| aws.aws_region | target.location.country_or_region | |
| aws.vpc_endpoint_id | target.resource_ancestors.product_object_id | |
|  | target.resource_ancestors.resource_type | If the aws.vpc_endpoint_idlog field value is not 
empty, then thetarget.resource_ancestors.resource_typeUDM field is set toVPC_NETWORK. | 
| aws.recipient_account_id | target.resource.product_object_id | |
|  | target.resource.resource_type | If the aws.recipient_account_idlog field value is not 
empty, then thetarget.resource.resource_typeUDM field is set toSERVICE_ACCOUNT. | 
| aws.event_name | additional.fields[aws_event_name] | |
| aws.event_source | additional.fields[aws_event_source] | |
| aws.event_type | additional.fields[aws_event_type] | |
| aws.readonly | additional.fields[aws_readonly] | |
| aws.request_id | additional.fields[aws_request_id] | |
| decoy.public | additional.fields[decoy_public] | 
Field mapping reference: ZSCALER_DECEPTION - azure
The following table lists the raw log fields for the azure 
log type and their corresponding UDM fields.
| Log field | UDM mapping | Logic | 
|---|---|---|
| type | metadata.product_event_type | |
| azure.caller_ip_address.port | principal.port | |
| decoy.dataset | security_result.rule_set | |
| decoy.storage_account | target.resource.name | |
|  | target.resource.resource_type | If the decoy.storage_accountlog field value is not 
empty, then thetarget.resource.resource_typeUDM field is set toSTORAGE_BUCKET. | 
| decoy.public | additional.fields[decoy_public] | |
| decoy.storage_account_container.dataset | additional.fields[decoy_storage_account_container_dataset] | 
Field mapping reference: ZSCALER_DECEPTION - credtheft
The following table lists the raw log fields for the credtheft 
log type and their corresponding UDM fields.
| Log field | UDM mapping | Logic | 
|---|---|---|
| credtheft.logon_process_name | extensions.auth.auth_details | |
|  | extensions.auth.mechanism | If the credtheft.logon_typelog field value matches the regular expression pattern(?i)interactive, then theextensions.auth.mechanismUDM field is set toINTERACTIVE.Else, if the credtheft.logon_typelog field value matches the regular expression pattern(?i)network, then theextensions.auth.mechanismUDM field is set toNETWORK.Else, if the credtheft.logon_typelog field value matches the regular expression pattern(?i)batch, then theextensions.auth.mechanismUDM field is set toBATCH.Else, if the credtheft.logon_typelog field value matches the regular expression pattern(?i)service, then theextensions.auth.mechanismUDM field is set toSERVICE.Else, if the credtheft.logon_typelog field value matches the regular expression pattern(?i)remoteinteractive, then theextensions.auth.mechanismUDM field is set toREMOTE_INTERACTIVE.Else, if the credtheft.logon_typelog field value matches the regular expression pattern(?i)unlock, then theextensions.auth.mechanismUDM field is set toUNLOCK.Else, if the credtheft.logon_typelog field value matches the regular expression pattern(?i)cached, then theextensions.auth.mechanismUDM field is set toCACHED_INTERACTIVE.Else, if the credtheft.logon_typelog field value is not 
empty, then theextensions.auth.mechanismUDM field is set toMECHANISM_OTHER. | 
| credtheft.event_id | metadata.description | |
|  | metadata.event_type | If (the credtheft.ip_addresslog field value is not 
empty or thecredtheft.workstationlog field value is not 
empty or thecredtheft.workstation_namelog field value is not 
empty) and (thecredtheft.usernamelog field value is not 
empty or thecredtheft.subject_user_namelog field value is not 
empty), then themetadata.event_typeUDM field is set toUSER_LOGIN.Else, the metadata.event_typeUDM field is set toUSER_RESOURCE_ACCESS. | 
| type | metadata.product_event_type | |
| credtheft.event_record_id | metadata.product_log_id | |
| credtheft.authentication_package_name | principal.application | |
| credtheft.subject_domain_name | principal.domain.name | |
| credtheft.workstation | principal.hostname | If the credtheft.workstationlog field value is not 
empty, then thecredtheft.workstationlog field is mapped to theprincipal.hostnameUDM field. | 
| credtheft.workstation_name | principal.hostname | If the credtheft.workstation_namelog field value is not 
empty, then thecredtheft.workstation_namelog field is mapped to theprincipal.hostnameUDM field. | 
| credtheft.ip_address | principal.ip | |
| credtheft.ip_port | principal.port | |
| credtheft.trigger_properties | principal.resource.attribute.labels[credtheft_trigger_properties] | |
| credtheft.service_name | principal.resource.name | |
|  | principal.resource.resource_type | If the credtheft.service_namelog field value is not 
empty, then theprincipal.resource.resource_typeUDM field is set toBACKEND_SERVICE. | 
| credtheft.subject_logon_id | principal.user.product_object_id | |
| credtheft.subject_user_sid | principal.user.windows_sid | |
|  | security_result.action | If the credtheft.statuslog field value matches the regular expression pattern(?i)successful, then thesecurity_result.actionUDM field is set toALLOW.Else, if the credtheft.statuslog field value matches the regular expression pattern(?i)failed, then thesecurity_result.actionUDM field is set toFAIL.Else, if the credtheft.statuslog field value matches the regular expression pattern(?i)denied, then thesecurity_result.actionUDM field is set toBLOCK. | 
| credtheft.status | security_result.action_details | |
| credtheft.operation_type | security_result.action_details | |
|  | security_result.category | The security_result.categoryUDM field is set toNETWORK_MALICIOUS. | 
| credtheft.access_list | security_result.detection_fields[credtheft_access_list] | |
| credtheft.access_mask | security_result.detection_fields[credtheft_access_mask] | |
| credtheft.ticket_encryption_type | security_result.detection_fields[credtheft_ticket_encryption_type] | |
| credtheft.ticket_options | security_result.detection_fields[credtheft_ticket_options] | |
| decoy.ad.asrep_roastable | security_result.detection_fields[decoy_ad_asrep_roastable] | |
| decoy.ad.can_password_expire | security_result.detection_fields[decoy_ad_can_password_expire] | |
| credtheft.target_domain_name | target.domain.name | |
| credtheft.target_server_name | target.domain.name_server | |
| credtheft.object_server | target.domain.name_server | |
| credtheft.properties | target.resource.attribute.labels[credtheft_properties] | |
| credtheft.sub_status | target.resource.attribute.labels[credtheft_sub_status] | |
| credtheft.object_name | target.resource.name | |
| credtheft.object_type | target.resource.resource_subtype | |
|  | target.resource.resource_type | If the credtheft.object_typelog field value matches the regular expression pattern(?i)user, then thetarget.resource.resource_typeUDM field is set toUSER.Else, if the credtheft.object_typelog field value matches the regular expression pattern(?i)computer, then thetarget.resource.resource_typeUDM field is set toDEVICE. | 
| decoy.ad.profile_path | target.user.attribute.labels[decoy_ad_profile_path] | |
| decoy.ad.group_memberships | target.user.group_identifiers | The decoy.ad.group_membershipslog field is mapped to thetarget.user.group_identifiersUDM field. | 
| credtheft.target_user_name | target.user.user_display_name | |
| credtheft.username | target.user.userid | |
| credtheft.subject_user_name | target.user.userid | |
| credtheft.handle_id | additional.fields[credtheft_handle_id] | |
| credtheft.pre_auth_type | additional.fields[credtheft_pre_auth_type] | |
| credtheft.system_time | additional.fields[credtheft_system_time] | |
| decoy.ad.ou | additional.fields[decoy_ad_ou] | 
Field mapping reference: ZSCALER_DECEPTION - custom
The following table lists the raw log fields for the custom 
log type and their corresponding UDM fields.
| Log field | UDM mapping | Logic | 
|---|---|---|
| type | metadata.product_event_type | |
| custom.dataset | principal.security_result.rule_set | |
| custom.protocol | security_result.detection_fields[custom_protocol] | |
| decoy.custom.protocol | security_result.detection_fields[decoy_custom_protocol] | |
| decoy.custom.dataset | target.security_result.rule_set | |
| custom.is_binary_request | additional.fields[custom_is_binary_request] | |
| custom.is_binary_response | additional.fields[custom_is_binary_response] | |
| custom.request | additional.fields[custom_request] | |
| custom.response | additional.fields[custom_response] | 
Field mapping reference: ZSCALER_DECEPTION - email
The following table lists the raw log fields for the email 
log type and their corresponding UDM fields.
| Log field | UDM mapping | Logic | 
|---|---|---|
| type | metadata.product_event_type | |
| email.evidence_id | network.email.mail_id | |
| email.subject | network.email.subject | |
| email.body.attachments | additional.fields[email_body_attachments] | The email.body.attachmentslog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| email.body.html | additional.fields[email_body_html] | The email.body.htmllog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| email.body.plain | additional.fields[email_body_plain] | The email.body.plainlog field is mapped to theadditional.fields.value.string_valueUDM field. | 
Field mapping reference: ZSCALER_DECEPTION - endpoint, itdr, ransomware
The following table lists the raw log fields for the endpoint 
, itdr 
and ransomware 
log types and their corresponding UDM fields.
attacker.event_name 
metadata.description 
psexec.event_name 
metadata.description 
triage.event_name 
metadata.description 
session_enumeration.type 
metadata.description 
metadata.event_type 
attacker.domain_name 
log field value is not 
empty and at least one of the following log field is not 
empty, then the metadata.event_type 
UDM field is set to PROCESS_TERMINATION 
. -  fake_process.process_id
-  pwsh.path
-  pwsh.script_block_id
-  pwsh.script_block_text
-  decoy.command_line
-  decoy.file_name
-  decoy.process_id
attacker.domain_name 
log field value is not 
empty and at least one of the following log field is not 
empty, then the metadata.event_type 
UDM field is set to PROCESS_LAUNCH 
. -  psexec.files_and_pipe_names
-  psexec.md5
-  psexec.sha1
-  psexec.sha256
file.name 
log field value is not 
empty and the attacker.domain_name 
log field value is not 
empty, then if the file.operation 
log field value matches the regular expression pattern (?i)read 
, then the metadata.event_type 
UDM field is set to FILE_READ 
.Else, if the
file.name 
log field value is not 
empty and the attacker.domain_name 
log field value is not 
empty, then if the file.operation 
log field value matches the regular expression pattern (?i)write or modify or encrypt 
, then the metadata.event_type 
UDM field is set to FILE_MODIFICATION 
.Else, if the
file.name 
log field value is not 
empty and the attacker.domain_name 
log field value is not 
empty, then if the file.operation 
log field value matches the regular expression pattern (?i)create 
, then the metadata.event_type 
UDM field is set to FILE_CREATION 
.Else, if the
file.name 
log field value is not 
empty and the attacker.domain_name 
log field value is not 
empty, then if the file.operation 
log field value matches the regular expression pattern (?i)delete 
, then the metadata.event_type 
UDM field is set to FILE_DELETION 
.Else, if the
file.name 
log field value is not 
empty and the attacker.domain_name 
log field value is not 
empty, then if the file.operation 
log field value matches the regular expression pattern (?i)open 
, then the metadata.event_type 
UDM field is set to FILE_OPEN 
.Else, if the
file.name 
log field value is not 
empty and the attacker.domain_name 
log field value is not 
empty, then if the file.operation 
log field value matches the regular expression pattern (?i)sync 
, then the metadata.event_type 
UDM field is set to FILE_SYNC 
.Else, if the
file.name 
log field value is not 
empty and the attacker.domain_name 
log field value is not 
empty, then if the file.operation 
log field value matches the regular expression pattern (?i)copy 
, then the metadata.event_type 
UDM field is set to FILE_COPY 
.Else, if the
file.name 
log field value is not 
empty and the attacker.domain_name 
log field value is not 
empty, then if the file.operation 
log field value matches the regular expression pattern (?i)move 
, then the metadata.event_type 
UDM field is set to FILE_MOVE 
.Else, if the
attacker.user_name 
log field value is not 
empty and (the message 
log field value matches the regular expression pattern (cbf or imc).) 
, then the metadata.event_type 
UDM field is set to USER_UNCATEGORIZED 
.Else, if the
attacker.domain_name 
log field value is not 
empty and the session_enumeration.network_address 
log field value is not 
empty, then the metadata.event_type 
UDM field is set to NETWORK_CONNECTION 
.Else, if the
attacker.domain_name 
log field value is not 
empty, then the metadata.event_type 
UDM field is set to SCAN_HOST 
.Else, the
metadata.event_type 
UDM field is set to USER_RESOURCE_ACCESS 
.type 
metadata.product_event_type 
triage.incident_id 
metadata.product_log_id 
session_enumeration.endpoint 
network.session_id 
attacker.domain_name 
principal.domain.name 
attacker.domain_name 
log field value is not 
empty, then the attacker.domain_name 
log field is mapped to the principal.domain.name 
UDM field.attacker.process.domain_name 
principal.domain.name 
attacker.process.domain_name 
log field value is not 
empty, then the attacker.process.domain_name 
log field is mapped to the principal.domain.name 
UDM field.attacker.machine_name 
principal.hostname 
attacker.session_id 
principal.network.session_id 
attacker.command_line 
principal.process.command_line 
attacker.command_line 
log field value is not 
empty, then the attacker.command_line 
log field is mapped to the principal.process.command_line 
UDM field.attacker.process.command_line 
principal.process.command_line 
attacker.process.command_line 
log field value is not 
empty, then the attacker.process.command_line 
log field is mapped to the principal.process.command_line 
UDM field.attacker.process.path 
principal.process.file.full_path 
attacker.process.md5 
principal.process.file.md5 
attacker.process.sha1 
principal.process.file.sha1 
attacker.process.sha256 
principal.process.file.sha256 
attacker.process.parent_info.command_line 
principal.process.parent_process.command_line 
attacker.process.parent_info.path 
principal.process.parent_process.file.full_path 
attacker.process.parent_info.md5 
principal.process.parent_process.file.md5 
attacker.process.parent_info.sha1 
principal.process.parent_process.file.sha1 
attacker.process.parent_info.sha256 
principal.process.parent_process.file.sha256 
attacker.process.parent_info.id 
principal.process.parent_process.pid 
attacker.process.parent_info.parent 
principal.process.parent_process.product_specific_process_id 
Deception:attacker.process.parent_info.parent 
log field is mapped to the principal.process.parent_process.product_specific_process_id 
UDM field.attacker.process.id 
principal.process.pid 
attacker.process.user_groups 
principal.user.group_identifiers 
attacker.process.user_groups 
log field is mapped to the principal.user.group_identifiers 
UDM field.attacker.process.user_ou 
principal.user.group_identifiers 
attacker.process.user_groups 
log field is mapped to the principal.user.group_identifiers 
UDM field and the attacker.process.user_ou 
log field is mapped to the principal.user.group_identifiers 
UDM field.attacker.process.user_name 
principal.user.user_display_name 
attacker.user_name 
principal.user.userid 
attacker.user_name 
log field value is not 
empty, then the attacker.user_name 
log field is mapped to the principal.user.userid 
UDM field.Else, if the
attacker.username 
log field value is not 
empty, then the attacker.user_name 
log field is mapped to the additional.fields 
UDM field.Else, if the
attacker.zcc_user 
log field value is not 
empty, then the attacker.user_name 
log field is mapped to the additional.fields 
UDM field.Else, if the
attacker.zia_user 
log field value is not 
empty, then the attacker.user_name 
log field is mapped to the additional.fields 
UDM field.Else, if the
attacker.zpa_user 
log field value is not 
empty, then the attacker.user_name 
log field is mapped to the additional.fields 
UDM field.attacker.username 
principal.user.userid 
attacker.user_name 
log field value is not 
empty, then the attacker.username 
log field is mapped to the additional.fields 
UDM field.Else, if the
attacker.username 
log field value is not 
empty, then the attacker.username 
log field is mapped to the principal.user.userid 
UDM field.Else, if the
attacker.zcc_user 
log field value is not 
empty, then the attacker.username 
log field is mapped to the additional.fields 
UDM field.Else, if the
attacker.zia_user 
log field value is not 
empty, then the attacker.username 
log field is mapped to the additional.fields 
UDM field.Else, if the
attacker.zpa_user 
log field value is not 
empty, then the attacker.username 
log field is mapped to the additional.fields 
UDM field.attacker.zcc_user 
principal.user.userid 
attacker.user_name 
log field value is not 
empty, then the attacker.zcc_user 
log field is mapped to the additional.fields 
UDM field.Else, if the
attacker.username 
log field value is not 
empty, then the attacker.zcc_user 
log field is mapped to the additional.fields 
UDM field.Else, if the
attacker.zcc_user 
log field value is not 
empty, then the attacker.zcc_user 
log field is mapped to the principal.user.userid 
UDM field.Else, if the
attacker.zia_user 
log field value is not 
empty, then the attacker.zcc_user 
log field is mapped to the additional.fields 
UDM field.Else, if the
attacker.zpa_user 
log field value is not 
empty, then the attacker.zcc_user 
log field is mapped to the additional.fields 
UDM field.attacker.zia_user 
principal.user.userid 
attacker.user_name 
log field value is not 
empty, then the attacker.zia_user 
log field is mapped to the additional.fields 
UDM field.Else, if the
attacker.username 
log field value is not 
empty, then the attacker.zia_user 
log field is mapped to the additional.fields 
UDM field.Else, if the
attacker.zcc_user 
log field value is not 
empty, then the attacker.zia_user 
log field is mapped to the additional.fields 
UDM field.Else, if the
attacker.zia_user 
log field value is not 
empty, then the attacker.zia_user 
log field is mapped to the principal.user.userid 
UDM field.Else, if the
attacker.zpa_user 
log field value is not 
empty, then the attacker.zia_user 
log field is mapped to the additional.fields 
UDM field.attacker.zpa_user 
principal.user.userid 
attacker.user_name 
log field value is not 
empty, then the attacker.zpa_user 
log field is mapped to the additional.fields 
UDM field.Else, if the
attacker.username 
log field value is not 
empty, then the attacker.zpa_user 
log field is mapped to the additional.fields 
UDM field.Else, if the
attacker.zcc_user 
log field value is not 
empty, then the attacker.zpa_user 
log field is mapped to the additional.fields 
UDM field.Else, if the
attacker.zia_user 
log field value is not 
empty, then the attacker.zpa_user 
log field is mapped to the additional.fields 
UDM field.Else, if the
attacker.zpa_user 
log field value is not 
empty, then the attacker.zpa_user 
log field is mapped to the principal.user.userid 
UDM field.attacker.process.user_sid 
principal.user.windows_sid 
fake_process.action 
security_result.action_details 
security_result.category 
type 
log field value matches the regular expression pattern ransomware 
, then the security_result.category 
UDM field is set to SOFTWARE_MALICIOUS 
.cbf.is_ad_decoy_credential 
security_result.detection_fields[cbf_is_ad_decoy_credential] 
file.operation_string 
security_result.detection_fields[file_operation_string] 
file.operation 
security_result.detection_fields[file_operation] 
kerberoast.is_decoy 
security_result.detection_fields[kerberoast_is_decoy] 
mitm.query 
security_result.detection_fields[mitm_query] 
mitm.technique 
security_result.detection_fields[mitm_technique] 
monitor_accounts.win_event_id 
security_result.detection_fields[monitor_accounts_win_event_id] 
triage.reason 
security_result.summary 
monitor_accounts.failure_reason 
security_result.summary 
cbf.target_domain_name 
target.domain.name 
fake_process.domain_name 
target.domain.name 
imc.target_domain_name 
target.domain.name 
psexec.domain_name 
target.domain.name 
monitor_accounts.target_domain_name 
target.domain.name 
file.name 
target.file.full_path 
psexec.machine_name 
target.hostname 
triage.machine_name 
target.hostname 
monitor_accounts.workstation_name 
target.hostname 
session_enumeration.network_address 
target.ip 
dcshadow.network_address 
target.ip 
dcsync.network_address 
target.ip 
zerologon.network_address 
target.ip 
monitor_accounts.ip_address 
target.ip 
fake_process.session_id 
target.network.session_id 
decoy.session_id 
target.network.session_id 
monitor_accounts.ip_port 
target.port 
fake_process.command_line 
target.process.command_line 
pwsh.script_block_text 
target.process.command_line 
decoy.command_line 
target.process.command_line 
pwsh.path 
target.process.file.full_path 
decoy.file_name 
target.process.file.full_path 
psexec.md5 
target.process.file.md5 
psexec.files_and_pipe_names 
target.process.file.names 
psexec.files_and_pipe_names 
log field is mapped to the target.process.file.names 
UDM field.psexec.sha1 
target.process.file.sha1 
psexec.sha256 
target.process.file.sha256 
fake_process.parent_process_id 
target.process.parent_process.pid 
fake_process.process_id 
target.process.pid 
pwsh.script_block_id 
target.process.pid 
decoy.process_id 
target.process.pid 
ad_enumeration.attribute_list 
target.resource.attribute.labels[ad_enumeration_attribute_list] 
ad_enumeration.scope_of_search_string 
target.resource.attribute.labels[ad_enumeration_scope_of_search_string] 
ad_enumeration.scope_of_search 
target.resource.attribute.labels[ad_enumeration_scope_of_search] 
ad_enumeration.search_filter 
target.resource.attribute.labels[ad_enumeration_search_filter] 
ad_enumeration.distinguished_name 
target.resource.name 
kerberoast.spn 
target.resource.name 
psexec.service_name 
target.resource.name 
ad_enumeration.type 
target.resource.resource_subtype 
target.resource.resource_type 
ad_enumeration.distinguished_name 
log field value is not 
empty, then the target.resource.resource_type 
UDM field is set to STORAGE_BUCKET 
.Else, if the
kerberoast.spn 
log field value is not 
empty or the psexec.service_name 
log field value is not 
empty, then the target.resource.resource_type 
UDM field is set to SERVICE_ACCOUNT 
.monitor_accounts.is_decoy 
target.user.attribute.labels[monitor_accounts_is_decoy] 
monitor_accounts.is_privileged 
target.user.attribute.labels[monitor_accounts_is_privileged] 
monitor_accounts.logon_process_name 
target.user.attribute.labels[monitor_accounts_logon_process_name] 
monitor_accounts.logon_type 
target.user.attribute.labels[monitor_accounts_logon_type] 
fake_process.user_groups 
target.user.group_identifiers 
fake_process.user_ou 
target.user.group_identifiers 
psexec.user_groups 
target.user.group_identifiers 
psexec.user_ou 
target.user.group_identifiers 
cbf.target_user_name 
target.user.userid 
fake_process.username 
target.user.userid 
imc.target_user_name 
target.user.userid 
psexec.user_name 
target.user.userid 
monitor_accounts.target_user_name 
target.user.userid 
fake_process.user_sid 
target.user.windows_sid 
psexec.user_sid 
target.user.windows_sid 
monitor_accounts.target_sid 
target.user.windows_sid 
attacker.logon_type 
additional.fields[attacker_logon_type] 
attacker.process.exit_code 
additional.fields[attacker_process_exit_code] 
attacker.process.name 
additional.fields[attacker_process_name] 
attacker.process.parent_info.domain_name 
additional.fields[attacker_process_parent_info_domain_name] 
attacker.process.parent_info.name 
additional.fields[attacker_process_parent_info_name] 
attacker.process.parent_info.tree 
additional.fields[attacker_process_parent_info_tree] 
attacker.process.parent_info.tree 
log field is mapped to the additional.fields.value.string_value 
UDM field.attacker.process.parent_info.user_groups 
additional.fields[attacker_process_parent_info_user_groups] 
attacker.process.parent_info.user_name 
additional.fields[attacker_process_parent_info_user_name] 
attacker.process.parent_info.user_ou 
additional.fields[attacker_process_parent_info_user_ou] 
attacker.process.parent_info.user_sid 
additional.fields[attacker_process_parent_info_user_sid] 
attacker.process.parent 
additional.fields[attacker_process_parent] 
attacker.process.tree 
additional.fields[attacker_process_tree] 
attacker.process.tree 
log field is mapped to the additional.fields.value.string_value 
UDM field.fake_process.exit_code 
additional.fields[fake_process_exit_code] 
fake_process.process_name 
additional.fields[fake_process_process_name] 
landmine.version 
additional.fields[landmine_version] 
monitor_accounts.auth_package 
additional.fields[monitor_accounts_auth_package] 
monitor_accounts.status 
additional.fields[monitor_accounts_status] 
monitor_accounts.sub_status_parsed 
additional.fields[monitor_accounts_sub_status_parsed] 
monitor_accounts.sub_status 
additional.fields[monitor_accounts_sub_status] 
pwsh.message_number 
additional.fields[pwsh_message_number] 
pwsh.message_total 
additional.fields[pwsh_message_total] 
Field mapping reference: ZSCALER_DECEPTION - filetheft
The following table lists the raw log fields for the filetheft 
log type and their corresponding UDM fields.
| Log field | UDM mapping | Logic | 
|---|---|---|
| type | metadata.product_event_type | |
| filetheft.useragent | network.http.user_agent | |
| filetheft.filename | target.file.full_path | |
| filetheft.file_uuid | additional.fields[filetheft_file_uuid] | 
Field mapping reference: ZSCALER_DECEPTION - mitm
The following table lists the raw log fields for the mitm 
log type and their corresponding UDM fields.
| Log field | UDM mapping | Logic | 
|---|---|---|
| type | metadata.product_event_type | |
|  | network.application_protocol | The network.application_protocolUDM field is set toDNS. | 
| mitm.answer | network.dns.answers.data | |
| mitm.qtype | network.dns.questions.type | |
| mitm.server | principal.hostname | |
| mitm.hostname | target.hostname | 
Field mapping reference: ZSCALER_DECEPTION - mongodb
The following table lists the raw log fields for the mongodb 
log type and their corresponding UDM fields.
| Log field | UDM mapping | Logic | 
|---|---|---|
| mongodb.message | metadata.description | |
| type | metadata.product_event_type | |
| mongodb.execution_time | network.session_duration.seconds | |
| mongodb.connection_id | network.session_id | |
| mongodb.command | security_result.detection_fields[mongodb_command] | |
| mongodb.object | additional.fields[mongodb_object] | |
| mongodb.protocol | additional.fields[mongodb_protocol] | 
Field mapping reference: ZSCALER_DECEPTION - network
The following table lists the raw log fields for the network 
log type and their corresponding UDM fields.
| Log field | UDM mapping | Logic | 
|---|---|---|
| rfb.authentication_method | extensions.auth.auth_details | |
| ssh.auth_success | extensions.auth.auth_details | |
|  | extensions.auth.mechanism | If the mysql.usernamelog field value is not 
empty, then theextensions.auth.mechanismUDM field is set toUSERNAME_PASSWORD.Else, if the ntlm.usernamelog field value is not 
empty, then theextensions.auth.mechanismUDM field is set toINTERACTIVE.Else, if the radius.usernamelog field value is not 
empty, then theextensions.auth.mechanismUDM field is set toREMOTE.Else, if the rfb.authentication_methodlog field value is not 
empty, then theextensions.auth.mechanismUDM field is set toREMOTE_INTERACTIVE. | 
| socks.bound | intermediary.hostname | |
| socks.bound_p | intermediary.port | |
| snmp.display_string | metadata.description | |
| syslog.message | metadata.description | |
| threat.event_type | metadata.description | |
|  | metadata.event_type | If (the ntlm.hostnamelog field value is not 
empty or theradius.maclog field value is not 
empty or theradius.remote_iplog field value is not 
empty) and (thentlm.usernamelog field value is not 
empty or theradius.usernamelog field value is not 
empty), then themetadata.event_typeUDM field is set toUSER_LOGIN.Else, if the messagelog field value matches the regular expression patternsmtp., then themetadata.event_typeUDM field is set toEMAIL_TRANSACTION.Else, if the messagelog field value matches the regular expression pattern(dnp3 or modbus or scan or snmp or syslog or tunnel)., then themetadata.event_typeUDM field is set toUSER_STATS.Else, the metadata.event_typeUDM field is set toUSER_RESOURCE_ACCESS. | 
| type | metadata.product_event_type | |
| threat.tx_id | metadata.product_log_id | |
|  | network.application_protocol | If the messagelog field value matches the regular expression patterndce_rpc., then thenetwork.application_protocolUDM field is set toDCERPC.Else, if the messagelog field value matches the regular expression patterndnp3., then thenetwork.application_protocolUDM field is set toDNP3.Else, if the messagelog field value matches the regular expression patterndns., then thenetwork.application_protocolUDM field is set toDNS.Else, if the messagelog field value matches the regular expression patternmqtt., then thenetwork.application_protocolUDM field is set toMQTT.Else, if the messagelog field value matches the regular expression patternrdp., then thenetwork.application_protocolUDM field is set toRDP.Else, if the messagelog field value matches the regular expression patternsip., then thenetwork.application_protocolUDM field is set toSIP.Else, if the messagelog field value matches the regular expression patternsmb., then thenetwork.application_protocolUDM field is set toSMB.Else, if the messagelog field value matches the regular expression patternsmtp., then thenetwork.application_protocolUDM field is set toSMTP.Else, if the messagelog field value matches the regular expression patternsnmp., then thenetwork.application_protocolUDM field is set toSNMP.Else, if the messagelog field value matches the regular expression patternssh., then thenetwork.application_protocolUDM field is set toSSH. | 
| mqtt.proto_version | network.application_protocol_version | |
| rdp.client_build | network.application_protocol_version | |
| snmp.version | network.application_protocol_version | |
| ssh.version | network.application_protocol_version | |
|  | network.direction | If the ssh.directionlog field value matches the regular expression pattern(?i)INBOUND, then thenetwork.directionUDM field is set toINBOUND.Else, if the ssh.directionlog field value matches the regular expression pattern(?i)OUTBOUND, then thenetwork.directionUDM field is set toOUTBOUND. | 
| dns.answers | network.dns.answers.data | |
| dns.TTLs | network.dns.answers.ttl | |
| dns.trans_id | network.dns.id | |
| dns.qclass | network.dns.questions.class | |
| dns.query | network.dns.questions.name | |
| dns.qtype | network.dns.questions.type | |
| dns.RA | network.dns.recursion_available | |
| dns.RD | network.dns.recursion_desired | |
| dns.AA | network.dns.response | |
| dns.rcode | network.dns.response_code | |
| dns.rejected | network.dns.truncated | |
| smtp.cc | network.email.cc | |
| smtp.mailfrom | network.email.from | |
| smtp.in_reply_to | network.email.reply_to | |
| smtp.reply_to | network.email.reply_to | |
| smtp.subject | network.email.subject | |
| smtp.to | network.email.to | |
| ftp.command | network.ftp.command | |
| sip.method | network.http.method | |
| sip.status_code | network.http.response_code | |
| sip.user_agent | network.http.user_agent | |
|  | network.ip_protocol | If the dns.protolog field value matches the regular expression pattern(?i)tcp, then thenetwork.ip_protocolUDM field is set toTCP.Else, if the dns.protolog field value matches the regular expression pattern(?i)udp, then thenetwork.ip_protocolUDM field is set toUDP.Else, if the dns.protolog field value matches the regular expression pattern(?i)icmp, then thenetwork.ip_protocolUDM field is set toICMP.Else, if the network.protocollog field value matches the regular expression pattern(?i)tcp, then thenetwork.ip_protocolUDM field is set toTCP.Else, if the network.protocollog field value matches the regular expression pattern(?i)udp, then thenetwork.ip_protocolUDM field is set toUDP.Else, if the network.protocollog field value matches the regular expression pattern(?i)icmp, then thenetwork.ip_protocolUDM field is set toICMP.Else, if the syslog.protolog field value matches the regular expression pattern(?i)tcp, then thenetwork.ip_protocolUDM field is set toTCP.Else, if the syslog.protolog field value matches the regular expression pattern(?i)udp, then thenetwork.ip_protocolUDM field is set toUDP.Else, if the syslog.protolog field value matches the regular expression pattern(?i)icmp, then thenetwork.ip_protocolUDM field is set toICMP. | 
| network.tunnel_parents | network.parent_session_id | |
| network.duration | network.session_duration | |
| network.connection_uid | network.session_id | |
| threat.flow_id | network.session_id | |
| smtp.helo | network.smtp.helo | |
|  | network.smtp.is_tls | If the smtp.tlslog field value matches the regular expression pattern(?i)true, then thenetwork.smtp.is_tlsUDM field is set totrue. | 
| smtp.from | network.smtp.mail_from | |
| smtp.rcptto | network.smtp.rcpt_to | |
| ssl.cipher | network.tls.cipher | |
| ssl.established | network.tls.established | |
| ssl.resumed | network.tls.resumed | |
| ssl.issuer | network.tls.server.certificate.issuer | |
| ssl.subject | network.tls.server.certificate.subject | |
| ssl.version | network.tls.version | |
| rdp.client_dig_product_id | principal.asset.product_object_id | |
| ntlm.domainname | principal.domain.name | |
| threat.alert.gid | principal.group.product_object_id | |
| ntlm.hostname | principal.hostname | |
| rdp.client_name | principal.hostname | |
| radius.remote_ip | principal.ip | |
| smtp.x_originating_ip | principal.ip | |
| radius.mac | principal.mac | |
| network.orig_bytes | principal.network.sent_bytes | |
| network.orig_pkts | principal.network.sent_packets | |
| rfb.client_major_version | principal.platform_version | The rfb.client_major_version rfb.client_minor_versionlog field is mapped to theprincipal.platform_versionUDM field. | 
| rfb.client_minor_version | principal.platform_version | The rfb.client_major_version rfb.client_minor_versionlog field is mapped to theprincipal.platform_versionUDM field. | 
| irc.command | principal.process.command_line | |
| ftp.password | principal.user.attribute.labels[ftp_password] | |
| mysql.password | principal.user.attribute.labels[mysql_password] | |
| socks.password | principal.user.attribute.labels[socks_password] | |
| ftp.user | principal.user.userid | |
| irc.user | principal.user.userid | |
| kerberos.client | principal.user.userid | |
| mqtt.client_id | principal.user.userid | |
| mysql.username | principal.user.userid | |
| rdp.cookie | principal.user.userid | |
| socks.user | principal.user.userid | |
|  | security_result.action | If the rdp.resultlog field value matches the regular expression pattern(?i)(allow or success), then thesecurity_result.actionUDM field is set toALLOW.Else, if the rdp.resultlog field value matches the regular expression pattern(?i)(fail), then thesecurity_result.actionUDM field is set toFAIL.Else, if the rdp.resultlog field value matches the regular expression pattern(?i)(denied or block), then thesecurity_result.actionUDM field is set toBLOCK.Else, if the radius.resultlog field value matches the regular expression pattern(?i)(allow or success), then thesecurity_result.actionUDM field is set toALLOW.Else, if the radius.resultlog field value matches the regular expression pattern(?i)(fail), then thesecurity_result.actionUDM field is set toFAIL.Else, if the radius.resultlog field value matches the regular expression pattern(?i)(denied or block), then thesecurity_result.actionUDM field is set toBLOCK.Else, if the threat.alert.actionlog field value matches the regular expression pattern(?i)(allow or success), then thesecurity_result.actionUDM field is set toALLOW.Else, if the threat.alert.actionlog field value matches the regular expression pattern(?i)(fail), then thesecurity_result.actionUDM field is set toFAIL.Else, if the threat.alert.actionlog field value matches the regular expression pattern(?i)(denied or block), then thesecurity_result.actionUDM field is set toBLOCK. | 
| radius.result | security_result.action_details | |
| rdp.result | security_result.action_details | |
| smb_files.action | security_result.action_details | |
| tunnel.action | security_result.action_details | |
| threat.alert.category | security_result.category_details | |
| kerberos.error_msg | security_result.description | |
| sip.warning | security_result.description | |
| dce_rpc.operation | security_result.detection_fields[dce_rpc_operation] | |
| file.analyzers | security_result.detection_fields[file_analyzers] | |
| mqtt.granted_qos_level | security_result.detection_fields[mqtt_granted_qos_level] | |
| mqtt.qos_val | security_result.detection_fields[mqtt_qos_val] | |
| rdp.cert_count | security_result.detection_fields[rdp_cert_count] | |
| rdp.cert_permanent | security_result.detection_fields[rdp_cert_permanent] | |
| rdp.cert_type | security_result.detection_fields[rdp_cert_type] | |
| rdp.encryption_level | security_result.detection_fields[rdp_encryption_level] | |
| rdp.encryption_method | security_result.detection_fields[rdp_encryption_method] | |
| rdp.security_protocol | security_result.detection_fields[rdp_security_protocol] | |
| ssh.auth_attempts | security_result.detection_fields[ssh_auth_attempts] | |
| ssh.cipher_alg | security_result.detection_fields[ssh_cipher_alg] | |
| ssh.client | security_result.detection_fields[ssh_client] | |
| ssh.compression_alg | security_result.detection_fields[ssh_compression_alg] | |
| ssh.host_key_alg | security_result.detection_fields[ssh_host_key_alg] | |
| ssh.host_key | security_result.detection_fields[ssh_host_key] | |
| ssh.kex_alg | security_result.detection_fields[ssh_kex_alg] | |
| ssh.mac_alg | security_result.detection_fields[ssh_mac_alg] | |
| ssh.server | security_result.detection_fields[ssh_server] | |
| ssl.cert_chain_fuids | security_result.detection_fields[ssl_cert_chain_fuids] | |
| ssl.client_cert_chain_fuids | security_result.detection_fields[ssl_client_cert_chain_fuids] | |
| ssl.validation_status | security_result.detection_fields[ssl_validation_status] | |
| syslog.facility | security_result.detection_fields[syslog_facility] | |
| threat.alert.rev | security_result.detection_fields[threat_alert_rev] | |
| threat.alert.signature_id | security_result.rule_id | |
| decoy.smb.dataset | security_result.rule_labels[decoy_smb_dataset] | The decoy.smb.datasetlog field is mapped to thesecurity_result.rule_labelsUDM field. | 
| threat.alert.signature | security_result.rule_name | |
| decoy.ftp.dataset | security_result.rule_set | |
|  | security_result.severity | If the syslog.severitylog field value matches the regular expression pattern(?i)Low, then thesecurity_result.severityUDM field is set toLOW.Else, if the syslog.severitylog field value matches the regular expression pattern(?i)Informational, then thesecurity_result.severityUDM field is set toINFORMATIONAL.Else, if the syslog.severitylog field value matches the regular expression pattern(?i)Medium, then thesecurity_result.severityUDM field is set toMEDIUM.Else, if the syslog.severitylog field value matches the regular expression pattern(?i)Critical, then thesecurity_result.severityUDM field is set toCRITICAL.Else, if the syslog.severitylog field value matches the regular expression pattern(?i)High, then thesecurity_result.severityUDM field is set toHIGH.Else, if the syslog.severitylog field value matches the regular expression pattern(?i)ERROR, then thesecurity_result.severityUDM field is set toERROR.Else, if the threat.alert.severitylog field value matches the regular expression pattern4 or 5, then thesecurity_result.severityUDM field is set toHIGH.Else, if the threat.alert.severitylog field value matches the regular expression pattern1 or 2, then thesecurity_result.severityUDM field is set toLOW.Else, if the threat.alert.severitylog field value matches the regular expression pattern3, then thesecurity_result.severityUDM field is set toMEDIUM. | 
| syslog.severity | security_result.severity_details | |
| threat.alert.severity | security_result.severity_details | |
|  | security_result.summary | If the kerberos.error_codelog field value is equal to1, then thesecurity_result.summaryUDM field is set toKDC_ERR_NAME_EXP.Else, if the kerberos.error_codelog field value is equal to2, then thesecurity_result.summaryUDM field is set toKDC_ERR_SERVICE_EXP.Else, if the kerberos.error_codelog field value is equal to3, then thesecurity_result.summaryUDM field is set toKDC_ERR_BAD_PVNO.Else, if the kerberos.error_codelog field value is equal to4, then thesecurity_result.summaryUDM field is set toKDC_ERR_C_OLD_MAST_KVNO.Else, if the kerberos.error_codelog field value is equal to5, then thesecurity_result.summaryUDM field is set toKDC_ERR_S_OLD_MAST_KVNO.Else, if the kerberos.error_codelog field value is equal to6, then thesecurity_result.summaryUDM field is set toKDC_ERR_C_PRINCIPAL_UNKNOWN.Else, if the kerberos.error_codelog field value is equal to7, then thesecurity_result.summaryUDM field is set toKDC_ERR_S_PRINCIPAL_UNKNOWN.Else, if the kerberos.error_codelog field value is equal to8, then thesecurity_result.summaryUDM field is set toKDC_ERR_PRINCIPAL_NOT_UNIQUE.Else, if the kerberos.error_codelog field value is equal to9, then thesecurity_result.summaryUDM field is set toKDC_ERR_NULL_KEY.Else, if the kerberos.error_codelog field value is equal to10, then thesecurity_result.summaryUDM field is set toKDC_ERR_CANNOT_POSTDATE.Else, if the kerberos.error_codelog field value is equal to11, then thesecurity_result.summaryUDM field is set toKDC_ERR_NEVER_VALID.Else, if the kerberos.error_codelog field value is equal to12, then thesecurity_result.summaryUDM field is set toKDC_ERR_POLICY.Else, if the kerberos.error_codelog field value is equal to13, then thesecurity_result.summaryUDM field is set toKDC_ERR_BADOPTION.Else, if the kerberos.error_codelog field value is equal to14, then thesecurity_result.summaryUDM field is set toKDC_ERR_ETYPE_NOSUPP.Else, if the kerberos.error_codelog field value is equal to15, then thesecurity_result.summaryUDM field is set toKDC_ERR_SUMTYPE_NOSUPP.Else, if the kerberos.error_codelog field value is equal to16, then thesecurity_result.summaryUDM field is set toKDC_ERR_PADATA_TYPE_NOSUPP.Else, if the kerberos.error_codelog field value is equal to17, then thesecurity_result.summaryUDM field is set toKDC_ERR_TRTYPE_NOSUPP.Else, if the kerberos.error_codelog field value is equal to18, then thesecurity_result.summaryUDM field is set toKDC_ERR_CLIENT_REVOKED.Else, if the kerberos.error_codelog field value is equal to19, then thesecurity_result.summaryUDM field is set toKDC_ERR_SERVICE_REVOKED.Else, if the kerberos.error_codelog field value is equal to20, then thesecurity_result.summaryUDM field is set toKDC_ERR_TGT_REVOKED.Else, if the kerberos.error_codelog field value is equal to21, then thesecurity_result.summaryUDM field is set toKDC_ERR_CLIENT_NOTYET.Else, if the kerberos.error_codelog field value is equal to22, then thesecurity_result.summaryUDM field is set toKDC_ERR_SERVICE_NOTYET.Else, if the kerberos.error_codelog field value is equal to23, then thesecurity_result.summaryUDM field is set toKDC_ERR_KEY_EXPIRED.Else, if the kerberos.error_codelog field value is equal to24, then thesecurity_result.summaryUDM field is set toKDC_ERR_PREAUTH_FAILED.Else, if the kerberos.error_codelog field value is equal to25, then thesecurity_result.summaryUDM field is set toKDC_ERR_PREAUTH_REQUIRED.Else, if the kerberos.error_codelog field value is equal to26, then thesecurity_result.summaryUDM field is set toKDC_ERR_SERVER_NOMATCH.Else, if the kerberos.error_codelog field value is equal to27, then thesecurity_result.summaryUDM field is set toKDC_ERR_MUST_USE_USER2USER.Else, if the kerberos.error_codelog field value is equal to28, then thesecurity_result.summaryUDM field is set toKDC_ERR_PATH_NOT_ACCEPTED.Else, if the kerberos.error_codelog field value is equal to29, then thesecurity_result.summaryUDM field is set toKDC_ERR_SVC_UNAVAILABLE.Else, if the kerberos.error_codelog field value is equal to31, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_BAD_INTEGRITY.Else, if the kerberos.error_codelog field value is equal to32, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_TKT_EXPIRED.Else, if the kerberos.error_codelog field value is equal to33, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_TKT_NYV.Else, if the kerberos.error_codelog field value is equal to34, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_REPEAT.Else, if the kerberos.error_codelog field value is equal to35, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_NOT_US.Else, if the kerberos.error_codelog field value is equal to36, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_BADMATCH.Else, if the kerberos.error_codelog field value is equal to37, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_SKEW.Else, if the kerberos.error_codelog field value is equal to38, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_BADADDR.Else, if the kerberos.error_codelog field value is equal to39, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_BADVERSION.Else, if the kerberos.error_codelog field value is equal to40, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_MSG_TYPE.Else, if the kerberos.error_codelog field value is equal to41, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_MODIFIED.Else, if the kerberos.error_codelog field value is equal to42, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_BADORDER.Else, if the kerberos.error_codelog field value is equal to44, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_BADKEYVER.Else, if the kerberos.error_codelog field value is equal to45, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_NOKEY.Else, if the kerberos.error_codelog field value is equal to46, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_MUT_FAIL.Else, if the kerberos.error_codelog field value is equal to47, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_BADDIRECTION.Else, if the kerberos.error_codelog field value is equal to48, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_METHOD.Else, if the kerberos.error_codelog field value is equal to49, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_BADSEQ.Else, if the kerberos.error_codelog field value is equal to50, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_INAPP_CKSUM.Else, if the kerberos.error_codelog field value is equal to51, then thesecurity_result.summaryUDM field is set toKRB_AP_PATH_NOT_ACCEPTED.Else, if the kerberos.error_codelog field value is equal to52, then thesecurity_result.summaryUDM field is set toKRB_ERR_RESPONSE_TOO_BIG.Else, if the kerberos.error_codelog field value is equal to60, then thesecurity_result.summaryUDM field is set toKRB_ERR_GENERIC.Else, if the kerberos.error_codelog field value is equal to61, then thesecurity_result.summaryUDM field is set toKRB_ERR_FIELD_TOOLONG.Else, if the kerberos.error_codelog field value is equal to62, then thesecurity_result.summaryUDM field is set toKDC_ERROR_CLIENT_NOT_TRUSTED.Else, if the kerberos.error_codelog field value is equal to63, then thesecurity_result.summaryUDM field is set toKDC_ERROR_KDC_NOT_TRUSTED.Else, if the kerberos.error_codelog field value is equal to64, then thesecurity_result.summaryUDM field is set toKDC_ERROR_INVALID_SIG.Else, if the kerberos.error_codelog field value is equal to65, then thesecurity_result.summaryUDM field is set toKDC_ERR_KEY_TOO_WEAK.Else, if the kerberos.error_codelog field value is equal to66, then thesecurity_result.summaryUDM field is set toKDC_ERR_CERTIFICATE_MISMATCH.Else, if the kerberos.error_codelog field value is equal to67, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_NO_TGT.Else, if the kerberos.error_codelog field value is equal to68, then thesecurity_result.summaryUDM field is set toKDC_ERR_WRONG_REALM.Else, if the kerberos.error_codelog field value is equal to69, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_USER_TO_USER_REQUIRED.Else, if the kerberos.error_codelog field value is equal to70, then thesecurity_result.summaryUDM field is set toKDC_ERR_CANT_VERIFY_CERTIFICATE.Else, if the kerberos.error_codelog field value is equal to71, then thesecurity_result.summaryUDM field is set toKDC_ERR_INVALID_CERTIFICATE.Else, if the kerberos.error_codelog field value is equal to72, then thesecurity_result.summaryUDM field is set toKDC_ERR_REVOKED_CERTIFICATE.Else, if the kerberos.error_codelog field value is equal to73, then thesecurity_result.summaryUDM field is set toKDC_ERR_REVOCATION_STATUS_UNKNOWN.Else, if the kerberos.error_codelog field value is equal to74, then thesecurity_result.summaryUDM field is set toKDC_ERR_REVOCATION_STATUS_UNAVAILABLE.Else, if the kerberos.error_codelog field value is equal to75, then thesecurity_result.summaryUDM field is set toKDC_ERR_CLIENT_NAME_MISMATCH.Else, if the kerberos.error_codelog field value is equal to76, then thesecurity_result.summaryUDM field is set toKDC_ERR_KDC_NAME_MISMATCH. | 
| pe.machine | target.asset.asset_id | The Zscaler:pe.machinelog field is mapped to thetarget.asset.asset_idUDM field. | 
|  | target.file.file_type | If the pe.is_exelog field value is equal totrue, then thetarget.file.file_typeUDM field is set toFILE_TYPE_PE_EXE. | 
| smb_files.times.created | target.file.first_submission_time | |
| file.source | target.file.full_path | |
| smb_files.path | target.file.full_path | |
| smb_mapping.path | target.file.full_path | |
| smb_files.times.accessed | target.file.last_analysis_time | |
| smb_files.times.changed | target.file.last_modification_time | If the smb_files.times.modifiedlog field value is not 
empty, then thesmb_files.times.modifiedlog field is mapped to thetarget.file.last_modification_timeUDM field.Else, if the smb_files.times.changedlog field value is not 
empty, then thesmb_files.times.changedlog field is mapped to thetarget.file.last_modification_timeUDM field. | 
| smb_files.times.modified | target.file.last_modification_time | If the smb_files.times.modifiedlog field value is not 
empty, then thesmb_files.times.modifiedlog field is mapped to thetarget.file.last_modification_timeUDM field. | 
| file.md5 | target.file.md5 | |
| file.mime_type | target.file.mime_type | |
| smb_files.name | target.file.names | |
| pe.compile_ts | target.file.pe_file.compilation_time | |
| pe.section_names | target.file.pe_file.section.name | The pe.section_nameslog field is mapped to thetarget.file.pe_file.section.nameUDM field. | 
| file.sha1 | target.file.sha1 | |
| file.total_bytes | target.file.size | |
| smb_files.size | target.file.size | |
| socks.request | target.hostname | |
| scan.ips | target.ip | The scan.ipslog field is mapped to thetarget.ipUDM field. | 
| network.resp_bytes | target.network.sent_bytes | |
| network.resp_pkts | target.network.sent_packets | |
|  | target.platform | If the pe.oslog field value matches the regular expression pattern(?i)Win, then theprincipal.platformUDM field is set toWINDOWS.Else, if the pe.oslog field value matches the regular expression pattern(?i)Lin, then theprincipal.platformUDM field is set toLINUX.Else, if the pe.oslog field value matches the regular expression pattern(?i)(Mac or iOS), then theprincipal.platformUDM field is set toMAC. | 
| rfb.server_major_version | target.platform_version | The rfb.server_major_version rfb.server_minor_versionlog field is mapped to thetarget.platform_versionUDM field. | 
| rfb.server_minor_version | target.platform_version | The rfb.server_major_version rfb.server_minor_versionlog field is mapped to thetarget.platform_versionUDM field. | 
| scan.ports | target.port | If the indexlog field value is equal to0, then thescan.portslog field is mapped to thetarget.portUDM field.Else, the scan.portslog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| socks.request_p | target.port | The socks.request_plog field is mapped to thetarget.portUDM field. | 
| dce_rpc.endpoint | target.resource_ancestors.name | |
|  | target.resource_ancestors.resource_type | If the dce_rpc.endpointlog field value is not 
empty, then thetarget.resource_ancestors.resource_typeUDM field is set toBACKEND_SERVICE. | 
| rfb.height | target.resource.attribute.labels[rfb_height] | |
| rfb.width | target.resource.attribute.labels[rfb_width] | |
| dce_rpc.named_pipe | target.resource.name | |
| kerberos.service | target.resource.name | |
| rfb.desktop_name | target.resource.name | |
|  | target.resource.resource_type | If the dce_rpc.named_pipelog field value is not 
empty, then thetarget.resource.resource_typeUDM field is set toPIPE.Else, if the kerberos.servicelog field value is not 
empty, then thetarget.resource.resource_typeUDM field is set toBACKEND_SERVICE.Else, if the rfb.desktop_namelog field value is not 
empty, then thetarget.resource.resource_typeUDM field is set toDEVICE. | 
| sip.uri | target.url | |
| ntlm.username | target.user.userid | |
| radius.username | target.user.userid | |
| dce_rpc.rtt | additional.fields[dce_rpc_rtt] | |
| decoy.ftp.banner | additional.fields[decoy_ftp_banner] | |
| dnp3.fc_reply | additional.fields[dnp3_fc_reply] | |
| dnp3.fc_request | additional.fields[dnp3_fc_request] | |
| dnp3.iin | additional.fields[dnp3_iin] | |
| dns.qclass_name | additional.fields[dns_qclass_name] | |
| dns.qtype_name | additional.fields[dns_qtype_name] | |
| dns.rcode_name | additional.fields[dns_rcode_name] | |
| dns.rtt | additional.fields[dns_rtt] | |
| dns.saw_query | additional.fields[dns_saw_query] | |
| dns.saw_reply | additional.fields[dns_saw_reply] | |
| dns.TC | additional.fields[dns_tc] | |
| dns.total_answers | additional.fields[dns_total_answers] | |
| dns.total_replies | additional.fields[dns_total_replies] | |
| dns.Z | additional.fields[dns_z] | |
| file.depth | additional.fields[file_depth] | |
| file.duration | additional.fields[file_duration] | |
| file.is_orig | additional.fields[file_is_orig] | |
| file.missing_bytes | additional.fields[file_missing_bytes] | |
| file.overflow_bytes | additional.fields[file_overflow_bytes] | |
| file.seen_bytes | additional.fields[file_seen_bytes] | |
| file.timedout | additional.fields[file_timedout] | |
| file.uid | additional.fields[file_uid] | |
| ftp.arg | additional.fields[ftp_arg] | |
| ftp.data_channel.passive | additional.fields[ftp_data_channel_passive] | |
| ftp.reply_code | additional.fields[ftp_reply_code] | |
| ftp.reply_msg | additional.fields[ftp_reply_msg] | |
| irc.addl | additional.fields[irc_addl] | |
| irc.nick | additional.fields[irc_nick] | |
| irc.value | additional.fields[irc_value] | |
| kerberos.cipher | additional.fields[kerberos_cipher] | |
| kerberos.forwardable | additional.fields[kerberos_forwardable] | |
| kerberos.from | additional.fields[kerberos_from] | |
| kerberos.logged | additional.fields[kerberos_logged] | |
| kerberos.renewable | additional.fields[kerberos_renewable] | |
| kerberos.request_type | additional.fields[kerberos_request_type] | |
| kerberos.success | additional.fields[kerberos_success] | |
| kerberos.till | additional.fields[kerberos_till] | |
| modbus.func | additional.fields[modbus_func] | |
| mqtt.ack | additional.fields[mqtt_ack] | |
| mqtt.action | additional.fields[mqtt_action] | |
| mqtt.connect_status | additional.fields[mqtt_connect_status] | |
| mqtt.from_client | additional.fields[mqtt_from_client] | |
| mqtt.message_type | additional.fields[mqtt_message_type] | |
| mqtt.payload_len | additional.fields[mqtt_payload_len] | |
| mqtt.payload | additional.fields[mqtt_payload] | |
| mqtt.retain | additional.fields[mqtt_retain] | |
| mqtt.status | additional.fields[mqtt_status] | |
| mqtt.topic | additional.fields[mqtt_topic] | |
| mqtt.topics | additional.fields[mqtt_topics] | |
| mysql.arg | additional.fields[mysql_arg] | |
| mysql.cmd | additional.fields[mysql_cmd] | |
| mysql.response | additional.fields[mysql_response] | |
| mysql.rows | additional.fields[mysql_rows] | |
| network.conn_state | additional.fields[network_conn_state] | |
| network.connection_uids | additional.fields[network_connection_uids] | The network.connection_uidslog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| network.history | additional.fields[network_history] | |
| network.icmp_type | additional.fields[network_icmp_type] | |
| network.local_orig | additional.fields[network_local_orig] | |
| network.local_resp | additional.fields[network_local_resp] | |
| network.missed_bytes | additional.fields[network_missed_bytes] | |
| network.orig_ip_bytes | additional.fields[network_orig_ip_bytes] | |
| network.resp_ip_bytes | additional.fields[network_resp_ip_bytes] | |
| network.service | additional.fields[network_service] | |
| ntlm.done | additional.fields[ntlm_done] | |
| ntlm.status | additional.fields[ntlm_status] | |
| pe.has_cert_table | additional.fields[pe_has_cert_table] | |
| pe.has_debug_data | additional.fields[pe_has_debug_data] | |
| pe.has_export_table | additional.fields[pe_has_export_table] | |
| pe.has_import_table | additional.fields[pe_has_import_table] | |
| pe.is_64bit | additional.fields[pe_is_64bit] | |
| pe.subsystem | additional.fields[pe_subsystem] | |
| pe.uses_aslr | additional.fields[pe_uses_aslr] | |
| pe.uses_code_integrity | additional.fields[pe_uses_code_integrity] | |
| pe.uses_dep | additional.fields[pe_uses_dep] | |
| pe.uses_seh | additional.fields[pe_uses_seh] | |
| radius.connect_info | additional.fields[radius_connect_info] | |
| radius.logged | additional.fields[radius_logged] | |
| rdp.desktop_height | additional.fields[rdp_desktop_height] | |
| rdp.desktop_width | additional.fields[rdp_desktop_width] | |
| rdp.keyboard_layout | additional.fields[rdp_keyboard_layout] | |
| rdp.requested_color_depth | additional.fields[rdp_requested_color_depth] | |
| rfb.auth | additional.fields[rfb_auth] | |
| rfb.done | additional.fields[rfb_done] | |
| rfb.share_flag | additional.fields[rfb_share_flag] | |
| scan.type | additional.fields[scan_type] | |
| sip.call_id | additional.fields[sip_call_id] | |
| sip.content_type | additional.fields[sip_content_type] | |
| sip.date | additional.fields[sip_date] | |
| sip.reply_to | additional.fields[sip_reply_to] | |
| sip.request_body_len | additional.fields[sip_request_body_len] | |
| sip.request_from | additional.fields[sip_request_from] | |
| sip.request_path | additional.fields[sip_request_path] | The sip.request_pathlog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| sip.request_to | additional.fields[sip_request_to] | |
| sip.response_body_len | additional.fields[sip_response_body_len] | |
| sip.response_from | additional.fields[sip_response_from] | |
| sip.response_path | additional.fields[sip_response_path] | The sip.response_pathlog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| sip.response_to | additional.fields[sip_response_to] | |
| sip.seq | additional.fields[sip_seq] | |
| sip.status_msg | additional.fields[sip_status_msg] | |
| sip.subject | additional.fields[sip_subject] | |
| sip.trans_depth | additional.fields[sip_trans_depth] | |
| smb_mapping.share_type | additional.fields[smb_mapping_share_type] | |
| smtp.date | additional.fields[smtp_date] | |
| smtp.first_received | additional.fields[smtp_first_received] | |
| smtp.has_client_activity | additional.fields[smtp_has_client_activity] | |
| smtp.last_reply | additional.fields[smtp_last_reply] | |
| smtp.msg_id | additional.fields[smtp_msg_id] | |
| smtp.path_list | additional.fields[smtp_path_list] | |
| smtp.process_received_from | additional.fields[smtp_process_received_from] | |
| smtp.second_received | additional.fields[smtp_second_received] | |
| smtp.trans_depth | additional.fields[smtp_trans_depth] | |
| smtp.user_agent | additional.fields[smtp_user_agent] | |
| snmp.duration | additional.fields[snmp_duration] | |
| snmp.get_bulk_requests | additional.fields[snmp_get_bulk_requests] | |
| snmp.get_requests | additional.fields[snmp_get_requests] | |
| snmp.get_responses | additional.fields[snmp_get_responses] | |
| snmp.set_requests | additional.fields[snmp_set_requests] | |
| snmp.up_since | additional.fields[snmp_up_since] | |
| socks.status | additional.fields[socks_status] | |
| socks.version | additional.fields[socks_version] | |
| tunnel.tunnel_type | additional.fields[tunnel_tunnel_type] | 
Field mapping reference: ZSCALER_DECEPTION - postgresql
The following table lists the raw log fields for the postgresql 
log type and their corresponding UDM fields.
| Log field | UDM mapping | Logic | 
|---|---|---|
| postgresql.message | metadata.description | |
| type | metadata.product_event_type | |
| postgresql.user | principal.user.userid | |
| postgresql.error_severity | security_result.severity_details | |
| postgresql.state_code | security_result.detection_fields[postgresql_state_code] | |
| postgresql.application_name | target.application | |
| postgresql.session_id | target.network.session_id | |
| postgresql.statement | target.process.command_line | |
| postgresql.pid | target.process.pid | |
| postgresql.vpid | target.process.product_specific_process_id | The Deception:postgresql.vpidlog field is mapped to thetarget.process.product_specific_process_idUDM field. | 
| postgresql.dbname | target.resource.name | |
|  | target.resource.resource_type | The target.resource.resource_typeUDM field is set toDATABASE. | 
| postgresql.password | additional.fields[postgresql_password] | |
| postgresql.vxid | additional.fields[postgresql_vxid] | 
Field mapping reference: ZSCALER_DECEPTION - QOS
The following table lists the raw log fields for the QOS 
log type and their corresponding UDM fields.
| Log field | UDM mapping | Logic | 
|---|---|---|
| type | metadata.product_event_type | |
| qos.message | metadata.description | 
Field mapping reference: ZSCALER_DECEPTION - recon
The following table lists the raw log fields for the recon 
log type and their corresponding UDM fields.
extensions.auth.mechanism 
extensions.auth.mechanism 
UDM field is set to USERNAME_PASSWORD 
.recon.cve_type 
extensions.vulns.vulnerabilities.about.security_result.detection_fields[recon_cve_type] 
recon.cve_name 
extensions.vulns.vulnerabilities.cve_description 
recon.cve_id 
extensions.vulns.vulnerabilities.cve_id 
timestamp(Europe/Amsterdam) 
metadata.event_timestamp 
metadata.event_type 
recon.http_x_forwarded_for 
log field value is not 
empty or the attacker.ip 
log field value is not 
empty or the attacker.name 
log field value is not 
empty) and (the decoy.ip 
log field value is not 
empty or the recon.host 
log field value is not 
empty), then the metadata.event_type 
UDM field is set to NETWORK_CONNECTION 
.Else, if the
recon.http_x_forwarded_for 
log field value is not 
empty or the attacker.ip 
log field value is not 
empty or the attacker.name 
log field value is not 
empty, then the metadata.event_type 
UDM field is set to STATUS_UPDATE 
.Else, the
metadata.event_type 
UDM field is set to USER_STATS 
.type 
metadata.product_event_type 
id 
metadata.product_log_id 
recon.bytes_sent 
network.sent_bytes 
attacker.name 
principal.hostname 
recon.http_x_forwarded_for 
principal.ip 
attacker.ip 
principal.ip 
recon.scheme 
principal.network.application_protocol 
recon.scheme 
log field value contain one of the following values, then the recon.scheme 
log field is mapped to the principal.network.application_protocol 
UDM field. -  AFP
-  APPC
-  AMQP
-  ATOM
-  BEEP
-  BITCOIN
-  BIT_TORRENT
-  CFDP
-  COAP
-  DCERPC
-  DDS
-  DEVICE_NET
-  DHCP
-  DNS
-  E_DONKEY
-  ENRP
-  FAST_TRACK
-  FINGER
-  FREENET
-  FTAM
-  GOPHER
-  HL7
-  H323
-  HTTP
-  HTTPS
-  IRCP
-  KADEMLIA
-  KRB5
-  LDAP
-  LPD
-  MIME
-  MODBUS
-  MQTT
-  NETCONF
-  NFS
-  NIS
-  NNTP
-  NTCIP
-  NTP
-  OSCAR
-  PNRP
-  QUIC
-  RDP
-  RELP
-  RIP
-  RLOGIN
-  RPC
-  RTMP
-  RTP
-  RTPS
-  RTSP
-  SAP
-  SDP
-  SIP
-  SLP
-  SMB
-  SMTP
-  SNTP
-  SSH
-  SSMS
-  STYX
-  TCAP
-  TDS
-  TOR
-  TSP
-  VTP
-  WHOIS
-  WEB_DAV
-  X400
-  X500
-  XMPP
attacker.id 
principal.network.dns.id 
recon.method 
principal.network.http.method 
recon.http_referrer 
principal.network.http.referral_url 
recon.status 
principal.network.http.response_code 
recon.user_agent.string 
principal.network.http.user_agent 
recon.user_agent.string 
log field value is not 
empty or the recon.user_agent.string 
log field value is not 
equal to $ 
, then the recon.user_agent.string 
log field is mapped to the principal.network.http.user_agent 
UDM field.principal.platform 
recon.user_agent.os.family 
log field value matches the regular expression pattern (?i)WIN 
, then the principal.platform 
UDM field is set to WINDOWS 
.Else, if the
recon.user_agent.os.family 
log field value matches the regular expression pattern (?i)LIN 
, then the principal.platform 
UDM field is set to LINUX 
.Else, if the
recon.user_agent.os.family 
log field value matches the regular expression pattern (?i)(MAC or iOS) 
, then the principal.platform 
UDM field is set to MAC 
.recon.user_agent.os.patch 
principal.platform_patch_level 
recon.user_agent.os.major 
principal.platform_version 
recon.user_agent.os.major recon.user_agent.os.minor 
log field is mapped to the principal.platform_version 
UDM field.recon.user_agent.os.minor 
principal.platform_version 
recon.user_agent.os.major recon.user_agent.os.minor 
log field is mapped to the principal.platform_version 
UDM field.attacker.port 
principal.port 
attacker.threat_parse_ids 
principal.security_result.detection_fields[attacker_threat_parse_ids] 
attacker.threat_parse_ids 
log field is mapped to the security_result.detection_fields 
UDM field.attacker.score 
principal.security_result.risk_score 
recon.uri 
principal.url 
recon.post_data.username 
principal.user.email_addresses 
mitre_ids 
security_result.attack_details.techniques.id 
mitre_ids 
log field is mapped to the security_result.attack_details.techniques.id 
UDM field.abuseip.abuseConfidenceScore 
security_result.confidence_score 
is_itdr 
security_result.detection_fields[is_itdr] 
kill_chain_phase 
security_result.detection_fields[kill_chain_phase] 
threat_parse_ids 
security_result.detection_fields[threat_parse_ids] 
threat_parse_ids 
log field is mapped to the security_result.detection_fields 
UDM field.whitelisted 
security_result.detection_fields[whitelisted] 
updated_on 
security_result.last_updated_time 
score 
security_result.risk_score 
decoy.recon.dataset_type 
security_result.rule_labels[decoy_recon_dataset_type] 
decoy.recon.dataset 
security_result.rule_set 
severity 
security_result.severity 
severity 
log field value contain one of the following values, then the severity 
log field is mapped to the security_result.severity 
UDM field. -  LOW
-  MEDIUM
-  HIGH
-  CRITICAL
severity 
security_result.severity_details 
abuseip.ipAddress 
src.artifact.ip 
abuseip.lastReportedAt 
src.artifact.last_seen_time 
abuseip.countryCode 
src.artifact.location.country_or_region 
recon.server_name 
target.domain.whois_server 
decoy.group 
target.group.group_display_name 
recon.host 
target.hostname 
decoy.ip 
target.ip 
target.network.application_protocol 
app_proto 
field is extracted from recon.server_protocol 
log field using the Grok pattern.If the
app_proto 
log field value contain one of the following values, then the app_proto 
extracted field is mapped to the target.network.application_protocol 
UDM field. -  AFP
-  APPC
-  AMQP
-  ATOM
-  BEEP
-  BITCOIN
-  BIT_TORRENT
-  CFDP
-  COAP
-  DCERPC
-  DDS
-  DEVICE_NET
-  DHCP
-  DNS
-  E_DONKEY
-  ENRP
-  FAST_TRACK
-  FINGER
-  FREENET
-  FTAM
-  GOPHER
-  HL7
-  H323
-  HTTP
-  HTTPS
-  IRCP
-  KADEMLIA
-  KRB5
-  LDAP
-  LPD
-  MIME
-  MODBUS
-  MQTT
-  NETCONF
-  NFS
-  NIS
-  NNTP
-  NTCIP
-  NTP
-  OSCAR
-  PNRP
-  QUIC
-  RDP
-  RELP
-  RIP
-  RLOGIN
-  RPC
-  RTMP
-  RTP
-  RTPS
-  RTSP
-  SAP
-  SDP
-  SIP
-  SLP
-  SMB
-  SMTP
-  SNTP
-  SSH
-  SSMS
-  STYX
-  TCAP
-  TDS
-  TOR
-  TSP
-  VTP
-  WHOIS
-  WEB_DAV
-  X400
-  X500
-  XMPP
target.network.application_protocol_version 
proto_version 
field is extracted from recon.server_protocol 
log field using the Grok pattern.If the
proto_version 
log field value is not 
empty, then the proto_version 
extracted field is mapped to the target.network.application_protocol_version 
UDM field.decoy.name 
target.resource.name 
decoy.id 
target.resource.product_object_id 
decoy.type 
target.resource.resource_subtype 
decoy.client.id 
target.user.product_object_id 
decoy.client.name 
target.user.user_display_name 
recon.http_basicauth_user 
target.user.userid 
 version 
 
additional.fields[ version 
] 
abuseip.ipVersion 
additional.fields[abuseip_ipversion] 
abuseip.isPublic 
additional.fields[abuseip_ispublic] 
abuseip.isWhitelisted 
additional.fields[abuseip_iswhitelisted] 
abuseip.totalReports 
additional.fields[abuseip_total_reports] 
decoy.appliance.id 
additional.fields[decoy_appliance_id] 
decoy.appliance.name 
additional.fields[decoy_appliance_name] 
decoy.network_name 
additional.fields[decoy_network_name] 
decoy.recon.server_type 
additional.fields[decoy_recon_server_type] 
decoy.vlan_id 
additional.fields[decoy_vlan_id] 
heatmap_per_week_15_min 
additional.fields[heatmap_per_week_15_min] 
indexed_on 
additional.fields[indexed_on] 
recon.content_length 
additional.fields[recon_content_length] 
recon.post_data.password 
additional.fields[recon_post_data_password] 
recon.post_data 
additional.fields[recon_post_data] 
recon.query_string 
additional.fields[recon_query_string] 
recon.request_body 
additional.fields[recon_request_body] 
recon.request_length 
additional.fields[recon_request_length] 
recon.request_time 
additional.fields[recon_request_time] 
recon.request_uri 
additional.fields[recon_request_uri] 
recon.request 
additional.fields[recon_request] 
recon.user_agent.family 
additional.fields[recon_user_agent_family] 
recon.user_agent.major 
additional.fields[recon_user_agent_major] 
recon.user_agent.minor 
additional.fields[recon_user_agent_minor] 
recon.user_agent.patch 
additional.fields[recon_user_agent_patch] 
record_type 
additional.fields[record_type] 
update_id 
additional.fields[update_id] 
Field mapping reference: ZSCALER_DECEPTION - scada
The following table lists the raw log fields for the scada 
log type and their corresponding UDM fields.
| Log field | UDM mapping | Logic | 
|---|---|---|
| scada.event_type | metadata.description | |
| type | metadata.product_event_type | |
| decoy.scada.dataset | security_result.rule_set | |
| scada.data_type | additional.fields[scada_data_type] | |
| scada.request | additional.fields[scada_request] | |
| scada.response | additional.fields[scada_response] | 
Field mapping reference: ZSCALER_DECEPTION - ssh, telnet
The following table lists the raw log fields for the ssh 
and telnet 
log types and their corresponding UDM fields.
| Log field | UDM mapping | Logic | 
|---|---|---|
|  | extensions.auth.mechanism | If the linux.remote_hostlog field value is not 
empty, then theextensions.auth.mechanismUDM field is set toREMOTE. | 
|  | metadata.event_type | If the linux.remote_hostlog field value is not 
empty and thelinux.userlog field value is not 
empty, then themetadata.event_typeUDM field is set toUSER_LOGIN.Else, the metadata.event_typeUDM field is set toUSER_RESOURCE_ACCESS. | 
| type | metadata.product_event_type | |
| linux.read_bytes | network.received_bytes | |
| linux.written_bytes | network.sent_bytes | |
| linux.remote_host | principal.ip | |
| linux.vpid | principal.process.pid | |
| linux.owner_id | principal.user.product_object_id | |
| linux.user | principal.user.userid | If the linux.remote_hostlog field value is not 
empty, then thelinux.userlog field is mapped to thetarget.user.useridUDM field.Else, the linux.userlog field is mapped to theprincipal.user.useridUDM field. | 
| linux.password | security_result.detection_fields[linux_password] | |
| linux.new_path | target.file.full_path | |
| linux.mode | target.file.security_result.detection_fields[linux_mode] | |
| linux.group_id | target.group.product_object_id | |
|  | target.platform | If the decoy.ssh.ostypelog field value matches the regular expression pattern(?i)Win, then thetarget.platformUDM field is set toWINDOWS.Else, if the decoy.ssh.ostypelog field value matches the regular expression pattern(?i)Lin, then thetarget.platformUDM field is set toLINUX.Else, if the decoy.ssh.ostypelog field value matches the regular expression pattern(?i)(Mac or iOS), then thetarget.platformUDM field is set toMAC.If the decoy.telnet.ostypelog field value matches the regular expression pattern(?i)Win, then thetarget.platformUDM field is set toWINDOWS.Else, if the decoy.telnet.ostypelog field value matches the regular expression pattern(?i)Lin, then thetarget.platformUDM field is set toLINUX.Else, if the decoy.telnet.ostypelog field value matches the regular expression pattern(?i)(Mac or iOS), then thetarget.platformUDM field is set toMAC. | 
| linux.command_line | target.process.command_line | |
| linux.path | target.process.file.full_path | |
| linux.ppid | target.process.parent_process.pid | |
| linux.pid | target.process.pid | |
| linux.process_name | target.process.product_specific_process_id | The Deception:linux.process_namelog field is mapped to thetarget.process.product_specific_process_idUDM field. | 
| linux.container_name | target.resource.name | |
|  | target.resource.resource_type | If the linux.container_namelog field value is not 
empty, then thetarget.resource.resource_typeUDM field is set toCONTAINER. | 
| linux.connection_info | additional.fields[linux_connection_info] | |
| linux.flags | additional.fields[linux_flags] | |
| linux.info | additional.fields[linux_info] | |
| linux.parent_process_name | additional.fields[linux_parent_process_name] | 
Field mapping reference: ZSCALER_DECEPTION - web
The following table lists the raw log fields for the web 
log type and their corresponding UDM fields.
extensions.auth.mechanism 
extensions.auth.mechanism 
UDM field is set to USERNAME_PASSWORD 
.web.cve_type 
extensions.vulns.vulnerabilities.about.security_result.detection_fields[web_cve_type] 
web.cve_name 
extensions.vulns.vulnerabilities.cve_description 
web.cve_id 
extensions.vulns.vulnerabilities.cve_id 
metadata.event_type 
web.http_x_forwarded_for 
log field value is not 
empty and (the web.http_basicauth_user 
log field value is not 
empty or the web.post_data.username 
log field value is not 
empty), then the metadata.event_type 
UDM field is set to USER_LOGIN 
.Else, the
metadata.event_type 
UDM field is set to USER_RESOURCE_ACCESS 
.type 
metadata.product_event_type 
web.bytes_sent 
network.sent_bytes 
web.http_x_forwarded_for 
principal.ip 
web.scheme 
principal.network.application_protocol 
web.scheme 
log field value contain one of the following values, then the web.scheme 
log field is mapped to the principal.network.application_protocol 
UDM field. -  AFP
-  APPC
-  AMQP
-  ATOM
-  BEEP
-  BITCOIN
-  BIT_TORRENT
-  CFDP
-  COAP
-  DCERPC
-  DDS
-  DEVICE_NET
-  DHCP
-  DNS
-  E_DONKEY
-  ENRP
-  FAST_TRACK
-  FINGER
-  FREENET
-  FTAM
-  GOPHER
-  HL7
-  H323
-  HTTP
-  HTTPS
-  IRCP
-  KADEMLIA
-  KRB5
-  LDAP
-  LPD
-  MIME
-  MODBUS
-  MQTT
-  NETCONF
-  NFS
-  NIS
-  NNTP
-  NTCIP
-  NTP
-  OSCAR
-  PNRP
-  QUIC
-  RDP
-  RELP
-  RIP
-  RLOGIN
-  RPC
-  RTMP
-  RTP
-  RTPS
-  RTSP
-  SAP
-  SDP
-  SIP
-  SLP
-  SMB
-  SMTP
-  SNTP
-  SSH
-  SSMS
-  STYX
-  TCAP
-  TDS
-  TOR
-  TSP
-  VTP
-  WHOIS
-  WEB_DAV
-  X400
-  X500
-  XMPP
web.method 
principal.network.http.method 
web.http_referrer 
principal.network.http.referral_url 
web.status 
principal.network.http.response_code 
web.user_agent.string 
principal.network.http.user_agent 
principal.platform 
web.user_agent.os.family 
log field value matches the regular expression pattern (?i)Win 
, then the principal.platform 
UDM field is set to WINDOWS 
.Else, if the
web.user_agent.os.family 
log field value matches the regular expression pattern (?i)Lin 
, then the principal.platform 
UDM field is set to LINUX 
.Else, if the
web.user_agent.os.family 
log field value matches the regular expression pattern (?i)(Mac or iOS) 
, then the principal.platform 
UDM field is set to MAC 
.web.user_agent.os.patch 
principal.platform_patch_level 
web.user_agent.os.major 
principal.platform_version 
web.user_agent.os.major web.user_agent.os.minor 
log field is mapped to the principal.platform_version 
UDM field.web.user_agent.os.minor 
principal.platform_version 
web.user_agent.os.major web.user_agent.os.minor 
log field is mapped to the principal.platform_version 
UDM field.web.uri 
principal.url 
decoy.web.dataset_type 
security_result.rule_labels[decoy_web_dataset_type] 
decoy.web.dataset 
security_result.rule_set 
web.host 
target.hostname 
target.network.application_protocol 
app_proto 
field is extracted from web.server_protocol 
log field using the Grok pattern.If the
app_proto 
log field value contain one of the following values, then the app_proto 
extracted field is mapped to the target.network.application_protocol 
UDM field. -  AFP
-  APPC
-  AMQP
-  ATOM
-  BEEP
-  BITCOIN
-  BIT_TORRENT
-  CFDP
-  COAP
-  DCERPC
-  DDS
-  DEVICE_NET
-  DHCP
-  DNS
-  E_DONKEY
-  ENRP
-  FAST_TRACK
-  FINGER
-  FREENET
-  FTAM
-  GOPHER
-  HL7
-  H323
-  HTTP
-  HTTPS
-  IRCP
-  KADEMLIA
-  KRB5
-  LDAP
-  LPD
-  MIME
-  MODBUS
-  MQTT
-  NETCONF
-  NFS
-  NIS
-  NNTP
-  NTCIP
-  NTP
-  OSCAR
-  PNRP
-  QUIC
-  RDP
-  RELP
-  RIP
-  RLOGIN
-  RPC
-  RTMP
-  RTP
-  RTPS
-  RTSP
-  SAP
-  SDP
-  SIP
-  SLP
-  SMB
-  SMTP
-  SNTP
-  SSH
-  SSMS
-  STYX
-  TCAP
-  TDS
-  TOR
-  TSP
-  VTP
-  WHOIS
-  WEB_DAV
-  X400
-  X500
-  XMPP
web.post_data.username 
target.user.email_addresses 
web.http_basicauth_user 
target.user.userid 
decoy.web.server_type 
additional.fields[decoy_web_server_type] 
web.content_length 
additional.fields[web_content_length] 
web.post_data.password 
additional.fields[web_post_data_password] 
web.post_data 
additional.fields[web_post_data] 
web.query_string 
additional.fields[web_query_string] 
web.request_body 
additional.fields[web_request_body] 
web.request_length 
additional.fields[web_request_length] 
web.request_time 
additional.fields[web_request_time] 
web.request_uri 
additional.fields[web_request_uri] 
web.request 
additional.fields[web_request] 
web.user_agent.family 
additional.fields[web_user_agent_family] 
web.user_agent.major 
additional.fields[web_user_agent_major] 
web.user_agent.minor 
additional.fields[web_user_agent_minor] 
web.user_agent.patch 
additional.fields[web_user_agent_patch] 
Field mapping reference: ZSCALER_DECEPTION - windows
The following table lists the raw log fields for the windows 
log type and their corresponding UDM fields.
| Log field | UDM mapping | Logic | 
|---|---|---|
|  | metadata.event_type | If the file.pathlog field value is not 
empty and theattacker.domainlog field value is not 
empty, then if thefile.operationlog field value matches the regular expression pattern(?i)read, then themetadata.event_typeUDM field is set toFILE_READ.Else, if the file.pathlog field value is not 
empty and theattacker.domainlog field value is not 
empty, then if thefile.operationlog field value matches the regular expression pattern(?i)write or modify or encrypt, then themetadata.event_typeUDM field is set toFILE_MODIFICATION.Else, if the file.pathlog field value is not 
empty and theattacker.domainlog field value is not 
empty, then if thefile.operationlog field value matches the regular expression pattern(?i)create, then themetadata.event_typeUDM field is set toFILE_CREATION.Else, if the file.pathlog field value is not 
empty and theattacker.domainlog field value is not 
empty, then if thefile.operationlog field value matches the regular expression pattern(?i)delete, then themetadata.event_typeUDM field is set toFILE_DELETION.Else, if the file.pathlog field value is not 
empty and theattacker.domainlog field value is not 
empty, then if thefile.operationlog field value matches the regular expression pattern(?i)open, then themetadata.event_typeUDM field is set toFILE_OPEN.Else, if the file.pathlog field value is not 
empty and theattacker.domainlog field value is not 
empty, then if thefile.operationlog field value matches the regular expression pattern(?i)sync, then themetadata.event_typeUDM field is set toFILE_SYNC.Else, if the file.pathlog field value is not 
empty and theattacker.domainlog field value is not 
empty, then if thefile.operationlog field value matches the regular expression pattern(?i)copy, then themetadata.event_typeUDM field is set toFILE_COPY.Else, if the file.pathlog field value is not 
empty and theattacker.domainlog field value is not 
empty, then if thefile.operationlog field value matches the regular expression pattern(?i)move, then themetadata.event_typeUDM field is set toFILE_MOVE.Else, if the attacker.domainlog field value is not 
empty and (thepowershell.pathlog field value is not 
empty or thepowershell.script_block_idlog field value is not 
empty or thepowershell.script_block_textlog field value is not 
empty), then themetadata.event_typeUDM field is set toPROCESS_TERMINATION.Else, if the attacker.domainlog field value is not 
empty and (thesmb.pathlog field value is not 
empty or thesmb.file_namelog field value is not 
empty), then themetadata.event_typeUDM field is set toFILE_READ.Else, if the attacker.domainlog field value is not 
empty and thenetwork.destination.iplog field value is not 
empty, then themetadata.event_typeUDM field is set toNETWORK_CONNECTION.Else, if the attacker.domainlog field value is not 
empty and (thewmi_process.command_linelog field value is not 
empty or thewmi_process.created_process_idlog field value is not 
empty), then themetadata.event_typeUDM field is set toPROCESS_LAUNCH.Else, if the attacker.domainlog field value is not 
empty and thewindows.base_vm_iplog field value is not 
empty, then themetadata.event_typeUDM field is set toSTATUS_STARTUP.Else, the metadata.event_typeUDM field is set toUSER_RESOURCE_ACCESS. | 
| type | metadata.product_event_type | |
| windows.incident_id | metadata.product_log_id | |
|  | network.application_protocol | If the messagelog field value matches the regular expression patternldap., then thenetwork.application_protocolUDM field is set toLDAP.Else, if the messagelog field value matches the regular expression patternrdp., then thenetwork.application_protocolUDM field is set toRDP.Else, if the messagelog field value matches the regular expression patternsmb., then thenetwork.application_protocolUDM field is set toSMB. | 
| smb.session_guid | network.session_id | |
| winrm.activity_id | network.session_id | |
| attacker.process.domain_name | principal.domain.name | |
| attacker.domain | principal.hostname | |
| attacker.process.session_id | principal.network.session_id | |
| attacker.process.command_line | principal.process.command_line | |
| attacker.process.md5 | principal.process.file.md5 | |
| attacker.process.sha1 | principal.process.file.sha1 | |
| attacker.process.sha256 | principal.process.file.sha256 | |
| attacker.process.parent | principal.process.parent_process.pid | |
| attacker.process.id | principal.process.pid | |
| psexec.service_name | principal.resource.name | |
|  | principal.resource.resource_type | If the psexec.service_namelog field value is not 
empty, then theprincipal.resource.resource_typeUDM field is set toBACKEND_SERVICE. | 
| attacker.process.user_groups | principal.user.group_identifiers | The attacker.process.user_groupslog field is mapped to theprincipal.user.group_identifiersUDM field. | 
| attacker.process.user_ou | principal.user.group_identifiers | The attacker.process.user_groupslog field is mapped to theprincipal.user.group_identifiersUDM field and theattacker.process.user_oulog field is mapped to theprincipal.user.group_identifiersUDM field. | 
| attacker.process.user_name | principal.user.user_display_name | |
| attacker.user | principal.user.userid | |
| attacker.process.user_sid | principal.user.windows_sid | |
| attacker.process.exit_code | security_result.detection_fields[attacker_process_exit_code] | |
| file.operation_string | security_result.detection_fields[file_operation_string] | |
| file.operation | security_result.detection_fields[file_operation] | |
| mssql.data_sensitivity_information | security_result.detection_fields[mssql_data_sensitivity_information] | |
| mssql.is_column_permission | security_result.detection_fields[mssql_is_column_permission] | |
| decoy.smb.dataset | security_result.rule_set | |
| smb.disconnect_reason | security_result.summary | |
| network.source.hostname | src.hostname | |
| network.source.ip | src.ip | |
| network.source.port | src.port | |
| wmi_process.client_machine_fqdn | target.domain.name | |
| mssql.server_instance_name | target.domain.name_server | |
| file.path | target.file.full_path | |
| smb.path | target.file.full_path | |
| psexec.md5 | target.file.md5 | |
| file.file_name | target.file.names | |
| psexec.file_and_pipe_names | target.file.names | The psexec.file_and_pipe_nameslog field is mapped to thetarget.file.namesUDM field. | 
| smb.file_name | target.file.names | |
| psexec.sha1 | target.file.sha1 | |
| psexec.sha256 | target.file.sha256 | |
| mssql.host_name | target.hostname | |
| network.destination.hostname | target.hostname | |
| wmi_process.client_machine | target.hostname | |
| windows.base_vm_ip | target.ip | |
| mssql.client_ip | target.ip | |
| network.destination.ip | target.ip | |
| mssql.duration_milliseconds | target.network.session_duration.seconds | |
| mssql.session_id | target.network.session_id | |
| rdp.session_id | target.network.session_id | |
| smb.connection_guid | target.network.session_id | |
|  | target.platform | If the decoy.vm.oslog field value matches the regular expression pattern(?i)Win, then thetarget.platformUDM field is set toWINDOWS.Else, if the decoy.vm.oslog field value matches the regular expression pattern(?i)Lin, then thetarget.platformUDM field is set toLINUX.Else, if the decoy.vm.oslog field value matches the regular expression pattern(?i)(Mac or iOS), then thetarget.platformUDM field is set toMAC. | 
| network.destination.port | target.port | |
| wmi_process.command_line | target.process.command_line | |
| powershell.script_block_text | target.process.command_line | |
| powershell.path | target.process.file.full_path | |
| wmi_process.client_process_id | target.process.parent_process.pid | |
| wmi_process.created_process_id | target.process.pid | |
| powershell.script_block_id | target.process.product_specific_process_id | The Deception:powershell.script_block_idlog field is mapped to thetarget.process.product_specific_process_idUDM field. | 
| mssql.database_principal_id | target.resource_ancestors.attribute.labels[mssql_database_principal_id] | |
| mssql.database_principal_name | target.resource_ancestors.attribute.labels[mssql_database_principal_name] | |
|  | target.resource_ancestors.resource_type | If the mssql.database_namelog field value is not 
empty, then thetarget.resource_ancestors.resource_typeUDM field is set toDATABASE. | 
| ldap.attribute_list | target.resource.attribute.labels[ldap_attribute_list] | The ldap.attribute_listlog field is mapped to thetarget.resource.attribute.labelsUDM field. | 
| ldap.distinguished_name | target.resource.attribute.labels[ldap_distinguished_name] | |
| ldap.scope_of_search_string | target.resource.attribute.labels[ldap_scope_of_search_string] | |
| ldap.scope_of_search | target.resource.attribute.labels[ldap_scope_of_search] | |
| ldap.search_filter | target.resource.attribute.labels[ldap_search_filter] | |
| decoy.vm.name | target.resource.name | |
| mssql.database_name | target.resource.name | |
| decoy.vm.id | target.resource.product_object_id | |
| smb.tree_connect_guid | target.resource.product_object_id | |
|  | target.resource.resource_type | If the decoy.vm.idlog field value is not 
empty or thedecoy.vm.namelog field value is not 
empty, then thetarget.resource.resource_typeUDM field is set toVIRTUAL_MACHINE. | 
| attacker.process.name | additional.fields[attacker_process_name] | |
| attacker.process.thread_id | additional.fields[attacker_process_thread_id] | |
| attacker.process.tree | additional.fields[attacker_process_tree] | The attacker.process.treelog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| mssql.action_id | additional.fields[mssql_action_id] | |
| mssql.action_string | additional.fields[mssql_action_string] | |
| mssql.additional_information | additional.fields[mssql_additional_information] | |
| mssql.affected_rows | additional.fields[mssql_affected_rows] | |
| mssql.application_name | additional.fields[mssql_application_name] | |
| mssql.audit_schema_version | additional.fields[mssql_audit_schema_version] | |
| mssql.class_type_string | additional.fields[mssql_class_type_string] | |
| mssql.class_type | additional.fields[mssql_class_type] | |
| mssql.connection_id | additional.fields[mssql_connection_id] | |
| mssql.event_time | additional.fields[mssql_event_time] | |
| mssql.object_id | additional.fields[mssql_object_id] | |
| mssql.object_name | additional.fields[mssql_object_name] | |
| mssql.permission_bitmask | additional.fields[mssql_permission_bitmask] | |
| mssql.response_rows | additional.fields[mssql_response_rows] | |
| mssql.schema_name | additional.fields[mssql_schema_name] | |
| mssql.sequence_group_id | additional.fields[mssql_sequence_group_id] | |
| mssql.sequence_number | additional.fields[mssql_sequence_number] | |
| mssql.server_principal_id | additional.fields[mssql_server_principal_id] | |
| mssql.server_principal_name | additional.fields[mssql_server_principal_name] | |
| mssql.server_principal_sid | additional.fields[mssql_server_principal_sid] | |
| mssql.session_server_principal_name | additional.fields[mssql_session_server_principal_name] | |
| mssql.statement | additional.fields[mssql_statement] | |
| mssql.succeeded | additional.fields[mssql_succeeded] | |
| mssql.target_database_principal_id | additional.fields[mssql_target_database_principal_id] | |
| mssql.target_database_principal_name | additional.fields[mssql_target_database_principal_name] | |
| mssql.target_server_principal_id | additional.fields[mssql_target_server_principal_id] | |
| mssql.target_server_principal_name | additional.fields[mssql_target_server_principal_name] | |
| mssql.target_server_principal_sid | additional.fields[mssql_target_server_principal_sid] | |
| mssql.transaction_id | additional.fields[mssql_transaction_id] | |
| mssql.user_defined_event_id | additional.fields[mssql_user_defined_event_id] | |
| mssql.user_defined_information | additional.fields[mssql_user_defined_information] | |
| powershell.message_number | additional.fields[powershell_message_number] | |
| powershell.message_total | additional.fields[powershell_message_total] | |
| rdp.activity_id | additional.fields[rdp_activity_id] | |
| smb.lease_id | additional.fields[smb_lease_id] | |
| smb.open_guid | additional.fields[smb_open_guid] | |
| smb.share_guid | additional.fields[smb_share_guid] | |
| wmi_process.client_process_creation_time | additional.fields[wmi_process_client_process_creation_time] | |
| wmi_process.correlation_id | additional.fields[wmi_process_correlation_id] | |
| wmi_process.created_process_creation_time | additional.fields[wmi_process_created_process_creation_time] | |
| wmi_process.group_operation_id | additional.fields[wmi_process_group_operation_id] | |
| wmi_process.is_local | additional.fields[wmi_process_is_local] | |
| wmi_process.operation_id | additional.fields[wmi_process_operation_id] | 
Need more help? Get answers from Community members and Google SecOps professionals.

