Collect SentinelOne Alert logs
This document describes how you can collect SentinelOne Alert logs by setting up a Google Security Operations feed and how log fields map to Google SecOps Unified Data Model (UDM) fields.
For more information, see Data ingestion to Google Security Operations overview .
A typical deployment consists of SentinelOne Alert and the Google SecOps feed configured to send logs to Google SecOps. Each customer deployment can differ and might be more complex.
The deployment contains the following components:
-  SentinelOne: The product from which you collect logs. 
-  Google SecOps feed: The Google SecOps feed that fetches logs from SentinelOne and writes logs to Google SecOps. 
-  Google SecOps: Google SecOps retains and analyzes the logs from SentinelOne. 
An ingestion label identifies the parser which normalizes raw log data to
structured UDM format. The information in this document applies to the parser
with the SENTINELONE_ALERT 
ingestion label.
Before you begin
Make sure you have the following prerequisites:
- An active Singularity Complete subscription for SentinelOne. Refer to Platform Packages for additional details.
- GET Alerts and GET Threats API v2.1
- An Admin role for the Global or Account level. To get an Admin role, contact your administrator user.
- Administrator rights to install the SentinelOne agent. To get administrator rights, contact your administrator user.
How to set up SentinelOne:
To generate an API token, follow these steps: 1. In the SentinelOne management console, go to Settings, and then click Users. 1. Click the Admin userfor which you want to generate the API token. 1. Click Actions> API token operations> Generate API token. You need this API token to populate Authentication HTTP headersin the Google SecOps platform.
Set up feeds
There are two different entry points to set up feeds in the Google SecOps platform:
- SIEM Settings > Feeds > Add New Feed
- Content Hub > Content Packs > Get Started
How to set up the SentinelOne Alerts feed
- Click the SentinelOnepack.
- Locate the SentinelOne Alertslog type.
- Specify the values for the following fields: - Source Type: Third Party API (recommended)
- Authentication HTTP headers: Enter the API token you generated in the SentinelOne platform.
- API hostname: SentinelOne platform hostname
- Initial start time: Time to start fetching the alerts from
- Is alert API subscribed: Whether the alert AOI is subscribed to by the customer
 Advanced options 
- Feed Name: A prepopulated value that identifies the feed.
- Asset Namespace: Namespace associated with the feed.
- Ingestion Labels: Labels applied to all events from this feed.
- Click Create feed.
For more information about configuring multiple feeds for different log types within this product family, see Configure feeds by product .
Supported SentinelOne Alert log types
The SentinelOne Alert parser supports alert and threat log types.
Supported SentinelOne Alert log formats
The SentinelOne Alert parser supports logs in both JSON and CEF formats.
Supported SentinelOne Alert Sample Logs
-  JSON { "accountId": "1235512064263015539", "accountName": "dummy", "agentComputerName": "dummy", "agentDomain": "WORKGROUP", "agentId": "1245680559492378683", "agentInfected": false, "agentIp": "198.51.100.0", "agentIsActive": false, "agentIsDecommissioned": true, "agentMachineType": "server", "agentNetworkStatus": "disconnecting", "agentOsType": "windows", "agentVersion": "21.6.2.272", "annotation": "Automatically resolved by SentinelOne Console", "automaticallyResolved": true, "browserType": null, "certId": "", "classification": "Malware", "classificationSource": "Static", "classifierName": "MANUAL", "cloudVerdict": null, "collectionId": "1251555311751427932", "commandId": "1251555264615838432", "createdAt": "2022-09-03T19:36:59.540349Z", "createdDate": "2021-09-23T19:36:57.867000Z", "description": "malware detected - not mitigated yet (cmd.exe (interactive session))", "engines": [ "manual" ], "external_ticket_id": null, "fileContentHash": "c3d10d8d9fce936e5ca32f930f20c8e703619f71", "fileCreatedDate": null, "fileDisplayName": "Unknown file", "fileExtensionType": "None", "fileIsDotNet": null, "fileIsExecutable": false, "fileIsSystem": false, "fileMaliciousContent": null, "fileObjectId": "3EFA3EFA3EFA3EFA", "filePath": "/home/gitlab-runner/webshell_hits/old.hits-go-here/fedcd896ef45bf145d7e880edd4e5390.dll", "fileSha256": null, "fileVerificationType": "NotSigned", "fromCloud": false, "fromScan": false, "id": "1251555311717873499", "indicators": [ { "categoryName": "test Hiding/Stealthiness", "description": "This binary may have Anti-sandboxing capabilities to evade detection in sandbox tools", "id": 126 }, { "categoryName": "Hiding/Stealthiness", "description": "sample desc There are signs of a backdoor in the PE header", "id": 127 }, { "categoryName": "Test category name Hiding/Stealthiness", "description": "This binary might try to schedule a task or modify a scheduled task", "id": 129 } ], "initiatedBy": "dvCommand", "initiatedByDescription": "Deep Visibility Command", "initiatingUserId": "1245152494739966182", "isCertValid": false, "isInteractiveSession": true, "isPartialStory": false, "maliciousGroupId": "DEA2CA314B3AB7E4", "maliciousProcessArguments": "", "markedAsBenign": true, "mitigationMode": "protect", "mitigationReport": { "kill": { "status": "success" }, "network_quarantine": { "status": null }, "quarantine": { "status": "success" }, "remediate": { "status": null }, "rollback": { "status": null }, "unquarantine": { "status": null } }, "mitigationStatus": "mitigated", "publisher": "", "rank": null, "resolved": true, "siteId": "1235512064330124404", "siteName": "Default site", "threatAgentVersion": "21.6.2.272", "threatName": "cmd.exe (interactive session)", "updatedAt": "2021-10-23T20:34:15.668440Z", "username": "dummy\\\\Administrator", "whiteningOptions": [] }
-  CEF <86>Nov 5 11:53:06 abcdefg sshd[1475549]: reprocess config line 158: Deprecated option RhostsRSAAuthentication
Field mapping reference
This section explains how the Google SecOps parser maps SentinelOne Alert fields to Google SecOps Unified Data Model (UDM) fields.
Field mapping reference: Event Identifier to Event Type
The following table lists theSENTINELONE_ALERT 
log types and their corresponding UDM event types. | Event Identifier | Event Type | Security Category | 
|---|---|---|
| BEHAVIORALINDICATORS | SCAN_UNCATEGORIZED | SOFTWARE_MALICIOUS | 
| DNS | NETWORK_DNS |  | 
| DUPLICATEPROCESS | PROCESS_UNCATEGORIZED |  | 
| FILECREATION | FILE_CREATION |  | 
| FILEDELETION | FILE_DELETION |  | 
| FILEMODIFICATION | FILE_MODIFICATION |  | 
| FILERENAME | FILE_MODIFICATION |  | 
| FILESCAN | SCAN_FILE |  | 
| HTTP | NETWORK_HTTP |  | 
| MALICIOUSFILE | SCAN_FILE | SOFTWARE_MALICIOUS | 
| OPENPROCESS | PROCESS_OPEN |  | 
| PROCESSCREATION | PROCESS_LAUNCH |  | 
| REGKEYCREATE | REGISTRY_CREATION |  | 
| REGKEYDELETE | REGISTRY_DELETION |  | 
| REGVALUECREATE | REGISTRY_CREATION |  | 
| REGVALUEDELETE | REGISTRY_DELETION |  | 
| REGVALUEMODIFIED | REGISTRY_MODIFICATION |  | 
| SCHEDTASKSTART | SERVICE_START |  | 
| SCHEDTASKTRIGGER | SERVICE_START |  | 
| SCHEDTASKUPDATE | SERVICE_MODIFICATION |  | 
| SCRIPTS | FILE_UNCATEGORIZED |  | 
| TCPV4 | NETWORK_UNCATEGORIZED |  | 
| TCPV4LISTEN | NETWORK_UNCATEGORIZED |  | 
| WINLOGONATTEMPT | USER_LOGIN |  | 
|   
If the  threatInfo.filePathlog field is not 
empty or thethreatInfo.fileSizelog field value is not 
empty, then themetadata.event_typeUDM field is set toFILE_UNCATEGORIZED. | FILE_UNCATEGORIZED |  | 
Field mapping reference: SENTINELONE_ALERT
The following table lists the log fields of the SENTINELONE_ALERT 
log type and their corresponding UDM fields.
metadata.vendor_name 
metadata.product_name 
metadata.url_back_to_product 
threatInfo.threatId 
log field value is not 
empty and the source_hostname 
log field value is not 
empty, then the https://source_hostname/incidents/threats/threatInfo.threatId/overview 
log field is mapped to the metadata.url_back_to_product 
UDM field.Else, if the
source_hostname 
log field value is not 
empty, then the https://source_hostname 
log field is mapped to the metadata.url_back_to_product 
UDM field.agentDetectionInfo.machineType 
principal.asset.type 
agentDetectionInfo.machineType 
log field value matches the regular expression pattern laptop 
, then the principal.asset.type 
UDM field is set to LAPTOP 
.Else, if the
agentDetectionInfo.machineType 
log field value matches the regular expression pattern desktop 
, then the principal.asset.type 
UDM field is set to WORKSTATION 
.Else, if the
agentDetectionInfo.machineType 
log field value matches the regular expression pattern server 
, then the principal.asset.type 
UDM field is set to SERVER 
.Else, the
agentDetectionInfo.machineType 
log field is mapped to the principal.asset.attribute.labels.agent_detection_info_machine_type 
UDM field.agentRealtimeInfo.agentMachineType 
principal.asset.type 
agentDetectionInfo.machineType 
log field value is empty and the agentRealtimeInfo.agentMachineType 
log field value is not 
empty , then: - If the agentRealtimeInfo.agentMachineTypelog field value matches the regular expression patternlaptop, then theprincipal.asset.typeUDM field is set toLAPTOP.
- Else, if the agentRealtimeInfo.agentMachineTypelog field value matches the regular expression patterndesktop, then theprincipal.asset.typeUDM field is set toWORKSTATION.
- Else, if the agentRealtimeInfo.agentMachineTypelog field value matches the regular expression patternserver, then theprincipal.asset.typeUDM field is set toSERVER.
- Else, the agentRealtimeInfo.agentMachineTypelog field is mapped to theprincipal.asset.attribute.labels.agent_detection_info_machine_typeUDM field.
agentRealtimeInfo.machineType 
principal.asset.type 
agentDetectionInfo.machineType 
log field value is empty and the agentRealtimeInfo.agentMachineType 
log field value is empty and the agentRealtimeInfo.machineType 
log field value is not 
empty , then: - If the agentRealtimeInfo.machineTypelog field value matches the regular expression patternlaptop, then theprincipal.asset.typeUDM field is set toLAPTOP.
- Else, if the agentRealtimeInfo.machineTypelog field value matches the regular expression patterndesktop, then theprincipal.asset.typeUDM field is set toWORKSTATION.
- Else, if the agentRealtimeInfo.machineTypelog field value matches the regular expression patternserver, then theprincipal.asset.typeUDM field is set toSERVER.
- Else, the agentRealtimeInfo.machineTypelog field is mapped to theprincipal.asset.attribute.labels.agent_detection_info_machine_typeUDM field.
agentDetectionInfo.name 
principal.hostname 
agentDetectionInfo.name 
log field value is not 
empty, then the agentDetectionInfo.name 
log field is mapped to the principal.hostname 
UDM field.Else, if the
agentRealtimeInfo.agentComputerName 
log field value is not 
empty, then the agentRealtimeInfo.agentComputerName 
log field is mapped to the principal.hostname 
UDM field.Else, if the
agentRealtimeInfo.name 
log field value is not 
empty, then the agentRealtimeInfo.name 
log field is mapped to the principal.hostname 
UDM field.agentRealtimeInfo.agentComputerName 
principal.hostname 
agentDetectionInfo.name 
log field value is not 
empty, then the agentDetectionInfo.name 
log field is mapped to the principal.hostname 
UDM field.Else, if the
agentRealtimeInfo.agentComputerName 
log field value is not 
empty, then the agentRealtimeInfo.agentComputerName 
log field is mapped to the principal.hostname 
UDM field.Else, if the
agentRealtimeInfo.name 
log field value is not 
empty, then the agentRealtimeInfo.name 
log field is mapped to the principal.hostname 
UDM field.agentRealtimeInfo.name 
principal.hostname 
agentDetectionInfo.name 
log field value is not 
empty, then the agentDetectionInfo.name 
log field is mapped to the principal.hostname 
UDM field.Else, if the
agentRealtimeInfo.agentComputerName 
log field value is not 
empty, then the agentRealtimeInfo.agentComputerName 
log field is mapped to the principal.hostname 
UDM field.Else, if the
agentRealtimeInfo.name 
log field value is not 
empty, then the agentRealtimeInfo.name 
log field is mapped to the principal.hostname 
UDM field.agentDetectionInfo.name 
principal.asset.hostname 
agentDetectionInfo.name 
log field value is not 
empty, then the agentDetectionInfo.name 
log field is mapped to the principal.asset.hostname 
UDM field.Else, if the
agentRealtimeInfo.agentComputerName 
log field value is not 
empty, then the agentRealtimeInfo.agentComputerName 
log field is mapped to the principal.asset.hostname 
UDM field.Else, if the
agentRealtimeInfo.name 
log field value is not 
empty, then the agentRealtimeInfo.name 
log field is mapped to the principal.asset.hostname 
UDM field.agentRealtimeInfo.agentComputerName 
principal.asset.hostname 
agentDetectionInfo.name 
log field value is not 
empty, then the agentDetectionInfo.name 
log field is mapped to the principal.asset.hostname 
UDM field.Else, if the
agentRealtimeInfo.agentComputerName 
log field value is not 
empty, then the agentRealtimeInfo.agentComputerName 
log field is mapped to the principal.asset.hostname 
UDM field.Else, if the
agentRealtimeInfo.name 
log field value is not 
empty, then the agentRealtimeInfo.name 
log field is mapped to the principal.asset.hostname 
UDM field.agentRealtimeInfo.name 
principal.asset.hostname 
agentDetectionInfo.name 
log field value is not 
empty, then the agentDetectionInfo.name 
log field is mapped to the principal.asset.hostname 
UDM field.Else, if the
agentRealtimeInfo.agentComputerName 
log field value is not 
empty, then the agentRealtimeInfo.agentComputerName 
log field is mapped to the principal.asset.hostname 
UDM field.Else, if the
agentRealtimeInfo.name 
log field value is not 
empty, then the agentRealtimeInfo.name 
log field is mapped to the principal.asset.hostname 
UDM field.agentDetectionInfo.osFamily 
principal.asset.platform_software.platform 
agentDetectionInfo.osFamily 
log field value matches the regular expression pattern (?i)win 
, then the principal.asset.platform_software.platform 
UDM field is set to WINDOWS 
.Else, if the
agentDetectionInfo.osFamily 
log field value matches the regular expression pattern (?i)lin 
, then the principal.asset.platform_software.platform 
UDM field is set to LINUX 
.Else, the
agentDetectionInfo.osFamily 
log field is mapped to the principal.asset.attribute.labels.agent_detection_info_os_family 
UDM field.agentRealtimeInfo.os 
principal.asset.platform_software.platform 
agentDetectionInfo.osFamily 
log field value is empty and the agentRealtimeInfo.os 
log field value is not 
empty , then: - If the agentRealtimeInfo.oslog field value matches the regular expression pattern(?i)win, then theprincipal.asset.platform_software.platformUDM field is set toWINDOWS.
- Else, if the agentRealtimeInfo.oslog field value matches the regular expression pattern(?i)lin, then theprincipal.asset.platform_software.platformUDM field is set toLINUX.
- Else, the agentRealtimeInfo.oslog field is mapped to theprincipal.asset.attribute.labels.agent_detection_info_os_familyUDM field.
agentDetectionInfo.osFamily 
principal.platform 
agentDetectionInfo.osFamily 
log field value matches the regular expression pattern (?i)win 
, then the principal.platform 
UDM field is set to WINDOWS 
.Else, if the
agentDetectionInfo.osFamily 
log field value matches the regular expression pattern (?i)lin 
, then the principal.platform 
UDM field is set to LINUX 
agentRealtimeInfo.os 
principal.platform 
agentDetectionInfo.osFamily 
log field value is empty and the agentRealtimeInfo.os 
log field value is not 
empty , then: - If the agentRealtimeInfo.oslog field value matches the regular expression pattern(?i)win, then theprincipal.platformUDM field is set toWINDOWS.
- Else, if the agentRealtimeInfo.oslog field value matches the regular expression pattern(?i)lin, then theprincipal.platformUDM field is set toLINUX.
agentDetectionInfo.osName 
principal.asset.platform_software.platform_version 
agentDetectionInfo.osName 
log field value is not 
empty, then the agentDetectionInfo.osName 
log field is mapped to the principal.asset.platform_software.platform_version 
UDM field.Else, if the
agentDetectionInfo.agentOsName 
log field value is not 
empty, then the agentDetectionInfo.agentOsName 
log field is mapped to the principal.asset.platform_software.platform_version 
UDM field.Else, if the
agentRealtimeInfo.agentOsName 
log field value is not 
empty, then the agentRealtimeInfo.agentOsName 
log field is mapped to the principal.asset.platform_software.platform_version 
UDM field.agentDetectionInfo.agentOsName 
principal.asset.platform_software.platform_version 
agentDetectionInfo.osName 
log field value is not 
empty, then the agentDetectionInfo.osName 
log field is mapped to the principal.asset.platform_software.platform_version 
UDM field.Else, if the
agentDetectionInfo.agentOsName 
log field value is not 
empty, then the agentDetectionInfo.agentOsName 
log field is mapped to the principal.asset.platform_software.platform_version 
UDM field.Else, if the
agentRealtimeInfo.agentOsName 
log field value is not 
empty, then the agentRealtimeInfo.agentOsName 
log field is mapped to the principal.asset.platform_software.platform_version 
UDM field.agentRealtimeInfo.agentOsName 
principal.asset.platform_software.platform_version 
agentDetectionInfo.osName 
log field value is not 
empty, then the agentDetectionInfo.osName 
log field is mapped to the principal.asset.platform_software.platform_version 
UDM field.Else, if the
agentDetectionInfo.agentOsName 
log field value is not 
empty, then the agentDetectionInfo.agentOsName 
log field is mapped to the principal.asset.platform_software.platform_version 
UDM field.Else, if the
agentRealtimeInfo.agentOsName 
log field value is not 
empty, then the agentRealtimeInfo.agentOsName 
log field is mapped to the principal.asset.platform_software.platform_version 
UDM field.agentDetectionInfo.osRevision 
principal.asset.platform_software.platform_patch_level 
agentDetectionInfo.osRevision 
log field value is not 
empty, then the agentDetectionInfo.osRevision 
log field is mapped to the principal.asset.platform_software.platform_patch_level 
UDM field.Else, if the
agentDetectionInfo.agentOsRevision 
log field value is not 
empty, then the agentDetectionInfo.agentOsRevision 
log field is mapped to the principal.asset.platform_software.platform_patch_level 
UDM field.Else, if the
agentRealtimeInfo.agentOsRevision 
log field value is not 
empty, then the agentRealtimeInfo.agentOsRevision 
log field is mapped to the principal.asset.platform_software.platform_patch_level 
UDM field.agentDetectionInfo.agentOsRevision 
principal.asset.platform_software.platform_patch_level 
agentDetectionInfo.osRevision 
log field value is not 
empty, then the agentDetectionInfo.osRevision 
log field is mapped to the principal.asset.platform_software.platform_patch_level 
UDM field.Else, if the
agentDetectionInfo.agentOsRevision 
log field value is not 
empty, then the agentDetectionInfo.agentOsRevision 
log field is mapped to the principal.asset.platform_software.platform_patch_level 
UDM field.Else, if the
agentRealtimeInfo.agentOsRevision 
log field value is not 
empty, then the agentRealtimeInfo.agentOsRevision 
log field is mapped to the principal.asset.platform_software.platform_patch_level 
UDM field.agentRealtimeInfo.agentOsRevision 
principal.asset.platform_software.platform_patch_level 
agentDetectionInfo.osRevision 
log field value is not 
empty, then the agentDetectionInfo.osRevision 
log field is mapped to the principal.asset.platform_software.platform_patch_level 
UDM field.Else, if the
agentDetectionInfo.agentOsRevision 
log field value is not 
empty, then the agentDetectionInfo.agentOsRevision 
log field is mapped to the principal.asset.platform_software.platform_patch_level 
UDM field.Else, if the
agentRealtimeInfo.agentOsRevision 
log field value is not 
empty, then the agentRealtimeInfo.agentOsRevision 
log field is mapped to the principal.asset.platform_software.platform_patch_level 
UDM field.agentDetectionInfo.siteId 
principal.labels[agent_detection_info_siteId] 
(deprecated)agentDetectionInfo.siteId 
additional.fields[agent_detection_info_siteId] 
agentDetectionInfo.uuid 
principal.asset_id 
agentDetectionInfo.uuid 
log field value is not 
empty, then the SentinelOne:%{agentDetectionInfo.uuid} 
log field is mapped to the principal.asset_id 
UDM field.Else, if the
agentDetectionInfo.agentUuid 
log field value is not 
empty, then the SentinelOne:%{agentDetectionInfo.agentUuid} 
log field is mapped to the principal.asset_id 
UDM field.Else, if the
agentRealtimeInfo.uuid 
log field value is not 
empty, then the SentinelOne:%{agentRealtimeInfo.uuid} 
log field is mapped to the principal.asset_id 
UDM field.Else, if the
agentRealtimeInfo.agentUuid 
log field value is not 
empty, then the SentinelOne:%{agentRealtimeInfo.agentUuid} 
log field is mapped to the principal.asset_id 
UDM field.agentDetectionInfo.agentUuid 
principal.asset_id 
agentDetectionInfo.uuid 
log field value is not 
empty, then the SentinelOne:%{agentDetectionInfo.uuid} 
log field is mapped to the principal.asset_id 
UDM field.Else, if the
agentDetectionInfo.agentUuid 
log field value is not 
empty, then the SentinelOne:%{agentDetectionInfo.agentUuid} 
log field is mapped to the principal.asset_id 
UDM field.Else, if the
agentRealtimeInfo.uuid 
log field value is not 
empty, then the SentinelOne:%{agentRealtimeInfo.uuid} 
log field is mapped to the principal.asset_id 
UDM field.Else, if the
agentRealtimeInfo.agentUuid 
log field value is not 
empty, then the SentinelOne:%{agentRealtimeInfo.agentUuid} 
log field is mapped to the principal.asset_id 
UDM field.agentRealtimeInfo.uuid 
principal.asset_id 
agentDetectionInfo.uuid 
log field value is not 
empty, then the SentinelOne:%{agentDetectionInfo.uuid} 
log field is mapped to the principal.asset_id 
UDM field.Else, if the
agentDetectionInfo.agentUuid 
log field value is not 
empty, then the SentinelOne:%{agentDetectionInfo.agentUuid} 
log field is mapped to the principal.asset_id 
UDM field.Else, if the
agentRealtimeInfo.uuid 
log field value is not 
empty, then the SentinelOne:%{agentRealtimeInfo.uuid} 
log field is mapped to the principal.asset_id 
UDM field.Else, if the
agentRealtimeInfo.agentUuid 
log field value is not 
empty, then the SentinelOne:%{agentRealtimeInfo.agentUuid} 
log field is mapped to the principal.asset_id 
UDM field.agentRealtimeInfo.agentUuid 
principal.asset_id 
agentDetectionInfo.uuid 
log field value is not 
empty, then the SentinelOne:%{agentDetectionInfo.uuid} 
log field is mapped to the principal.asset_id 
UDM field.Else, if the
agentDetectionInfo.agentUuid 
log field value is not 
empty, then the SentinelOne:%{agentDetectionInfo.agentUuid} 
log field is mapped to the principal.asset_id 
UDM field.Else, if the
agentRealtimeInfo.uuid 
log field value is not 
empty, then the SentinelOne:%{agentRealtimeInfo.uuid} 
log field is mapped to the principal.asset_id 
UDM field.Else, if the
agentRealtimeInfo.agentUuid 
log field value is not 
empty, then the SentinelOne:%{agentRealtimeInfo.agentUuid} 
log field is mapped to the principal.asset_id 
UDM field.agentDetectionInfo.uuid 
principal.asset.asset_id 
agentDetectionInfo.uuid 
log field value is not 
empty, then the SentinelOne:%{agentDetectionInfo.uuid} 
log field is mapped to the principal.asset.asset_id 
UDM field.Else, if the
agentDetectionInfo.agentUuid 
log field value is not 
empty, then the SentinelOne:%{agentDetectionInfo.agentUuid} 
log field is mapped to the principal.asset.asset_id 
UDM field.Else, if the
agentRealtimeInfo.uuid 
log field value is not 
empty, then the SentinelOne:%{agentRealtimeInfo.uuid} 
log field is mapped to the principal.asset.asset_id 
UDM field.Else, if the
agentRealtimeInfo.agentUuid 
log field value is not 
empty, then the SentinelOne:%{agentRealtimeInfo.agentUuid} 
log field is mapped to the principal.asset.asset_id 
UDM field.agentDetectionInfo.agentUuid 
principal.asset.asset_id 
agentDetectionInfo.uuid 
log field value is not 
empty, then the SentinelOne:%{agentDetectionInfo.uuid} 
log field is mapped to the principal.asset.asset_id 
UDM field.Else, if the
agentDetectionInfo.agentUuid 
log field value is not 
empty, then the SentinelOne:%{agentDetectionInfo.agentUuid} 
log field is mapped to the principal.asset.asset_id 
UDM field.Else, if the
agentRealtimeInfo.uuid 
log field value is not 
empty, then the SentinelOne:%{agentRealtimeInfo.uuid} 
log field is mapped to the principal.asset.asset_id 
UDM field.Else, if the
agentRealtimeInfo.agentUuid 
log field value is not 
empty, then the SentinelOne:%{agentRealtimeInfo.agentUuid} 
log field is mapped to the principal.asset.asset_id 
UDM field.agentRealtimeInfo.uuid 
principal.asset.asset_id 
agentDetectionInfo.uuid 
log field value is not 
empty, then the SentinelOne:%{agentDetectionInfo.uuid} 
log field is mapped to the principal.asset.asset_id 
UDM field.Else, if the
agentDetectionInfo.agentUuid 
log field value is not 
empty, then the SentinelOne:%{agentDetectionInfo.agentUuid} 
log field is mapped to the principal.asset.asset_id 
UDM field.Else, if the
agentRealtimeInfo.uuid 
log field value is not 
empty, then the SentinelOne:%{agentRealtimeInfo.uuid} 
log field is mapped to the principal.asset.asset_id 
UDM field.Else, if the
agentRealtimeInfo.agentUuid 
log field value is not 
empty, then the SentinelOne:%{agentRealtimeInfo.agentUuid} 
log field is mapped to the principal.asset.asset_id 
UDM field.agentRealtimeInfo.agentUuid 
principal.asset.asset_id 
agentDetectionInfo.uuid 
log field value is not 
empty, then the SentinelOne:%{agentDetectionInfo.uuid} 
log field is mapped to the principal.asset.asset_id 
UDM field.Else, if the
agentDetectionInfo.agentUuid 
log field value is not 
empty, then the SentinelOne:%{agentDetectionInfo.agentUuid} 
log field is mapped to the principal.asset.asset_id 
UDM field.Else, if the
agentRealtimeInfo.uuid 
log field value is not 
empty, then the SentinelOne:%{agentRealtimeInfo.uuid} 
log field is mapped to the principal.asset.asset_id 
UDM field.Else, if the
agentRealtimeInfo.agentUuid 
log field value is not 
empty, then the SentinelOne:%{agentRealtimeInfo.agentUuid} 
log field is mapped to the principal.asset.asset_id 
UDM field.agentDetectionInfo.version 
principal.asset.attribute.labels[agent_version] 
agentDetectionInfo.agentVersion 
principal.asset.attribute.labels[agent_detection_info_agent_version] 
agentRealtimeInfo.agentVersion 
principal.asset.attribute.labels[agent_realtime_info_agent_version] 
agentRealtimeInfo.id 
principal.asset.attribute.labels[agent_realtime_info_id] 
agentRealtimeInfo.infected 
principal.asset.attribute.labels[agent_realtime_info_infected] 
agentRealtimeInfo.agentInfected 
principal.asset.attribute.labels[agent_realtime_info_infected] 
agentRealtimeInfo.isActive 
principal.asset.attribute.labels[agent_realtime_info_is_active] 
agentRealtimeInfo.agentIsActive 
principal.asset.attribute.labels[agent_realtime_info_is_active] 
agentRealtimeInfo.isDecommissioned 
principal.asset.attribute.labels[agent_realtime_info_is_decommissioned] 
agentRealtimeInfo.agentIsDecommissioned 
principal.asset.attribute.labels[agent_realtime_info_is_decommissioned] 
alertInfo.alertId 
metadata.product_log_id 
id 
metadata.product_log_id 
metadata.product_event_type 
alertInfo 
, then the metadata.product_event_type 
UDM field is set to Alerts 
.Else, if the log matches the regular expression pattern
threatInfo 
, then the metadata.product_event_type 
UDM field is set to Threats 
.alertInfo.analystVerdict 
security_result.detection_fields[alert_info_analyst_verdict] 
alertInfo.createdAt 
metadata.event_timestamp 
alertInfo.createdAt 
log field value is not 
empty, then the alertInfo.createdAt 
log field is mapped to the metadata.event_timestamp 
UDM field.Else, if the
threatInfo.identifiedAt 
log field value is not 
empty, then the threatInfo.identifiedAt 
log field is mapped to the metadata.event_timestamp 
UDM field.threatInfo.identifiedAt 
metadata.event_timestamp 
alertInfo.createdAt 
log field value is not 
empty, then the alertInfo.createdAt 
log field is mapped to the metadata.event_timestamp 
UDM field.Else, if the
threatInfo.identifiedAt 
log field value is not 
empty, then the threatInfo.identifiedAt 
log field is mapped to the metadata.event_timestamp 
UDM field.network.application_protocol 
alertInfo.dnsRequest 
log field value is not 
empty, then the network.application_protocol 
UDM field is set to DNS 
.alertInfo.dnsRequest 
network.dns.questions.name 
alertInfo.dnsResponse 
network.dns.answers.name 
alertInfo.dstIp 
target.ip 
alertInfo.dstPort 
target.port 
alertInfo.dvEventId 
security_result.detection_fields[alert_info_dv_event_id] 
alertInfo.eventType 
security_result.detection_fields[alert_info_event_type] 
alertInfo.hitType 
security_result.detection_fields[alert_info_hit_type] 
alertInfo.incidentStatus 
security_result.detection_fields[alert_info_incident_status] 
alertInfo.indicatorCategory 
security_result.detection_fields[alert_info_indicator_category] 
alertInfo.indicatorDescription 
security_result.detection_fields[alert_info_indicator_description] 
alertInfo.indicatorName 
security_result.detection_fields[alert_info_indicator_name] 
alertInfo.isEdr 
security_result.detection_fields[alert_info_is_edr] 
alertInfo.loginAccountDomain 
security_result.detection_fields[alert_info_login_account_domain] 
alertInfo.loginAccountSid 
security_result.detection_fields[alert_info_login_account_sid] 
alertInfo.loginIsAdministratorEquivalent 
security_result.detection_fields[alert_info_login_is_administrator_equivalent] 
security_result.action 
alertInfo.loginIsSuccessful 
log field value is equal to true 
, then the security_result.action 
UDM field is set to ALLOW 
. else the alertInfo.loginIsSuccessful 
log field value is equal to false 
, then the security_result.action 
UDM field is set to BLOCK 
.If the
threatInfo.mitigationStatus 
log field value contain one of the following values, then the security_result.action 
UDM field is set to BLOCK 
. -  mitigated
-  marked_as_benign
-  blocked
-  suspicious_resolved
threatInfo.mitigationStatus 
log field value contain one of the following values, then the security_result.action 
UDM field is set to ALLOW 
. -  active
-  suspicious
-  pending
-  not_mitigated
extensions.auth.mechanism 
alertInfo.loginType 
log field value is equal to NETWORK 
, then the extensions.auth.mechanism 
UDM field is set to NETWORK 
.Else, if the
alertInfo.loginType 
log field value is equal to SYSTEM 
, then the extensions.auth.mechanism 
UDM field is set to LOCAL 
.Else, if the
alertInfo.loginType 
log field value is equal to INTERACTIVE 
, then the extensions.auth.mechanism 
UDM field is set to INTERACTIVE 
.Else, if the
alertInfo.loginType 
log field value is equal to BATCH 
, then the extensions.auth.mechanism 
UDM field is set to BATCH 
.Else, if the
alertInfo.loginType 
log field value is equal to SERVICE 
, then the extensions.auth.mechanism 
UDM field is set to SERVICE 
.Else, if the
alertInfo.loginType 
log field value is equal to UNLOCK 
, then the extensions.auth.mechanism 
UDM field is set to UNLOCK 
.Else, if the
alertInfo.loginType 
log field value is equal to NETWORK_CLEAR_TEXT 
, then the extensions.auth.mechanism 
UDM field is set to NETWORK_CLEAR_TEXT 
.Else, if the
alertInfo.loginType 
log field value is equal to NEW_CREDENTIALS 
, then the extensions.auth.mechanism 
UDM field is set to NEW_CREDENTIALS 
.Else, if the
alertInfo.loginType 
log field value is equal to REMOTE_INTERACTIVE 
, then the extensions.auth.mechanism 
UDM field is set to REMOTE_INTERACTIVE 
.Else, if the
alertInfo.loginType 
log field value is equal to CACHED_INTERACTIVE 
, then the extensions.auth.mechanism 
UDM field is set to CACHED_INTERACTIVE 
.Else, if the
alertInfo.loginType 
log field value is equal to CACHED_REMOTE_INTERACTIVE 
, then the extensions.auth.mechanism 
UDM field is set to CACHED_REMOTE_INTERACTIVE 
.Else, if the
alertInfo.loginType 
log field value is equal to CACHED_UNLOCK 
, then the extensions.auth.mechanism 
UDM field is set to CACHED_UNLOCK 
.alertInfo.loginsUserName 
target.user.user_display_name 
alertInfo.modulePath 
security_result.detection_fields[alert_info_module_path] 
alertInfo.moduleSha1 
security_result.detection_fields[alert_info_module_sha1] 
alertInfo.netEventDirection 
network.direction 
alertInfo.netEventDirection 
log field value matches the regular expression pattern OUTGOING 
, then the network.direction 
UDM field is set to OUTBOUND 
.Else, if the
alertInfo.netEventDirection 
log field value matches the regular expression pattern INCOMING 
, then the network.direction 
UDM field is set to INBOUND 
.alertInfo.registryKeyPath 
target.registry.registry_key 
alertInfo.registryOldValue 
src.registry.registry_value_data 
alertInfo.registryOldValueType 
src.registry.registry_value_name 
alertInfo.registryPath 
src.registry.registry_key 
alertInfo.registryValue 
target.registry.registry_value_data 
alertInfo.reportedAt 
security_result.first_discovered_time 
alertInfo.source 
security_result.category_details 
alertInfo.srcPort 
principal.port 
alertInfo.tiIndicatorComparisonMethod 
security_result.detection_fields[alert_info_tiIndicator_comparison_method] 
alertInfo.tiIndicatorSource 
security_result.detection_fields[alert_info_tiIndicator_source] 
alertInfo.tiIndicatorType 
security_result.detection_fields[alert_info_tiIndicator_type] 
alertInfo.tiIndicatorValue 
security_result.detection_fields[alert_info_tiIndicator_value] 
alertInfo.updatedAt 
security_result.detection_fields[alert_info_updated_at] 
containerInfo.id 
target.resource.product_object_id 
containerInfo.image 
target.resource.attribute.labels[container_image] 
containerInfo.labels 
target.resource.attribute.labels[container_labels] 
containerInfo.labels 
log field value is not 
empty, then the containerInfo.labels 
log field is mapped to the target.resource.attribute.labels.container_labels 
UDM field.containerInfo.name 
target.resource.name 
target.resource.resource_type 
containerInfo.name 
log field value is not 
empty, then the target.resource.resource_type 
UDM field is set to CONTAINER 
.kubernetesInfo.cluster 
target.resource_ancestors.name 
kubernetesInfo.controllerName 
target.resource_ancestors.name 
kubernetesInfo.node 
target.resource_ancestors.name 
kubernetesInfo.pod 
target.resource_ancestors.name 
target.resource_ancestors.resource_type 
kubernetesInfo.pod 
log field value is not 
empty, then the target.resource_ancestors.resource_type 
UDM field is set to POD 
.If the
kubernetesInfo.cluster 
log field value is not 
empty, then the target.resource_ancestors.resource_type 
UDM field is set to CLUSTER 
.If the
kubernetesInfo.isContainerQuarantine 
log field value is not 
empty, then the target.resource_ancestors.resource_type 
UDM field is set to CLUSTER 
.If the
kubernetesInfo.controllerName 
log field value is not 
empty, then the target.resource_ancestors.resource_type 
UDM field is set to CLUSTER 
.If the
kubernetesInfo.node 
log field value is not 
empty, then the target.resource_ancestors.resource_type 
UDM field is set to CLUSTER 
.kubernetesInfo.controllerKind 
target.resource_ancestors.attribute.labels[kubernetes_controller_kind] 
kubernetesInfo.controllerLabels 
target.resource_ancestors.attribute.labels[kubernetes_controller_labels] 
kubernetesInfo.controllerLabels 
log field value is not 
empty, then the kubernetesInfo.controllerLabels 
log field is mapped to the target.resource_ancestors.attribute.labels.kubernetes_controller_labels 
UDM field.kubernetesInfo.namespace 
target.resource_ancestors.attribute.labels[kubernetes_namespace] 
kubernetesInfo.namespaceLabels 
target.resource_ancestors.attribute.labels[kubernetes_namespace_labels] 
kubernetesInfo.podLabels 
target.resource_ancestors.attribute.labels[kubernetes_pod_labels] 
kubernetesInfo.podLabels 
log field value is not 
empty, then the kubernetesInfo.podLabels 
log field is mapped to the target.resource_ancestors.attribute.labels.kubernetes_pod_labels 
UDM field.ruleInfo.description 
security_result.rule_set_display_name 
ruleInfo.id 
security_result.rule_id 
ruleInfo.name 
security_result.rule_name 
ruleInfo.queryLang 
security_result.rule_labels[query_lang] 
ruleInfo.queryType 
security_result.rule_labels[query_type] 
ruleInfo.s1ql 
security_result.rule_labels[s1ql] 
ruleInfo.scopeLevel 
security_result.rule_labels[scope_level] 
security_result.severity 
ruleInfo.severity 
log field value matches the regular expression pattern (?i)low 
, then the security_result.severity 
UDM field is set to LOW 
.Else, if the
ruleInfo.severity 
log field value matches the regular expression pattern (?i)medium 
, then the security_result.severity 
UDM field is set to MEDIUM 
.Else, if the
ruleInfo.severity 
log field value matches the regular expression pattern (?i)critical 
, then the security_result.severity 
UDM field is set to CRITICAL 
.Else, if the
ruleInfo.severity 
log field value matches the regular expression pattern (?i)high 
, then the security_result.severity 
UDM field is set to HIGH 
.ruleInfo.severity 
security_result.severity_details 
ruleInfo.treatAsThreat 
security_result.rule_type 
sourceParentProcessInfo.commandline 
principal.process.parent_process.command_line 
sourceParentProcessInfo.fileHashMd5 
principal.process.parent_process.file.md5 
sourceParentProcessInfo.fileHashMd5 
log field value matches the regular expression pattern ^[a-f0-9]{32}$ 
, then the sourceParentProcessInfo.fileHashMd5 
log field is mapped to the principal.process.parent_process.file.md5 
UDM field.sourceParentProcessInfo.fileHashSha1 
principal.process.parent_process.file.sha1 
sourceParentProcessInfo.fileHashSha1 
log field value matches the regular expression pattern ^[a-f0-9]{40}$ 
, then the sourceParentProcessInfo.fileHashSha1 
log field is mapped to the principal.process.parent_process.file.sha1 
UDM field.sourceParentProcessInfo.fileHashSha256 
principal.process.parent_process.file.sha256 
sourceParentProcessInfo.fileHashSha256 
log field value matches the regular expression pattern ^[a-f0-9]{64}$ 
, then the sourceParentProcessInfo.fileHashSha256 
log field is mapped to the principal.process.parent_process.file.sha256 
UDM field.sourceParentProcessInfo.filePath 
principal.process.parent_process.file.full_path 
sourceParentProcessInfo.fileSignerIdentity 
principal.process.parent_process.file.signature_info.sigcheck.signers.name 
sourceParentProcessInfo.integrityLevel 
principal.labels[source_parent_process_integrity_level] 
(deprecated)sourceParentProcessInfo.integrityLevel 
additional.fields[source_parent_process_integrity_level] 
sourceParentProcessInfo.name 
principal.labels[source_parent_process_name] 
(deprecated)sourceParentProcessInfo.name 
additional.fields[source_parent_process_name] 
sourceParentProcessInfo.pid 
principal.process.parent_process.pid 
sourceParentProcessInfo.pidStarttime 
principal.labels[source_parent_process_pid_start_time] 
(deprecated)sourceParentProcessInfo.pidStarttime 
additional.fields[source_parent_process_pid_start_time] 
sourceParentProcessInfo.storyline 
principal.labels[source_parent_process_storyline] 
(deprecated)sourceParentProcessInfo.storyline 
additional.fields[source_parent_process_storyline] 
sourceParentProcessInfo.subsystem 
principal.labels[source_parent_process_subsystem] 
(deprecated)sourceParentProcessInfo.subsystem 
additional.fields[source_parent_process_subsystem] 
principal.process.parent_process.product_specific_process_id 
sourceParentProcessInfo.uniqueId 
log field value is not 
empty, then the SO:%{agentDetectionInfo.siteId}:%{agentDetectionInfo.accountId}:%{agentDetectionInfo.uuid}:%{sourceParentProcessInfo.uniqueId} 
log field is mapped to the principal.process.parent_process.product_specific_process_id 
UDM field.sourceParentProcessInfo.user 
principal.labels[source_parent_process_user] 
(deprecated)sourceParentProcessInfo.user 
additional.fields[source_parent_process_user] 
sourceProcessInfo.commandline 
principal.process.command_line 
sourceProcessInfo.fileHashMd5 
principal.process.file.md5 
sourceProcessInfo.fileHashMd5 
log field value matches the regular expression pattern ^[a-f0-9]{32}$ 
, then the sourceProcessInfo.fileHashMd5 
log field is mapped to the principal.process.file.md5 
UDM field.sourceProcessInfo.fileHashSha1 
principal.process.file.sha1 
sourceProcessInfo.fileHashSha1 
log field value matches the regular expression pattern ^[a-f0-9]{40}$ 
, then the sourceProcessInfo.fileHashSha1 
log field is mapped to the principal.process.file.sha1 
UDM field.sourceProcessInfo.fileHashSha256 
principal.process.file.sha256 
sourceProcessInfo.fileHashSha256 
log field value matches the regular expression pattern ^[a-f0-9]{64}$ 
, then the sourceProcessInfo.fileHashSha256 
log field is mapped to the principal.process.file.sha256 
UDM field.sourceProcessInfo.filePath 
principal.process.file.full_path 
sourceProcessInfo.fileSignerIdentity 
principal.process.file.signature_info.sigcheck.signers.name 
sourceProcessInfo.integrityLevel 
principal.labels[source_process_integrity_level] 
(deprecated)sourceProcessInfo.integrityLevel 
additional.fields[source_process_integrity_level] 
sourceProcessInfo.name 
principal.labels[source_process_name] 
(deprecated)sourceProcessInfo.name 
additional.fields[source_process_name] 
sourceProcessInfo.pid 
principal.process.pid 
sourceProcessInfo.pidStarttime 
principal.labels[source_process_pid_start_time] 
(deprecated)sourceProcessInfo.pidStarttime 
additional.fields[source_process_pid_start_time] 
sourceProcessInfo.storyline 
principal.labels[source_process_storyline] 
(deprecated)sourceProcessInfo.storyline 
additional.fields[source_process_storyline] 
sourceProcessInfo.subsystem 
principal.labels[source_process_subsystem] 
(deprecated)sourceProcessInfo.subsystem 
additional.fields[source_process_subsystem] 
principal.process.product_specific_process_id 
sourceProcessInfo.uniqueId 
log field value is not 
empty, then the SO:%{agentDetectionInfo.siteId}:%{agentDetectionInfo.accountId}:%{agentDetectionInfo.uuid}:%{sourceProcessInfo.uniqueId} 
log field is mapped to the principal.process.product_specific_process_id 
UDM field.sourceProcessInfo.user 
principal.user.user_display_name 
threatInfo.initiatingUsername 
principal.user.user_display_name 
targetProcessInfo.tgtFileCreatedAt 
target.process.file.first_seen_time 
targetProcessInfo.tgtFileHashSha1 
target.process.file.sha1 
targetProcessInfo.tgtFileHashSha1 
log field value matches the regular expression pattern ^[a-f0-9]{40}$ 
, then the targetProcessInfo.tgtFileHashSha1 
log field is mapped to the target.process.file.sha1 
UDM field.targetProcessInfo.tgtFileHashSha256 
target.process.file.sha256 
targetProcessInfo.tgtFileHashSha256 
log field value matches the regular expression pattern ^[a-f0-9]{64}$ 
, then the targetProcessInfo.tgtFileHashSha256 
log field is mapped to the target.process.file.sha256 
UDM field.targetProcessInfo.tgtFileId 
target.labels[target_file_id] 
(deprecated)targetProcessInfo.tgtFileId 
additional.fields[target_file_id] 
targetProcessInfo.tgtFileIsSigned 
target.process.file.signature_info.sigcheck.verification_message 
targetProcessInfo.tgtFileModifiedAt 
target.process.file.last_modification_time 
targetProcessInfo.tgtFileOldPath 
target.labels[target_file_old_path] 
(deprecated)targetProcessInfo.tgtFileOldPath 
additional.fields[target_file_old_path] 
targetProcessInfo.tgtFilePath 
target.process.file.full_path 
targetProcessInfo.tgtProcCmdLine 
target.process.command_line 
targetProcessInfo.tgtProcImagePath 
target.labels[target_process_image_path] 
(deprecated)targetProcessInfo.tgtProcImagePath 
additional.fields[target_process_image_path] 
targetProcessInfo.tgtProcIntegrityLevel 
target.labels[target_process_integrity_level] 
(deprecated)targetProcessInfo.tgtProcIntegrityLevel 
additional.fields[target_process_integrity_level] 
targetProcessInfo.tgtProcName 
target.labels[target_process_name] 
(deprecated)targetProcessInfo.tgtProcName 
additional.fields[target_process_name] 
targetProcessInfo.tgtProcPid 
target.process.pid 
targetProcessInfo.tgtProcSignedStatus 
target.labels[target_process_signed_status] 
(deprecated)targetProcessInfo.tgtProcSignedStatus 
additional.fields[target_process_signed_status] 
targetProcessInfo.tgtProcStorylineId 
target.labels[target_process_storyline_id] 
(deprecated)targetProcessInfo.tgtProcStorylineId 
additional.fields[target_process_storyline_id] 
target.process.product_specific_process_id 
targetProcessInfo.tgtProcUid 
log field value is not 
empty, then the SO:%{agentDetectionInfo.siteId}:%{agentDetectionInfo.accountId}:%{agentDetectionInfo.uuid}:%{targetProcessInfo.tgtProcUid} 
log field is mapped to the target.process.product_specific_process_id 
UDM field.targetProcessInfo.tgtProcessStartTime 
target.labels[target_process_start_time] 
(deprecated)targetProcessInfo.tgtProcessStartTime 
additional.fields[target_process_start_time] 
source_hostname 
intermediary.hostname 
agentDetectionInfo.accountId 
metadata.product_deployment_id 
agentDetectionInfo.accountName 
principal.labels[agent_detection_info_account_name] 
(deprecated)agentDetectionInfo.accountName 
additional.fields[agent_detection_info_account_name] 
agentDetectionInfo.agentDetectionState 
principal.asset.attribute.labels[agent_detection_info_detection_state] 
agentDetectionInfo.agentDomain 
principal.administrative_domain 
agentDetectionInfo.agentIpV4 
principal.ip 
agentDetectionInfo.agentIpV6 
principal.ip 
alertInfo.srcIp 
principal.ip 
alertInfo.srcMachineIp 
principal.ip 
agentDetectionInfo.agentIpV4 
principal.asset.ip 
agentDetectionInfo.agentIpV6 
principal.asset.ip 
alertInfo.srcIp 
principal.asset.ip 
alertInfo.srcMachineIp 
principal.asset.ip 
agentDetectionInfo.agentLastLoggedInUpn 
principal.labels[agent_detection_info_last_logged_in_upn] 
(deprecated)agentDetectionInfo.agentLastLoggedInUpn 
additional.fields[agent_detection_info_last_logged_in_upn] 
agentDetectionInfo.agentLastLoggedInUserMail 
principal.user.email_addresses 
agentDetectionInfo.agentLastLoggedInUserName 
principal.user.attribute.labels[agent_last_loggedIn_user_name] 
agentDetectionInfo.agentMitigationMode 
principal.asset.attribute.labels[agent_detection_info_mitigation_mode] 
agentDetectionInfo.agentRegisteredAt 
principal.asset.first_discover_time 
agentDetectionInfo.externalIp 
principal.nat_ip 
agentDetectionInfo.groupId 
principal.group.attribute.labels[agent_detection_info_group_id] 
agentRealtimeInfo.groupId 
principal.group.attribute.labels[agent_realtime_info_group_id] 
agentDetectionInfo.groupName 
principal.group.group_display_name 
agentDetectionInfo.groupName 
log field value is not 
empty, then the agentDetectionInfo.groupName 
log field is mapped to the principal.group.group_display_name 
UDM field.If the
agentDetectionInfo.groupName 
log field value is empty and the agentRealtimeInfo.groupName 
log field value is not 
empty, then the agentRealtimeInfo.groupName 
log field is mapped to the principal.group.group_display_name 
UDM field.Else, the
agentRealtimeInfo.groupName 
log field is mapped to the principal.group.attribute.labels.agent_realtime_info_group_name 
UDM field.agentRealtimeInfo.groupName 
principal.group.group_display_name 
agentDetectionInfo.groupName 
log field value is not 
empty, then the agentDetectionInfo.groupName 
log field is mapped to the principal.group.group_display_name 
UDM field.If the
agentDetectionInfo.groupName 
log field value is empty and the agentRealtimeInfo.groupName 
log field value is not 
empty, then the agentRealtimeInfo.groupName 
log field is mapped to the principal.group.group_display_name 
UDM field.Else, the
agentRealtimeInfo.groupName 
log field is mapped to the principal.group.attribute.labels.agent_realtime_info_group_name 
UDM field.agentDetectionInfo.siteName 
principal.labels[agent_detection_info_site_name] 
(deprecated)agentDetectionInfo.siteName 
additional.fields[agent_detection_info_site_name] 
agentRealtimeInfo.siteName 
principal.labels[agent_realtime_info_site_name] 
(deprecated)agentRealtimeInfo.siteName 
additional.fields[agent_realtime_info_site_name] 
agentRealtimeInfo.accountId 
principal.labels[agent_realtime_info_account_id] 
(deprecated)agentRealtimeInfo.accountId 
additional.fields[agent_realtime_info_account_id] 
agentRealtimeInfo.accountName 
principal.labels[agent_realtime_info_account_name] 
(deprecated)agentRealtimeInfo.accountName 
additional.fields[agent_realtime_info_account_name] 
agentRealtimeInfo.activeThreats 
security_result.detection_fields[agent_realtime_info_active_threats] 
agentRealtimeInfo.agentDecommissionedAt 
principal.asset.attribute.labels[agent_realtime_info_agent_decommissioned_at] 
agentRealtimeInfo.agentDomain 
principal.labels[agent_realtime_info_domain] 
(deprecated)agentRealtimeInfo.agentDomain 
additional.fields[agent_realtime_info_domain] 
agentRealtimeInfo.agentId 
principal.asset.attribute.labels[agent_realtime_info_agent_id] 
agentRealtimeInfo.agentMitigationMode 
principal.asset.attribute.labels[agent_realtime_info_mitigation_mode] 
agentRealtimeInfo.agentNetworkStatus 
principal.labels[agent_realtime_info_network_status] 
(deprecated)agentRealtimeInfo.agentNetworkStatus 
additional.fields[agent_realtime_info_network_status] 
agentRealtimeInfo.agentOsType 
principal.labels[agent_realtime_info_os_type] 
(deprecated)agentRealtimeInfo.agentOsType 
additional.fields[agent_realtime_info_os_type] 
agentRealtimeInfo.networkInterfaces.id 
principal.labels[network_interface_id] 
agentRealtimeInfo.networkInterfaces.name 
principal.labels[network_interface_name] 
agentRealtimeInfo.networkInterfaces.physical 
principal.labels[network_interface_physical] 
agentRealtimeInfo.operationalState 
principal.asset.attribute.labels[agent_realtime_info_operational_State] 
agentRealtimeInfo.rebootRequired 
principal.labels[agent_realtime_info_reboot_required] 
(deprecated)agentRealtimeInfo.rebootRequired 
additional.fields[agent_realtime_info_reboot_required] 
agentRealtimeInfo.scanAbortedAt 
security_result.detection_fields[agent_realtime_info_scan_aborted_at] 
agentRealtimeInfo.scanFinishedAt 
security_result.detection_fields[agent_realtime_info_scan_finished_at] 
agentRealtimeInfo.scanStartedAt 
security_result.detection_fields[agent_realtime_info_scan_started_at] 
agentRealtimeInfo.scanStatus 
security_result.detection_fields[agent_realtime_info_scan_status] 
agentRealtimeInfo.siteId 
principal.labels[agent_realtime_info_site_id] 
(deprecated)agentRealtimeInfo.siteId 
additional.fields[agent_realtime_info_site_id] 
agentRealtimeInfo.storageName 
principal.resource.name 
principal.resource.resource_type 
agentRealtimeInfo.storageName 
log field value is not 
empty, then the principal.resource.resource_type 
UDM field is set to STORAGE_OBJECT 
.agentRealtimeInfo.storageType 
principal.resource.resource_subtype 
agentRealtimeInfo.userActionsNeeded 
security_result.detection_fields[agent_realtime_info_user_actions_needed] 
agentRealtimeInfo.userActionsNeeded 
log field value is not 
empty, then the agentRealtimeInfo.userActionsNeeded 
log field is mapped to the security_result.detection_fields.agent_realtime_info_user_actions_needed 
UDM field.containerInfo.isContainerQuarantine 
target.resource.attribute.labels[container_is_container_quarantine] 
indicators.category 
security_result.category_details 
indicators.categoryId 
security_result.detection_fields[indicators_category_id] 
indicators.description 
security_result.description 
indicators.ids 
security_result.detection_fields[indicators_ids] 
security_result.attack_details.tactics.id 
indicators.tactics.name 
security_result.attack_details.tactics.name 
indicators.tactics.name 
log field value is not 
empty, then the indicators.tactics.name 
log field is mapped to the security_result.attack_details.tactics.name 
UDM field.indicators.tactics.source 
security_result.detection_fields[indicators_tactics_source] 
indicators.tactics.techniques.link 
security_result.detection_fields[indicators_tactics_techniques_link] 
indicators.tactics.techniques.name 
security_result.attack_details.techniques.id 
indicators.tactics.techniques.name 
log field value is not 
empty, then the indicators.tactics.techniques.name 
log field is mapped to the security_result.attack_details.techniques.id 
UDM field.security_result.attack_details.techniques.name 
security_result.attack_details.techniques.subtechnique_id 
security_result.attack_details.techniques.subtechnique_name 
kubernetesInfo.isContainerQuarantine 
target.resource_ancestors.attribute.labels[kubernetes_is_container_quarantine] 
kubernetesInfo.nodeLabels 
target.resource_ancestors.attribute.labels[kubernetes_node_labels] 
mitigationStatus.action 
security_result.detection_fields[mitigation_status_action] 
mitigationStatus.actionsCounters.failed 
security_result.detection_fields[mitigation_status_actions_counters_failed] 
mitigationStatus.actionsCounters.notFound 
security_result.detection_fields[mitigation_status_actions_counters_not_Found] 
mitigationStatus.actionsCounters.pendingReboot 
security_result.detection_fields[mitigation_status_actions_counters_pending_reboot] 
mitigationStatus.actionsCounters.success 
security_result.detection_fields[mitigation_status_actions_counters_success] 
mitigationStatus.actionsCounters.total 
security_result.detection_fields[mitigation_status_actions_counters_total] 
mitigationStatus.agentSupportsReport 
security_result.detection_fields[mitigation_status_agent_supports_report] 
mitigationStatus.groupNotFound 
security_result.detection_fields[mitigation_status_group_not_found] 
mitigationStatus.lastUpdate 
security_result.detection_fields[mitigation_status_last_update] 
mitigationStatus.latestReport 
security_result.detection_fields[mitigation_status_last_report] 
mitigationStatus.mitigationEndedAt 
security_result.detection_fields[mitigation_status_mitigation_ended_at] 
mitigationStatus.mitigationStartedAt 
security_result.detection_fields[mitigation_status_mitigation_started_at] 
mitigationStatus.status 
security_result.detection_fields[mitigation_status] 
threatInfo.analystVerdict 
security_result.detection_fields[analystVerdict] 
threatInfo.analystVerdictDescription 
security_result.detection_fields[analyst_verdict_description] 
threatInfo.automaticallyResolved 
security_result.detection_fields[automatically_resolved] 
threatInfo.browserType 
security_result.detection_fields[browser_type] 
threatInfo.certificateId 
security_result.detection_fields[certificate_id] 
threatInfo.classification 
security_result.category_details 
security_result.category 
threatInfo.classification 
log field value contain one of the following values, then the security_result.category 
UDM field is set to SOFTWARE_MALICIOUS 
. -  Malware
-  Ransomware
-  Linux.Malware
-  OSX.Malware
-  Manual
Else, if the
threatInfo.classification 
log field value contain one of the following values, then the security_result.category 
UDM field is set to SOFTWARE_SUSPICIOUS 
. -  Trojan
-  miner
-  Virus
-  Malicious PDF
-  Worm
-  Rootkit
-  Infostealer
-  Lateral Movement
-  Generic.Heuristic
-  Downloader
-  Backdoor
-  Hacktool
-  Browser
-  Dialer
-  Installer
-  Packed
-  Network
-  Spyware
-  Interactive shell
-  Remote shell
Else, if the
threatInfo.classification 
log field value contain one of the following values, then the security_result.category 
UDM field is set to NETWORK_SUSPICIOUS 
. -  Lateral Movement
-  Remote shell
Else, if the
threatInfo.classification 
log field value is equal to Exploit 
, then the security_result.category 
UDM field is set to EXPLOIT 
.Else, if the
threatInfo.classification 
log field value is equal to Application Control 
, then the security_result.category 
UDM field is set to UNKNOWN_CATEGORY 
.If the
alertInfo.eventType 
log field value contain one of the following values, then the security_result.category 
UDM field is set to SOFTWARE_MALICIOUS 
. -  BEHAVIORALINDICATORS
-  MALICIOUSFILE
threatInfo.classificationSource 
security_result.detection_fields[classification_source] 
threatInfo.cloudFilesHashVerdict 
security_result.detection_fields[cloud_Files_hash_verdict] 
threatInfo.collectionId 
security_result.detection_fields[collection_id] 
threatInfo.confidenceLevel 
security_result.confidence_details 
security_result.confidence 
threatInfo.confidenceLevel 
log field value is equal to malicious 
, then the security_result.confidence 
UDM field is set to HIGH_CONFIDENCE 
.Else, if the
threatInfo.confidenceLevel 
log field value is equal to suspicious 
, then the security_result.confidence 
UDM field is set to MEDIUM_CONFIDENCE 
.threatInfo.createdAt 
metadata.collected_timestamp 
threatInfo.detectionEngines 
security_result.detection_fields[detection_engines] 
threatInfo.detectionEngines 
log field value is not 
empty, then the threatInfo.detectionEngines 
log field is mapped to the security_result.detection_fields.detection_engines 
UDM field.threatInfo.detectionEngines.key 
security_result.detection_fields[detection_engines_key] 
threatInfo.detectionEngines.key 
log field value is not 
empty, then the threatInfo.detectionEngines.key 
log field is mapped to the security_result.detection_fields.detection_engines_key 
UDM field.threatInfo.detectionEngines.title 
security_result.detection_fields[detection_engines_title] 
threatInfo.detectionEngines.title 
log field value is not 
empty, then the threatInfo.detectionEngines.title 
log field is mapped to the security_result.detection_fields.detection_engines_title 
UDM field.threatInfo.detectionType 
security_result.detection_fields[detection_type] 
threatInfo.engines 
security_result.detection_fields[engines] 
threatInfo.engines 
log field value is not 
empty, then the threatInfo.engines 
log field is mapped to the security_result.detection_fields.engines 
UDM field.threatInfo.externalTicketExists 
security_result.detection_fields[external_ticket_exists] 
threatInfo.externalTicketExists.description 
security_result.detection_fields[external_ticket_exists_description] 
threatInfo.externalTicketExists.readOnly 
security_result.detection_fields[external_ticket_exists_readOnly] 
threatInfo.externalTicketId 
security_result.detection_fields[external_ticket_id] 
threatInfo.failedActions 
security_result.detection_fields[failed_actions] 
threatInfo.fileExtension 
target.file.mime_type 
threatInfo.fileExtensionType 
security_result.detection_fields[file_extension_type] 
threatInfo.filePath 
target.file.full_path 
threatInfo.filePath.description 
security_result.detection_fields[file_path_description] 
threatInfo.filePath.readOnly 
security_result.detection_fields[file_path_readOnly] 
threatInfo.fileSize 
target.file.size 
threatInfo.fileVerificationType 
security_result.detection_fields[file_verification_type] 
threatInfo.incidentStatus 
security_result.detection_fields[incident_status] 
threatInfo.incidentStatusDescription 
security_result.detection_fields[incident_status_description] 
threatInfo.incidentStatusDescription.description 
security_result.detection_fields[incident_status_description] 
threatInfo.incidentStatusDescription.readOnly 
security_result.detection_fields[incident_status_description_readOnly] 
threatInfo.initiatedBy 
security_result.detection_fields[initiatedBy] 
threatInfo.initiatedByDescription 
security_result.detection_fields[initiatedBy_description] 
threatInfo.initiatedByDescription.description 
security_result.detection_fields[initiatedBy_description] 
threatInfo.initiatedByDescription.readOnly 
security_result.detection_fields[initiatedBy_description_readOnly] 
threatInfo.initiatingUserId 
principal.user.attribute.labels[initiating_user_id] 
threatInfo.isFileless 
security_result.detection_fields[is_fileless] 
threatInfo.isFileless.description 
security_result.detection_fields[is_fileless_description] 
threatInfo.isFileless.readOnly 
security_result.detection_fields[is_fileless_readOnly] 
threatInfo.isValidCertificate 
security_result.detection_fields[is_valid_certificate] 
threatInfo.maliciousProcessArguments 
security_result.detection_fields[malicious_process_arguments] 
threatInfo.md5 
target.file.md5 
threatInfo.md5 
log field value matches the regular expression pattern ^[a-f0-9]{32}$ 
, then the threatInfo.md5 
log field is mapped to the target.file.md5 
UDM field.threatInfo.mitigatedPreemptively 
security_result.detection_fields[mitigated_preemptively] 
threatInfo.mitigationStatus 
security_result.action_details 
security_result.threat_status 
threatInfo.mitigationStatus 
log field value contain one of the following values, then the security_result.threat_status 
UDM field is set to CLEARED 
. -  mitigated
-  marked_as_benign
-  blocked
-  suspicious_resolved
threatInfo.mitigationStatus 
log field value contain one of the following values, then the security_result.threat_status 
UDM field is set to ACTIVE 
. -  active
-  suspicious
-  pending
-  not_mitigated
threatInfo.mitigationStatusDescription 
security_result.detection_fields[mitigation_status_description] 
threatInfo.mitigationStatusDescription.description 
security_result.detection_fields[mitigation_status_description] 
threatInfo.mitigationStatusDescription.readOnly 
security_result.detection_fields[mitigation_status_description_readOnly] 
threatInfo.originatorProcess 
principal.process.parent_process.file.names 
threatInfo.pendingActions 
security_result.detection_fields[pending_actions] 
threatInfo.processUser 
principal.user.userid 
threatInfo.publisherName 
security_result.threat_feed_name 
threatInfo.reachedEventsLimit 
security_result.detection_fields[reached_events_limit] 
threatInfo.rebootRequired 
security_result.detection_fields[reboot_required] 
threatInfo.sha1 
target.file.sha1 
threatInfo.sha1 
log field value matches the regular expression pattern ^[a-f0-9]{40}$" 
, then the threatInfo.sha1 
log field is mapped to the target.file.sha1 
UDM field.threatInfo.sha256 
target.file.sha256 
threatInfo.sha256 
log field value matches the regular expression pattern ^[a-f0-9]{64}$" 
, then the threatInfo.sha256 
log field is mapped to the target.file.sha256 
UDM field.threatInfo.storyline 
security_result.detection_fields[storyline] 
threatInfo.threatId 
security_result.threat_id 
threatInfo.threatName 
security_result.threat_name 
threatInfo.threatName 
target.file.names 
threatInfo.updatedAt 
security_result.detection_fields[updatedAt] 
whiteningOptions 
about.labels[whitening_options] 
whiteningOptions 
log field value is not 
empty, then the whiteningOptions 
log field is mapped to the about.labels.whitening_options 
UDM field.agentDetectionInfo.cloudProviders.AWS.awsRole 
principal.resource.attribute.roles.name 
agentDetectionInfo.cloudProviders.AWS.awsSecurityGroups 
principal.resource.attribute.labels[cloud_providers_AWS_security_groups] 
agentDetectionInfo.cloudProviders.AWS.awsSecurityGroups 
log field value is not 
empty, then the agentDetectionInfo.cloudProviders.AWS.awsSecurityGroups 
log field is mapped to the principal.resource.attribute.labels.cloud_providers_AWS_security_groups 
UDM field.agentDetectionInfo.cloudProviders.AWS.awsSubnetIds 
principal.resource.attribute.labels[cloud_providers_AWS_subnet_ids] 
agentDetectionInfo.cloudProviders.AWS.awsSubnetIds 
log field value is not 
empty, then the agentDetectionInfo.cloudProviders.AWS.awsSubnetIds 
log field is mapped to the principal.resource.attribute.labels.cloud_providers_AWS_subnet_ids 
UDM field.agentDetectionInfo.cloudProviders.AWS.cloudAccount 
principal.resource.attribute.labels[cloud_providers_AWS_cloud_account] 
agentDetectionInfo.cloudProviders.AWS.cloudImage 
principal.resource.attribute.labels[cloud_providers_AWS_cloud_image] 
agentDetectionInfo.cloudProviders.AWS.cloudInstanceId 
principal.resource.attribute.labels[cloud_providers_AWS_cloud_instance_id] 
agentDetectionInfo.cloudProviders.AWS.cloudInstanceSize 
principal.resource.attribute.labels[cloud_providers_AWS_cloud_instance_size] 
agentDetectionInfo.cloudProviders.AWS.cloudLocation 
principal.resource.attribute.cloud.availability_zone 
agentDetectionInfo.cloudProviders.AWS.cloudNetwork 
principal.resource.attribute.labels[cloud_providers_AWS_cloud_network] 
agentDetectionInfo.cloudProviders.AWS.cloudTags 
principal.resource.attribute.labels[cloud_providers_AWS_cloud_tags] 
agentDetectionInfo.cloudProviders.AWS.cloudTags 
log field value is not 
empty, then the agentDetectionInfo.cloudProviders.AWS.cloudTags 
log field is mapped to the principal.resource.attribute.labels.cloud_providers_AWS_cloud_tags 
UDM field.modular_input_consumption_time 
about.labels[modular_input_consumption_time] 
(deprecated)modular_input_consumption_time 
additional.fields[modular_input_consumption_time] 
timestamp 
about.labels[timestamp] 
(deprecated)timestamp 
additional.fields[timestamp] 
updatedAt 
about.labels[updatedAt] 
(deprecated)updatedAt 
additional.fields[updatedAt] 
What's next
Need more help? Get answers from Community members and Google SecOps professionals.

