Collect SentinelOne Alert logs
This document describes how you can collect SentinelOne Alert logs by setting up a Google Security Operations feed and how log fields map to Google SecOps Unified Data Model (UDM) fields.
For more information, see Data ingestion to Google Security Operations overview .
A typical deployment consists of SentinelOne Alert and the Google SecOps feed configured to send logs to Google SecOps. Each customer deployment can differ and might be more complex.
The deployment contains the following components:
-
SentinelOne: The product from which you collect logs.
-
Google SecOps feed: The Google SecOps feed that fetches logs from SentinelOne and writes logs to Google SecOps.
-
Google SecOps: Google SecOps retains and analyzes the logs from SentinelOne.
An ingestion label identifies the parser which normalizes raw log data to
structured UDM format. The information in this document applies to the parser
with the SENTINELONE_ALERT
ingestion label.
Before you begin
Make sure you have the following prerequisites:
- An active Singularity Complete subscription for SentinelOne. Refer to Platform Packages for additional details.
- GET Alerts and GET Threats API v2.1
- An Admin role for the Global or Account level. To get an Admin role, contact your administrator user.
- Administrator rights to install the SentinelOne agent. To get administrator rights, contact your administrator user.
How to set up SentinelOne:
To generate an API token, follow these steps: 1. In the SentinelOne management console, go to Settings, and then click Users. 1. Click the Admin userfor which you want to generate the API token. 1. Click Actions> API token operations> Generate API token. You need this API token to populate Authentication HTTP headersin the Google SecOps platform.
Set up feeds
There are two different entry points to set up feeds in the Google SecOps platform:
- SIEM Settings > Feeds > Add New
- Content Hub > Content Packs > Get Started
How to set up the SentinelOne Alerts feed
- Click the SentinelOnepack.
- Locate the SentinelOne Alertslog type.
- Specify the values for the following fields:
- Source Type: Third Party API (recommended)
- Authentication HTTP headers: Enter the API token you generated in the SentinelOne platform.
- API hostname: SentinelOne platform hostname
- Initial start time: Time to start fetching the alerts from
- Is alert API subscribed: Whether the alert AOI is subscribed to by the customer
Advanced options
- Feed Name: A prepopulated value that identifies the feed.
- Asset Namespace: Namespace associated with the feed.
- Ingestion Labels: Labels applied to all events from this feed.
- Click Create feed.
For more information about configuring multiple feeds for different log types within this product family, see Configure feeds by product .
Supported SentinelOne Alert log types
The SentinelOne Alert parser supports alert and threat log types.
Supported SentinelOne Alert log formats
The SentinelOne Alert parser supports logs in both JSON and CEF formats.
Supported SentinelOne Alert Sample Logs
-
JSON
{ "accountId": "1235512064263015539", "accountName": "dummy", "agentComputerName": "dummy", "agentDomain": "WORKGROUP", "agentId": "1245680559492378683", "agentInfected": false, "agentIp": "198.51.100.0", "agentIsActive": false, "agentIsDecommissioned": true, "agentMachineType": "server", "agentNetworkStatus": "disconnecting", "agentOsType": "windows", "agentVersion": "21.6.2.272", "annotation": "Automatically resolved by SentinelOne Console", "automaticallyResolved": true, "browserType": null, "certId": "", "classification": "Malware", "classificationSource": "Static", "classifierName": "MANUAL", "cloudVerdict": null, "collectionId": "1251555311751427932", "commandId": "1251555264615838432", "createdAt": "2022-09-03T19:36:59.540349Z", "createdDate": "2021-09-23T19:36:57.867000Z", "description": "malware detected - not mitigated yet (cmd.exe (interactive session))", "engines": [ "manual" ], "external_ticket_id": null, "fileContentHash": "c3d10d8d9fce936e5ca32f930f20c8e703619f71", "fileCreatedDate": null, "fileDisplayName": "Unknown file", "fileExtensionType": "None", "fileIsDotNet": null, "fileIsExecutable": false, "fileIsSystem": false, "fileMaliciousContent": null, "fileObjectId": "3EFA3EFA3EFA3EFA", "filePath": "/home/gitlab-runner/webshell_hits/old.hits-go-here/fedcd896ef45bf145d7e880edd4e5390.dll", "fileSha256": null, "fileVerificationType": "NotSigned", "fromCloud": false, "fromScan": false, "id": "1251555311717873499", "indicators": [ { "categoryName": "test Hiding/Stealthiness", "description": "This binary may have Anti-sandboxing capabilities to evade detection in sandbox tools", "id": 126 }, { "categoryName": "Hiding/Stealthiness", "description": "sample desc There are signs of a backdoor in the PE header", "id": 127 }, { "categoryName": "Test category name Hiding/Stealthiness", "description": "This binary might try to schedule a task or modify a scheduled task", "id": 129 } ], "initiatedBy": "dvCommand", "initiatedByDescription": "Deep Visibility Command", "initiatingUserId": "1245152494739966182", "isCertValid": false, "isInteractiveSession": true, "isPartialStory": false, "maliciousGroupId": "DEA2CA314B3AB7E4", "maliciousProcessArguments": "", "markedAsBenign": true, "mitigationMode": "protect", "mitigationReport": { "kill": { "status": "success" }, "network_quarantine": { "status": null }, "quarantine": { "status": "success" }, "remediate": { "status": null }, "rollback": { "status": null }, "unquarantine": { "status": null } }, "mitigationStatus": "mitigated", "publisher": "", "rank": null, "resolved": true, "siteId": "1235512064330124404", "siteName": "Default site", "threatAgentVersion": "21.6.2.272", "threatName": "cmd.exe (interactive session)", "updatedAt": "2021-10-23T20:34:15.668440Z", "username": "dummy\\\\Administrator", "whiteningOptions": [] }
-
CEF
<86>Nov 5 11:53:06 abcdefg sshd[1475549]: reprocess config line 158: Deprecated option RhostsRSAAuthentication
Field mapping reference
This section explains how the Google SecOps parser maps SentinelOne Alert fields to Google SecOps Unified Data Model (UDM) fields.
Field mapping reference: Event Identifier to Event Type
The following table lists theSENTINELONE_ALERT
log types and their corresponding UDM event types. Event Identifier | Event Type | Security Category |
---|---|---|
BEHAVIORALINDICATORS
|
SCAN_UNCATEGORIZED
|
SOFTWARE_MALICIOUS
|
DNS
|
NETWORK_DNS
|
|
DUPLICATEPROCESS
|
PROCESS_UNCATEGORIZED
|
|
FILECREATION
|
FILE_CREATION
|
|
FILEDELETION
|
FILE_DELETION
|
|
FILEMODIFICATION
|
FILE_MODIFICATION
|
|
FILERENAME
|
FILE_MODIFICATION
|
|
FILESCAN
|
SCAN_FILE
|
|
HTTP
|
NETWORK_HTTP
|
|
MALICIOUSFILE
|
SCAN_FILE
|
SOFTWARE_MALICIOUS
|
OPENPROCESS
|
PROCESS_OPEN
|
|
PROCESSCREATION
|
PROCESS_LAUNCH
|
|
REGKEYCREATE
|
REGISTRY_CREATION
|
|
REGKEYDELETE
|
REGISTRY_DELETION
|
|
REGVALUECREATE
|
REGISTRY_CREATION
|
|
REGVALUEDELETE
|
REGISTRY_DELETION
|
|
REGVALUEMODIFIED
|
REGISTRY_MODIFICATION
|
|
SCHEDTASKSTART
|
SERVICE_START
|
|
SCHEDTASKTRIGGER
|
SERVICE_START
|
|
SCHEDTASKUPDATE
|
SERVICE_MODIFICATION
|
|
SCRIPTS
|
FILE_UNCATEGORIZED
|
|
TCPV4
|
NETWORK_UNCATEGORIZED
|
|
TCPV4LISTEN
|
NETWORK_UNCATEGORIZED
|
|
WINLOGONATTEMPT
|
USER_LOGIN
|
|
If the
threatInfo.filePath
log field is not
empty or the threatInfo.fileSize
log field value is not
empty, then the metadata.event_type
UDM field is set to FILE_UNCATEGORIZED
. |
FILE_UNCATEGORIZED
|
|
Field mapping reference: SENTINELONE_ALERT
The following table lists the log fields of the SENTINELONE_ALERT
log type and their corresponding UDM fields.
metadata.vendor_name
metadata.product_name
metadata.url_back_to_product
threatInfo.threatId
log field value is not
empty and the source_hostname
log field value is not
empty, then the https://source_hostname/incidents/threats/threatInfo.threatId/overview
log field is mapped to the metadata.url_back_to_product
UDM field.Else, if the
source_hostname
log field value is not
empty, then the https://source_hostname
log field is mapped to the metadata.url_back_to_product
UDM field.agentDetectionInfo.machineType
principal.asset.type
agentDetectionInfo.machineType
log field value matches the regular expression pattern laptop
, then the principal.asset.type
UDM field is set to LAPTOP
.Else, if the
agentDetectionInfo.machineType
log field value matches the regular expression pattern desktop
, then the principal.asset.type
UDM field is set to WORKSTATION
.Else, if the
agentDetectionInfo.machineType
log field value matches the regular expression pattern server
, then the principal.asset.type
UDM field is set to SERVER
.Else, the
agentDetectionInfo.machineType
log field is mapped to the principal.asset.attribute.labels.agent_detection_info_machine_type
UDM field.agentRealtimeInfo.agentMachineType
principal.asset.type
agentDetectionInfo.machineType
log field value is empty and the agentRealtimeInfo.agentMachineType
log field value is not
empty , then: - If the
agentRealtimeInfo.agentMachineType
log field value matches the regular expression patternlaptop
, then theprincipal.asset.type
UDM field is set toLAPTOP
. - Else, if the
agentRealtimeInfo.agentMachineType
log field value matches the regular expression patterndesktop
, then theprincipal.asset.type
UDM field is set toWORKSTATION
. - Else, if the
agentRealtimeInfo.agentMachineType
log field value matches the regular expression patternserver
, then theprincipal.asset.type
UDM field is set toSERVER
. - Else, the
agentRealtimeInfo.agentMachineType
log field is mapped to theprincipal.asset.attribute.labels.agent_detection_info_machine_type
UDM field.
agentRealtimeInfo.machineType
principal.asset.type
agentDetectionInfo.machineType
log field value is empty and the agentRealtimeInfo.agentMachineType
log field value is empty and the agentRealtimeInfo.machineType
log field value is not
empty , then: - If the
agentRealtimeInfo.machineType
log field value matches the regular expression patternlaptop
, then theprincipal.asset.type
UDM field is set toLAPTOP
. - Else, if the
agentRealtimeInfo.machineType
log field value matches the regular expression patterndesktop
, then theprincipal.asset.type
UDM field is set toWORKSTATION
. - Else, if the
agentRealtimeInfo.machineType
log field value matches the regular expression patternserver
, then theprincipal.asset.type
UDM field is set toSERVER
. - Else, the
agentRealtimeInfo.machineType
log field is mapped to theprincipal.asset.attribute.labels.agent_detection_info_machine_type
UDM field.
agentDetectionInfo.name
principal.hostname
agentDetectionInfo.name
log field value is not
empty, then the agentDetectionInfo.name
log field is mapped to the principal.hostname
UDM field.Else, if the
agentRealtimeInfo.agentComputerName
log field value is not
empty, then the agentRealtimeInfo.agentComputerName
log field is mapped to the principal.hostname
UDM field.Else, if the
agentRealtimeInfo.name
log field value is not
empty, then the agentRealtimeInfo.name
log field is mapped to the principal.hostname
UDM field.agentRealtimeInfo.agentComputerName
principal.hostname
agentDetectionInfo.name
log field value is not
empty, then the agentDetectionInfo.name
log field is mapped to the principal.hostname
UDM field.Else, if the
agentRealtimeInfo.agentComputerName
log field value is not
empty, then the agentRealtimeInfo.agentComputerName
log field is mapped to the principal.hostname
UDM field.Else, if the
agentRealtimeInfo.name
log field value is not
empty, then the agentRealtimeInfo.name
log field is mapped to the principal.hostname
UDM field.agentRealtimeInfo.name
principal.hostname
agentDetectionInfo.name
log field value is not
empty, then the agentDetectionInfo.name
log field is mapped to the principal.hostname
UDM field.Else, if the
agentRealtimeInfo.agentComputerName
log field value is not
empty, then the agentRealtimeInfo.agentComputerName
log field is mapped to the principal.hostname
UDM field.Else, if the
agentRealtimeInfo.name
log field value is not
empty, then the agentRealtimeInfo.name
log field is mapped to the principal.hostname
UDM field.agentDetectionInfo.name
principal.asset.hostname
agentDetectionInfo.name
log field value is not
empty, then the agentDetectionInfo.name
log field is mapped to the principal.asset.hostname
UDM field.Else, if the
agentRealtimeInfo.agentComputerName
log field value is not
empty, then the agentRealtimeInfo.agentComputerName
log field is mapped to the principal.asset.hostname
UDM field.Else, if the
agentRealtimeInfo.name
log field value is not
empty, then the agentRealtimeInfo.name
log field is mapped to the principal.asset.hostname
UDM field.agentRealtimeInfo.agentComputerName
principal.asset.hostname
agentDetectionInfo.name
log field value is not
empty, then the agentDetectionInfo.name
log field is mapped to the principal.asset.hostname
UDM field.Else, if the
agentRealtimeInfo.agentComputerName
log field value is not
empty, then the agentRealtimeInfo.agentComputerName
log field is mapped to the principal.asset.hostname
UDM field.Else, if the
agentRealtimeInfo.name
log field value is not
empty, then the agentRealtimeInfo.name
log field is mapped to the principal.asset.hostname
UDM field.agentRealtimeInfo.name
principal.asset.hostname
agentDetectionInfo.name
log field value is not
empty, then the agentDetectionInfo.name
log field is mapped to the principal.asset.hostname
UDM field.Else, if the
agentRealtimeInfo.agentComputerName
log field value is not
empty, then the agentRealtimeInfo.agentComputerName
log field is mapped to the principal.asset.hostname
UDM field.Else, if the
agentRealtimeInfo.name
log field value is not
empty, then the agentRealtimeInfo.name
log field is mapped to the principal.asset.hostname
UDM field.agentDetectionInfo.osFamily
principal.asset.platform_software.platform
agentDetectionInfo.osFamily
log field value matches the regular expression pattern (?i)win
, then the principal.asset.platform_software.platform
UDM field is set to WINDOWS
.Else, if the
agentDetectionInfo.osFamily
log field value matches the regular expression pattern (?i)lin
, then the principal.asset.platform_software.platform
UDM field is set to LINUX
.Else, the
agentDetectionInfo.osFamily
log field is mapped to the principal.asset.attribute.labels.agent_detection_info_os_family
UDM field.agentRealtimeInfo.os
principal.asset.platform_software.platform
agentDetectionInfo.osFamily
log field value is empty and the agentRealtimeInfo.os
log field value is not
empty , then: - If the
agentRealtimeInfo.os
log field value matches the regular expression pattern(?i)win
, then theprincipal.asset.platform_software.platform
UDM field is set toWINDOWS
. - Else, if the
agentRealtimeInfo.os
log field value matches the regular expression pattern(?i)lin
, then theprincipal.asset.platform_software.platform
UDM field is set toLINUX
. - Else, the
agentRealtimeInfo.os
log field is mapped to theprincipal.asset.attribute.labels.agent_detection_info_os_family
UDM field.
agentDetectionInfo.osFamily
principal.platform
agentDetectionInfo.osFamily
log field value matches the regular expression pattern (?i)win
, then the principal.platform
UDM field is set to WINDOWS
.Else, if the
agentDetectionInfo.osFamily
log field value matches the regular expression pattern (?i)lin
, then the principal.platform
UDM field is set to LINUX
agentRealtimeInfo.os
principal.platform
agentDetectionInfo.osFamily
log field value is empty and the agentRealtimeInfo.os
log field value is not
empty , then: - If the
agentRealtimeInfo.os
log field value matches the regular expression pattern(?i)win
, then theprincipal.platform
UDM field is set toWINDOWS
. - Else, if the
agentRealtimeInfo.os
log field value matches the regular expression pattern(?i)lin
, then theprincipal.platform
UDM field is set toLINUX
.
agentDetectionInfo.osName
principal.asset.platform_software.platform_version
agentDetectionInfo.osName
log field value is not
empty, then the agentDetectionInfo.osName
log field is mapped to the principal.asset.platform_software.platform_version
UDM field.Else, if the
agentDetectionInfo.agentOsName
log field value is not
empty, then the agentDetectionInfo.agentOsName
log field is mapped to the principal.asset.platform_software.platform_version
UDM field.Else, if the
agentRealtimeInfo.agentOsName
log field value is not
empty, then the agentRealtimeInfo.agentOsName
log field is mapped to the principal.asset.platform_software.platform_version
UDM field.agentDetectionInfo.agentOsName
principal.asset.platform_software.platform_version
agentDetectionInfo.osName
log field value is not
empty, then the agentDetectionInfo.osName
log field is mapped to the principal.asset.platform_software.platform_version
UDM field.Else, if the
agentDetectionInfo.agentOsName
log field value is not
empty, then the agentDetectionInfo.agentOsName
log field is mapped to the principal.asset.platform_software.platform_version
UDM field.Else, if the
agentRealtimeInfo.agentOsName
log field value is not
empty, then the agentRealtimeInfo.agentOsName
log field is mapped to the principal.asset.platform_software.platform_version
UDM field.agentRealtimeInfo.agentOsName
principal.asset.platform_software.platform_version
agentDetectionInfo.osName
log field value is not
empty, then the agentDetectionInfo.osName
log field is mapped to the principal.asset.platform_software.platform_version
UDM field.Else, if the
agentDetectionInfo.agentOsName
log field value is not
empty, then the agentDetectionInfo.agentOsName
log field is mapped to the principal.asset.platform_software.platform_version
UDM field.Else, if the
agentRealtimeInfo.agentOsName
log field value is not
empty, then the agentRealtimeInfo.agentOsName
log field is mapped to the principal.asset.platform_software.platform_version
UDM field.agentDetectionInfo.osRevision
principal.asset.platform_software.platform_patch_level
agentDetectionInfo.osRevision
log field value is not
empty, then the agentDetectionInfo.osRevision
log field is mapped to the principal.asset.platform_software.platform_patch_level
UDM field.Else, if the
agentDetectionInfo.agentOsRevision
log field value is not
empty, then the agentDetectionInfo.agentOsRevision
log field is mapped to the principal.asset.platform_software.platform_patch_level
UDM field.Else, if the
agentRealtimeInfo.agentOsRevision
log field value is not
empty, then the agentRealtimeInfo.agentOsRevision
log field is mapped to the principal.asset.platform_software.platform_patch_level
UDM field.agentDetectionInfo.agentOsRevision
principal.asset.platform_software.platform_patch_level
agentDetectionInfo.osRevision
log field value is not
empty, then the agentDetectionInfo.osRevision
log field is mapped to the principal.asset.platform_software.platform_patch_level
UDM field.Else, if the
agentDetectionInfo.agentOsRevision
log field value is not
empty, then the agentDetectionInfo.agentOsRevision
log field is mapped to the principal.asset.platform_software.platform_patch_level
UDM field.Else, if the
agentRealtimeInfo.agentOsRevision
log field value is not
empty, then the agentRealtimeInfo.agentOsRevision
log field is mapped to the principal.asset.platform_software.platform_patch_level
UDM field.agentRealtimeInfo.agentOsRevision
principal.asset.platform_software.platform_patch_level
agentDetectionInfo.osRevision
log field value is not
empty, then the agentDetectionInfo.osRevision
log field is mapped to the principal.asset.platform_software.platform_patch_level
UDM field.Else, if the
agentDetectionInfo.agentOsRevision
log field value is not
empty, then the agentDetectionInfo.agentOsRevision
log field is mapped to the principal.asset.platform_software.platform_patch_level
UDM field.Else, if the
agentRealtimeInfo.agentOsRevision
log field value is not
empty, then the agentRealtimeInfo.agentOsRevision
log field is mapped to the principal.asset.platform_software.platform_patch_level
UDM field.agentDetectionInfo.siteId
principal.labels[agent_detection_info_siteId]
(deprecated)agentDetectionInfo.siteId
additional.fields[agent_detection_info_siteId]
agentDetectionInfo.uuid
principal.asset_id
agentDetectionInfo.uuid
log field value is not
empty, then the SentinelOne:%{agentDetectionInfo.uuid}
log field is mapped to the principal.asset_id
UDM field.Else, if the
agentDetectionInfo.agentUuid
log field value is not
empty, then the SentinelOne:%{agentDetectionInfo.agentUuid}
log field is mapped to the principal.asset_id
UDM field.Else, if the
agentRealtimeInfo.uuid
log field value is not
empty, then the SentinelOne:%{agentRealtimeInfo.uuid}
log field is mapped to the principal.asset_id
UDM field.Else, if the
agentRealtimeInfo.agentUuid
log field value is not
empty, then the SentinelOne:%{agentRealtimeInfo.agentUuid}
log field is mapped to the principal.asset_id
UDM field.agentDetectionInfo.agentUuid
principal.asset_id
agentDetectionInfo.uuid
log field value is not
empty, then the SentinelOne:%{agentDetectionInfo.uuid}
log field is mapped to the principal.asset_id
UDM field.Else, if the
agentDetectionInfo.agentUuid
log field value is not
empty, then the SentinelOne:%{agentDetectionInfo.agentUuid}
log field is mapped to the principal.asset_id
UDM field.Else, if the
agentRealtimeInfo.uuid
log field value is not
empty, then the SentinelOne:%{agentRealtimeInfo.uuid}
log field is mapped to the principal.asset_id
UDM field.Else, if the
agentRealtimeInfo.agentUuid
log field value is not
empty, then the SentinelOne:%{agentRealtimeInfo.agentUuid}
log field is mapped to the principal.asset_id
UDM field.agentRealtimeInfo.uuid
principal.asset_id
agentDetectionInfo.uuid
log field value is not
empty, then the SentinelOne:%{agentDetectionInfo.uuid}
log field is mapped to the principal.asset_id
UDM field.Else, if the
agentDetectionInfo.agentUuid
log field value is not
empty, then the SentinelOne:%{agentDetectionInfo.agentUuid}
log field is mapped to the principal.asset_id
UDM field.Else, if the
agentRealtimeInfo.uuid
log field value is not
empty, then the SentinelOne:%{agentRealtimeInfo.uuid}
log field is mapped to the principal.asset_id
UDM field.Else, if the
agentRealtimeInfo.agentUuid
log field value is not
empty, then the SentinelOne:%{agentRealtimeInfo.agentUuid}
log field is mapped to the principal.asset_id
UDM field.agentRealtimeInfo.agentUuid
principal.asset_id
agentDetectionInfo.uuid
log field value is not
empty, then the SentinelOne:%{agentDetectionInfo.uuid}
log field is mapped to the principal.asset_id
UDM field.Else, if the
agentDetectionInfo.agentUuid
log field value is not
empty, then the SentinelOne:%{agentDetectionInfo.agentUuid}
log field is mapped to the principal.asset_id
UDM field.Else, if the
agentRealtimeInfo.uuid
log field value is not
empty, then the SentinelOne:%{agentRealtimeInfo.uuid}
log field is mapped to the principal.asset_id
UDM field.Else, if the
agentRealtimeInfo.agentUuid
log field value is not
empty, then the SentinelOne:%{agentRealtimeInfo.agentUuid}
log field is mapped to the principal.asset_id
UDM field.agentDetectionInfo.uuid
principal.asset.asset_id
agentDetectionInfo.uuid
log field value is not
empty, then the SentinelOne:%{agentDetectionInfo.uuid}
log field is mapped to the principal.asset.asset_id
UDM field.Else, if the
agentDetectionInfo.agentUuid
log field value is not
empty, then the SentinelOne:%{agentDetectionInfo.agentUuid}
log field is mapped to the principal.asset.asset_id
UDM field.Else, if the
agentRealtimeInfo.uuid
log field value is not
empty, then the SentinelOne:%{agentRealtimeInfo.uuid}
log field is mapped to the principal.asset.asset_id
UDM field.Else, if the
agentRealtimeInfo.agentUuid
log field value is not
empty, then the SentinelOne:%{agentRealtimeInfo.agentUuid}
log field is mapped to the principal.asset.asset_id
UDM field.agentDetectionInfo.agentUuid
principal.asset.asset_id
agentDetectionInfo.uuid
log field value is not
empty, then the SentinelOne:%{agentDetectionInfo.uuid}
log field is mapped to the principal.asset.asset_id
UDM field.Else, if the
agentDetectionInfo.agentUuid
log field value is not
empty, then the SentinelOne:%{agentDetectionInfo.agentUuid}
log field is mapped to the principal.asset.asset_id
UDM field.Else, if the
agentRealtimeInfo.uuid
log field value is not
empty, then the SentinelOne:%{agentRealtimeInfo.uuid}
log field is mapped to the principal.asset.asset_id
UDM field.Else, if the
agentRealtimeInfo.agentUuid
log field value is not
empty, then the SentinelOne:%{agentRealtimeInfo.agentUuid}
log field is mapped to the principal.asset.asset_id
UDM field.agentRealtimeInfo.uuid
principal.asset.asset_id
agentDetectionInfo.uuid
log field value is not
empty, then the SentinelOne:%{agentDetectionInfo.uuid}
log field is mapped to the principal.asset.asset_id
UDM field.Else, if the
agentDetectionInfo.agentUuid
log field value is not
empty, then the SentinelOne:%{agentDetectionInfo.agentUuid}
log field is mapped to the principal.asset.asset_id
UDM field.Else, if the
agentRealtimeInfo.uuid
log field value is not
empty, then the SentinelOne:%{agentRealtimeInfo.uuid}
log field is mapped to the principal.asset.asset_id
UDM field.Else, if the
agentRealtimeInfo.agentUuid
log field value is not
empty, then the SentinelOne:%{agentRealtimeInfo.agentUuid}
log field is mapped to the principal.asset.asset_id
UDM field.agentRealtimeInfo.agentUuid
principal.asset.asset_id
agentDetectionInfo.uuid
log field value is not
empty, then the SentinelOne:%{agentDetectionInfo.uuid}
log field is mapped to the principal.asset.asset_id
UDM field.Else, if the
agentDetectionInfo.agentUuid
log field value is not
empty, then the SentinelOne:%{agentDetectionInfo.agentUuid}
log field is mapped to the principal.asset.asset_id
UDM field.Else, if the
agentRealtimeInfo.uuid
log field value is not
empty, then the SentinelOne:%{agentRealtimeInfo.uuid}
log field is mapped to the principal.asset.asset_id
UDM field.Else, if the
agentRealtimeInfo.agentUuid
log field value is not
empty, then the SentinelOne:%{agentRealtimeInfo.agentUuid}
log field is mapped to the principal.asset.asset_id
UDM field.agentDetectionInfo.version
principal.asset.attribute.labels[agent_version]
agentDetectionInfo.agentVersion
principal.asset.attribute.labels[agent_detection_info_agent_version]
agentRealtimeInfo.agentVersion
principal.asset.attribute.labels[agent_realtime_info_agent_version]
agentRealtimeInfo.id
principal.asset.attribute.labels[agent_realtime_info_id]
agentRealtimeInfo.infected
principal.asset.attribute.labels[agent_realtime_info_infected]
agentRealtimeInfo.agentInfected
principal.asset.attribute.labels[agent_realtime_info_infected]
agentRealtimeInfo.isActive
principal.asset.attribute.labels[agent_realtime_info_is_active]
agentRealtimeInfo.agentIsActive
principal.asset.attribute.labels[agent_realtime_info_is_active]
agentRealtimeInfo.isDecommissioned
principal.asset.attribute.labels[agent_realtime_info_is_decommissioned]
agentRealtimeInfo.agentIsDecommissioned
principal.asset.attribute.labels[agent_realtime_info_is_decommissioned]
alertInfo.alertId
metadata.product_log_id
id
metadata.product_log_id
metadata.product_event_type
alertInfo
, then the metadata.product_event_type
UDM field is set to Alerts
.Else, if the log matches the regular expression pattern
threatInfo
, then the metadata.product_event_type
UDM field is set to Threats
.alertInfo.analystVerdict
security_result.detection_fields[alert_info_analyst_verdict]
alertInfo.createdAt
metadata.event_timestamp
alertInfo.createdAt
log field value is not
empty, then the alertInfo.createdAt
log field is mapped to the metadata.event_timestamp
UDM field.Else, if the
threatInfo.identifiedAt
log field value is not
empty, then the threatInfo.identifiedAt
log field is mapped to the metadata.event_timestamp
UDM field.threatInfo.identifiedAt
metadata.event_timestamp
alertInfo.createdAt
log field value is not
empty, then the alertInfo.createdAt
log field is mapped to the metadata.event_timestamp
UDM field.Else, if the
threatInfo.identifiedAt
log field value is not
empty, then the threatInfo.identifiedAt
log field is mapped to the metadata.event_timestamp
UDM field.
network.application_protocol
alertInfo.dnsRequest
log field value is not
empty, then the network.application_protocol
UDM field is set to DNS
.alertInfo.dnsRequest
network.dns.questions.name
alertInfo.dnsResponse
network.dns.answers.name
alertInfo.dstIp
target.ip
alertInfo.dstPort
target.port
alertInfo.dvEventId
security_result.detection_fields[alert_info_dv_event_id]
alertInfo.eventType
security_result.detection_fields[alert_info_event_type]
alertInfo.hitType
security_result.detection_fields[alert_info_hit_type]
alertInfo.incidentStatus
security_result.detection_fields[alert_info_incident_status]
alertInfo.indicatorCategory
security_result.detection_fields[alert_info_indicator_category]
alertInfo.indicatorDescription
security_result.detection_fields[alert_info_indicator_description]
alertInfo.indicatorName
security_result.detection_fields[alert_info_indicator_name]
alertInfo.isEdr
security_result.detection_fields[alert_info_is_edr]
alertInfo.loginAccountDomain
security_result.detection_fields[alert_info_login_account_domain]
alertInfo.loginAccountSid
security_result.detection_fields[alert_info_login_account_sid]
alertInfo.loginIsAdministratorEquivalent
security_result.detection_fields[alert_info_login_is_administrator_equivalent]
security_result.action
alertInfo.loginIsSuccessful
log field value is equal to true
, then the security_result.action
UDM field is set to ALLOW
. else the alertInfo.loginIsSuccessful
log field value is equal to false
, then the security_result.action
UDM field is set to BLOCK
.If the
threatInfo.mitigationStatus
log field value contain one of the following values, then the security_result.action
UDM field is set to BLOCK
. -
mitigated
-
marked_as_benign
-
blocked
-
suspicious_resolved
threatInfo.mitigationStatus
log field value contain one of the following values, then the security_result.action
UDM field is set to ALLOW
. -
active
-
suspicious
-
pending
-
not_mitigated
extensions.auth.mechanism
alertInfo.loginType
log field value is equal to NETWORK
, then the extensions.auth.mechanism
UDM field is set to NETWORK
.Else, if the
alertInfo.loginType
log field value is equal to SYSTEM
, then the extensions.auth.mechanism
UDM field is set to LOCAL
.Else, if the
alertInfo.loginType
log field value is equal to INTERACTIVE
, then the extensions.auth.mechanism
UDM field is set to INTERACTIVE
.Else, if the
alertInfo.loginType
log field value is equal to BATCH
, then the extensions.auth.mechanism
UDM field is set to BATCH
.Else, if the
alertInfo.loginType
log field value is equal to SERVICE
, then the extensions.auth.mechanism
UDM field is set to SERVICE
.Else, if the
alertInfo.loginType
log field value is equal to UNLOCK
, then the extensions.auth.mechanism
UDM field is set to UNLOCK
.Else, if the
alertInfo.loginType
log field value is equal to NETWORK_CLEAR_TEXT
, then the extensions.auth.mechanism
UDM field is set to NETWORK_CLEAR_TEXT
.Else, if the
alertInfo.loginType
log field value is equal to NEW_CREDENTIALS
, then the extensions.auth.mechanism
UDM field is set to NEW_CREDENTIALS
.Else, if the
alertInfo.loginType
log field value is equal to REMOTE_INTERACTIVE
, then the extensions.auth.mechanism
UDM field is set to REMOTE_INTERACTIVE
.Else, if the
alertInfo.loginType
log field value is equal to CACHED_INTERACTIVE
, then the extensions.auth.mechanism
UDM field is set to CACHED_INTERACTIVE
.Else, if the
alertInfo.loginType
log field value is equal to CACHED_REMOTE_INTERACTIVE
, then the extensions.auth.mechanism
UDM field is set to CACHED_REMOTE_INTERACTIVE
.Else, if the
alertInfo.loginType
log field value is equal to CACHED_UNLOCK
, then the extensions.auth.mechanism
UDM field is set to CACHED_UNLOCK
.alertInfo.loginsUserName
target.user.user_display_name
alertInfo.modulePath
security_result.detection_fields[alert_info_module_path]
alertInfo.moduleSha1
security_result.detection_fields[alert_info_module_sha1]
alertInfo.netEventDirection
network.direction
alertInfo.netEventDirection
log field value matches the regular expression pattern OUTGOING
, then the network.direction
UDM field is set to OUTBOUND
.Else, if the
alertInfo.netEventDirection
log field value matches the regular expression pattern INCOMING
, then the network.direction
UDM field is set to INBOUND
.alertInfo.registryKeyPath
target.registry.registry_key
alertInfo.registryOldValue
src.registry.registry_value_data
alertInfo.registryOldValueType
src.registry.registry_value_name
alertInfo.registryPath
src.registry.registry_key
alertInfo.registryValue
target.registry.registry_value_data
alertInfo.reportedAt
security_result.first_discovered_time
alertInfo.source
security_result.category_details
alertInfo.srcPort
principal.port
alertInfo.tiIndicatorComparisonMethod
security_result.detection_fields[alert_info_tiIndicator_comparison_method]
alertInfo.tiIndicatorSource
security_result.detection_fields[alert_info_tiIndicator_source]
alertInfo.tiIndicatorType
security_result.detection_fields[alert_info_tiIndicator_type]
alertInfo.tiIndicatorValue
security_result.detection_fields[alert_info_tiIndicator_value]
alertInfo.updatedAt
security_result.detection_fields[alert_info_updated_at]
containerInfo.id
target.resource.product_object_id
containerInfo.image
target.resource.attribute.labels[container_image]
containerInfo.labels
target.resource.attribute.labels[container_labels]
containerInfo.labels
log field value is not
empty, then the containerInfo.labels
log field is mapped to the target.resource.attribute.labels.container_labels
UDM field.containerInfo.name
target.resource.name
target.resource.resource_type
containerInfo.name
log field value is not
empty, then the target.resource.resource_type
UDM field is set to CONTAINER
.kubernetesInfo.cluster
target.resource_ancestors.name
kubernetesInfo.controllerName
target.resource_ancestors.name
kubernetesInfo.node
target.resource_ancestors.name
kubernetesInfo.pod
target.resource_ancestors.name
target.resource_ancestors.resource_type
kubernetesInfo.pod
log field value is not
empty, then the target.resource_ancestors.resource_type
UDM field is set to POD
.If the
kubernetesInfo.cluster
log field value is not
empty, then the target.resource_ancestors.resource_type
UDM field is set to CLUSTER
.If the
kubernetesInfo.isContainerQuarantine
log field value is not
empty, then the target.resource_ancestors.resource_type
UDM field is set to CLUSTER
.If the
kubernetesInfo.controllerName
log field value is not
empty, then the target.resource_ancestors.resource_type
UDM field is set to CLUSTER
.If the
kubernetesInfo.node
log field value is not
empty, then the target.resource_ancestors.resource_type
UDM field is set to CLUSTER
.kubernetesInfo.controllerKind
target.resource_ancestors.attribute.labels[kubernetes_controller_kind]
kubernetesInfo.controllerLabels
target.resource_ancestors.attribute.labels[kubernetes_controller_labels]
kubernetesInfo.controllerLabels
log field value is not
empty, then the kubernetesInfo.controllerLabels
log field is mapped to the target.resource_ancestors.attribute.labels.kubernetes_controller_labels
UDM field.kubernetesInfo.namespace
target.resource_ancestors.attribute.labels[kubernetes_namespace]
kubernetesInfo.namespaceLabels
target.resource_ancestors.attribute.labels[kubernetes_namespace_labels]
kubernetesInfo.podLabels
target.resource_ancestors.attribute.labels[kubernetes_pod_labels]
kubernetesInfo.podLabels
log field value is not
empty, then the kubernetesInfo.podLabels
log field is mapped to the target.resource_ancestors.attribute.labels.kubernetes_pod_labels
UDM field.ruleInfo.description
security_result.rule_set_display_name
ruleInfo.id
security_result.rule_id
ruleInfo.name
security_result.rule_name
ruleInfo.queryLang
security_result.rule_labels[query_lang]
ruleInfo.queryType
security_result.rule_labels[query_type]
ruleInfo.s1ql
security_result.rule_labels[s1ql]
ruleInfo.scopeLevel
security_result.rule_labels[scope_level]
security_result.severity
ruleInfo.severity
log field value matches the regular expression pattern (?i)low
, then the security_result.severity
UDM field is set to LOW
.Else, if the
ruleInfo.severity
log field value matches the regular expression pattern (?i)medium
, then the security_result.severity
UDM field is set to MEDIUM
.Else, if the
ruleInfo.severity
log field value matches the regular expression pattern (?i)critical
, then the security_result.severity
UDM field is set to CRITICAL
.Else, if the
ruleInfo.severity
log field value matches the regular expression pattern (?i)high
, then the security_result.severity
UDM field is set to HIGH
.ruleInfo.severity
security_result.severity_details
ruleInfo.treatAsThreat
security_result.rule_type
sourceParentProcessInfo.commandline
principal.process.parent_process.command_line
sourceParentProcessInfo.fileHashMd5
principal.process.parent_process.file.md5
sourceParentProcessInfo.fileHashMd5
log field value matches the regular expression pattern ^[a-f0-9]{32}$
, then the sourceParentProcessInfo.fileHashMd5
log field is mapped to the principal.process.parent_process.file.md5
UDM field.sourceParentProcessInfo.fileHashSha1
principal.process.parent_process.file.sha1
sourceParentProcessInfo.fileHashSha1
log field value matches the regular expression pattern ^[a-f0-9]{40}$
, then the sourceParentProcessInfo.fileHashSha1
log field is mapped to the principal.process.parent_process.file.sha1
UDM field.sourceParentProcessInfo.fileHashSha256
principal.process.parent_process.file.sha256
sourceParentProcessInfo.fileHashSha256
log field value matches the regular expression pattern ^[a-f0-9]{64}$
, then the sourceParentProcessInfo.fileHashSha256
log field is mapped to the principal.process.parent_process.file.sha256
UDM field.sourceParentProcessInfo.filePath
principal.process.parent_process.file.full_path
sourceParentProcessInfo.fileSignerIdentity
principal.process.parent_process.file.signature_info.sigcheck.signers.name
sourceParentProcessInfo.integrityLevel
principal.labels[source_parent_process_integrity_level]
(deprecated)sourceParentProcessInfo.integrityLevel
additional.fields[source_parent_process_integrity_level]
sourceParentProcessInfo.name
principal.labels[source_parent_process_name]
(deprecated)sourceParentProcessInfo.name
additional.fields[source_parent_process_name]
sourceParentProcessInfo.pid
principal.process.parent_process.pid
sourceParentProcessInfo.pidStarttime
principal.labels[source_parent_process_pid_start_time]
(deprecated)sourceParentProcessInfo.pidStarttime
additional.fields[source_parent_process_pid_start_time]
sourceParentProcessInfo.storyline
principal.labels[source_parent_process_storyline]
(deprecated)sourceParentProcessInfo.storyline
additional.fields[source_parent_process_storyline]
sourceParentProcessInfo.subsystem
principal.labels[source_parent_process_subsystem]
(deprecated)sourceParentProcessInfo.subsystem
additional.fields[source_parent_process_subsystem]
principal.process.parent_process.product_specific_process_id
sourceParentProcessInfo.uniqueId
log field value is not
empty, then the SO:%{agentDetectionInfo.siteId}:%{agentDetectionInfo.accountId}:%{agentDetectionInfo.uuid}:%{sourceParentProcessInfo.uniqueId}
log field is mapped to the principal.process.parent_process.product_specific_process_id
UDM field.sourceParentProcessInfo.user
principal.labels[source_parent_process_user]
(deprecated)sourceParentProcessInfo.user
additional.fields[source_parent_process_user]
sourceProcessInfo.commandline
principal.process.command_line
sourceProcessInfo.fileHashMd5
principal.process.file.md5
sourceProcessInfo.fileHashMd5
log field value matches the regular expression pattern ^[a-f0-9]{32}$
, then the sourceProcessInfo.fileHashMd5
log field is mapped to the principal.process.file.md5
UDM field.sourceProcessInfo.fileHashSha1
principal.process.file.sha1
sourceProcessInfo.fileHashSha1
log field value matches the regular expression pattern ^[a-f0-9]{40}$
, then the sourceProcessInfo.fileHashSha1
log field is mapped to the principal.process.file.sha1
UDM field.sourceProcessInfo.fileHashSha256
principal.process.file.sha256
sourceProcessInfo.fileHashSha256
log field value matches the regular expression pattern ^[a-f0-9]{64}$
, then the sourceProcessInfo.fileHashSha256
log field is mapped to the principal.process.file.sha256
UDM field.sourceProcessInfo.filePath
principal.process.file.full_path
sourceProcessInfo.fileSignerIdentity
principal.process.file.signature_info.sigcheck.signers.name
sourceProcessInfo.integrityLevel
principal.labels[source_process_integrity_level]
(deprecated)sourceProcessInfo.integrityLevel
additional.fields[source_process_integrity_level]
sourceProcessInfo.name
principal.labels[source_process_name]
(deprecated)sourceProcessInfo.name
additional.fields[source_process_name]
sourceProcessInfo.pid
principal.process.pid
sourceProcessInfo.pidStarttime
principal.labels[source_process_pid_start_time]
(deprecated)sourceProcessInfo.pidStarttime
additional.fields[source_process_pid_start_time]
sourceProcessInfo.storyline
principal.labels[source_process_storyline]
(deprecated)sourceProcessInfo.storyline
additional.fields[source_process_storyline]
sourceProcessInfo.subsystem
principal.labels[source_process_subsystem]
(deprecated)sourceProcessInfo.subsystem
additional.fields[source_process_subsystem]
principal.process.product_specific_process_id
sourceProcessInfo.uniqueId
log field value is not
empty, then the SO:%{agentDetectionInfo.siteId}:%{agentDetectionInfo.accountId}:%{agentDetectionInfo.uuid}:%{sourceProcessInfo.uniqueId}
log field is mapped to the principal.process.product_specific_process_id
UDM field.sourceProcessInfo.user
principal.user.user_display_name
threatInfo.initiatingUsername
principal.user.user_display_name
targetProcessInfo.tgtFileCreatedAt
target.process.file.first_seen_time
targetProcessInfo.tgtFileHashSha1
target.process.file.sha1
targetProcessInfo.tgtFileHashSha1
log field value matches the regular expression pattern ^[a-f0-9]{40}$
, then the targetProcessInfo.tgtFileHashSha1
log field is mapped to the target.process.file.sha1
UDM field.targetProcessInfo.tgtFileHashSha256
target.process.file.sha256
targetProcessInfo.tgtFileHashSha256
log field value matches the regular expression pattern ^[a-f0-9]{64}$
, then the targetProcessInfo.tgtFileHashSha256
log field is mapped to the target.process.file.sha256
UDM field.targetProcessInfo.tgtFileId
target.labels[target_file_id]
(deprecated)targetProcessInfo.tgtFileId
additional.fields[target_file_id]
targetProcessInfo.tgtFileIsSigned
target.process.file.signature_info.sigcheck.verification_message
targetProcessInfo.tgtFileModifiedAt
target.process.file.last_modification_time
targetProcessInfo.tgtFileOldPath
target.labels[target_file_old_path]
(deprecated)targetProcessInfo.tgtFileOldPath
additional.fields[target_file_old_path]
targetProcessInfo.tgtFilePath
target.process.file.full_path
targetProcessInfo.tgtProcCmdLine
target.process.command_line
targetProcessInfo.tgtProcImagePath
target.labels[target_process_image_path]
(deprecated)targetProcessInfo.tgtProcImagePath
additional.fields[target_process_image_path]
targetProcessInfo.tgtProcIntegrityLevel
target.labels[target_process_integrity_level]
(deprecated)targetProcessInfo.tgtProcIntegrityLevel
additional.fields[target_process_integrity_level]
targetProcessInfo.tgtProcName
target.labels[target_process_name]
(deprecated)targetProcessInfo.tgtProcName
additional.fields[target_process_name]
targetProcessInfo.tgtProcPid
target.process.pid
targetProcessInfo.tgtProcSignedStatus
target.labels[target_process_signed_status]
(deprecated)targetProcessInfo.tgtProcSignedStatus
additional.fields[target_process_signed_status]
targetProcessInfo.tgtProcStorylineId
target.labels[target_process_storyline_id]
(deprecated)targetProcessInfo.tgtProcStorylineId
additional.fields[target_process_storyline_id]
target.process.product_specific_process_id
targetProcessInfo.tgtProcUid
log field value is not
empty, then the SO:%{agentDetectionInfo.siteId}:%{agentDetectionInfo.accountId}:%{agentDetectionInfo.uuid}:%{targetProcessInfo.tgtProcUid}
log field is mapped to the target.process.product_specific_process_id
UDM field.targetProcessInfo.tgtProcessStartTime
target.labels[target_process_start_time]
(deprecated)targetProcessInfo.tgtProcessStartTime
additional.fields[target_process_start_time]
source_hostname
intermediary.hostname
agentDetectionInfo.accountId
metadata.product_deployment_id
agentDetectionInfo.accountName
principal.labels[agent_detection_info_account_name]
(deprecated)agentDetectionInfo.accountName
additional.fields[agent_detection_info_account_name]
agentDetectionInfo.agentDetectionState
principal.asset.attribute.labels[agent_detection_info_detection_state]
agentDetectionInfo.agentDomain
principal.administrative_domain
agentDetectionInfo.agentIpV4
principal.ip
agentDetectionInfo.agentIpV6
principal.ip
alertInfo.srcIp
principal.ip
alertInfo.srcMachineIp
principal.ip
agentDetectionInfo.agentIpV4
principal.asset.ip
agentDetectionInfo.agentIpV6
principal.asset.ip
alertInfo.srcIp
principal.asset.ip
alertInfo.srcMachineIp
principal.asset.ip
agentDetectionInfo.agentLastLoggedInUpn
principal.labels[agent_detection_info_last_logged_in_upn]
(deprecated)agentDetectionInfo.agentLastLoggedInUpn
additional.fields[agent_detection_info_last_logged_in_upn]
agentDetectionInfo.agentLastLoggedInUserMail
principal.user.email_addresses
agentDetectionInfo.agentLastLoggedInUserName
principal.user.attribute.labels[agent_last_loggedIn_user_name]
agentDetectionInfo.agentMitigationMode
principal.asset.attribute.labels[agent_detection_info_mitigation_mode]
agentDetectionInfo.agentRegisteredAt
principal.asset.first_discover_time
agentDetectionInfo.externalIp
principal.nat_ip
agentDetectionInfo.groupId
principal.group.attribute.labels[agent_detection_info_group_id]
agentRealtimeInfo.groupId
principal.group.attribute.labels[agent_realtime_info_group_id]
agentDetectionInfo.groupName
principal.group.group_display_name
agentDetectionInfo.groupName
log field value is not
empty, then the agentDetectionInfo.groupName
log field is mapped to the principal.group.group_display_name
UDM field.If the
agentDetectionInfo.groupName
log field value is empty and the agentRealtimeInfo.groupName
log field value is not
empty, then the agentRealtimeInfo.groupName
log field is mapped to the principal.group.group_display_name
UDM field.Else, the
agentRealtimeInfo.groupName
log field is mapped to the principal.group.attribute.labels.agent_realtime_info_group_name
UDM field.agentRealtimeInfo.groupName
principal.group.group_display_name
agentDetectionInfo.groupName
log field value is not
empty, then the agentDetectionInfo.groupName
log field is mapped to the principal.group.group_display_name
UDM field.If the
agentDetectionInfo.groupName
log field value is empty and the agentRealtimeInfo.groupName
log field value is not
empty, then the agentRealtimeInfo.groupName
log field is mapped to the principal.group.group_display_name
UDM field.Else, the
agentRealtimeInfo.groupName
log field is mapped to the principal.group.attribute.labels.agent_realtime_info_group_name
UDM field.agentDetectionInfo.siteName
principal.labels[agent_detection_info_site_name]
(deprecated)agentDetectionInfo.siteName
additional.fields[agent_detection_info_site_name]
agentRealtimeInfo.siteName
principal.labels[agent_realtime_info_site_name]
(deprecated)agentRealtimeInfo.siteName
additional.fields[agent_realtime_info_site_name]
agentRealtimeInfo.accountId
principal.labels[agent_realtime_info_account_id]
(deprecated)agentRealtimeInfo.accountId
additional.fields[agent_realtime_info_account_id]
agentRealtimeInfo.accountName
principal.labels[agent_realtime_info_account_name]
(deprecated)agentRealtimeInfo.accountName
additional.fields[agent_realtime_info_account_name]
agentRealtimeInfo.activeThreats
security_result.detection_fields[agent_realtime_info_active_threats]
agentRealtimeInfo.agentDecommissionedAt
principal.asset.attribute.labels[agent_realtime_info_agent_decommissioned_at]
agentRealtimeInfo.agentDomain
principal.labels[agent_realtime_info_domain]
(deprecated)agentRealtimeInfo.agentDomain
additional.fields[agent_realtime_info_domain]
agentRealtimeInfo.agentId
principal.asset.attribute.labels[agent_realtime_info_agent_id]
agentRealtimeInfo.agentMitigationMode
principal.asset.attribute.labels[agent_realtime_info_mitigation_mode]
agentRealtimeInfo.agentNetworkStatus
principal.labels[agent_realtime_info_network_status]
(deprecated)agentRealtimeInfo.agentNetworkStatus
additional.fields[agent_realtime_info_network_status]
agentRealtimeInfo.agentOsType
principal.labels[agent_realtime_info_os_type]
(deprecated)agentRealtimeInfo.agentOsType
additional.fields[agent_realtime_info_os_type]
agentRealtimeInfo.networkInterfaces.id
principal.labels[network_interface_id]
agentRealtimeInfo.networkInterfaces.name
principal.labels[network_interface_name]
agentRealtimeInfo.networkInterfaces.physical
principal.labels[network_interface_physical]
agentRealtimeInfo.operationalState
principal.asset.attribute.labels[agent_realtime_info_operational_State]
agentRealtimeInfo.rebootRequired
principal.labels[agent_realtime_info_reboot_required]
(deprecated)agentRealtimeInfo.rebootRequired
additional.fields[agent_realtime_info_reboot_required]
agentRealtimeInfo.scanAbortedAt
security_result.detection_fields[agent_realtime_info_scan_aborted_at]
agentRealtimeInfo.scanFinishedAt
security_result.detection_fields[agent_realtime_info_scan_finished_at]
agentRealtimeInfo.scanStartedAt
security_result.detection_fields[agent_realtime_info_scan_started_at]
agentRealtimeInfo.scanStatus
security_result.detection_fields[agent_realtime_info_scan_status]
agentRealtimeInfo.siteId
principal.labels[agent_realtime_info_site_id]
(deprecated)agentRealtimeInfo.siteId
additional.fields[agent_realtime_info_site_id]
agentRealtimeInfo.storageName
principal.resource.name
principal.resource.resource_type
agentRealtimeInfo.storageName
log field value is not
empty, then the principal.resource.resource_type
UDM field is set to STORAGE_OBJECT
.agentRealtimeInfo.storageType
principal.resource.resource_subtype
agentRealtimeInfo.userActionsNeeded
security_result.detection_fields[agent_realtime_info_user_actions_needed]
agentRealtimeInfo.userActionsNeeded
log field value is not
empty, then the agentRealtimeInfo.userActionsNeeded
log field is mapped to the security_result.detection_fields.agent_realtime_info_user_actions_needed
UDM field.containerInfo.isContainerQuarantine
target.resource.attribute.labels[container_is_container_quarantine]
indicators.category
security_result.category_details
indicators.categoryId
security_result.detection_fields[indicators_category_id]
indicators.description
security_result.description
indicators.ids
security_result.detection_fields[indicators_ids]
security_result.attack_details.tactics.id
indicators.tactics.name
security_result.attack_details.tactics.name
indicators.tactics.name
log field value is not
empty, then the indicators.tactics.name
log field is mapped to the security_result.attack_details.tactics.name
UDM field.indicators.tactics.source
security_result.detection_fields[indicators_tactics_source]
indicators.tactics.techniques.link
security_result.detection_fields[indicators_tactics_techniques_link]
indicators.tactics.techniques.name
security_result.attack_details.techniques.id
indicators.tactics.techniques.name
log field value is not
empty, then the indicators.tactics.techniques.name
log field is mapped to the security_result.attack_details.techniques.id
UDM field.
security_result.attack_details.techniques.name
security_result.attack_details.techniques.subtechnique_id
security_result.attack_details.techniques.subtechnique_name
kubernetesInfo.isContainerQuarantine
target.resource_ancestors.attribute.labels[kubernetes_is_container_quarantine]
kubernetesInfo.nodeLabels
target.resource_ancestors.attribute.labels[kubernetes_node_labels]
mitigationStatus.action
security_result.detection_fields[mitigation_status_action]
mitigationStatus.actionsCounters.failed
security_result.detection_fields[mitigation_status_actions_counters_failed]
mitigationStatus.actionsCounters.notFound
security_result.detection_fields[mitigation_status_actions_counters_not_Found]
mitigationStatus.actionsCounters.pendingReboot
security_result.detection_fields[mitigation_status_actions_counters_pending_reboot]
mitigationStatus.actionsCounters.success
security_result.detection_fields[mitigation_status_actions_counters_success]
mitigationStatus.actionsCounters.total
security_result.detection_fields[mitigation_status_actions_counters_total]
mitigationStatus.agentSupportsReport
security_result.detection_fields[mitigation_status_agent_supports_report]
mitigationStatus.groupNotFound
security_result.detection_fields[mitigation_status_group_not_found]
mitigationStatus.lastUpdate
security_result.detection_fields[mitigation_status_last_update]
mitigationStatus.latestReport
security_result.detection_fields[mitigation_status_last_report]
mitigationStatus.mitigationEndedAt
security_result.detection_fields[mitigation_status_mitigation_ended_at]
mitigationStatus.mitigationStartedAt
security_result.detection_fields[mitigation_status_mitigation_started_at]
mitigationStatus.status
security_result.detection_fields[mitigation_status]
threatInfo.analystVerdict
security_result.detection_fields[analystVerdict]
threatInfo.analystVerdictDescription
security_result.detection_fields[analyst_verdict_description]
threatInfo.automaticallyResolved
security_result.detection_fields[automatically_resolved]
threatInfo.browserType
security_result.detection_fields[browser_type]
threatInfo.certificateId
security_result.detection_fields[certificate_id]
threatInfo.classification
security_result.category_details
security_result.category
threatInfo.classification
log field value contain one of the following values, then the security_result.category
UDM field is set to SOFTWARE_MALICIOUS
. -
Malware
-
Ransomware
-
Linux.Malware
-
OSX.Malware
-
Manual
Else, if the
threatInfo.classification
log field value contain one of the following values, then the security_result.category
UDM field is set to SOFTWARE_SUSPICIOUS
. -
Trojan
-
miner
-
Virus
-
Malicious PDF
-
Worm
-
Rootkit
-
Infostealer
-
Lateral Movement
-
Generic.Heuristic
-
Downloader
-
Backdoor
-
Hacktool
-
Browser
-
Dialer
-
Installer
-
Packed
-
Network
-
Spyware
-
Interactive shell
-
Remote shell
Else, if the
threatInfo.classification
log field value contain one of the following values, then the security_result.category
UDM field is set to NETWORK_SUSPICIOUS
. -
Lateral Movement
-
Remote shell
Else, if the
threatInfo.classification
log field value is equal to Exploit
, then the security_result.category
UDM field is set to EXPLOIT
.Else, if the
threatInfo.classification
log field value is equal to Application Control
, then the security_result.category
UDM field is set to UNKNOWN_CATEGORY
.If the
alertInfo.eventType
log field value contain one of the following values, then the security_result.category
UDM field is set to SOFTWARE_MALICIOUS
. -
BEHAVIORALINDICATORS
-
MALICIOUSFILE
threatInfo.classificationSource
security_result.detection_fields[classification_source]
threatInfo.cloudFilesHashVerdict
security_result.detection_fields[cloud_Files_hash_verdict]
threatInfo.collectionId
security_result.detection_fields[collection_id]
threatInfo.confidenceLevel
security_result.confidence_details
security_result.confidence
threatInfo.confidenceLevel
log field value is equal to malicious
, then the security_result.confidence
UDM field is set to HIGH_CONFIDENCE
.Else, if the
threatInfo.confidenceLevel
log field value is equal to suspicious
, then the security_result.confidence
UDM field is set to MEDIUM_CONFIDENCE
.threatInfo.createdAt
metadata.collected_timestamp
threatInfo.detectionEngines
security_result.detection_fields[detection_engines]
threatInfo.detectionEngines
log field value is not
empty, then the threatInfo.detectionEngines
log field is mapped to the security_result.detection_fields.detection_engines
UDM field.threatInfo.detectionEngines.key
security_result.detection_fields[detection_engines_key]
threatInfo.detectionEngines.key
log field value is not
empty, then the threatInfo.detectionEngines.key
log field is mapped to the security_result.detection_fields.detection_engines_key
UDM field.threatInfo.detectionEngines.title
security_result.detection_fields[detection_engines_title]
threatInfo.detectionEngines.title
log field value is not
empty, then the threatInfo.detectionEngines.title
log field is mapped to the security_result.detection_fields.detection_engines_title
UDM field.threatInfo.detectionType
security_result.detection_fields[detection_type]
threatInfo.engines
security_result.detection_fields[engines]
threatInfo.engines
log field value is not
empty, then the threatInfo.engines
log field is mapped to the security_result.detection_fields.engines
UDM field.threatInfo.externalTicketExists
security_result.detection_fields[external_ticket_exists]
threatInfo.externalTicketExists.description
security_result.detection_fields[external_ticket_exists_description]
threatInfo.externalTicketExists.readOnly
security_result.detection_fields[external_ticket_exists_readOnly]
threatInfo.externalTicketId
security_result.detection_fields[external_ticket_id]
threatInfo.failedActions
security_result.detection_fields[failed_actions]
threatInfo.fileExtension
target.file.mime_type
threatInfo.fileExtensionType
security_result.detection_fields[file_extension_type]
threatInfo.filePath
target.file.full_path
threatInfo.filePath.description
security_result.detection_fields[file_path_description]
threatInfo.filePath.readOnly
security_result.detection_fields[file_path_readOnly]
threatInfo.fileSize
target.file.size
threatInfo.fileVerificationType
security_result.detection_fields[file_verification_type]
threatInfo.incidentStatus
security_result.detection_fields[incident_status]
threatInfo.incidentStatusDescription
security_result.detection_fields[incident_status_description]
threatInfo.incidentStatusDescription.description
security_result.detection_fields[incident_status_description]
threatInfo.incidentStatusDescription.readOnly
security_result.detection_fields[incident_status_description_readOnly]
threatInfo.initiatedBy
security_result.detection_fields[initiatedBy]
threatInfo.initiatedByDescription
security_result.detection_fields[initiatedBy_description]
threatInfo.initiatedByDescription.description
security_result.detection_fields[initiatedBy_description]
threatInfo.initiatedByDescription.readOnly
security_result.detection_fields[initiatedBy_description_readOnly]
threatInfo.initiatingUserId
principal.user.attribute.labels[initiating_user_id]
threatInfo.isFileless
security_result.detection_fields[is_fileless]
threatInfo.isFileless.description
security_result.detection_fields[is_fileless_description]
threatInfo.isFileless.readOnly
security_result.detection_fields[is_fileless_readOnly]
threatInfo.isValidCertificate
security_result.detection_fields[is_valid_certificate]
threatInfo.maliciousProcessArguments
security_result.detection_fields[malicious_process_arguments]
threatInfo.md5
target.file.md5
threatInfo.md5
log field value matches the regular expression pattern ^[a-f0-9]{32}$
, then the threatInfo.md5
log field is mapped to the target.file.md5
UDM field.threatInfo.mitigatedPreemptively
security_result.detection_fields[mitigated_preemptively]
threatInfo.mitigationStatus
security_result.action_details
security_result.threat_status
threatInfo.mitigationStatus
log field value contain one of the following values, then the security_result.threat_status
UDM field is set to CLEARED
. -
mitigated
-
marked_as_benign
-
blocked
-
suspicious_resolved
threatInfo.mitigationStatus
log field value contain one of the following values, then the security_result.threat_status
UDM field is set to ACTIVE
. -
active
-
suspicious
-
pending
-
not_mitigated
threatInfo.mitigationStatusDescription
security_result.detection_fields[mitigation_status_description]
threatInfo.mitigationStatusDescription.description
security_result.detection_fields[mitigation_status_description]
threatInfo.mitigationStatusDescription.readOnly
security_result.detection_fields[mitigation_status_description_readOnly]
threatInfo.originatorProcess
principal.process.parent_process.file.names
threatInfo.pendingActions
security_result.detection_fields[pending_actions]
threatInfo.processUser
principal.user.userid
threatInfo.publisherName
security_result.threat_feed_name
threatInfo.reachedEventsLimit
security_result.detection_fields[reached_events_limit]
threatInfo.rebootRequired
security_result.detection_fields[reboot_required]
threatInfo.sha1
target.file.sha1
threatInfo.sha1
log field value matches the regular expression pattern ^[a-f0-9]{40}$"
, then the threatInfo.sha1
log field is mapped to the target.file.sha1
UDM field.threatInfo.sha256
target.file.sha256
threatInfo.sha256
log field value matches the regular expression pattern ^[a-f0-9]{64}$"
, then the threatInfo.sha256
log field is mapped to the target.file.sha256
UDM field.threatInfo.storyline
security_result.detection_fields[storyline]
threatInfo.threatId
security_result.threat_id
threatInfo.threatName
security_result.threat_name
threatInfo.threatName
target.file.names
threatInfo.updatedAt
security_result.detection_fields[updatedAt]
whiteningOptions
about.labels[whitening_options]
whiteningOptions
log field value is not
empty, then the whiteningOptions
log field is mapped to the about.labels.whitening_options
UDM field.agentDetectionInfo.cloudProviders.AWS.awsRole
principal.resource.attribute.roles.name
agentDetectionInfo.cloudProviders.AWS.awsSecurityGroups
principal.resource.attribute.labels[cloud_providers_AWS_security_groups]
agentDetectionInfo.cloudProviders.AWS.awsSecurityGroups
log field value is not
empty, then the agentDetectionInfo.cloudProviders.AWS.awsSecurityGroups
log field is mapped to the principal.resource.attribute.labels.cloud_providers_AWS_security_groups
UDM field.agentDetectionInfo.cloudProviders.AWS.awsSubnetIds
principal.resource.attribute.labels[cloud_providers_AWS_subnet_ids]
agentDetectionInfo.cloudProviders.AWS.awsSubnetIds
log field value is not
empty, then the agentDetectionInfo.cloudProviders.AWS.awsSubnetIds
log field is mapped to the principal.resource.attribute.labels.cloud_providers_AWS_subnet_ids
UDM field.agentDetectionInfo.cloudProviders.AWS.cloudAccount
principal.resource.attribute.labels[cloud_providers_AWS_cloud_account]
agentDetectionInfo.cloudProviders.AWS.cloudImage
principal.resource.attribute.labels[cloud_providers_AWS_cloud_image]
agentDetectionInfo.cloudProviders.AWS.cloudInstanceId
principal.resource.attribute.labels[cloud_providers_AWS_cloud_instance_id]
agentDetectionInfo.cloudProviders.AWS.cloudInstanceSize
principal.resource.attribute.labels[cloud_providers_AWS_cloud_instance_size]
agentDetectionInfo.cloudProviders.AWS.cloudLocation
principal.resource.attribute.cloud.availability_zone
agentDetectionInfo.cloudProviders.AWS.cloudNetwork
principal.resource.attribute.labels[cloud_providers_AWS_cloud_network]
agentDetectionInfo.cloudProviders.AWS.cloudTags
principal.resource.attribute.labels[cloud_providers_AWS_cloud_tags]
agentDetectionInfo.cloudProviders.AWS.cloudTags
log field value is not
empty, then the agentDetectionInfo.cloudProviders.AWS.cloudTags
log field is mapped to the principal.resource.attribute.labels.cloud_providers_AWS_cloud_tags
UDM field.modular_input_consumption_time
about.labels[modular_input_consumption_time]
(deprecated)modular_input_consumption_time
additional.fields[modular_input_consumption_time]
timestamp
about.labels[timestamp]
(deprecated)timestamp
additional.fields[timestamp]
updatedAt
about.labels[updatedAt]
(deprecated)updatedAt
additional.fields[updatedAt]
What's next
Need more help? Get answers from Community members and Google SecOps professionals.