A Unified Data Model event.
JSON representation |
---|
{ "metadata" : { object ( |
Fields | |
---|---|
metadata
|
Event metadata such as timestamp, source product, etc. |
additional
|
Any important vendor-specific event data that cannot be adequately represented within the formal sections of the UDM model. |
principal
|
Represents the acting entity that originates the activity described in the event. The principal must include at least one machine detail (hostname, MACs, IPs, port, product-specific identifiers like an EDR asset ID) or user detail (for example, username), and optionally include process details. It must NOT include any of the following fields: email, files, registry keys or values. |
src
|
Represents a source entity being acted upon by the participant along with the device or process context for the source object (the machine where the source object resides). For example, if user U copies file A on machine X to file B on machine Y, both file A and machine X would be specified in the src portion of the UDM event. |
target
|
Represents a target entity being referenced by the event or an object on the target entity. For example, in a firewall connection from device A to device B, A is described as the principal and B is described as the target. For a process injection by process C into target process D, process C is described as the principal and process D is described as the target. |
intermediary[]
|
Represents details on one or more intermediate entities processing activity described in the event. This includes device details about a proxy server or SMTP relay server. If an active event (that has a principal and possibly target) passes through any intermediaries, they're added here. Intermediaries can impact the overall action, for example blocking or modifying an ongoing request. A rule of thumb here is that 'principal', 'target', and description of the initial action should be the same regardless of the intermediary or its action. A successful network connection from A->B should look the same in principal/target/intermediary as one blocked by firewall C: principal: A, target: B (intermediary: C). |
observer
|
Represents an observer entity (for example, a packet sniffer or network-based vulnerability scanner), which is not a direct intermediary, but which observes and reports on the event in question. |
about[]
|
Represents entities referenced by the event that are not otherwise described in principal, src, target, intermediary or observer. For example, it could be used to track email file attachments, domains/URLs/IPs embedded within an email body, and DLLs that are loaded during a PROCESS_LAUNCH event. |
security_result[]
|
A list of security results. |
network
|
All network details go here, including sub-messages with details on each protocol (for example, DHCP, DNS, or HTTP). |
extensions
|
All other first-class, event-specific metadata goes in this message. Do not place protocol metadata in Extensions; put it in Network. |
extracted
|
Flattened fields extracted from the log. |
Extensions
Extensions to a UDM event.
JSON representation |
---|
{ "auth" : { object ( |
Fields | |
---|---|
auth
|
An authentication extension. |
vulns
|
A vulnerability extension. |
entity_risk
|
An entity risk change extension. |
Vulnerabilities
The Vulnerabilities extension captures details on observed/detected vulnerabilities.
JSON representation |
---|
{
"vulnerabilities"
:
[
{
object (
|
Fields | |
---|---|
vulnerabilities[]
|
A list of vulnerabilities. |