The following field words are used to write signatures that normalizes the raw logs. We recommended you to use these fields to write signatures.
A
access access_control_list access_list access_mask access_point access_rights account_name acl_name action action_code action_flags action_group action_id actual_action actual_mps admin admin_id admin_name agent alarm_type alert_id alert_message alert_name alert_type alertrule_id algorithm_name another_patient another_patient_id answer antivirus application application_action application_category application_hash application_id application_list application_name application_type application_version attack_group attack_id attack_message attack_type attacking_ip attribute_name audit_name authentication_sourceB
backend_name branch browser bss_idC
cache_info caller_address caller_computer caller_database_user caller_domain caller_login caller_logon_id caller_object caller_user callout_name cat_id category category_id certificate_name change_type changes channel child_object_type child_object_url class_type cleaned_items cleanup_time client client_address client_agent client_domain client_port client_type client_user code command command_name comment company_name component component_version computer_name confidence configuration_path connection_id connection_name connection_time consumer consumer_id content_type context_name correlation_id count counter cpu_time cpu_usage current_timeD
database database_id database_name database_option database_principal_id database_principal_name datarate datasize datatypeid date default_context deleted_datasize deleted_mailboxes description destination destination_address destination_dns destination_domain destination_email destination_interface destination_ip destination_location destination_mac_address destination_network destination_object destination_port destination_release destination_url destination_zone destinaton_address detection_timestamp device device_address device_address_ipv6 device_host device_id device_type dhcid direction directory disk dispatch_type display_name disposition DNS doable_mps document_id domain download_site downloaded_by dst_ip dst_name duration duration_seconds dvc_hostE
email_id email_port encryption end_datasize end_items end_time endpoint_address endpoint_domain error error_code error_message error_messsage establish_time event event_category event_id event_level event_log event_name event_source event_tag event_time event_type exceptionF
facility failure_code feature file file_name file_path file_size file_type files_skipped filter filter_action filter_info first_seen flags folder folder_id folder_name free_size from_release frontend_name function_name funtion_nameG
gateway generated_bytes generated_records generated_time group group_id group_nameH
handle handle_id hardware_address hash_key hash_type healthy hierarchy hip_name hip_type host host_name host_url host_user httpI
id identity imap in_use inbound_spi incident_id infected infection_destination infection_destination_address infection_source infection_source_address inserted_time inspection_subrule instance institution interface interface_address interface_name interface_state intrusion_id intrusion_url investigation_id IoDepth is_column_permissionJ
job job_id job_nameK
kernel_time keyL
last_update_time layer_name lease_address lease_duration license life_id link local_address local_proxy location log_ts log_type login_id login_name logon_id logon_ID logon_type lower_limitM
mac_address machine mail_id mailbox mailbox_guid mailbox_owner mailer malware_id_mcafee malware_id_sophos malware_id_webroot map mapped_name match_option matched_criteria mdb_guid member_id member_name message message_id message_subject message_type method mime_type mobile_number mobile_station most_used mount_point msg_idmac_addressN
name nas_address nas_identifier nas_port nat_address nat_destination_address nat_destination_port nat_source_address nat_source_port nc_address net_mask network_device_name network_user network_view new_bandwidth new_memory new_policy new_port new_status new_user new_value new_value_type node ns_name numberO
object object_count object_id object_name object_server object_source object_type object_url occurrences oid old_bandwidth old_memory old_port old_status old_value old_value_type omitted operation operation_type operations outbound_datasize outbound_spi OutgoingConnections ownerP
package package_name packet pages_read pages_updated palyload_name parent_network parent_object_filepath parent_object_subtype parent_object_type parent_object_url parent_process parent_process_id passcode_type path patient_id patient_name payload_url peer_address peer_interface peer_interface_state peer_ip peer_name permission_bitmask permission_level_id physical_memory physical_memory_percent pin_code policy policy_applied policy_id policy_name pool_name pop3 port port_channel port_id port_name portnum prevalence previous_time primary_dns_address priority private_address privilege probation_time probe_name process process_id process_name processed_mailboxes product profile profile_changed profile_name profile_used property protocol protocol_id protocol_map provider_nameQ
query query_result queue_idR
radioband realm reason reason_code received_datasize received_packetsize receiver recipient record record_name record_type referer relay_address relay_interface remaining_mailboxes remote_address remote_proxy remote_user repeat_count repos reputation reputation_score request_date request_guid request_id request_method requested_action resolved_domain resource response_time result result_code retained_datasize retained_mailboxes return_code risk risk_level risk_name risk_type roaming role role_id role_name root_context rows_deleted rule rule_id rule_name rulebaseS
scan_id scanned scanned_items scanner_address scanner_node schema schema_name scheme scope search_id search_name secondary_actions secondary_dns_address secondary_user security sender sensitivity sensor_id sent_datasize sent_packetsize seperated_mailboxes sequence_number serial serial_number server server_address server_host server_instance_name server_name server_principal_id server_principal_name server_principal_sid server_time service service_name Service_start_type Service_type service_type session session_id session_name session_server_principal_name sever_address severity shutdown_type signature_id site size size_limit skipped_mailboxes smoke smtp snapshot snort_id source source_addresss source_computer source_destination source_dns source_domain source_handle_id source_host source_interface source_ip source_location source_mac_address source_network source_object source_port source_zone spi spi_code spyware ssid start_datasize start_items start_time state statement station_identifier status status_code status_msg sub_category sub_status_code subject substatus_code succeeded synchronized_files system system_idT
table target_account target_database_principal_id target_database_principal_name target_database_user target_domain target_entity target_handle_id target_login target_logon_id target_name target_object target_process target_server_principal_id target_server_principal_name target_server_principal_sid target_type target_user task tenant tenant_id terminal terrmination_state thread_id threat threat_category threat_id threat_level threat_severity tid time time_zone timerange_end timerange_start token_type total transaction_id transport typeU
unit update update_ts upper_limit url url_category url_category_name url_query url_tracking use used user user_time user_typeV
value vendor vendor_id virtual_address virtual_firewall virtual_memory virus virus_name vpn_address vpn_variantW
waiting_time web_domain workstationZ
zone
We are glad this guide helped.
Please don't include any personal information in your comment
Contact Support