Vendor Field Map

Symantec Security Taxonomy Mapping

The following table maps the vendor fields to the LogPoint taxonomy:

Vendor Fields

LogPoint Fields

Action Type

action_type

Action

action

Actual action

action

Admin

user

Application

application

Application hash

hash

Application name

application

Application path

path

Application type

application_type

Application Version

application_version

Begin

start_ts

Category

category

category set

event_category

Category type

category

Certificate issuer

certificate_issuer

Certificate serial number

certificate_serial_number

Certificate signer

certificate_signer

Certificate thumbprint

certificate_hash

CIDS Signature ID

cids_signature_id

CIDS Signature string

cids_signature

CIDS Signature SubID

cids_signature_subid

COH Engine Version

coh_engine_version

Command

command

Company

organization

Company name

organization

Computer

workstation

Computer name

workstation

Confidence

confidence

Detection Source

detection_source

Detection Score

detection_score

Detection Submissions

detection_submission

Detection type

detection_type

Device ID

device_id

Disposition

disposition

Domain

domain

Domain Name

domain

Download site

download_site

Downloaded by

downloaded_by

Duration (seconds)

duration

End

end_ts

End Time

end_ts

Event time

event_ts

File size (bytes)

datasize

First Seen

first_seen

Group

group

Group Name

group

Hash type

cipher

Infected

infection_count

infected file count

infection_count

Inserted

insert_ts

Intensive Protection Level

protection_level

Intrusion ID

intrusion_id

Intrusion Payload URL

intrusion_payload_url

Intrusion URL

url

IP Address

host_address

Last update time

last_update_ts

Local Host

source_address

Local Host IP

source_address

Local Host MAC

source_hardware_address

Local Port

source_port

Location

location

MD5

hash

Occurrences

occurrence_count

Omitted

omission_count

Permitted application reason

reason

Prevalence

prevalence

Remote Host IP

destination_address

Remote Host MAC

destination_hardware_address

Remote Host Name

destination_host

Remote Port

destination_port

Requested action

requested_action

Risk

malware

Risk Level

threat_level

Risk name

malware

Risk type

threat_type

Rule

rule

Scan ID

scan_id

Secondary action

secondary_action

Sensitivity

sensitivity

Server

server

Server Name

server

SHA_256

hash_sha256

Signing timestamp

signing_time

Site

site

Source computer

source_workstation

Source IP

source_address

Source

event_source

Threats

threat_count

Total files

file_count

URL Tracking Status

url_tracking_status

User

user

User1

user

User2

caller_user

User Name

user

Web domain

web_domain

Symantec EndPoint Protection

The following table lists labels for actions related to the Symantec EndPoint Protection:

Action

Labels

Virus found

Malware, Risk, Detect, Virus

Security risk found

Security,Risk,Detect

SONAR detection now permitted

SONAR,Detect,Risk

Compressed File

File,Compression,Risk

Malicious Site

Malicious

Web Attack

Web,Attack

Quarantined

Quarantine

disabled

Disable

enabled

Enable

Allowed

Allow

Blocked

Deny

Virus and Spyware Definitions

Malware,Spyware,Definition

Intrusion Prevention Signature

Signature

SONAR Definitions

SONAR Definition

Intrusion Prevention

Intrusion,Prevention

OS Attack

OS,Attack

scan

Scan

Completed

Complete

install,success

Installation,Successful

install,fail

Installation,Fail

block traffic

Deny,Traffic

Block access

Access,Deny

malware

Malware

Traffic blocked

Deny,Traffic

Traffic has been blocked for this application

Deny,Application,Traffic

Symantec Antivirus

The following table lists labels for Event IDs related to the Symantec Antivirus:

Event ID

Labels

45

Integrity,Protection

7

Virus,Malware,File,Load

Symantec EmailGateway

The following tables lists labels for actions related to the Symantec EmailGateway:

Action

Labels

Quarantined

Quarantine,Email

Blocked

Block,Email

Allow

Allow,Email

Symantec Mail Security

The following tables lists labels for Event IDs related to the Symantec Mail Security:

Event ID

Labels

303

Policy,Violate

381

Policy,Violate

291

Policy,Violate

218

Policy,Violate

236

Quarantine,Directory,Exceed,Limit

30

Virus,Malware,Definition,Update,Successful


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support