Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

Version 1 Current »

Introduction

Tables beginning withcef0.stealthbitstechnologies identify events in CEF format generated by Stealthbits technologies.

Tag structure

Events in CEF format don't have a specific tag structure, as explained in Technologies supported in CEF syslog format. They are always sent to a table with the structure cef0.deviceVendor.deviceProduct.

In this case, the valid data tables are:

Tags

Data tables

cef0.stealthbitsTechnologies.stealthdefend

cef0.stealthbitsTechnologies.stealthdefend

How is the data sent to Devo?

Learn more about CEF syslog format and how Devo tags these events in Technologies supported in CEF syslog format.

Table structure

These are the fields displayed in this table:

cef0.stealthbitsTechnologies.stealthdefend

Field

Type

Source field name

Extra fields

eventdate

timestamp

hostname

str

priority_code

str

cef_tag

str

cef_version

str

emb_device_vendor

str

emb_device_product

str

device_version

str

signature_id

str

name

str

severity

str

computers

str

evidence

str

file_name

str

new_file_name

str

process

str

threat_time

str

threat_type

str

users

str

hostchain

str

tag

str

cef0Tag

rawMessage

str

  • No labels