Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Current »

Introduction

The tags beginning with cef0.fidelisCybersecurity identify events in CEF format generated by Fidelis Security.

Tag structure

Events in CEF format don't have a specific tag structure, as explained in Technologies supported in CEF syslog format. They are always sent to a table with the structure cef0.deviceVendor.deviceProduct.

In this case, the valid data tables are:

Tags

Data tables

cef0.fidelisCybersecurity.directv

cef0.fidelisCybersecurity.directv

How is the data sent to Devo?

Learn more about CEF syslog format and how Devo tags these events in Technologies supported in CEF syslog format.

Table structure

These are the fields displayed in this table:

cef0.fidelisCybersecurity.directv

Field

Type

Source field name

Extra fields

eventdate

timestamp

hostname

str

priorityCode

str

cefTag

str

cefVersion

str

embDeviceVendor

str

embDeviceProduct

str

deviceVersion

str

signatureID

str

name

str

severity

str

reason

str

fileHash

str

dst

ip4

requestMethod

str

rt

str

dvc

ip4

fname

str

requestClientApplication

str

act

str

dvchost

str

msg

str

src

ip4

spt

int4

duser

str

proto

str

suser

str

dpt

str

target

str

url

str

sev

str

cs1Label

str

cs1

str

cs2Label

str

cs2

str

cs3Label

str

cs3

str

cs4Label

str

cs4

str

cs5Label

str

cs5

str

cs6Label

str

cs6

str

cn1Label

str

cn1

int8

cn2Label

str

cn2

int8

hostchain

str

tag

str

cefTag

rawMessage

str

  • No labels