The tags beginning with vuln.beyondtrust
identify events generated by BeyondTrust vulnerability management.
The full tag must have 3 levels. The first two are fixed as vuln.beyondtrust
. The third level identifies the type of events sent.
These are the valid tags and corresponding data tables that will receive the parsers' data:
Product / Service | Tags | Data tables |
---|---|---|
Beyond Trust vulnerability management |
|
|
| ||
|
| |
| ||
|
|
For more information, read more About Devo tags.
Data should be sent using the relay.
In BeyondTrust solutions, you can set up a connector that enables syslog event forwarding. The events should be directed to a Devo relay where a relay rule applies the correct tag, then forwards the events securely to your Devo domain.
For information about setting up syslog event forwarding, see the BeyondInsight and Password Safe Third-Party Integration Guide.
Source message: Source data: Agent ID: ([^ ]+) Source tag: Target tag: vuln.beyondtrust.\\D1 Sent without syslog tag: false Stop processing: true |
These are the fields displayed in these tables:
Field | Type | Field transformation | Source field name | Extra fields | |
---|---|---|---|---|---|
eventdate |
| ||||
host |
| ||||
agent_desc |
| ||||
agent_id |
| ||||
agent_ver |
| ||||
category |
| ||||
source_host |
| ||||
event_desc |
| ||||
event_name |
| ||||
os |
| ||||
event_severity |
| ||||
source_ip |
| ||||
event_subject |
| ||||
event_type |
| ||||
user |
| ||||
workgroup_desc |
| ||||
workgroup_id |
| ||||
workgroup_location |
| ||||
audit_id |
| ||||
action_type |
| ||||
system_name |
| ||||
app_user_id |
| ||||
create_date |
|
| mycreatedate | ||
ip_address |
| ||||
user_name2 |
| ||||
groupp |
| ||||
auth_type |
| ||||
domain_name |
| ||||
sam_account_name |
| ||||
source |
| ||||
message |
| ||||
address_group_name |
| ||||
id |
| ||||
smart_rule_name |
| ||||
report_name |
| ||||
asset_name |
| ||||
unknown |
| ||||
rawMessage |
| ||||
hostchain |
| ✓ | |||
tag |
| ✓ |
Field | Type | Field transformation | Source field name | Extra fields | |
---|---|---|---|---|---|
eventdate |
| ||||
host |
|
| hostchain | ||
agent_desc |
| ||||
agent_id |
| ||||
agent_ver |
| ||||
category |
| ||||
source_host |
| ||||
event_desc |
| ||||
event_name |
| ||||
os |
| ||||
event_severity |
| ||||
source_ip |
| ||||
event_subject |
| ||||
event_type |
| ||||
user |
| ||||
workgroup_desc |
| ||||
workgroup_id |
| ||||
workgroup_location |
| ||||
log_system_id |
| ||||
log_time |
| ||||
user_name |
| ||||
role_used |
| ||||
object_type_id |
|
| mycreatedate | ||
object_type |
| ||||
object_id |
| ||||
operation |
| ||||
failed |
| ||||
target |
| ||||
details |
| ||||
user_id |
| ||||
time_stamp |
| ||||
ip_address |
| ||||
unknown |
| ||||
rawMessage |
| ||||
hostchain |
| ✓ | |||
tag |
| ✓ |
Field | Type | Field transformation | Source field name | Extra fields | |
---|---|---|---|---|---|
eventdate |
| ||||
host |
|
| hostchain | ||
agent_desc |
| ||||
agent_id |
| ||||
agent_ver |
| ||||
category |
| ||||
source_host |
| ||||
event_desc |
| ||||
event_name |
| ||||
os |
| ||||
event_severity |
| ||||
source_ip |
| ||||
event_subject |
| ||||
event_type |
| ||||
user |
| ||||
workgroup_desc |
| ||||
workgroup_id |
| ||||
workgroup_location |
| ||||
company_name |
| ||||
description |
| ||||
filename |
| ||||
md5 |
| ||||
signer |
|
| mycreatedate | ||
version |
| ||||
product_name |
| ||||
author |
| ||||
idle_time |
| ||||
last_result |
| ||||
logon_mode |
| ||||
power_management |
| ||||
run_as_user |
| ||||
volume_name |
| ||||
stop_task_hours |
| ||||
task_name |
| ||||
task_to_run |
| ||||
startup_type |
| ||||
disable_auditing |
| ||||
disable_auditing_01 |
| ||||
rth_id |
| ||||
detected_protocol |
| ||||
port_state |
| ||||
port_type |
| ||||
response_type |
| ||||
wb_checked |
| ||||
wb_text |
| ||||
wb_context |
| ||||
cpe |
| ||||
product |
| ||||
image_path |
| ||||
detected_protocol_01 |
|
| mydetected_protocol | ||
port_state_01 |
| ||||
port_type_01 |
| ||||
version_01 |
| ||||
response_type_01 |
| ||||
free_vir_mem_01 |
| ||||
drive_desc_01 |
| ||||
sys_model_01 |
| ||||
member_count_01 |
| ||||
sid_01 |
| ||||
bad_pw_count_01 |
| ||||
enum_src_01 |
| ||||
asset_name_01 |
| ||||
dns_server |
| ||||
dhcp_name_server |
| ||||
destination |
| ||||
dcal |
| ||||
dependencies |
| ||||
state |
| ||||
alias |
| ||||
antispy_sig_last_update |
| ||||
attributes |
| ||||
dist_name_0 |
| ||||
registry_value |
| ||||
dns_name_01 |
| ||||
prin_group_id |
| ||||
base_address |
| ||||
folder_path |
| ||||
rth_ids_0 |
| ||||
rth_ids_1 |
| ||||
rth_ids_2 |
| ||||
rth_ids_3 |
| ||||
rth_ids_4 |
| ||||
rth_ids_5 |
| ||||
rth_ids_6 |
| ||||
rth_ids_7 |
| ||||
rth_ids_8 |
| ||||
rth_ids_9 |
| ||||
rth_ids_10 |
| ||||
rth_ids_11 |
| ||||
rth_ids_12 |
| ||||
rth_ids_13 |
| ||||
unknown |
| ||||
rawMessage |
| ||||
hostchain |
| ✓ | |||
tag |
| ✓ |
BeyondInsight and Password Safe Third-Party Integration Guide
Scenario 4: Assign dynamic Devo tag using inbound source data