utm.hawkeye
Introduction
The tags beginning with utm.hawkeye
identify events generated by Juniper Networks Advanced Threat Prevention (formerly of Cyphort)
Valid tags and data tables
The full tag must have 3 levels. The first two are fixed as utm.hawkeye
. The third level identifies the type of events sent.
These are the valid tags and corresponding data tables that will receive the parsers' data:
Product / Service | Tags | Data tables |
---|---|---|
Juniper Networks Advanced Threat Prevention (formerly of Cyphort) |
|
|
For more information, read more About Devo tags.
Table structure
These are the fields displayed in this table:
utm.hawkeye.cyphort
Field | Type | Source field name | Extra fields |
---|---|---|---|
eventdate |
|
|
|
host |
| vhost |
|
rawMessage |
| rawSource |
|
cef |
|
|
|
device |
|
|
|
model |
|
|
|
version |
|
|
|
process |
|
|
|
platform |
|
|
|
id |
|
|
|
rt |
|
|
|
cs1Label |
|
|
|
cs1 |
|
|
|
cs2Label |
|
|
|
cs2 |
|
|
|
cs3Label |
|
|
|
cs3 |
|
|
|
shost |
|
|
|
srcIp |
|
| ✓ |
hostchain |
|
| ✓ |
tag |
|
| ✓ |