Document toolboxDocument toolbox

cef0.fidelisCybersecurity

Introduction

The tags beginning with cef0.fidelisCybersecurity identify events in CEF format generated by Fidelis Security.

Tag structure

Events in CEF format don't have a specific tag structure, as explained in Technologies supported in CEF syslog format. They are always sent to a table with the structure cef0.deviceVendor.deviceProduct.

In this case, the valid data tables are:

Tags

Data tables

Tags

Data tables

cef0.fidelisCybersecurity.directv

cef0.fidelisCybersecurity.directv

How is the data sent to Devo?

Learn more about CEF syslog format and how Devo tags these events in Technologies supported in CEF syslog format.

Table structure

These are the fields displayed in this table:

cef0.fidelisCybersecurity.directv

Field

Type

Source field name

Extra fields

Field

Type

Source field name

Extra fields

eventdate

timestamp

 

 

hostname

str

 

 

priorityCode

str

 

 

cefTag

str

 

 

cefVersion

str

 

 

embDeviceVendor

str

 

 

embDeviceProduct

str

 

 

deviceVersion

str

 

 

signatureID

str

 

 

name

str

 

 

severity

str

 

 

reason

str

 

 

fileHash

str

 

 

dst

ip4

 

 

requestMethod

str

 

 

rt

str

 

 

dvc

ip4

 

 

fname

str

 

 

requestClientApplication

str

 

 

act

str

 

 

dvchost

str

 

 

msg

str

 

 

src

ip4

 

 

spt

int4

 

 

duser

str

 

 

proto

str

 

 

suser

str

 

 

dpt

str

 

 

target

str

 

 

url

str

 

 

sev

str

 

 

cs1Label

str

 

 

cs1

str

 

 

cs2Label

str

 

 

cs2

str

 

 

cs3Label

str

 

 

cs3

str

 

 

cs4Label

str

 

 

cs4

str

 

 

cs5Label

str

 

 

cs5

str

 

 

cs6Label

str

 

 

cs6

str

 

 

cn1Label

str

 

 

cn1

int8

 

 

cn2Label

str

 

 

cn2

int8

 

 

hostchain

str

 

✓

tag

str

cefTag

✓

rawMessage

str

 

✓