Document toolboxDocument toolbox

cef0.stealthbits

Introduction

Tables beginning withcef0.stealthbits identify events in CEF format generated by Stealthbits technologies.

Tag structure

Events in CEF format don't have a specific tag structure, as explained in Technologies supported in CEF syslog format. They are always sent to a table with the structure cef0.deviceVendor.deviceProduct.

In this case, the valid data tables are:

Tags

Data tables

Tags

Data tables

cef0.stealthbits.stealthintercept

cef0.stealthbits.stealthintercept

How is the data sent to Devo?

Learn more about CEF syslog format and how Devo tags these events in Technologies supported in CEF syslog format.

Table structure

These are the fields displayed in this table:

cef0.stealthbits.stealthintercept

Field

Type

Field transformation

Source field name

Extra fields

Field

Type

Field transformation

Source field name

Extra fields

eventdate

timestamp

 

 

 

hostchain

str

 

 

✓

hostname

str

 

 

 

cefTag

str

 

 

 

cefVersion

str

 

 

 

embDeviceVendor

str

 

 

 

embDeviceProduct

str

 

 

 

deviceVersion

str

 

 

 

signatureID

str

 

 

 

name

str

 

 

 

severity

str

 

 

 

rt

timestamp

 

 

 

sntdom

str

 

 

 

suser

str

 

 

 

src

str

 

 

 

duser

str

 

 

 

shost

str

 

 

 

Policy_Name

str

(msg -> "Policy_Name") ? split(msg, "= ", 1) : null

msg

 

Severity

str

 

 

 

Component

str

 

 

 

OrigServer

str

 

 

 

usrName

str

 

 

 

UserName

str

 

 

 

UserSID

str

 

 

 

Started

str

 

 

 

Ended

str

 

 

 

NumberOfLogins

str

 

 

 

UsedLoginProtocols

str

 

 

 

AttackingHost

str

 

 

 

AttackingHostIp

str

 

 

 

AttackedHost

str

 

 

 

AttackedHostIp

str

 

 

 

Object_Class

str

 

 

 

Success

str

 

 

 

Blocked

str

 

 

 

Attribute_Name

str

 

 

 

New_Attribute_Value

str

 

 

 

Old_Attribute_Value

str

 

 

 

AlertText

str

 

 

 

tag

str

 

cefTag

✓

rawMessage

str

 

 

✓