/
cef0.stealthbitstechnologies

cef0.stealthbitstechnologies

Introduction

Tables beginning withcef0.stealthbitstechnologies identify events in CEF format generated by Stealthbits technologies.

Tag structure

Events in CEF format don't have a specific tag structure, as explained in Technologies supported in CEF syslog format. They are always sent to a table with the structure cef0.deviceVendor.deviceProduct.

In this case, the valid data tables are:

Tags

Data tables

Tags

Data tables

cef0.stealthbitsTechnologies.stealthdefend

cef0.stealthbitsTechnologies.stealthdefend

How is the data sent to Devo?

CEF data can be sent directly to Devo or by using a relay. To use the CEF default relay rule, send to the relay’s port 13000. Learn more about CEF syslog format and how Devo tags these events in Technologies supported in CEF syslog format.

Table structure

These are the fields displayed in this table:

cef0.stealthbitsTechnologies.stealthdefend

Field

Type

Source field name

Extra fields

Field

Type

Source field name

Extra fields

eventdate

timestamp

 

 

hostname

str

 

 

priority_code

str

 

 

cef_tag

str

 

 

cef_version

str

 

 

emb_device_vendor

str

 

 

emb_device_product

str

 

 

device_version

str

 

 

signature_id

str

 

 

name

str

 

 

severity

str

 

 

computers

str

 

 

evidence

str

 

 

file_name

str

 

 

new_file_name

str

 

 

process

str

 

 

threat_time

str

 

 

threat_type

str

 

 

users

str

 

 

hostchain

str

 

tag

str

cef0Tag

rawMessage

str

 

Related content

cef0.stealthbits
cef0.stealthbits
More like this
cef0.impervaInc
cef0.impervaInc
More like this
cef0.forescoutTechnologies
cef0.forescoutTechnologies
More like this
cef0.f5
More like this
cef0.unix
cef0.unix
More like this
cef0.anubisnetworks
cef0.anubisnetworks
More like this