/
cef0.cybereason
cef0.cybereason
[ 1 Introduction ] [ 2 Tag structure ] [ 3 How is the data sent to Devo? ]
Introduction
The tables cef0.cybereason.* identify events in CEF format generated by Cybereason services.
Tag structure
Events in CEF format don't have a specific tag structure, as explained in Technologies supported in CEF syslog format. They are always sent to a table with the structure cef0.deviceVendor.deviceProduct.
In this case, the valid data tables are:
Tag | Data table |
---|---|
cef0.cybereason.failedLogin | cef0.cybereason.failedLogin |
cef0.cybereason.sensorHealth | cef0.cybereason.sensorHealth |
cef0.cybereason.malop | cef0.cybereason.malop |
cef0.cybereason.malware | cef0.cybereason.malware |
cef0.cybereason.sensorAction | cef0.cybereason.sensorAction |
How is the data sent to Devo?
Learn more about CEF syslog format and how Devo tags these events in Technologies supported in CEF syslog format.
, multiple selections available,
Related content
cef0.cybereason
cef0.cybereason
More like this
cef0.anubisnetworks
cef0.anubisnetworks
More like this
cef0.impervaInc
cef0.impervaInc
More like this
cef0.forescoutTechnologies
cef0.forescoutTechnologies
More like this
cef0.cybersoc
cef0.cybersoc
More like this
cef0.thycotic
cef0.thycotic
More like this