/
cef0.impervaInc.attackAnalytics
cef0.impervaInc.attackAnalytics
[ 1 Introduction ] [ 2 Tag structure ] [ 3 How is the data sent to Devo? ]
Introduction
The table cef0.impervaInc.attackAnalytics identifies events in CEF format generated by Imperva Attack Analytics.
Tag structure
Events in CEF format don't have a specific tag structure, as explained in Technologies supported in CEF syslog format. They are always sent to a table with the structure cef0.deviceVendor.deviceProduct.
In this case, the valid data tables are:
Tag | Data table |
---|---|
cef0.impervaInc.attackAnalytics | cef0.impervaInc.attackAnalytics |
How is the data sent to Devo?
Learn more about CEF syslog format and how Devo tags these events in Technologies supported in CEF syslog format.
, multiple selections available,
Related content
cef0.impervaInc.attackAnalytics
cef0.impervaInc.attackAnalytics
More like this
cef0.impervaInc
cef0.impervaInc
More like this
cef0.imperva
cef0.imperva
More like this
cef0.incapsula
cef0.incapsula
More like this
cef0.impervaMx
cef0.impervaMx
More like this
cef0.fidelisCybersecurity
cef0.fidelisCybersecurity
More like this