Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

Version 1 Current »

Introduction

Tables beginning withcef0.stealthbits identify events in CEF format generated by Stealthbits technologies.

Tag structure

Events in CEF format don't have a specific tag structure, as explained in Technologies supported in CEF syslog format. They are always sent to a table with the structure cef0.deviceVendor.deviceProduct.

In this case, the valid data tables are:

Tags

Data tables

cef0.stealthbits.stealthintercept

cef0.stealthbits.stealthintercept

How is the data sent to Devo?

Learn more about CEF syslog format and how Devo tags these events in Technologies supported in CEF syslog format.

Table structure

These are the fields displayed in this table:

cef0.stealthbits.stealthintercept

Field

Type

Field transformation

Source field name

Extra fields

eventdate

timestamp

hostchain

str

hostname

str

cefTag

str

cefVersion

str

embDeviceVendor

str

embDeviceProduct

str

deviceVersion

str

signatureID

str

name

str

severity

str

rt

timestamp

sntdom

str

suser

str

src

str

duser

str

shost

str

Policy_Name

str

(msg -> "Policy_Name") ? split(msg, "= ", 1) : null

msg

Severity

str

Component

str

OrigServer

str

usrName

str

UserName

str

UserSID

str

Started

str

Ended

str

NumberOfLogins

str

UsedLoginProtocols

str

AttackingHost

str

AttackingHostIp

str

AttackedHost

str

AttackedHostIp

str

Object_Class

str

Success

str

Blocked

str

Attribute_Name

str

New_Attribute_Value

str

Old_Attribute_Value

str

AlertText

str

tag

str

cefTag

rawMessage

str

  • No labels