Microsoft Graph API のアラートログを収集する
このドキュメントでは、Google SecOps フィードを使用して Microsoft Graph API アラートログを Google Security Operations にエクスポートする方法と、Microsoft Graph API アラート フィールドが Google SecOps の統合データモデル(UDM)フィールドにマッピングされる方法について説明します。
詳細については、Google SecOps へのデータの取り込みの概要をご覧ください。
概要
一般的なデプロイは、Microsoft Graph API アラート、および Google SecOps にログを送信するように構成された Google SecOps フィードで構成されます。お客様のデプロイはそれぞれ異なり、より複雑になる場合もあります。
デプロイには次のコンポーネントが含まれます。
Microsoft Graph API アラート: Microsoft Graph API が生成したアラート。
Google SecOps が管理するフィード。Microsoft Graph プロバイダ(Cloud)からログを取得し、Google SecOps にログを書き込む Google SecOps が管理するフィード。
Google SecOps: Microsoft Graph API のアラートログを保持して分析します。
取り込みラベルによって、未加工のログデータを構造化 UDM 形式に正規化するパーサーが識別されます。このドキュメントの情報は、取り込みラベル MICROSOFT_GRAPH_ALERT
が付加されたパーサーに適用されます。
始める前に
Google SecOps フィードを構成する前に、次の操作を行います。
- Azure ポータルにログインします。
- [Azure Active Directory] をクリックします。
- [App Registrations] をクリックします。
- [New registrations] をクリックして、アプリケーションを作成します。
- Client ID と Tenant ID をコピーします。これらは、Google Security Operations フィードを構成する際に必要になります。
- [API 権限] をクリックします。
- [Add a permission] をクリックし、新しいペインで [Microsoft Graph] を選択します。
- [Application Permissions] をクリックします。
- [SecurityActions] セクションと [SecurityActions] セクションを展開し、[Read.All] 権限を選択します。
- [権限を追加] をクリックします。
- [デフォルトディレクトリへの管理者の同意を付与] をクリックします。
- [Manage] メニューで、[Certificates & secrets] をクリックします。
- [New Client secret] をクリックして、新しい鍵を作成します。
- [Value] フィールドから秘密鍵をコピーします。秘密鍵は作成時にのみ表示され、Google Security Operations フィードを構成するときに必要になります。
ログを取り込むように Google SecOps フィードを構成する
取り込みフィードを設定する手順は次のとおりです。
- [Settings] をクリックし、[Feeds] に移動します。
- [Add new] をクリックして、次の詳細情報を入力します。
- [Source type] を
Third Party API
に設定します。 - [Log type] を
Microsoft Graph API Alerts
に設定します。
- [Source type] を
- [次へ] をクリックします。
Oauth client id
、Oauth client secret
、Tenant id
に値を入力します。- フィードを作成します。
- [次へ]、[送信] の順にクリックします。
問題が発生した場合は、サポートにお問い合わせください。詳細については、Google Security Operations SIEM サポートからサポートを受けるをご覧ください。
フィールド マッピング リファレンス
このセクションでは、Google SecOps パーサーが Microsoft Graph API アラート フィールドを Google SecOps UDM フィールドにマッピングする方法について説明します。
フィールド マッピング リファレンス: イベント識別子からイベントタイプへ
次の表に、MICROSOFT_GRAPH_ALERT
ログタイプと対応する UDM のイベントの種類を示します。
Event Identifier | Event Type | Security Category |
---|---|---|
'Agent' backdoor was detected |
SCAN_UNCATEGORIZED |
|
'AutoItinject' malware was detected |
SCAN_HOST |
|
'AutoItinject' malware was prevented |
SCAN_HOST |
|
'CoinMiner' unwanted software was detected |
SCAN_HOST |
SOFTWARE_PUA |
'CoinMiner' unwanted software was prevented |
SCAN_HOST |
|
'Conteban' malware was detected |
SCAN_HOST |
SOFTWARE_PUA |
'EICAR_Test_File' malware was prevented |
SCAN_HOST |
SOFTWARE_MALICIOUS |
'EncDoc' malware was prevented |
SCAN_HOST |
SOFTWARE_PUA |
'Fuerboos' malware was detected |
SCAN_HOST |
SOFTWARE_PUA |
'Laqma' malware was prevented |
SCAN_HOST |
SOFTWARE_PUA |
'Locky' ransomware was prevented |
SCAN_HOST |
SOFTWARE_PUA |
'Oneeva' malware was prevented |
SCAN_HOST |
SOFTWARE_PUA |
'Phish' malware was prevented |
SCAN_HOST |
MAIL_PHISHING |
'PiriformBundler' unwanted software was prevented |
SCAN_HOST |
SOFTWARE_PUA |
'Presenoker' unwanted software was prevented |
SCAN_HOST |
SOFTWARE_PUA |
'Uwamson' malware was prevented |
SCAN_HOST |
SOFTWARE_PUA |
(Preview) Suspicious spike in latency for traffic between a single IP address and an API endpoint |
SCAN_UNCATEGORIZED |
|
A history file has been cleared |
STATUS_UPDATE |
|
A logon from a malicious IP has been detected. [seen multiple times] |
USER_LOGIN |
NETWORK_MALICIOUS |
A malicious file was detected based on indication provided by O365 |
SCAN_FILE |
|
A possible vulnerability to SQL Injection |
USER_RESOURCE_ACCESS |
EXPLOIT |
A potentially malicious URL click was detected |
USER_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
A suspicious file was observed |
SCAN_FILE |
|
A user clicked through to a potentially malicious URL |
USER_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate |
USER_LOGIN |
|
Abnormal activity of managed identity associated with Kubernetes (Preview) |
SCAN_UNCATEGORIZED |
|
Abnormal Kubernetes service account operation detected |
SCAN_UNCATEGORIZED |
|
Access from a known suspicious application to a sensitive blob container (Preview) |
USER_RESOURCE_ACCESS |
|
Access from a known suspicious IP address to a sensitive blob container (Preview) |
USER_RESOURCE_ACCESS |
|
Access from a suspicious application |
USER_RESOURCE_ACCESS |
EXPLOIT |
Access from a suspicious IP |
USER_RESOURCE_ACCESS |
|
Access from a suspicious IP address |
USER_RESOURCE_ACCESS |
|
Access from a suspicious IP address to a key vault |
USER_RESOURCE_ACCESS |
|
Access from a Tor exit node |
USER_RESOURCE_ACCESS |
|
Access from a TOR exit node to a key vault |
USER_RESOURCE_ACCESS |
|
Access from a Tor exit node to a sensitive blob container (Preview) |
USER_RESOURCE_ACCESS |
|
Access from a Tor exit node to an API endpoint |
NETWORK_UNCATEGORIZED |
|
Access from an unusual location |
USER_RESOURCE_ACCESS |
|
Access from an unusual location to a sensitive blob container (Preview) |
USER_RESOURCE_ACCESS |
|
Access from an unusual location to a storage account |
USER_RESOURCE_ACCESS |
|
Access from an unusual location to a storage blob container |
USER_RESOURCE_ACCESS |
|
Access to cloud metadata service detected |
SCAN_UNCATEGORIZED |
|
Access to kubelet kubeconfig file detected |
SCAN_UNCATEGORIZED |
|
Account enumeration reconnaissance |
NETWORK_UNCATEGORIZED |
|
Account Enumeration reconnaissance (LDAP) (Preview) |
STATUS_UPDATE |
|
Active Directory attributes reconnaissance (LDAP) |
STATUS_UPDATE |
|
Activity by terminated user |
USER_UNCATEGORIZED |
ACL_VIOLATION |
Activity from a TOR IP address |
USER_LOGIN |
ACL_VIOLATION |
Activity from an anonymous proxy |
USER_UNCATEGORIZED |
|
Activity from anonymous IP address |
USER_UNCATEGORIZED |
|
Activity from anonymous IP addresses |
USER_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Activity from infrequent country |
USER_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Activity from Nigeria |
USER_UNCATEGORIZED |
POLICY_VIOLATION |
Activity from suspicious IP addresses |
USER_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Activity performed by terminated user |
USER_UNCATEGORIZED |
POLICY_VIOLATION |
Activity policy violation |
STATUS_UPDATE |
POLICY_VIOLATION |
Adaptive application control policy violation was audited |
STATUS_UPDATE |
POLICY_VIOLATION |
Addition of Guest account to Local Administrators group |
GROUP_MODIFICATION |
|
Additional risk detected |
STATUS_UPDATE |
|
Admin confirmed user compromised |
USER_UNCATEGORIZED |
|
Admin Submission result completed |
STATUS_UPDATE |
|
Admin triggered manual investigation of email |
EMAIL_TRANSACTION |
|
Admin triggered user compromise investigation |
EMAIL_TRANSACTION |
|
Administrative action submitted by an Administrator |
EMAIL_UNCATEGORIZED |
|
An active 'Wacatac' malware was blocked |
SCAN_UNCATEGORIZED |
|
An attempt to run Linux commands on a Windows App Service |
PROCESS_UNCATEGORIZED |
|
An event log was cleared |
STATUS_UPDATE |
|
An IP that connected to your Azure App Service FTP Interface was found in Threat Intelligence |
NETWORK_UNCATEGORIZED |
|
An uncommon connection attempt detected |
SCAN_UNCATEGORIZED |
|
Anomalous network protocol usage |
NETWORK_UNCATEGORIZED |
|
Anomalous SSH login detected |
USER_LOGIN |
|
Anomalous Token |
USER_RESOURCE_ACCESS |
|
Anomalous user activity |
USER_UNCATEGORIZED |
|
Anonymity network activity |
NETWORK_UNCATEGORIZED |
|
Anonymity network activity using web proxy |
NETWORK_UNCATEGORIZED |
|
Anonymous IP address |
USER_LOGIN |
|
Antimalware Action Failed |
STATUS_UPDATE |
|
Antimalware Action Taken |
STATUS_UPDATE |
|
Antimalware broad files exclusion in your virtual machine |
STATUS_UPDATE |
|
Antimalware disabled and code execution in your virtual machine |
STATUS_UPDATE |
|
Antimalware disabled in your virtual machine |
STATUS_UPDATE |
|
Antimalware file exclusion and code execution in your virtual machine |
STATUS_UPDATE |
|
Antimalware file exclusion in your virtual machine |
STATUS_UPDATE |
|
Antimalware real-time protection was disabled in your virtual machine |
STATUS_UPDATE |
|
Antimalware real-time protection was disabled temporarily in your virtual machine |
STATUS_UPDATE |
|
Antimalware real-time protection was disabled temporarily while code was executed in your virtual machine |
STATUS_UPDATE |
|
Antimalware scans blocked for files potentially related to malware campaigns on your virtual machine (Preview) |
STATUS_UPDATE |
|
Antimalware temporarily disabled in your virtual machine |
STATUS_UPDATE |
|
Antimalware unusual file exclusion in your virtual machine |
STATUS_UPDATE |
|
API Endpoint access from suspicious IP |
NETWORK_UNCATEGORIZED |
|
API requests spray from a single IP address to an unusually large number of distinct API endpoints |
NETWORK_UNCATEGORIZED |
|
Attempt to create a new Linux namespace from a container detected |
SCAN_UNCATEGORIZED |
|
Attempt to run high privilege command detected |
PROCESS_UNCATEGORIZED |
|
Attempt to stop apt-daily-upgrade.timer service detected |
SCAN_UNCATEGORIZED |
|
Attempted communication with suspicious sinkholed domain |
NETWORK_UNCATEGORIZED |
|
Attempted logon by a potentially harmful application |
USER_LOGIN |
|
Atypical travel |
USER_UNCATEGORIZED |
|
Authenticated access from a Tor exit node |
USER_RESOURCE_ACCESS |
|
Azure AD threat intelligence |
USER_UNCATEGORIZED |
|
Azure High Risk User account - Signin |
USER_LOGIN |
|
Azure Resource Manager operation from suspicious IP address |
NETWORK_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Azure Resource Manager operation from suspicious proxy IP address |
NETWORK_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Azure VWAN Tunnel Down - Run the RRAS Scrip |
STATUS_UPDATE |
|
Azure VWAN Tunnel Down - Run the RRAS Script |
STATUS_UPDATE |
|
Behavior similar to common Linux bots detected (Preview) |
SCAN_UNCATEGORIZED |
|
Behavior similar to ransomware detected [seen multiple times] |
SCAN_UNCATEGORIZED |
|
Block download based on real-time content inspection |
USER_UNCATEGORIZED |
|
Brute force attack against Azure Portal |
USER_LOGIN |
|
Burst of multiple reconnaissance commands could indicate initial activity after compromise |
STATUS_UPDATE |
|
Changes made to AWS CloudTrail logs |
STATUS_UPDATE |
|
Command within a container running with high privileges |
STATUS_UPDATE |
|
Communication with possible phishing domain |
NETWORK_UNCATEGORIZED |
|
Communication with suspicious algorithmically generated domain |
NETWORK_UNCATEGORIZED |
|
Communication with suspicious domain identified by threat intelligence |
STATUS_UPDATE |
|
Communication with suspicious random domain name |
NETWORK_UNCATEGORIZED |
|
Compromised account |
STATUS_UPDATE |
|
Connection to a custom network indicator |
SCAN_UNCATEGORIZED |
|
Connection to web page from anomalous IP address detected |
SCAN_NETWORK |
|
Container running in privileged mode |
STATUS_UPDATE |
|
Container with a miner image detected |
SCAN_UNCATEGORIZED |
|
Container with a sensitive volume mount detected |
SCAN_UNCATEGORIZED |
|
CoreDNS modification in Kubernetes detected |
SCAN_UNCATEGORIZED |
|
Creation of admission webhook configuration detected |
SCAN_UNCATEGORIZED |
|
Creation of forwarding/redirect rule |
USER_UNCATEGORIZED |
|
Custom script extension with a suspicious script was detected on your virtual machine (Preview) |
PROCESS_UNCATEGORIZED |
|
Custom script extension with suspicious entry-point in your virtual machine |
PROCESS_UNCATEGORIZED |
|
Custom script extension with suspicious payload in your virtual machine |
PROCESS_UNCATEGORIZED |
|
Dangling DNS record for an App Service resource detected |
RESOURCE_DELETION |
|
Data exfiltration over SMB |
STATUS_UPDATE |
DATA_EXFILTRATION |
Data exfiltration to unsanctioned apps |
USER_UNCATEGORIZED |
DATA_EXFILTRATION |
DDoS Attack detected for Public IP |
SCAN_UNCATEGORIZED |
NETWORK_DENIAL_OF_SERVICE |
DDoS Attack mitigated for Public IP |
STATUS_UPDATE |
NETWORK_DENIAL_OF_SERVICE |
Default Mapping |
USER_UNCATEGORIZED |
|
Denied access from a suspicious IP to a key vault |
USER_RESOURCE_ACCESS |
|
Desired State Configuration (DSC) extension with a suspicious script was detected on your virtual machine (Preview) |
PROCESS_UNCATEGORIZED |
|
Detected actions indicative of disabling and deleting IIS log files |
FILE_MODIFICATION |
|
Detected anomalous mix of upper and lower case characters in command line |
PROCESS_UNCATEGORIZED |
|
Detected anomalous mix of upper and lower case characters in command-line |
PROCESS_UNCATEGORIZED |
|
Detected change to a registry key that can be abused to bypass UAC |
REGISTRY_MODIFICATION |
|
Detected decoding of an executable using built-in certutil.exe tool |
PROCESS_UNCATEGORIZED |
|
Detected enabling of the WDigest UseLogonCredential registry key |
REGISTRY_MODIFICATION |
|
Detected encoded executable in command line data |
PROCESS_UNCATEGORIZED |
|
Detected file download from a known malicious source |
SCAN_UNCATEGORIZED |
|
Detected obfuscated command line |
PROCESS_UNCATEGORIZED |
|
Detected possible execution of keygen executable |
PROCESS_UNCATEGORIZED |
|
Detected possible execution of malware dropper |
STATUS_UPDATE |
|
Detected possible local reconnaissance activity |
PROCESS_UNCATEGORIZED |
|
Detected potentially suspicious use of Telegram tool |
DEVICE_PROGRAM_DOWNLOAD |
SOFTWARE_SUSPICIOUS |
Detected suppression of legal notice displayed to users at logon |
REGISTRY_MODIFICATION |
|
Detected suspicious combination of HTA and PowerShell |
PROCESS_UNCATEGORIZED |
|
Detected suspicious commandline arguments |
PROCESS_UNCATEGORIZED |
|
Detected suspicious commandline used to start all executables in a directory |
PROCESS_UNCATEGORIZED |
|
Detected suspicious credentials in commandline |
PROCESS_UNCATEGORIZED |
|
Detected suspicious document credentials |
PROCESS_UNCATEGORIZED |
|
Detected suspicious execution of VBScript.Encode command |
PROCESS_UNCATEGORIZED |
|
Detected suspicious execution via rundll32.exe |
PROCESS_UNCATEGORIZED |
|
Detected suspicious file cleanup commands |
PROCESS_UNCATEGORIZED |
|
Detected suspicious file creation |
FILE_CREATION |
|
Detected suspicious file download |
SCAN_UNCATEGORIZED |
|
Detected suspicious named pipe communications |
PROCESS_UNCATEGORIZED |
|
Detected suspicious network activity |
NETWORK_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Detected suspicious new firewall rule |
DEVICE_CONFIG_UPDATE |
NETWORK_SUSPICIOUS |
Detected suspicious use of Cacls to lower the security state of the system |
PROCESS_UNCATEGORIZED |
|
Detected suspicious use of FTP -s Switch |
PROCESS_UNCATEGORIZED |
|
Detected suspicious use of Pcalua.exe to launch executable code |
PROCESS_UNCATEGORIZED |
|
Detected suspicious use of the nohup command |
SCAN_UNCATEGORIZED |
|
Detected suspicious use of the useradd command |
SCAN_UNCATEGORIZED |
|
Detected the disabling of critical services |
PROCESS_UNCATEGORIZED |
|
Digital currency mining activity |
NETWORK_UNCATEGORIZED |
|
Digital currency mining container detected |
SCAN_UNCATEGORIZED |
|
Digital currency mining related behavior detected |
PROCESS_UNCATEGORIZED |
|
Directory Services Restore Mode Password Change (Preview) |
SETTING_MODIFICATION |
|
Disabling of auditd logging [seen multiple times] |
STATUS_UPDATE |
|
Distributed parameter enumeration on an API endpoint |
NETWORK_UNCATEGORIZED |
|
DLP-Detect Highly Sensitive Data Movement |
USER_UNCATEGORIZED |
NETWORK_MALICIOUS |
DLP-Sensitive Data Movement |
USER_UNCATEGORIZED |
|
Docker build operation detected on a Kubernetes node |
SCAN_UNCATEGORIZED |
|
Dynamic PS script construction |
PROCESS_UNCATEGORIZED |
|
EAF violation blocked by exploit protection |
SCAN_UNCATEGORIZED |
EXPLOIT |
eDiscovery search started or exported |
USER_UNCATEGORIZED |
|
Elevation of Exchange admin privilege |
USER_UNCATEGORIZED |
|
Email messages containing malicious file removed after delivery |
EMAIL_TRANSACTION |
MAIL_PHISHING |
Email messages containing malicious URL removed after delivery |
EMAIL_TRANSACTION |
MAIL_PHISHING |
Email messages containing malware removed after delivery |
EMAIL_TRANSACTION |
MAIL_PHISHING |
Email messages containing phish URLs removed after delivery |
EMAIL_TRANSACTION |
MAIL_PHISHING |
Email messages from a campaign removed after delivery |
EMAIL_TRANSACTION |
MAIL_PHISHING |
Email messages removed after delivery |
EMAIL_TRANSACTION |
MAIL_PHISHING |
Email reported by user as junk |
EMAIL_TRANSACTION |
|
Email reported by user as malware or phish |
EMAIL_TRANSACTION |
MAIL_PHISHING |
Email sending limit exceeded |
EMAIL_UNCATEGORIZED |
|
Endpoint - NT - A .js file executed inside zip archive. Locky - Rule |
STATUS_UPDATE |
|
Endpoint - NT - Anomalous BITS download URL destination - Rule |
STATUS_UPDATE |
|
Endpoint - NT - New service created with anomalous name and ImagePath under users. - Rul |
SERVICE_CREATION |
|
Endpoint - NT - New service created with anomalous name and ImagePath under users. - Rule |
STATUS_UPDATE |
|
Endpoint - NT - New service created with possibly obfuscated powershell commandline ImagePath - Rule |
SERVICE_CREATION |
|
Endpoint - NT - Powershell CommandLine Longer than 2000 Characters |
USER_UNCATEGORIZED |
|
Endpoint - NT - Scheduled task created with anomalous location under user profile - Rule |
SCHEDULED_TASK_CREATION |
|
Endpoint - NT - Suspicious Oracle Query - Attempted Password Hash Exfiltration |
USER_UNCATEGORIZED |
DATA_EXFILTRATION |
Exchange Server Remote Code Execution (CVE-2021-26855) |
STATUS_UPDATE |
|
Executable decoded using certutil |
PROCESS_UNCATEGORIZED |
|
Executable found running from a suspicious location |
PROCESS_UNCATEGORIZED |
|
Exploitation of Xorg vulnerability [seen multiple times] |
STATUS_UPDATE |
|
Exposed Kubeflow dashboard detected |
SCAN_UNCATEGORIZED |
|
Exposed Kubernetes dashboard detected |
SCAN_UNCATEGORIZED |
|
Exposed Kubernetes service detected |
SCAN_UNCATEGORIZED |
|
Exposed Postgres service with risky configuration in Kubernetes detected (Preview) |
SCAN_UNCATEGORIZED |
|
Exposed Postgres service with trust authentication configuration in Kubernetes detected (Preview) |
SCAN_UNCATEGORIZED |
|
Exposed Redis service in AKS detected |
SCAN_UNCATEGORIZED |
|
Extraction of Azure Cosmos DB accounts keys via a potentially malicious script |
STATUS_UPDATE |
|
Failed AzureAD logons but success logon to AWS Console |
USER_UNCATEGORIZED |
|
Failed logon attempts |
USER_UNCATEGORIZED |
|
Failed SSH brute force attack |
USER_LOGIN |
|
Field policy violation |
STATUS_UPDATE |
POLICY_VIOLATION |
File policy violation |
STATUS_UPDATE |
POLICY_VIOLATION |
Fileless attack behavior detected |
PROCESS_UNCATEGORIZED |
|
Fileless attack technique detected |
PROCESS_UNCATEGORIZED |
|
Fileless attack toolkit detected |
PROCESS_UNCATEGORIZED |
|
Form blocked due to potential phishing attempt |
STATUS_UPDATE |
MAIL_PHISHING |
Form flagged and confirmed as phishing |
STATUS_UPDATE |
MAIL_PHISHING |
General Policy - Deny Prior Threats |
USER_UNCATEGORIZED |
|
Hidden file execution detected |
PROCESS_UNCATEGORIZED |
|
High count of failed attempts from same client IP |
USER_UNCATEGORIZED |
|
High count of failed logons by a user |
USER_UNCATEGORIZED |
|
High risk software detected |
STATUS_UPDATE |
|
High Risk Travel Alert |
USER_UNCATEGORIZED |
|
High volume of operations in a key vault |
USER_UNCATEGORIZED |
|
Honeytoken authentication activity |
USER_UNCATEGORIZED |
|
Honeytoken group membership changed |
GROUP_MODIFICATION |
|
Honeytoken user attributes modified |
SETTING_MODIFICATION |
|
Honeytoken was queried via LDAP |
STATUS_UPDATE |
|
Honeytoken was queried via SAM-R |
STATUS_UPDATE |
|
Identity - Suspicious granting of permissions to an account |
USER_CHANGE_PERMISSIONS |
|
Identity - AD user created password not set with 24-48 hours |
USER_UNCATEGORIZED |
|
Identity - Attempt to bypass conditional access rule in Azure AD |
USER_UNCATEGORIZED |
|
Identity - Attempts to sign in to disabled accounts |
USER_LOGIN |
|
Identity - New user created and added to the built-in administrators group |
USER_CREATION |
|
Identity - NT - Pulse VPN Brute Force Attempt |
USER_UNCATEGORIZED |
|
Identity - User account created and deleted within 10 mins |
USER_UNCATEGORIZED |
|
Impossible travel |
USER_UNCATEGORIZED |
|
Impossible travel activity |
USER_UNCATEGORIZED |
POLICY_VIOLATION |
Inactive account |
STATUS_UPDATE |
|
Indicators associated with DDOS toolkit detected |
SCAN_UNCATEGORIZED |
|
Investigation priority score increase |
USER_UNCATEGORIZED |
|
K8S API requests from proxy IP address detected |
SCAN_UNCATEGORIZED |
|
Kubernetes events deleted |
STATUS_UPDATE |
|
Kubernetes penetration testing tool detected |
SCAN_UNCATEGORIZED |
|
Leaked credentials |
STATUS_UPDATE |
|
Local Administrators group members were enumerated |
GROUP_MODIFICATION |
|
Log on from an unusual Azure Data Center |
USER_LOGIN |
|
Log on from an unusual location |
USER_LOGIN |
|
Login from a domain not seen in 60 days |
USER_LOGIN |
|
Login from a principal user not seen in 60 days |
USER_LOGIN |
|
Login from a suspicious IP |
USER_LOGIN |
|
Login to AWS Management Console without MFA |
STATUS_UPDATE |
|
Logon by an unfamiliar principal |
USER_LOGIN |
|
Logon from an unusual cloud provider |
USER_LOGIN |
|
Logon from an unusual location |
USER_UNCATEGORIZED |
|
Malicious blob was downloaded from a storage account (Preview) |
STATUS_UPDATE |
|
Malicious file uploaded to storage account |
STATUS_UPDATE |
|
Malicious firewall rule created by ZINC server implant [seen multiple times] |
SETTING_MODIFICATION |
|
Malicious IP address |
USER_LOGIN |
|
Malicious OAuth app consent |
SCAN_UNCATEGORIZED |
|
Malicious request of Data Protection API master key |
USER_UNCATEGORIZED |
|
Malicious SQL activity |
PROCESS_UNCATEGORIZED |
|
Malware campaign detected after delivery |
EMAIL_TRANSACTION |
|
Malware campaign detected and blocked |
EMAIL_TRANSACTION |
|
Malware campaign detected in SharePoint and OneDrive |
STATUS_UPDATE |
|
Malware detection |
USER_UNCATEGORIZED |
|
Malware linked IP address |
USER_LOGIN |
|
Malware not zapped because ZAP is disabled |
STATUS_UPDATE |
|
Mass Access to Sensitive Files |
USER_RESOURCE_ACCESS |
|
Mass delete |
USER_UNCATEGORIZED |
DATA_DESTRUCTION |
Mass download |
USER_UNCATEGORIZED |
|
Mass download by a single user |
USER_UNCATEGORIZED |
|
Mass download by a single user - External users |
USER_RESOURCE_ACCESS |
|
Mass download by a single user - Internal |
USER_RESOURCE_ACCESS |
|
Mass share |
USER_UNCATEGORIZED |
|
Messages containing malicious entity not removed after delivery |
EMAIL_TRANSACTION |
MAIL_PHISHING |
Messages have been delayed |
EMAIL_UNCATEGORIZED |
|
MicroBurst exploitation toolkit used to enumerate resources in your subscriptions |
PROCESS_UNCATEGORIZED |
|
MicroBurst exploitation toolkit used to execute code on your virtual machine |
PROCESS_UNCATEGORIZED |
|
MicroBurst exploitation toolkit used to extract keys from your Azure key vaults |
PROCESS_UNCATEGORIZED |
|
MicroBurst exploitation toolkit used to extract keys to your storage accounts |
PROCESS_UNCATEGORIZED |
|
MicroBurst exploitation toolkit used to extract secrets from your Azure key vaults |
PROCESS_UNCATEGORIZED |
|
Microsoft Defender ATP detected 'Trojan.Generic.1218852' malware |
SCAN_UNCATEGORIZED |
SOFTWARE_MALICIOUS |
Microsoft Defender for Cloud test alert (not a threat). |
STATUS_UPDATE |
|
Microsoft Defender for Cloud test alert for App Service (not a threat) |
STATUS_UPDATE |
|
Microsoft Entra threat intelligence (sign-in) |
USER_UNCATEGORIZED |
|
Misleading OAuth app name |
SCAN_UNCATEGORIZED |
POLICY_VIOLATION |
Misleading publisher name for an OAuth app |
SCAN_UNCATEGORIZED |
POLICY_VIOLATION |
MITRE Caldera agent detected |
SCAN_UNCATEGORIZED |
|
Monitor AWS Credential abuse or hijacking |
STATUS_UPDATE |
|
Multiple delete VM activities |
USER_UNCATEGORIZED |
DATA_DESTRUCTION |
Multiple Domain Accounts Queried |
STATUS_UPDATE |
|
Multiple failed login attempts |
USER_LOGIN |
AUTH_VIOLATION |
Multiple Power BI report sharing activities |
USER_UNCATEGORIZED |
|
Network - FirepowerAlertTest |
STATUS_UPDATE |
|
Network - NT - Email detected from tiscali.it may be part of phishing campaign - Rule |
EMAIL_UNCATEGORIZED |
|
Network - NT - Malware attachment delivered - Rule |
EMAIL_UNCATEGORIZED |
|
Network - NT - Malware url delivered - Rule |
STATUS_UPDATE |
|
Network - NT - Phishing attachment delivered - Rule |
EMAIL_UNCATEGORIZED |
|
Network - NT - Phishing Link Clicked |
EMAIL_UNCATEGORIZED |
|
Network - NT - Possible Ursnif/Gozi Phish |
EMAIL_UNCATEGORIZED |
|
Network - NT - Recently Created Domain Referenced in Inbound Email |
EMAIL_UNCATEGORIZED |
|
Network - NT - Sender Domain in Inbound Email Recently Created |
EMAIL_UNCATEGORIZED |
|
Network - NT - StealthWatch Detected a Concerning Host |
STATUS_UPDATE |
|
Network - Rare RDP Connections |
NETWORK_UNCATEGORIZED |
|
Network - SSH Potential Brute Force |
USER_LOGIN |
|
Network communication with a malicious machine detected |
NETWORK_UNCATEGORIZED |
|
Network intrusion detection signature activation |
NETWORK_UNCATEGORIZED |
|
Network mapping reconnaissance (DNS) |
NETWORK_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
New admin user |
STATUS_UPDATE |
|
New container in the kube-system namespace detected |
SCAN_UNCATEGORIZED |
|
New country |
USER_UNCATEGORIZED |
|
New high privileges role detected |
SCAN_UNCATEGORIZED |
|
New high upload volume app |
STATUS_UPDATE |
POLICY_VIOLATION |
New high volume app |
STATUS_UPDATE |
POLICY_VIOLATION |
New location |
STATUS_UPDATE |
|
New popular app |
STATUS_UPDATE |
POLICY_VIOLATION |
New risky app |
STATUS_UPDATE |
POLICY_VIOLATION |
New service discovered |
STATUS_UPDATE |
|
New SSH key added |
SETTING_MODIFICATION |
|
New SSH key added [seen multiple times] |
SETTING_MODIFICATION |
|
NMap scanning detected |
SCAN_UNCATEGORIZED |
|
NT - Anomalous attempt to reset Domain Admin or Enterprise Admin account password |
USER_UNCATEGORIZED |
|
NT - Anomalous bitsadmin transfer request |
STATUS_UPDATE |
|
NT - Anomalous reg import command - Rule |
STATUS_UPDATE |
|
NT - Anomalous Registry Persistence Value |
USER_UNCATEGORIZED |
|
NT - Anomalous usage of sdbinst.exe - possible shim database persistence |
STATUS_UPDATE |
|
NT - Degraded Workspace Performance Warning, Last 4 hours |
STATUS_UPDATE |
|
NT - Download requested by Powershell |
USER_UNCATEGORIZED |
|
NT - Encoded powershell command executed |
USER_UNCATEGORIZED |
|
NT - Folder name of nonbreaking space detected in commandline. possible Andromeda. |
STATUS_UPDATE |
|
NT - LogSource Increasing or Decreasing over Last 4 Hour |
STATUS_UPDATE |
|
NT - LogSource Increasing or Decreasing over Last 4 Hours |
STATUS_UPDATE |
|
NT - Powershell command with suspicious reference to AppData subfolder |
USER_UNCATEGORIZED |
|
NT - Powershell executing standard input (possible obfuscation) |
USER_UNCATEGORIZED |
|
NT - Rundll32.exe communicating with proxy |
STATUS_UPDATE |
|
NT - StealthWatch Detected Potential Exploitation Activity |
STATUS_UPDATE |
|
NT - Suspicious powershell command with windowstyle hidden |
USER_UNCATEGORIZED |
|
NT - Unauthorized nmap usage |
USER_UNCATEGORIZED |
|
NT - Unknown process injecting dll into lsass or winlogon |
SCAN_UNCATEGORIZED |
|
NT - Unusual process spawned from Chrome |
USER_UNCATEGORIZED |
|
NT - Usage of jsc.exe. Possible malware recompilation on endpoint - Endpoint |
STATUS_UPDATE |
|
NTC3 Testing Rule AR466 |
STATUS_UPDATE |
|
Parameter enumeration on an API endpoint |
NETWORK_UNCATEGORIZED |
|
Parameter value(s) with anomalous data types in an API call |
NETWORK_UNCATEGORIZED |
|
Password hashes dumped from LSASS memory |
USER_UNCATEGORIZED |
|
Password spray |
USER_UNCATEGORIZED |
AUTH_VIOLATION |
Phish delivered due to an ETR override |
EMAIL_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Phish delivered due to an IP allow policy |
EMAIL_TRANSACTION |
NETWORK_SUSPICIOUS |
Phish delivered due to tenant or user override1 |
EMAIL_TRANSACTION |
|
Phish not zapped because ZAP is disabled |
EMAIL_TRANSACTION |
NETWORK_SUSPICIOUS |
Phishing content hosted on a storage account |
STATUS_UPDATE |
|
Phishing content hosted on Azure Webapps |
SCAN_UNCATEGORIZED |
|
PHP file in upload folder |
SCAN_UNCATEGORIZED |
|
Possible attack tool detected |
SCAN_UNCATEGORIZED |
|
Possible attempt to access Primary Refresh Token (PRT) |
USER_RESOURCE_ACCESS |
|
Possible backdoor detected |
SCAN_UNCATEGORIZED |
|
Possible backdoor detected [seen multiple times] |
FILE_UNCATEGORIZED |
|
Possible command line exploitation attempt |
SCAN_UNCATEGORIZED |
|
Possible compromised machine detected |
NETWORK_UNCATEGORIZED |
|
Possible credential access tool detected |
SCAN_UNCATEGORIZED |
|
Possible credential dumping detected [seen multiple times] |
STATUS_UPDATE |
|
Possible Cryptocoinminer download detected |
SCAN_UNCATEGORIZED |
|
Possible data download via DNS tunnel |
NETWORK_UNCATEGORIZED |
|
Possible data exfiltration detected |
NETWORK_UNCATEGORIZED |
DATA_EXFILTRATION |
Possible data exfiltration via DNS tunnel |
NETWORK_UNCATEGORIZED |
DATA_EXFILTRATION |
Possible data transfer via DNS tunnel |
NETWORK_UNCATEGORIZED |
|
Possible exploitation of the mailserver detected |
SCAN_UNCATEGORIZED |
|
Possible incoming %{Service Name} brute force attempts detected |
NETWORK_UNCATEGORIZED |
|
Possible incoming SQL brute force attempts detected |
NETWORK_UNCATEGORIZED |
|
Possible Log Tampering Activity Detected |
SCAN_UNCATEGORIZED |
|
Possible malicious web shell detected |
SCAN_UNCATEGORIZED |
|
Possible malicious web shell detected. |
SCAN_UNCATEGORIZED |
|
Possible outgoing denial-of-service attack detected |
NETWORK_UNCATEGORIZED |
NETWORK_DENIAL_OF_SERVICE |
Possible password change using crypt-method detected |
SCAN_UNCATEGORIZED |
|
Possible password change using crypt-method detected [seen multiple times] |
USER_CHANGE_PASSWORD |
|
Potential attempt to bypass AppLocker detected |
PROCESS_UNCATEGORIZED |
|
Potential crypto coin miner started |
STATUS_UPDATE |
|
Potential dangling DNS record for an App Service resource detected |
RESOURCE_DELETION |
|
Potential malware uploaded to a storage account |
STATUS_UPDATE |
|
Potential port forwarding to external IP address |
SCAN_UNCATEGORIZED |
|
Potential reverse shell detected |
SCAN_UNCATEGORIZED |
|
Potential SQL injection |
USER_RESOURCE_ACCESS |
EXPLOIT |
Potentially Unsafe Action |
USER_RESOURCE_ACCESS |
|
PowerZure exploitation toolkit used to elevate access from Azure AD to Azure |
STATUS_UPDATE |
|
PowerZure exploitation toolkit used to enumerate resources |
RESOURCE_READ |
|
PowerZure exploitation toolkit used to enumerate storage containers, shares, and tables |
RESOURCE_READ |
|
PowerZure exploitation toolkit used to execute a Runbook in your subscription |
STATUS_UPDATE |
|
PowerZure exploitation toolkit used to extract Runbooks content |
STATUS_UPDATE |
|
PREVIEW - Azurite toolkit run detected |
SCAN_UNCATEGORIZED |
|
PREVIEW - Suspicious creation of compute resources detected |
RESOURCE_CREATION |
|
PREVIEW - Suspicious invocation of a high-risk 'Credential Access' operation by a service principal detected |
SCAN_UNCATEGORIZED |
|
PREVIEW - Suspicious invocation of a high-risk 'Data Collection' operation by a service principal detected |
SCAN_UNCATEGORIZED |
|
PREVIEW - Suspicious invocation of a high-risk 'Defense Evasion' operation by a service principal detected |
SCAN_UNCATEGORIZED |
|
PREVIEW - Suspicious invocation of a high-risk 'Execution' operation by a service principal detected |
SCAN_UNCATEGORIZED |
|
PREVIEW - Suspicious invocation of a high-risk 'Impact' operation by a service principal detected |
SCAN_UNCATEGORIZED |
|
PREVIEW - Suspicious invocation of a high-risk 'Initial Access' operation by a service principal detected |
SCAN_UNCATEGORIZED |
|
PREVIEW - Suspicious invocation of a high-risk 'Lateral Movement Access' operation by a service principal detected |
SCAN_UNCATEGORIZED |
|
PREVIEW - Suspicious invocation of a high-risk 'persistence' operation by a service principal detected |
SCAN_UNCATEGORIZED |
|
PREVIEW - Suspicious invocation of a high-risk 'Privilege Escalation' operation by a service principal detected |
SCAN_UNCATEGORIZED |
|
PREVIEW - Suspicious key vault recovery detected |
SCAN_UNCATEGORIZED |
|
PREVIEW - Suspicious management session using an inactive account detected |
SCAN_UNCATEGORIZED |
|
PREVIEW - Suspicious management session using PowerShell detected |
SCAN_UNCATEGORIZED |
|
PREVIEW â€" Suspicious management session using Azure portal detected |
SCAN_UNCATEGORIZED |
|
Previously unseen parameter used in an API call |
NETWORK_UNCATEGORIZED |
|
Privileged container detected |
SCAN_UNCATEGORIZED |
|
Privileged custom role created for your subscription in a suspicious way (Preview) |
SCAN_UNCATEGORIZED |
|
Process associated with digital currency mining detected |
PROCESS_UNCATEGORIZED |
|
Process associated with digital currency mining detected [seen multiple times] |
PROCESS_UNCATEGORIZED |
|
Process seen accessing the SSH authorized keys file in an unusual way |
FILE_READ |
|
Proxy policy violation |
STATUS_UPDATE |
POLICY_VIOLATION |
PsExec execution detected |
USER_UNCATEGORIZED |
|
Publicly accessible storage containers successfully discovered |
STATUS_UPDATE |
|
Publicly accessible storage containers unsuccessfully scanned |
STATUS_UPDATE |
|
Python encoded downloader detected [seen multiple times] |
SCAN_UNCATEGORIZED |
|
Ransomware activity |
USER_UNCATEGORIZED |
|
Ransomware activity |
USER_UNCATEGORIZED |
|
Ransomware activity |
USER_UNCATEGORIZED |
|
Rare SVCHOST service group executed |
USER_UNCATEGORIZED |
|
Raw data download detected |
SCAN_UNCATEGORIZED |
|
Remote code execution attempt |
USER_UNCATEGORIZED |
|
Remote code execution over DNS |
NETWORK_UNCATEGORIZED |
|
Right-to-Left-Override (RLO) technique observed |
SCAN_FILE |
SOCIAL_ENGINEERING |
Role binding to the cluster-admin role detected |
SCAN_UNCATEGORIZED |
|
Run Command with a suspicious script was detected on your virtual machine (Preview) |
PROCESS_UNCATEGORIZED |
|
Saving curl output to disk detected |
PROCESS_UNCATEGORIZED |
|
Screenshot taken on host [seen multiple times] |
STATUS_UPDATE |
|
Security incident detected |
STATUS_UPDATE |
|
Security incident detected on multiple resources |
STATUS_UPDATE |
|
Security incident with shared process detected |
STATUS_UPDATE |
|
Security principal reconnaissance (LDAP) |
STATUS_UPDATE |
|
Security-related process termination detected |
PROCESS_TERMINATION |
|
Sensitive credential memory read |
SCAN_UNCATEGORIZED |
|
Shellcode detected [seen multiple times] |
PROCESS_UNCATEGORIZED |
|
Sign-ins from IPs that attempt sign-ins to disabled accounts |
STATUS_UPDATE |
|
Spam folder referrer detected |
SCAN_UNCATEGORIZED |
|
SQL injection: fuzzing attempt |
STATUS_UPDATE |
EXPLOIT |
SQL injection: potential data exfiltration |
STATUS_UPDATE |
EXPLOIT |
SQL Server potentially spawned a Windows command shell and accessed an abnormal external source |
PROCESS_UNCATEGORIZED |
|
SSH server is running inside a container |
STATUS_UPDATE |
|
Sticky keys attack detected |
STATUS_UPDATE |
|
Storage account identified as source for distribution of malware |
STATUS_UPDATE |
|
Successful brute force attack |
USER_LOGIN |
|
Successful SSH brute force attack |
USER_LOGIN |
|
Suspect integrity level indicative of RDP hijacking |
PROCESS_PRIVILEGE_ESCALATION |
|
Suspect service installation |
SERVICE_CREATION |
|
Suspected account takeover using shadow credentials |
USER_RESOURCE_ACCESS |
EXPLOIT |
Suspected AD FS DKM key read |
STATUS_UPDATE |
|
Suspected AS-REP Roasting attack |
NETWORK_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspected brute force attack |
USER_LOGIN |
|
Suspected Brute Force attack (Kerberos, NTLM) |
USER_LOGIN |
|
Suspected Brute Force attack (LDAP) |
USER_LOGIN |
|
Suspected Brute Force attack (SMB) |
NETWORK_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspected brute force attack using a valid user |
USER_LOGIN |
|
Suspected brute-force attack (Kerberos, NTLM) |
USER_UNCATEGORIZED |
AUTH_VIOLATION |
Suspected DCShadow attack (domain controller promotion) |
STATUS_UPDATE |
|
Suspected DCShadow attack (domain controller replication request) |
STATUS_UPDATE |
|
Suspected DCSync attack (replication of directory services) |
NETWORK_UNCATEGORIZED |
|
Suspected DFSCoerce attack using Distributed File System Protocol |
USER_LOGIN |
|
Suspected exploitation attempt on Windows Print Spooler service |
NETWORK_UNCATEGORIZED |
|
Suspected Golden Ticket usage (encryption downgrade) |
USER_UNCATEGORIZED |
|
Suspected Golden Ticket usage (forged authorization data) |
USER_UNCATEGORIZED |
|
Suspected Golden Ticket usage (nonexistent account) |
USER_UNCATEGORIZED |
|
Suspected Golden Ticket usage (ticket anomaly using RBCD) |
USER_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspected Golden Ticket usage (ticket anomaly) |
USER_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspected Golden Ticket usage (time anomaly) |
USER_UNCATEGORIZED |
|
Suspected identity theft (pass-the-hash) |
USER_UNCATEGORIZED |
DATA_EXFILTRATION |
Suspected identity theft (pass-the-ticket) |
USER_UNCATEGORIZED |
EXPLOIT |
Suspected Kerberos Golden Ticket attack parameters observed |
STATUS_UPDATE |
|
Suspected Kerberos SPN exposure |
NETWORK_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspected Netlogon privilege elevation attempt (CVE-2020-1472 exploitation) |
NETWORK_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspected NTLM authentication tampering |
NETWORK_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspected NTLM relay attack |
NETWORK_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspected over-pass-the-hash attack (forced encryption type) |
NETWORK_UNCATEGORIZED |
|
Suspected overpass-the-hash attack (Kerberos) |
NETWORK_UNCATEGORIZED |
|
Suspected rogue Kerberos certificate usage |
NETWORK_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspected SID-History injection |
USER_CHANGE_PERMISSIONS |
|
Suspected Skeleton Key attack (encryption downgrade) |
NETWORK_UNCATEGORIZED |
|
Suspected SMB packet manipulation (CVE-2020-0796 exploitation) |
STATUS_UPDATE |
|
Suspected successful brute force attack |
USER_LOGIN |
|
Suspected suspicious Kerberos ticket request |
STATUS_UPDATE |
|
Suspected use of Metasploit hacking framework |
NETWORK_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspected WannaCry ransomware attack |
NETWORK_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspicious access to possibly vulnerable web page detected |
SCAN_UNCATEGORIZED |
|
Suspicious Account Creation Detected |
USER_CREATION |
|
Suspicious activity alert |
STATUS_UPDATE |
|
Suspicious Activity Detected |
PROCESS_INJECTION |
|
Suspicious additions to sensitive groups |
USER_CHANGE_PERMISSIONS |
|
Suspicious administrative activity |
USER_RESOURCE_ACCESS |
|
Suspicious API Traffic |
USER_UNCATEGORIZED |
|
Suspicious authentication activity |
USER_RESOURCE_ACCESS |
|
Suspicious Azure role assignment detected (Preview) |
SCAN_UNCATEGORIZED |
|
Suspicious browser |
USER_UNCATEGORIZED |
|
Suspicious certificate usage over Kerberos protocol (PKINIT) |
STATUS_UPDATE |
EXPLOIT |
Suspicious classic role assignment detected (Preview) |
RESOURCE_PERMISSIONS_CHANGE |
|
Suspicious cloud use alert |
STATUS_UPDATE |
|
Suspicious code segment detected |
STATUS_UPDATE |
|
Suspicious communication over DNS |
NETWORK_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspicious connection blocked by network protection |
SCAN_UNCATEGORIZED |
|
Suspicious deletion of the certificate database entries |
STATUS_UPDATE |
|
Suspicious disable of audit filters of AD CS |
SETTING_MODIFICATION |
|
Suspicious Domain Controller certificate request (ESC8) |
STATUS_UPDATE |
|
Suspicious domain name reference |
SCAN_UNCATEGORIZED |
|
Suspicious double extension file executed |
PROCESS_UNCATEGORIZED |
|
Suspicious Download Then Run Activity |
STATUS_UPDATE |
|
Suspicious download using Certutil detected |
PROCESS_UNCATEGORIZED |
|
Suspicious download using Certutil detected [seen multiple times] |
PROCESS_UNCATEGORIZED |
|
Suspicious elevate access operation (Preview)(ARM_AnomalousElevateAccess) |
SCAN_UNCATEGORIZED |
|
Suspicious email deletion activity |
EMAIL_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspicious email forwarding activity |
EMAIL_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspicious email sending patterns detected |
EMAIL_UNCATEGORIZED |
EXPLOIT |
Suspicious external access to an Azure storage account with overly permissive SAS token (Preview) |
USER_RESOURCE_ACCESS |
|
Suspicious external operation to an Azure storage account with overly permissive SAS token (Preview) |
USER_RESOURCE_ACCESS |
|
Suspicious extraction of Azure Cosmos DB account keys (AzureCosmosDB_SuspiciousListKeys.SuspiciousPrincipal) |
STATUS_UPDATE |
|
Suspicious failed execution of custom script extension in your virtual machine |
PROCESS_UNCATEGORIZED |
|
Suspicious failure installing GPU extension in your subscription (Preview) |
SCAN_UNCATEGORIZED |
|
Suspicious file timestamp modification |
STATUS_UPDATE |
|
Suspicious inbox forwarding |
USER_UNCATEGORIZED |
|
Suspicious inbox forwarding |
EMAIL_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspicious inbox manipulation rules |
USER_UNCATEGORIZED |
|
Suspicious inbox manipulation rules |
STATUS_UPDATE |
NETWORK_SUSPICIOUS |
Suspicious incoming RDP network activity |
NETWORK_UNCATEGORIZED |
|
Suspicious incoming RDP network activity from multiple sources |
NETWORK_UNCATEGORIZED |
|
Suspicious incoming SSH network activity |
NETWORK_UNCATEGORIZED |
|
Suspicious incoming SSH network activity from multiple sources |
NETWORK_UNCATEGORIZED |
|
Suspicious installation of a GPU extension was detected on your virtual machine (Preview) |
SCAN_UNCATEGORIZED |
|
Suspicious installation of disk encryption extensions was detected on your virtual machines (Preview) |
SCAN_UNCATEGORIZED |
|
Suspicious installation of GPU extension in your virtual machine (Preview) |
SERVICE_CREATION |
|
Suspicious invocation of a high-risk 'Credential Access' operation detected (Preview) |
SCAN_UNCATEGORIZED |
|
Suspicious invocation of a high-risk 'Data Collection' operation detected (Preview) |
SCAN_UNCATEGORIZED |
|
Suspicious invocation of a high-risk 'Defense Evasion' operation detected (Preview) |
SCAN_UNCATEGORIZED |
|
Suspicious invocation of a high-risk 'Execution' operation detected (Preview) |
SCAN_UNCATEGORIZED |
|
Suspicious invocation of a high-risk 'Impact' operation detected (Preview) |
SCAN_UNCATEGORIZED |
|
Suspicious invocation of a high-risk 'Initial Access' operation detected (Preview) |
SCAN_UNCATEGORIZED |
|
Suspicious invocation of a high-risk 'Lateral Movement' operation detected (Preview) |
SCAN_UNCATEGORIZED |
|
Suspicious invocation of a high-risk 'Persistence' operation detected (Preview) |
SCAN_UNCATEGORIZED |
|
Suspicious invocation of a high-risk 'Privilege Escalation' operation detected (Preview) |
SCAN_UNCATEGORIZED |
|
Suspicious Kerberos delegation attempt by a newly created computer |
NETWORK_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspicious Kerberos delegation attempt using BronzeBit method (CVE-2020-17049 exploitation) |
STATUS_UPDATE |
NETWORK_SUSPICIOUS |
Suspicious kernel module detected [seen multiple times] |
PROCESS_MODULE_LOAD |
|
Suspicious massive data read |
USER_UNCATEGORIZED |
|
Suspicious modification of a dNSHostName attribute (CVE-2022-26923) |
SETTING_MODIFICATION |
|
Suspicious modification of a sAMNameAccount attribute (CVE-2021-42278 and CVE-2021-42287 exploitation) |
STATUS_UPDATE |
|
Suspicious modification of domain AdminSdHolder |
SETTING_MODIFICATION |
|
Suspicious modification of the Resource Based Constrained Delegation attribute by a machine account |
SETTING_MODIFICATION |
|
Suspicious modification of the trust relationship of AD FS server |
SETTING_MODIFICATION |
|
Suspicious modifications to the AD CS security permissions/settings |
SETTING_MODIFICATION |
|
Suspicious network connection over Encrypting File System Remote Protocol |
NETWORK_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Suspicious OAuth app file download activities |
SCAN_HOST |
|
Suspicious outgoing %{Attacked Protocol} traffic detected |
NETWORK_UNCATEGORIZED |
|
Suspicious outgoing RDP network activity |
NETWORK_UNCATEGORIZED |
|
Suspicious outgoing RDP network activity to multiple destinations |
NETWORK_UNCATEGORIZED |
|
Suspicious outgoing SSH network activity |
NETWORK_UNCATEGORIZED |
|
Suspicious outgoing SSH network activity to multiple destinations |
NETWORK_UNCATEGORIZED |
|
Suspicious password access |
STATUS_UPDATE |
|
Suspicious password access [seen multiple times] |
STATUS_UPDATE |
|
Suspicious PHP execution detected |
SCAN_UNCATEGORIZED |
|
Suspicious policy change and secret query in a key vault |
USER_UNCATEGORIZED |
|
Suspicious population-level spike in API traffic to an API endpoint |
SCAN_UNCATEGORIZED |
|
Suspicious PowerShell Activity Detected |
PROCESS_UNCATEGORIZED |
|
Suspicious PowerShell cmdlets executed |
PROCESS_UNCATEGORIZED |
|
Suspicious process executed |
PROCESS_UNCATEGORIZED |
|
Suspicious process executed [seen multiple times] |
PROCESS_UNCATEGORIZED |
|
Suspicious process name detected |
PROCESS_UNCATEGORIZED |
|
Suspicious process name detected [seen multiple times] |
PROCESS_UNCATEGORIZED |
|
Suspicious request to Kubernetes API |
STATUS_UPDATE |
|
Suspicious request to the Kubernetes Dashboard |
STATUS_UPDATE |
|
Suspicious Resource deployment |
USER_RESOURCE_ACCESS |
|
Suspicious Run Command usage was detected on your virtual machine (Preview) |
PROCESS_UNCATEGORIZED |
|
Suspicious secret listing and query in a key vault |
USER_UNCATEGORIZED |
|
Suspicious sending patterns |
USER_UNCATEGORIZED |
|
Suspicious service creation |
SERVICE_CREATION |
|
Suspicious spike in API traffic from a single IP address to an API endpoint |
SCAN_UNCATEGORIZED |
|
Suspicious SQL activity |
PROCESS_UNCATEGORIZED |
|
Suspicious SVCHOST process executed |
PROCESS_UNCATEGORIZED |
|
Suspicious system process executed |
PROCESS_UNCATEGORIZED |
|
Suspicious unauthorized Run Command usage was detected on your virtual machine (Preview) |
PROCESS_UNCATEGORIZED |
|
Suspicious usage of a Desired State Configuration (DSC) extension was detected on your virtual machines (Preview) |
PROCESS_UNCATEGORIZED |
|
Suspicious usage of multiple monitoring or data collection extensions was detected on your virtual machines (Preview) |
SCAN_UNCATEGORIZED |
|
Suspicious usage of VMAccess extension was detected on your virtual machines (Preview) |
SCAN_UNCATEGORIZED |
|
Suspicious User Agent detected |
SCAN_UNCATEGORIZED |
|
Suspicious Volume Shadow Copy Activity |
RESOURCE_DELETION |
|
Suspicious VPN connection |
USER_UNCATEGORIZED |
|
Suspicious WindowPosition registry value detected |
REGISTRY_MODIFICATION |
|
Suspicious WordPress theme invocation detected |
SCAN_UNCATEGORIZED |
|
Suspiciously named process detected |
PROCESS_UNCATEGORIZED |
|
Tenant Allow/Block List entry is about to expire |
STATUS_UPDATE |
|
Tenant restricted from sending email |
EMAIL_UNCATEGORIZED |
|
Tenant restricted from sending unprovisioned email |
EMAIL_UNCATEGORIZED |
|
Test Endpoint - MDATP Machine Isolated Test |
USER_UNCATEGORIZED |
|
Test_Set Auditpol |
SCAN_UNCATEGORIZED |
|
Test- Security Event log Deleted/Cleared |
USER_UNCATEGORIZED |
|
The access level of a potentially sensitive storage blob container was changed to allow unauthenticated public access |
RESOURCE_PERMISSIONS_CHANGE |
|
The access level of a sensitive storage blob container was changed to allow unauthenticated public access (Preview) |
RESOURCE_PERMISSIONS_CHANGE |
|
Tracking Online Meeting App Usage |
STATUS_UPDATE |
|
Traffic detected from IP addresses recommended for blocking |
SCAN_NETWORK |
|
Unexpected admin location |
STATUS_UPDATE |
|
Unfamiliar sign-in properties |
USER_LOGIN |
|
Unknown login to Exchange Online |
USER_UNCATEGORIZED |
|
Unsanctioned cloud app access was blocked |
SCAN_UNCATEGORIZED |
|
Unusual access denied - Unusual user accessing key vault denied |
USER_RESOURCE_ACCESS |
|
Unusual access denied - User accessing high volume of key vaults denied |
USER_RESOURCE_ACCESS |
|
Unusual access inspection in a storage account |
USER_RESOURCE_ACCESS |
|
Unusual access to the key vault from a suspicious IP (Non-Microsoft or External) |
USER_RESOURCE_ACCESS |
|
Unusual addition of credentials to an OAuth app |
USER_RESOURCE_ACCESS |
|
Unusual administrative activities |
USER_UNCATEGORIZED |
|
Unusual amount of data extracted from a sensitive blob container (Preview) |
STATUS_UPDATE |
|
Unusual amount of data extracted from a storage account |
STATUS_UPDATE |
|
Unusual application accessed a key vault |
USER_RESOURCE_ACCESS |
|
Unusual application accessed a storage account |
USER_RESOURCE_ACCESS |
|
Unusual config reset in your virtual machine |
SETTING_MODIFICATION |
|
Unusual data exploration in a storage account |
STATUS_UPDATE |
|
Unusual deletion in a storage account |
STATUS_UPDATE |
|
Unusual deletion of custom script extension in your virtual machine |
PROCESS_UNCATEGORIZED |
|
Unusual execution of custom script extension in your virtual machine |
PROCESS_UNCATEGORIZED |
|
Unusual external user file activity |
FILE_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Unusual file access |
USER_UNCATEGORIZED |
|
Unusual file deletion activities |
USER_UNCATEGORIZED |
|
Unusual file share activities |
USER_UNCATEGORIZED |
|
Unusual impersonated activities |
USER_UNCATEGORIZED |
|
Unusual increase in email reported as phish |
EMAIL_TRANSACTION |
NETWORK_SUSPICIOUS |
Unusual ISP for an OAuth App |
NETWORK_UNCATEGORIZED |
SOFTWARE_PUA |
Unusual multiple file download activities |
USER_UNCATEGORIZED |
|
Unusual multiple storage deletion activities (preview) |
USER_UNCATEGORIZED |
|
Unusual multiple VM creation activities (preview) |
USER_UNCATEGORIZED |
|
Unusual number of blobs extracted from a sensitive blob container (Preview) |
STATUS_UPDATE |
|
Unusual operation pattern in a key vault |
USER_UNCATEGORIZED |
|
Unusual payload with obfuscated parts has been initiated by SQL Server |
STATUS_UPDATE |
|
Unusual Power BI report sharing activities (preview) |
USER_UNCATEGORIZED |
|
Unusual process execution detected |
PROCESS_UNCATEGORIZED |
|
Unusual region for cloud resource (preview) |
USER_UNCATEGORIZED |
|
Unusual SAS token was used to access an Azure storage account from a public IP address (Preview) |
USER_RESOURCE_ACCESS |
|
Unusual unauthenticated access to a storage container |
USER_RESOURCE_ACCESS |
|
Unusual unauthenticated public access to a sensitive blob container (Preview) |
USER_RESOURCE_ACCESS |
|
Unusual user accessed a key vault |
USER_RESOURCE_ACCESS |
|
Unusual user password reset in your virtual machine |
USER_CHANGE_PASSWORD |
|
Unusual user SSH key reset in your virtual machine |
STATUS_UPDATE |
|
Unusual user-application pair accessed a key vault |
USER_RESOURCE_ACCESS |
|
Unusual volume of data extracted |
STATUS_UPDATE |
|
Unusual volume of external file sharing |
FILE_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
Unusual volume of file deletion |
FILE_DELETION |
DATA_DESTRUCTION |
Unusually large request body transmitted between a single IP address and an API endpoint |
SCAN_UNCATEGORIZED |
|
Unusually large response payload transmitted between a single IP address and an API endpoint |
SCAN_UNCATEGORIZED |
|
Usage of MicroBurst exploitation toolkit to run an arbitrary code or exfiltrate Azure Automation account credentials |
PROCESS_UNCATEGORIZED |
|
Usage of NetSPI techniques to maintain persistence in your Azure environment |
SCAN_UNCATEGORIZED |
|
Usage of PowerZure exploitation toolkit to run an arbitrary code or exfiltrate Azure Automation account credentials |
SCAN_UNCATEGORIZED |
|
Usage of PowerZure function to maintain persistence in your Azure environment |
SCAN_UNCATEGORIZED |
|
Use of personal account |
STATUS_UPDATE |
|
User accessed high volume of key vaults |
USER_RESOURCE_ACCESS |
|
User and group membership reconnaissance (SAMR) |
USER_RESOURCE_ACCESS |
|
User and Group membership reconnaissance (SAMR) |
USER_UNCATEGORIZED |
|
User and IP address reconnaissance (SMB) |
NETWORK_UNCATEGORIZED |
|
User impersonation phish delivered to inbox/folder |
USER_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
User reported suspicious activity |
USER_UNCATEGORIZED |
|
User requested to release a quarantined message |
USER_UNCATEGORIZED |
|
User restricted from sending email |
USER_UNCATEGORIZED |
|
User restricted from sharing forms and collecting responses |
USER_UNCATEGORIZED |
NETWORK_SUSPICIOUS |
VBScript HTTP object allocation detected |
FILE_CREATION |
|
Verified threat actor IP |
USER_LOGIN |
|
Vulnerability scanner detected |
SCAN_UNCATEGORIZED |
|
Web fingerprinting detected |
SCAN_UNCATEGORIZED |
|
Website is tagged as malicious in threat intelligence feed |
STATUS_UPDATE |
フィールド マッピング リファレンス: MICROSOFT_GRAPH_ALERT
次の表に、MICROSOFT_GRAPH_ALERT
ログタイプのログ フィールドと、対応する UDM フィールドを示します。
Log field | UDM mapping | Logic |
---|---|---|
principal.asset.deployment_status |
The principal.asset.deployment_status UDM field is set to one of the following values:
|
|
target.resource_ancestors.resource_type |
If the evidence.@odata.type log field value matches the regular expression pattern .*kubernetesNamespaceEvidence , then the target.resource_ancestors.resource_type UDM field is set to CONTAINER . |
|
target.resource_ancestors.resource_type |
If the evidence.cluster.name log field value is not empty, then the target.resource_ancestors.resource_type UDM field is set to CLUSTER . |
|
target.resource_ancestors.resource_type |
If the evidence.@odata.type log field value matches the regular expression pattern .*containerEvidence , then the target.resource_ancestors.resource_type UDM field is set to IMAGE . |
|
target.resource_ancestors.resource_type |
If the evidence.@odata.type log field value matches the regular expression pattern .*containerEvidence , then the target.resource_ancestors.resource_type UDM field is set to CONTAINER . |
|
target.resource_ancestors.resource_type |
If the evidence.@odata.type log field value matches the regular expression pattern .*containerEvidence , then the target.resource_ancestors.resource_type UDM field is set to POD . |
|
target.resource_ancestors.resource_type |
If the evidence.@odata.type log field value matches the regular expression pattern .*containerEvidence , then the target.resource_ancestors.resource_type UDM field is set to CONTAINER . |
|
target.resource_ancestors.resource_type |
If the evidence.@odata.type log field value matches the regular expression pattern .*containerEvidence , and if the evidence.pod.serviceAccount.name log field value is not empty, then the target.resource_ancestors.resource_type UDM field is set to SERVICE_ACCOUNT . |
|
target.resource_ancestors.resource_type |
If the evidence.@odata.type log field value matches the regular expression pattern .*containerEvidence , then the target.resource_ancestors.resource_type UDM field is set to CONTAINER . |
|
target.resource_ancestors.resource_type |
If the evidence.@odata.type log field value matches the regular expression pattern .*kubernetesNamespaceEvidence , then the target.resource_ancestors.resource_type UDM field is set to CONTAINER . |
|
target.resource_ancestors.resource_type |
If the evidence.@odata.type log field value matches the regular expression pattern .*kubernetesNamespaceEvidence , then the target.resource_ancestors.resource_type UDM field is set to CONTAINER . |
|
target.resource_ancestors.resource_type |
If the evidence.@odata.type log field value matches the regular expression pattern .*kubernetesNamespaceEvidence , then the target.resource_ancestors.resource_type UDM field is set to CONTAINER . |
|
target.resource_ancestors.resource_type |
If the evi.@odata.type log field value matches the regular expression pattern (.*)(kubernetesNamespaceEvidence or kubernetesPodEvidence) , then the target.resource_ancestors.resource_type UDM field is set to SERVICE_ACCOUNT . |
|
network.direction |
If the evidence.antiSpamDirection log field value matches the regular expression pattern (?i)(inbound) , then the network.direction UDM field is set to INBOUND .Else, If the evidence.antiSpamDirection log field value matches the regular expression pattern (?i)(outbound) , then the network.direction UDM field is set to OUTBOUND . |
|
security_result.associations.type |
If the evidence.@odata.type log field value matches the regular expression pattern (.*malwareEvidence) , then the security_result.associations.type UDM field is set to MALWARE . |
|
principal.platform |
The principal.platform UDM field is set to one of the following values:
|
|
principal.asset.platform_software.platform |
The principal.asset.platform_software.platform UDM field is set to one of the following values:
|
|
target.resource_ancestors.resource_type |
If the evidence.@odata.type log field value matches the regular expression pattern .*blobEvidence , then the target.resource_ancestors.resource_type UDM field is set to STORAGE_OBJECT . |
|
security_result.action |
If the title log field value matches the regular expression pattern (malware was blocked or Unsanctioned cloud app access was blocked or Activity from an anonymous proxy or Network - NT - Possible Ursnif/Gozi Phish or Network - SSH Potential Brute Force or Multiple failed login attempts or Brute force attack against Azure Portal or Block download based on real-time content inspection) , then the security_result.action UDM field is set to BLOCK .Else, If the title log field value matches the regular expression pattern (Failed SSH brute force attack) , then the security_result.action UDM field is set to FAIL .Else, If the title log field value contain one of the following values, then the security_result.action UDM field is set to ALLOW .
|
|
metadata.vendor_name |
The metadata.vendor_name UDM field is set to Microsoft . |
|
principal.hostname |
The src_host field is extracted from description log field using the Grok pattern and the src_host extracted field is mapped to the principal.hostname UDM field. |
|
principal.asset.hostname |
The src_host field is extracted from description log field using the Grok pattern and the src_host extracted field is mapped to the principal.asset.hostname UDM field. |
|
extensions.auth.type |
If the title log field value contain one of the following values, then the extensions.auth.type UDM field is set to AUTHTYPE_UNSPECIFIED .
|
|
network.application_protocol |
If the title log field value is equal to Network - Rare RDP Connections , then the network.application_protocol UDM field is set to RDP . |
|
idm.is_alert |
The idm.is_alert UDM field is set to True . |
|
idm.is_significant |
The idm.is_significant UDM field is set to True . |
|
security_result.alert_state |
The security_result.alert_state UDM field is set to ALERTING . |
|
security_result.attack_details.tactics.name |
If the title log field value contain one of the following values, then the security_result.attack_details.techniques.id UDM field is set to T1530 and T1567 values and the security_result.attack_details.tactics.name UDM field is set to Exfiltration .
title log field value contain one of the following values, then the security_result.attack_details.techniques.id UDM field is set to T1078 .
title log field value contain one of the following values, then the security_result.attack_details.techniques.id UDM field is set to T1090 .
title log field value contain one of the following values, then the security_result.attack_details.techniques.id UDM field is set to T1098 .
title log field value contain one of the following values, then the security_result.attack_details.techniques.id UDM field is set to T1589 .
title log field value is equal to Failed login for admin account , then the security_result.attack_details.techniques.id UDM field is set to T1589 and the security_result.attack_details.techniques.id UDM field is set to T1110 and the security_result.attack_details.tactics.name UDM field is set to CredentialAccess .Else, If the title log field value is equal to New risky app , then the security_result.attack_details.techniques.id UDM field is set to T1199 .Else, If the title log field value is equal to Creation of forwarding/redirect rule , then the security_result.attack_details.techniques.id UDM field is set to T1137 .If the mitre_technique_data.id log field value contain one of the following values, then the security_result.attack_details.tactics.name UDM field is set to Reconnaissance .
mitre_technique_data.id log field value contain one of the following values, then the security_result.attack_details.tactics.name UDM field is set to ResourceDevelopment .
mitre_technique_data.id log field value contain one of the following values, then the security_result.attack_details.tactics.name UDM field is set to InitialAccess .
mitre_technique_data.id log field value contain one of the following values, then the security_result.attack_details.tactics.name UDM field is set to Execution .
mitre_technique_data.id log field value contain one of the following values, then the security_result.attack_details.tactics.name UDM field is set to Persistence .
mitre_technique_data.id log field value contain one of the following values, then the security_result.attack_details.tactics.name UDM field is set to PrivilegeEscalation .
mitre_technique_data.id log field value contain one of the following values, then the security_result.attack_details.tactics.name UDM field is set to DefenseEvasion .
mitre_technique_data.id log field value contain one of the following values, then the security_result.attack_details.tactics.name UDM field is set to CredentialAccess .
mitre_technique_data.id log field value contain one of the following values, then the security_result.attack_details.tactics.name UDM field is set to Discovery .
mitre_technique_data.id log field value contain one of the following values, then the security_result.attack_details.tactics.name UDM field is set to LateralMovement .
mitre_technique_data.id log field value contain one of the following values, then the security_result.attack_details.tactics.name UDM field is set to Collection .
mitre_technique_data.id log field value contain one of the following values, then the security_result.attack_details.tactics.name UDM field is set to CommandAndControl .
mitre_technique_data.id log field value contain one of the following values, then the security_result.attack_details.tactics.name UDM field is set to Exfiltration .
mitre_technique_data.id log field value contain one of the following values, then the security_result.attack_details.tactics.name UDM field is set to Impact .
|
|
actorDisplayName |
security_result.about.user.user_display_name |
If the actorDisplayName log field value is not equal to null , then the actorDisplayName log field is mapped to the security_result.about.user.user_display_name UDM field. |
additionalData |
additional.fields [additionalData %{key}] |
|
alertPolicyId |
security_result.rule_id |
If the alertPolicyId log field value is not equal to null , then the alertPolicyId log field is mapped to the security_result.rule_id UDM field. |
alertWebUrl |
metadata.url_back_to_product |
|
assignedTo |
security_result.about.user.userid |
If the assignedTo log field value is not equal to null , then the assignedTo log field is mapped to the security_result.about.user.userid UDM field. |
category |
metadata.product_event_type |
|
category |
security_result.summary |
|
classification |
security_result.detection_fields[classification] |
If the classification log field value is not equal to null , then the classification log field is mapped to the security_result.detection_fields UDM field. |
comments.comment |
security_result.about.investigation.comments |
|
comments.createdByDisplayName |
security_result.detection_fields[comments_created_by_display_name] |
|
comments.createdDateTime |
security_result.detection_fields[comments_created_date_time] |
|
createdDateTime |
metadata.event_timestamp |
|
description |
metadata.description |
|
description |
security_result.description |
|
detectionSource |
security_result.detection_fields[detection_source] |
|
detectorId |
security_result.detection_fields[detector_id] |
If the detectorId log field value is not equal to null , then the detectorId log field is mapped to the security_result.detection_fields UDM field. |
determination |
security_result.detection_fields[determination] |
If the determination log field value is not equal to null , then the determination log field is mapped to the security_result.detection_fields UDM field. |
evidence.@odata.type |
||
evidence.algorithm |
security_result.detection_fields[algorithm] |
|
evidence.amazonAccountId |
target.resource_ancestors.attribute.labels[amazon_account_id] |
|
evidence.amazonResourceId |
target.resource_ancestors.product_object_id |
|
evidence.appId |
target.application |
If the index log field value is equal to 1 , then the evidence.appId log field is mapped to the target.application UDM field. |
evidence.appId |
target.resource_ancestors.attribute.labels[app_id] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*oauthApplicationEvidence or .*cloudApplicationEvidence) , then the evidence.appId log field is mapped to the target.resource_ancestors.attribute.labels UDM field. |
evidence.args |
target.resource_ancestors.attribute.labels[args] |
|
evidence.attachmentsCount |
security_result.detection_fields[attachments_count] |
|
evidence.azureAdDeviceId |
security_result.detection_fields[azure_ad_device_id] |
|
evidence.blobContainer.createdDateTime |
target.resource_ancestors.attribute.creation_time |
|
evidence.blobContainer.name |
target.resource_ancestors.name |
|
evidence.blobContainer.remediationStatus |
target.resource_ancestors.attribute.labels [blob_container_remediation_status] |
|
evidence.blobContainer.remediationStatusDetails |
target.resource_ancestors.attribute.labels [blob_container_remediation_status_details] |
|
evidence.blobContainer.roles |
target.resource_ancestors.attribute.labels [blob_container_roles] |
|
evidence.blobContainer.storageResource.createdDateTime |
target.resource_ancestors.attribute.creation_time |
|
evidence.blobContainer.storageResource.remediationStatus |
target.resource_ancestors.attribute.labels [pod_storage_resource_remediation_status] |
|
evidence.blobContainer.storageResource.remediationStatusDetails |
target.resource_ancestors.attribute.labels [pod_storage_resource_remediation_status_details] |
|
evidence.blobContainer.storageResource.resourceId |
target.resource_ancestors.product_object_id |
|
evidence.blobContainer.storageResource.resourceName |
target.resource_ancestors.name |
|
evidence.blobContainer.storageResource.resourceType |
target.resource_ancestors.resource_subtype |
|
evidence.blobContainer.storageResource.verdict |
target.resource_ancestors.attribute.labels [pod_storage_resource_verdict] |
|
evidence.blobContainer.tags |
target.resource_ancestors.attribute.labels [blob_container_tags] |
|
evidence.blobContainer.url |
target.resource_ancestors.attribute.labels [blob_container_url] |
|
evidence.blobContainer.verdict |
target.resource_ancestors.attribute.labels [blob_container_verdict] |
|
evidence.category |
security_result.detection_fields[category] |
|
evidence.cloudResource.amazonAccountId |
target.resource_ancestors.attribute.labels[cloud_resource_amazon_account_id] |
|
evidence.cloudResource.amazonResourceId |
target.resource_ancestors.attribute.labels[cloud_resource_amazon_resource_id] |
|
evidence.cloudResource.createdDateTime |
target.resource_ancestors.attribute.labels[cloud_resource_created_date_time] |
|
evidence.cloudResource.location |
target.resource_ancestors.attribute.labels[cloud_resource_location] |
|
evidence.cloudResource.locationType |
target.resource_ancestors.attribute.labels[cloud_resource_location_type] |
|
evidence.cloudResource.projectId |
target.resource_ancestors.attribute.labels[cloud_resource_project_id] |
|
evidence.cloudResource.projectNumber |
target.resource_ancestors.attribute.labels[cloud_resource_project_number] |
|
evidence.cloudResource.remediationStatus |
target.resource_ancestors.attribute.labels[cloud_resource_remediation_status] |
|
evidence.cloudResource.remediationStatusDetails |
target.resource_ancestors.attribute.labels[cloud_resource_remediation_status_details] |
|
evidence.cloudResource.resourceId |
target.resource_ancestors.attribute.labels[cloud_resource_resource_id] |
|
evidence.cloudResource.resourceName |
target.resource_ancestors.attribute.labels[cloud_resource_resource_name] |
|
evidence.cloudResource.resourceType |
target.resource_ancestors.attribute.labels[cloud_resource_resource_type] |
|
evidence.cloudResource.roles |
target.resource_ancestors.attribute.labels[cloud_resource_roles] |
|
evidence.cloudResource.tags |
target.resource_ancestors.attribute.labels[cloud_resource_tags] |
|
evidence.cloudResource.verdict |
target.resource_ancestors.attribute.labels[cloud_resource_verdict] |
|
evidence.cluster.cloudResource.amazonAccountId |
target.resource_ancestors.attribute.labels[cluster_cloud_resource_amazon_account_id] |
|
evidence.cluster.cloudResource.amazonResourceId |
target.resource_ancestors.attribute.labels[cluster_cloud_resource_amazon_resource_id] |
|
evidence.cluster.cloudResource.createdDateTime |
target.resource_ancestors.attribute.labels[cluster_cloud_resource_created_date_time] |
|
evidence.cluster.cloudResource.location |
target.resource_ancestors.attribute.labels[cluster_cloud_resource_location] |
|
evidence.cluster.cloudResource.locationType |
target.resource_ancestors.attribute.labels[cluster_cloud_resource_location_type] |
|
evidence.cluster.cloudResource.projectId |
target.resource_ancestors.attribute.labels[cluster_cloud_resource_project_id] |
|
evidence.cluster.cloudResource.projectNumber |
target.resource_ancestors.attribute.labels[cluster_cloud_resource_project_number] |
|
evidence.cluster.cloudResource.remediationStatus |
target.resource_ancestors.attribute.labels[cluster_cloud_resource_remediation_status] |
|
evidence.cluster.cloudResource.remediationStatusDetails |
target.resource_ancestors.attribute.labels[cluster_cloud_resource_remediation_status_details] |
|
evidence.cluster.cloudResource.resourceId |
target.resource_ancestors.attribute.labels[cluster_cloud_resource_resource_id] |
|
evidence.cluster.cloudResource.resourceName |
target.resource_ancestors.attribute.labels[cluster_cloud_resource_resource_name] |
|
evidence.cluster.cloudResource.resourceType |
target.resource_ancestors.attribute.labels[cluster_cloud_resource_resource_type] |
|
evidence.cluster.cloudResource.roles |
target.resource_ancestors.attribute.labels[cluster_cloud_resource_roles] |
|
evidence.cluster.cloudResource.tags |
target.resource_ancestors.attribute.labels[cluster_cloud_resource_tags] |
|
evidence.cluster.cloudResource.verdict |
target.resource_ancestors.attribute.labels[cluster_cloud_resource_verdict] |
|
evidence.cluster.createdDateTime |
target.resource_ancestors.attribute.creation_time |
|
evidence.cluster.distribution |
target.resource_ancestors.attribute.labels[cluster_distribution] |
|
evidence.cluster.name |
target.resource_ancestors.name |
|
evidence.cluster.platform |
target.resource_ancestors.attribute.labels[cluster_platform] |
|
evidence.cluster.remediationStatus |
target.resource_ancestors.attribute.labels[cluster_remediation_status] |
|
evidence.cluster.remediationStatusDetails |
target.resource_ancestors.attribute.labels[cluster_remediation_status_details] |
|
evidence.cluster.roles |
target.resource_ancestors.attribute.roles.name |
|
evidence.cluster.tags |
target.resource_ancestors.attribute.labels[cluster_tags] |
|
evidence.cluster.verdict |
target.resource_ancestors.attribute.labels[cluster_verdict] |
|
evidence.cluster.version |
target.resource_ancestors.attribute.labels[cluster_version] |
|
evidence.clusterBy |
security_result.detection_fields[cluster_by] |
|
evidence.clusterByValue |
security_result.detection_fields[cluster_by_value] |
|
evidence.clusterIP.countryLetterCode |
about.location.country_or_region |
If the evidence.@odata.type log field value matches the regular expression pattern .*kubernetesServiceEvidence , then the evidence.clusterIP.countryLetterCode log field is mapped to the about.location.country_or_region UDM field. |
evidence.clusterIP.ipAddress |
about.ip |
|
evidence.command |
target.resource_ancestors.attribute.labels[command] |
|
evidence.containerId |
target.resource_ancestors.attribute.labels[container_id] |
|
evidence.containers.args |
target.resource_ancestors.attribute.labels [containers_args] |
|
evidence.containers.command |
target.resource_ancestors.attribute.labels [containers_command] |
|
evidence.containers.containerId |
target.resource_ancestors.product_object_id |
|
evidence.containers.createdDateTime |
target.resource_ancestors.attribute.creation_time |
|
evidence.containers.isPrivileged |
target.resource_ancestors.attribute.labels [containers_is_privileged] |
|
evidence.containers.name |
target.resource_ancestors.name |
|
evidence.containers.remediationStatus |
target.resource_ancestors.attribute.labels [containers_remediation_status] |
|
evidence.containers.remediationStatusDetails |
target.resource_ancestors.attribute.labels [containers_remediation_status_details] |
|
evidence.containers.roles |
target.resource_ancestors.attribute.labels [containers_roles] |
|
evidence.containers.tags |
target.resource_ancestors.attribute.labels [containers_tags] |
|
evidence.containers.verdict |
target.resource_ancestors.attribute.labels [containers_verdict] |
|
evidence.controller.createdDateTime |
target.resource_ancestors.attribute.creation_time |
|
evidence.controller.name |
target.resource_ancestors.name |
|
evidence.controller.remediationStatus |
target.resource_ancestors.attribute.labels [controller_remediation_status] |
|
evidence.controller.remediationStatusDetails |
target.resource_ancestors.attribute.labels [controller_remediation_status_details] |
|
evidence.controller.roles |
target.resource_ancestors.attribute.labels [controller_roles] |
|
evidence.controller.tags |
target.resource_ancestors.attribute.labels [controller_tags] |
|
evidence.controller.type |
target.resource_ancestors.resource_subtype |
|
evidence.controller.verdict |
target.resource_ancestors.attribute.labels [controller_verdict] |
|
evidence.countryLetterCode |
principal.location.country_or_region |
|
evidence.createdDateTime |
principal.user.attribute.creation_time |
The evidence.createdDateTime is mapped to principal.user.attribute.creation_time when all of the following conditions are met:
|
evidence.createdDateTime |
target.user.attribute.creation_time |
The evidence.createdDateTime is mapped to target.user.attribute.creation_time when all of the following conditions are met:
|
evidence.createdDateTime |
principal.asset.attribute.creation_time |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)deviceEvidence , then the evidence.createdDateTime log field is mapped to the principal.asset.attribute.creation_time UDM field. |
evidence.createdDateTime |
target.resource_ancestors.attribute.creation_time |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(amazonResourceEvidence or azureResourceEvidence or blobContainerEvidence or blobEvidence or googleCloudResourceEvidence or containerEvidence or containerImageEvidence or containerRegistryEvidence or kubernetesClusterEvidence or kubernetesControllerEvidence or kubernetesNamespaceEvidence or kubernetesPodEvidence or kubernetesSecretEvidence or kubernetesServiceAccountEvidence or kubernetesServiceEvidence or oauthApplicationEvidence) , then the evidence.createdDateTime log field is mapped to the target.resource_ancestors.attribute.creation_time UDM field. |
evidence.createdDateTime |
target.group.attribute.creation_time |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)securityGroupEvidence , then the evidence.createdDateTime log field is mapped to the target.group.attribute.creation_time UDM field. |
evidence.createdDateTime |
security_result.detection_fields [created_date_time] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(cloudApplicationEvidence or amazonResourceEvidence or azureResourceEvidence or blobContainerEvidence or blobEvidence or googleCloudResourceEvidence or containerEvidence or containerImageEvidence or containerRegistryEvidence or kubernetesClusterEvidence or kubernetesControllerEvidence or kubernetesNamespaceEvidence or kubernetesSecretEvidence or kubernetesServiceAccountEvidence or kubernetesServiceEvidence or oauthApplicationEvidence or kubernetesPodEvidence or deviceEvidence or mailClusterEvidence or registryKeyEvidence or registryValueEvidence or urlEvidence or analyzedMessageEvidence or securityGroupEvidence or userEvidence or mailboxEvidence or ipEvidence or mailClusterEvidence or analyzedMessageEvidence or registryKeyEvidence or registryValueEvidence or urlEvidence or fileEvidence or processEvidence) , then the evidence.createdDateTime extracted field is mapped to the security_result.detection_fields UDM field. |
evidence.createdDateTime |
target.resource.attribute.creation_time |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)cloudApplicationEvidence , then the evidence.createdDateTime log field is mapped to the target.resource.attribute.creation_time UDM field. |
evidence.defenderAvStatus |
security_result.detection_fields [defender_av_status] |
|
evidence.deliveryAction |
security_result.detection_fields [delivery_action] |
|
evidence.deliveryLocation |
security_result.detection_fields [delivery_location] |
|
evidence.destinationPort |
target.port |
|
evidence.detailedRoles |
principal.user.attribute.labels [evidence_detailed_roles] |
The evidence.detailedRoles is mapped to principal.user.attribute.labels when all
of the following conditions are met:
|
evidence.detailedRoles |
target.user.attribute.labels [evidence_detailed_roles] |
The evidence.detailedRoles is mapped to target.user.attribute.labels when all
of the following conditions are met:
|
evidence.detailedRoles |
principal.asset.attribute.labels [evidence_detailed_roles] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)deviceEvidence , then the evidence.detailedRoles log field is mapped to the principal.asset.attribute.labels UDM field. |
evidence.detailedRoles |
target.resource_ancestors.attribute.labels [evidence_detailed_roles] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(amazonResourceEvidence or azureResourceEvidence or blobContainerEvidence or blobEvidence or googleCloudResourceEvidence or containerEvidence or containerImageEvidence or containerRegistryEvidence or kubernetesClusterEvidence or kubernetesControllerEvidence or kubernetesNamespaceEvidence or kubernetesPodEvidence or kubernetesSecretEvidence or kubernetesServiceAccountEvidence or kubernetesServiceEvidence or oauthApplicationEvidence) , then the evidence.detailedRoles log field is mapped to the target.resource_ancestors.attribute.labels UDM field. |
evidence.detailedRoles |
target.group.attribute.labels [evidence_detailed_roles] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)securityGroupEvidence , then the evidence.detailedRoles log field is mapped to the target.group.attribute.labels UDM field. |
evidence.detailedRoles |
security_result.detection_fields [detailed_roles] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(ipEvidence or mailClusterEvidence or analyzedMessageEvidence or registryKeyEvidence or registryValueEvidence or urlEvidence or fileEvidence or processEvidence) , then the evidence.detailedRoles log field is mapped to the security_result.detection_fields UDM field. |
evidence.detectionStatus |
security_result.detection_fields[detection_status] |
|
evidence.deviceDnsName |
principal.asset.hostname |
If the evidence.@odata.type log field value matches the regular expression pattern .*deviceEvidence , then the evidence.deviceDnsName field is mapped to the principal.asset.hostname UDM field. |
evidence.deviceDnsName |
principal.hostname |
If the evidence.@odata.type log field value matches the regular expression pattern .*deviceEvidence , then the evidence.deviceDnsName field is mapped to the principal.hostname UDM field. |
evidence.displayName |
target.application |
If the evidence.@odata.type log field value matches the regular expression pattern (.*oauthApplicationEvidence or .*cloudApplicationEvidence) , then the evidence.displayName log field is mapped to the target.application UDM field. |
evidence.displayName |
target.group.group_display_name |
If the evidence.@odata.type log field value matches the regular expression pattern .*securityGroupEvidence , then the evidence.displayName log field is mapped to the target.group.group_display_name UDM field. |
evidence.displayName |
principal.user.attribute.labels[display_name] |
If the evidence.@odata.type log field value matches the regular expression pattern .*mailboxEvidence , and if the title log field value does not contain one of the following values, then the evidence.displayName log field is mapped to the principal.user.attribute.labels UDM field.
|
evidence.displayName |
target.user.attribute.labels[display_name] |
If the evidence.@odata.type log field value matches the regular expression pattern .*mailboxEvidence , and if the title log field value contain one of the following values, then the evidence.displayName log field is mapped to the target.user.attribute.labels UDM field.
|
evidence.distribution |
target.resource_ancestors.attribute.labels[distribution] |
|
evidence.emailCount |
security_result.detection_fields [email_count] |
|
evidence.ephemeralContainers.args |
target.resource_ancestors.attribute.labels [ephemeral_containers_args] |
|
evidence.ephemeralContainers.command |
target.resource_ancestors.attribute.labels [ephemeral_containers_command] |
|
evidence.ephemeralContainers.containerId |
target.resource_ancestors.product_object_id |
|
evidence.ephemeralContainers.createdDateTime |
target.resource_ancestors.attribute.creation_time |
|
evidence.ephemeralContainers.isPrivileged |
target.resource_ancestors.attribute.labels [ephemeral_containers_is_privileged] |
|
evidence.ephemeralContainers.name |
target.resource_ancestors.name |
|
evidence.ephemeralContainers.remediationStatus |
target.resource_ancestors.attribute.labels [ephemeral_containers_remediation_status] |
|
evidence.ephemeralContainers.remediationStatusDetails |
target.resource_ancestors.attribute.labels [ephemeral_containers_remediation_status_details] |
|
evidence.ephemeralContainers.roles |
target.resource_ancestors.attribute.labels [ephemeral_containers_roles] |
|
evidence.ephemeralContainers.tags |
target.resource_ancestors.attribute.labels [ephemeral_containers_tags] |
|
evidence.ephemeralContainers.verdict |
target.resource_ancestors.attribute.labels [ephemeral_containers_verdict] |
|
evidence.etag |
target.resource_ancestors.attribute.labels[etag] |
|
evidence.externalIPs.countryLetterCode |
about.location.country_or_region |
|
evidence.externalIPs.ipAddress |
about.ip |
|
evidence.fileDetails.fileName |
target.file.names |
|
evidence.fileDetails.filePath |
target.file.full_path |
|
evidence.fileDetails.filePublisher |
security_result.detection_fields [file_details_file_publisher] |
If the evidence.@odata.type log field value matches the regular expression pattern .*fileEvidence , then the evidence.fileDetails.filePublisher log field is mapped to the security_result.detection_fields UDM field. |
evidence.fileDetails.fileSize |
target.file.size |
|
evidence.fileDetails.issuer |
security_result.detection_fields [file_details_issuer] |
|
evidence.fileDetails.sha1 |
target.file.sha1 |
|
evidence.fileDetails.sha256 |
target.file.sha256 |
|
evidence.fileDetails.signer |
security_result.detection_fields [file_details_signer] |
|
evidence.fileHashes |
target.resource_ancestors.attribute.labels [file_hashes] |
|
evidence.files.createdDateTime |
security_result.detection_fields [files_created_date_time] |
|
evidence.files.detectionStatus |
security_result.detection_fields [files_detection_status] |
|
evidence.files.fileDetails.fileName |
target.file.names |
|
evidence.files.fileDetails.filePath |
target.file.full_path |
|
evidence.files.fileDetails.filePublisher |
security_result.detection_fields [files_file_details_file_publisher] |
|
evidence.files.fileDetails.fileSize |
target.file.size |
|
evidence.files.fileDetails.issuer |
security_result.detection_fields [files_file_details_issuer] |
|
evidence.files.fileDetails.sha1 |
target.file.sha1 |
|
evidence.files.fileDetails.sha256 |
target.file.sha256 |
|
evidence.files.fileDetails.signer |
security_result.detection_fields [files_file_details_signer] |
|
evidence.files.mdeDeviceId |
security_result.detection_fields [files_mde_device_id] |
|
evidence.files.remediationStatus |
security_result.detection_fields [files_remediation_status] |
|
evidence.files.remediationStatusDetails |
security_result.detection_fields [files_remediation_status_details] |
|
evidence.files.verdict |
security_result.detection_fields [files_verdict] |
|
evidence.firstSeenDateTime |
principal.asset.first_seen_time |
|
evidence.fullResourceName |
target.resource_ancestors.attribute.labels[full_resource_name] |
|
evidence.healthStatus |
principal.asset.attribute.labels[health_status] |
|
evidence.image.createdDateTime |
target.resource_ancestors.attribute.creation_time |
|
evidence.image.digestImage |
target.resource_ancestors.attribute.labels [image_digest_image] |
|
evidence.image.imageId |
target.resource_ancestors.product_object_id |
|
evidence.image.registry.createdDateTime |
target.resource_ancestors.attribute.labels [image_registry_created_date_time] |
|
evidence.image.registry.registry |
target.resource_ancestors.attribute.labels [image_registry_registry] |
|
evidence.image.registry.remediationStatus |
target.resource_ancestors.attribute.labels [image_registry_remediation_status] |
|
evidence.image.registry.remediationStatusDetails |
target.resource_ancestors.attribute.labels [image_registry_remediation_status_details] |
|
evidence.image.registry.roles |
target.resource_ancestors.attribute.labels [image_registry_roles] |
|
evidence.image.registry.tags |
target.resource_ancestors.attribute.labels [image_registry_tags] |
|
evidence.image.registry.verdict |
target.resource_ancestors.attribute.labels [image_registry_verdict] |
|
evidence.image.remediationStatus |
target.resource_ancestors.attribute.labels [image_remediation_status] |
|
evidence.image.remediationStatusDetails |
target.resource_ancestors.attribute.labels [image_remediation_status_details] |
|
evidence.image.roles |
target.resource_ancestors.attribute.labels [image_roles] |
|
evidence.image.tags |
target.resource_ancestors.attribute.labels [image_tags] |
|
evidence.image.verdict |
target.resource_ancestors.attribute.labels [image_verdict] |
|
evidence.imageFile.fileName |
target.process.file.names |
If the evidence.@odata.type log field value matches the regular expression pattern .*processEvidence , then the evidence.imageFile.fileName log field is mapped to the target.process.file.names UDM field. |
evidence.imageFile.filePath |
target.process.file.full_path |
If the evidence.@odata.type log field value matches the regular expression pattern .*processEvidence , then the evidence.imageFile.filePath log field is mapped to the target.process.file.full_path UDM field. |
evidence.imageFile.filePublisher |
security_result.detection_fields [image_file_file_publisher] |
If the evidence.@odata.type log field value matches the regular expression pattern .*processEvidence , then the evidence.imageFile.filePublisher log field is mapped to the security_result.detection_fields UDM field. |
evidence.imageFile.fileSize |
target.process.file.size |
If the evidence.@odata.type log field value matches the regular expression pattern .*processEvidence , then the evidence.imageFile.fileSize log field is mapped to the target.process.file.size UDM field. |
evidence.imageFile.issuer |
security_result.detection_fields[image_file_issuer] |
|
evidence.imageFile.sha1 |
target.process.file.sha1 |
If the evidence.@odata.type log field value matches the regular expression pattern .*processEvidence , then the evidence.imageFile.sha1 log field is mapped to the target.process.file.sha1 UDM field. |
evidence.imageFile.sha256 |
target.process.file.sha256 |
If the evidence.@odata.type log field value matches the regular expression pattern .*processEvidence , then the evidence.imageFile.sha256 log field is mapped to the target.process.file.sha256 UDM field. |
evidence.imageFile.signer |
security_result.detection_fields [image_file_signer] |
|
evidence.imageId |
target.resource_ancestors.attribute.labels[image_id] |
|
evidence.initContainers.args |
target.resource_ancestors.attribute.labels [init_containers_args] |
|
evidence.initContainers.command |
target.resource_ancestors.attribute.labels [init_containers_command] |
|
evidence.initContainers.containerId |
target.resource_ancestors.product_object_id |
|
evidence.initContainers.createdDateTime |
target.resource_ancestors.attribute.creation_time |
|
evidence.initContainers.isPrivileged |
target.resource_ancestors.attribute.labels [init_containers_is_privileged] |
|
evidence.initContainers.name |
target.resource_ancestors.name |
|
evidence.initContainers.remediationStatus |
target.resource_ancestors.attribute.labels [init_containers_remediation_status] |
|
evidence.initContainers.remediationStatusDetails |
target.resource_ancestors.attribute.labels [init_containers_remediation_status_details] |
|
evidence.initContainers.roles |
target.resource_ancestors.attribute.labels [init_containers_roles] |
|
evidence.initContainers.tags |
target.resource_ancestors.attribute.labels [init_containers_tags] |
|
evidence.initContainers.verdict |
target.resource_ancestors.attribute.labels [init_containers_verdict] |
|
evidence.instanceId |
target.resource.product_object_id |
|
evidence.instanceName |
target.resource.name |
|
evidence.internetMessageId |
principal.network.email.mail_id |
|
evidence.ipAddress |
principal.ip |
If the evidence.@odata.type log field value matches the regular expression pattern (.*ipEvidence) , then the evidence.ipAddress log field is mapped to the principal.ip UDM field. |
evidence.ipInterfaces |
principal.asset.attribute.labels[ip_interfaces] |
|
evidence.isPrivileged |
target.resource_ancestors.attribute.labels[is_privileged] |
|
evidence.language |
security_result.detection_fields[language] |
|
evidence.lastExternalIpAddress |
principal.asset.attribute.labels[last_external_ip_address] |
|
evidence.location |
target.location.country_or_region |
If the evidence.@odata.type log field value matches the regular expression pattern .*googleCloudResourceEvidence , then the evidence.location log field is mapped to the target.location.country_or_region UDM field. |
evidence.location.city |
principal.location.city |
|
evidence.location.countryName |
principal.location.name |
|
evidence.location.latitude |
principal.location.region_coordinates.latitude |
|
evidence.location.longitude |
principal.location.region_coordinates.longitude |
|
evidence.location.state |
principal.location.state |
|
evidence.locationType |
target.resource_ancestors.attribute.labels[location_type] |
|
evidence.loggedOnUsers.accountName |
target.user.userid |
|
evidence.loggedOnUsers.domainName |
principal.domain.name |
|
evidence.mdeDeviceId |
principal.asset.asset_id |
|
evidence.mdeDeviceId |
principal.asset_id |
|
evidence.name |
security_result.associations.name |
If the evidence.@odata.type log field value matches the regular expression pattern (.*malwareEvidence) , then the evidence.name log field is mapped to the security_result.associations.name UDM field. |
evidence.name |
target.resource_ancestors.name |
|
evidence.namespace.cluster.cloudResource.amazonAccountId |
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_amazon_account_id] |
|
evidence.namespace.cluster.cloudResource.amazonResourceId |
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_amazon_resource_id] |
|
evidence.namespace.cluster.cloudResource.createdDateTime |
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_created_date_time] |
|
evidence.namespace.cluster.cloudResource.location |
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_location] |
|
evidence.namespace.cluster.cloudResource.locationType |
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_location_type] |
|
evidence.namespace.cluster.cloudResource.projectId |
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_project_id] |
|
evidence.namespace.cluster.cloudResource.projectNumber |
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_project_number] |
|
evidence.namespace.cluster.cloudResource.remediationStatus |
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_remediation_status] |
|
evidence.namespace.cluster.cloudResource.remediationStatusDetails |
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_remediation_status_details] |
|
evidence.namespace.cluster.cloudResource.resourceId |
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_resource_id] |
|
evidence.namespace.cluster.cloudResource.resourceName |
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_resource_name] |
|
evidence.namespace.cluster.cloudResource.resourceType |
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_resource_type] |
|
evidence.namespace.cluster.cloudResource.roles |
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_roles] |
|
evidence.namespace.cluster.cloudResource.tags |
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_tags] |
|
evidence.namespace.cluster.cloudResource.verdict |
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_verdict] |
|
evidence.namespace.cluster.createdDateTime |
target.resource_ancestors.attribute.labels[namespace_cluster_created_date_time] |
|
evidence.namespace.cluster.distribution |
target.resource_ancestors.attribute.labels[namespace_cluster_distribution] |
|
evidence.namespace.cluster.name |
target.resource_ancestors.attribute.labels[namespace_cluster_name] |
|
evidence.namespace.cluster.platform |
target.resource_ancestors.attribute.labels[namespace_cluster_platform] |
|
evidence.namespace.cluster.remediationStatus |
target.resource_ancestors.attribute.labels[namespace_cluster_remediation_status] |
|
evidence.namespace.cluster.remediationStatusDetails |
target.resource_ancestors.attribute.labels[namespace_cluster_remediation_status_details] |
|
evidence.namespace.cluster.roles |
target.resource_ancestors.attribute.labels[namespace_cluster_roles] |
|
evidence.namespace.cluster.tags |
target.resource_ancestors.attribute.labels[namespace_cluster_tags] |
|
evidence.namespace.cluster.verdict |
target.resource_ancestors.attribute.labels[namespace_cluster_verdict] |
|
evidence.namespace.cluster.version |
target.resource_ancestors.attribute.labels[namespace_cluster_version] |
|
evidence.namespace.createdDateTime |
target.resource_ancestors.attribute.labels[namespace_created_date_time] |
|
evidence.namespace.name |
target.resource_ancestors.attribute.labels[namespace_name] |
|
evidence.namespace.remediationStatus |
target.resource_ancestors.attribute.labels[namespace_remediation_status] |
|
evidence.namespace.remediationStatusDetails |
target.resource_ancestors.attribute.labels[namespace_remediation_status_details] |
|
evidence.namespace.roles |
target.resource_ancestors.attribute.labels[namespace_roles] |
|
evidence.namespace.tags |
target.resource_ancestors.attribute.labels[namespace_tags] |
|
evidence.namespace.verdict |
target.resource_ancestors.attribute.labels[namespace_verdict] |
|
evidence.networkMessageId |
security_result.detection_fields[network_message_id] |
|
evidence.networkMessageIds |
security_result.detection_fields[network_message_ids] |
|
evidence.objectId |
target.resource.product_object_id |
If the evidence.@odata.type log field value matches the regular expression pattern (.*oauthApplicationEvidence or .*cloudApplicationEvidence) , then the evidence.objectId log field is mapped to the target.resource.product_object_id UDM field. |
evidence.onboardingStatus |
principal.asset.attribute.labels [onboarding_status] |
If the evidence.@odata.type log field value matches the regular expression pattern .*deviceEvidence , then the evidence.onboardingStatus log field is mapped to the principal.asset.attribute.labels UDM field. |
evidence.osBuild |
principal.asset.platform_software.platform_patch_level |
If the evidence.@odata.type log field value matches the regular expression pattern .*deviceEvidence , then the evidence.osBuild log field is mapped to the principal.asset.platform_software.platform_patch_level UDM field. |
evidence.osBuild |
principal.platform_patch_level |
If the evidence.@odata.type log field value matches the regular expression pattern .*deviceEvidence , then the evidence.osBuild log field is mapped to the principal.platform_patch_level UDM field. |
evidence.osPlatform |
principal.asset.attribute.labels[os_platform] |
|
evidence.p1Sender.displayName |
security_result.about.user.user_display_name |
If the evidence.p2Sender.displayName log field value does not match the regular expression pattern ^.+@.+$ , then the evidence.p1Sender.displayName log field is mapped to the security_result.about.user.user_display_name UDM field. |
evidence.p1Sender.displayName |
security_result.about.user.email_addresses |
|
evidence.p1Sender.domainName |
security_result.about.domain.name |
|
evidence.p1Sender.emailAddress |
security_result.about.network.email.from |
|
evidence.p2Sender.displayName |
security_result.about.user.user_display_name |
If the evidence.p2Sender.displayName log field value does not match the regular expression pattern ^.+@.+$ , then the evidence.p2Sender.displayName log field is mapped to the security_result.about.user.user_display_name UDM field. |
evidence.p2Sender.displayName |
security_result.about.user.email_addresses |
|
evidence.p2Sender.domainName |
security_result.about.domain.name |
|
evidence.p2Sender.emailAddress |
security_result.about.network.email.from |
|
evidence.parentProcessCreationDateTime |
security_result.detection_fields[parent_process_creation_date_time] |
If the evidence.@odata.type log field value matches the regular expression pattern .*processEvidence , then the evidence.parentProcessCreationDateTime log field is mapped to the security_result.detection_fields UDM field. |
evidence.parentProcessId |
target.process.parent_process.pid |
If the evidence.@odata.type log field value matches the regular expression pattern .*processEvidence , then the evidence.parentProcessId log field is mapped to the target.process.parent_process.pid UDM field. |
evidence.parentProcessImageFile.fileName |
target.process.parent_process.file.names |
If the evidence.@odata.type log field value matches the regular expression pattern .*processEvidence , then the evidence.parentProcessImageFile.fileName log field is mapped to the target.process.parent_process.file.names UDM field. |
evidence.parentProcessImageFile.filePath |
target.process.parent_process.file.full_path |
If the evidence.@odata.type log field value matches the regular expression pattern .*processEvidence , then the evidence.parentProcessImageFile.filePath log field is mapped to the target.process.parent_process.file.full_path UDM field. |
evidence.parentProcessImageFile.filePublisher |
security_result.detection_fields [parent_process_image_file_file_publisher] |
|
evidence.parentProcessImageFile.fileSize |
target.process.parent_process.file.size |
If the evidence.@odata.type log field value matches the regular expression pattern .*processEvidence , then the evidence.parentProcessImageFile.fileSize log field is mapped to the target.process.parent_process.file.size UDM field. |
evidence.parentProcessImageFile.issuer |
security_result.detection_fields [parent_process_image_file_issuer] |
|
evidence.parentProcessImageFile.sha1 |
target.process.parent_process.file.sha1 |
|
evidence.parentProcessImageFile.sha256 |
target.process.parent_process.file.sha256 |
|
evidence.parentProcessImageFile.signer |
security_result.detection_fields [parent_process_image_file_signer] |
|
evidence.platform |
target.resource_ancestors.attribute.labels [platform] |
|
evidence.pod.containers.args |
target.resource_ancestors.attribute.labels [pod_containers_args] |
|
evidence.pod.containers.command |
target.resource_ancestors.attribute.labels [pod_containers_command] |
|
evidence.pod.containers.containerId |
target.resource_ancestors.product_object_id |
|
evidence.pod.containers.createdDateTime |
target.resource_ancestors.attribute.creation_time |
|
evidence.pod.containers.isPrivileged |
target.resource_ancestors.attribute.labels [pod_containers_is_privileged] |
|
evidence.pod.containers.name |
target.resource_ancestors.name |
|
evidence.pod.containers.remediationStatus |
target.resource_ancestors.attribute.labels [pod_containers_remediation_status] |
|
evidence.pod.containers.remediationStatusDetails |
target.resource_ancestors.attribute.labels [pod_containers_remediation_status_details] |
|
evidence.pod.containers.roles |
target.resource_ancestors.attribute.labels [pod_containers_roles] |
|
evidence.pod.containers.tags |
target.resource_ancestors.attribute.labels [pod_containers_tags] |
|
evidence.pod.containers.verdict |
target.resource_ancestors.attribute.labels [pod_containers_verdict] |
|
evidence.pod.controller.createdDateTime |
target.resource_ancestors.attribute.creation_time |
|
evidence.pod.controller.labels |
target.resource_ancestors.attribute.labels [pod_controller_labels] |
|
evidence.pod.controller.name |
target.resource_ancestors.name |
|
evidence.pod.controller.remediationStatus |
target.resource_ancestors.attribute.labels [pod_controller_remediation_status] |
|
evidence.pod.controller.remediationStatusDetails |
target.resource_ancestors.attribute.labels [pod_controller_remediation_status_details] |
|
evidence.pod.controller.roles |
target.resource_ancestors.attribute.labels [pod_controller_roles] |
|
evidence.pod.controller.tags |
target.resource_ancestors.attribute.labels [pod_controller_tags] |
|
evidence.pod.controller.type |
target.resource_ancestors.resource_subtype |
|
evidence.pod.controller.verdict |
target.resource_ancestors.attribute.labels [pod_controller_verdict] |
|
evidence.pod.createdDateTime |
target.resource_ancestors.attribute.creation_time |
|
evidence.pod.ephemeralContainers.args |
target.resource_ancestors.attribute.labels [pod_ephemeral_containers_args] |
|
evidence.pod.ephemeralContainers.command |
target.resource_ancestors.attribute.labels [pod_ephemeral_containers_command] |
|
evidence.pod.ephemeralContainers.containerId |
target.resource_ancestors.product_object_id |
|
evidence.pod.ephemeralContainers.createdDateTime |
target.resource_ancestors.attribute.creation_time |
|
evidence.pod.ephemeralContainers.isPrivileged |
target.resource_ancestors.attribute.labels [pod_ephemeral_containers_is_privileged] |
|
evidence.pod.ephemeralContainers.name |
target.resource_ancestors.name |
|
evidence.pod.ephemeralContainers.remediationStatus |
target.resource_ancestors.attribute.labels [pod_ephemeral_containers_remediation_status] |
|
evidence.pod.ephemeralContainers.remediationStatusDetails |
target.resource_ancestors.attribute.labels [pod_ephemeral_containers_remediation_status_details] |
|
evidence.pod.ephemeralContainers.roles |
target.resource_ancestors.attribute.labels [pod_ephemeral_containers_roles] |
|
evidence.pod.ephemeralContainers.tags |
target.resource_ancestors.attribute.labels [pod_ephemeral_containers_tags] |
|
evidence.pod.ephemeralContainers.verdict |
target.resource_ancestors.attribute.labels [pod_ephemeral_containers_verdict] |
|
evidence.pod.initContainers.args |
target.resource_ancestors.attribute.labels [pod_init_containers_args] |
|
evidence.pod.initContainers.command |
target.resource_ancestors.attribute.labels [pod_init_containers_command] |
|
evidence.pod.initContainers.containerId |
target.resource_ancestors.product_object_id |
|
evidence.pod.initContainers.createdDateTime |
target.resource_ancestors.attribute.creation_time |
|
evidence.pod.initContainers.isPrivileged |
target.resource_ancestors.attribute.labels [pod_init_containers_is_privileged] |
|
evidence.pod.initContainers.name |
target.resource_ancestors.name |
|
evidence.pod.initContainers.remediationStatus |
target.resource_ancestors.attribute.labels [pod_init_containers_remediation_status] |
|
evidence.pod.initContainers.remediationStatusDetails |
target.resource_ancestors.attribute.labels [pod_init_containers_remediation_status_details] |
|
evidence.pod.initContainers.roles |
target.resource_ancestors.attribute.labels [pod_init_containers_roles] |
|
evidence.pod.initContainers.tags |
target.resource_ancestors.attribute.labels [pod_init_containers_tags] |
|
evidence.pod.initContainers.verdict |
target.resource_ancestors.attribute.labels [pod_init_containers_verdict] |
|
evidence.pod.name |
target.resource_ancestors.name |
|
evidence.pod.namespace.cluster.cloudResource.amazonAccountId |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_amazon_account_id] |
|
evidence.pod.namespace.cluster.cloudResource.amazonResourceId |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_amazon_resource_id] |
|
evidence.pod.namespace.cluster.cloudResource.createdDateTime |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_created_date_time] |
|
evidence.pod.namespace.cluster.cloudResource.location |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_location] |
|
evidence.pod.namespace.cluster.cloudResource.locationType |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_location_type] |
|
evidence.pod.namespace.cluster.cloudResource.projectId |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_project_id] |
|
evidence.pod.namespace.cluster.cloudResource.projectNumber |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_project_number] |
|
evidence.pod.namespace.cluster.cloudResource.remediationStatus |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_remediation_status] |
|
evidence.pod.namespace.cluster.cloudResource.remediationStatusDetails |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_remediation_status_details] |
|
evidence.pod.namespace.cluster.cloudResource.resourceId |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_resource_id] |
|
evidence.pod.namespace.cluster.cloudResource.resourceName |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_resource_name] |
|
evidence.pod.namespace.cluster.cloudResource.resourceType |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_resource_type] |
|
evidence.pod.namespace.cluster.cloudResource.roles |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_roles] |
|
evidence.pod.namespace.cluster.cloudResource.tags |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_tags] |
|
evidence.pod.namespace.cluster.cloudResource.verdict |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_verdict] |
|
evidence.pod.namespace.cluster.createdDateTime |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_created_date_time] |
|
evidence.pod.namespace.cluster.distribution |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_distribution] |
|
evidence.pod.namespace.cluster.name |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_name] |
|
evidence.pod.namespace.cluster.platform |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_platform] |
|
evidence.pod.namespace.cluster.remediationStatus |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_remediation_status] |
|
evidence.pod.namespace.cluster.remediationStatusDetails |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_remediation_status_details] |
|
evidence.pod.namespace.cluster.roles |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_roles] |
|
evidence.pod.namespace.cluster.tags |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_tags] |
|
evidence.pod.namespace.cluster.verdict |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_verdict] |
|
evidence.pod.namespace.cluster.version |
target.resource_ancestors.attribute.labels[pod_namespace_cluster_version] |
|
evidence.pod.namespace.createdDateTime |
target.resource_ancestors.attribute.labels[pod_namespace_created_date_time] |
|
evidence.pod.namespace.name |
target.resource_ancestors.attribute.labels[pod_namespace_name] |
|
evidence.pod.namespace.remediationStatus |
target.resource_ancestors.attribute.labels[pod_namespace_remediation_status] |
|
evidence.pod.namespace.remediationStatusDetails |
target.resource_ancestors.attribute.labels[pod_namespace_remediation_status_details] |
|
evidence.pod.namespace.roles |
target.resource_ancestors.attribute.labels[pod_namespace_roles] |
|
evidence.pod.namespace.tags |
target.resource_ancestors.attribute.labels[pod_namespace_tags] |
|
evidence.pod.namespace.verdict |
target.resource_ancestors.attribute.labels[pod_namespace_verdict] |
|
evidence.pod.podIp.countryLetterCode |
target.resource_ancestors.attribute.labels [pod_pod_ip_country_letter_code] |
|
evidence.pod.podIp.ipAddress |
target.resource_ancestors.attribute.labels [pod_pod_ip_ip_address] |
|
evidence.pod.remediationStatus |
target.resource_ancestors.attribute.labels [pod_remediation_status] |
|
evidence.pod.remediationStatusDetails |
target.resource_ancestors.attribute.labels [pod_remediation_status_details] |
|
evidence.pod.roles |
target.resource_ancestors.attribute.labels [pod_roles] |
|
evidence.pod.serviceAccount.createdDateTime |
target.resource_ancestors.attribute.creation_time |
|
evidence.pod.serviceAccount.name |
target.resource_ancestors.name |
|
evidence.pod.serviceAccount.remediationStatus |
target.resource_ancestors.attribute.labels [pod_service_account_remediation_status] |
|
evidence.pod.serviceAccount.remediationStatusDetails |
target.resource_ancestors.attribute.labels [pod_service_account_remediation_status_details] |
|
evidence.pod.serviceAccount.roles |
target.resource_ancestors.attribute.labels [pod_service_account_roles] |
|
evidence.pod.serviceAccount.tags |
target.resource_ancestors.attribute.labels [pod_service_account_tags] |
|
evidence.pod.serviceAccount.verdict |
target.resource_ancestors.attribute.labels [pod_service_account_verdict] |
|
evidence.pod.tags |
target.resource_ancestors.attribute.labels [pod_tags] |
|
evidence.pod.verdict |
target.resource_ancestors.attribute.labels [pod_verdict] |
|
evidence.podIp.countryLetterCode |
target.resource_ancestors.attribute.labels [podip_country_letter_code] |
|
evidence.podIp.ipAddress |
target.resource_ancestors.attribute.labels [podip_ip_address] |
|
evidence.primaryAddress |
principal.user.email_addresses |
If the evidence.primaryAddress log field value matches the regular expression pattern ^.+@.+$ , and if the title log field value does not contain one of the following values, then the evidence.primaryAddress log field is mapped to the principal.user.email_addresses UDM field.
|
evidence.primaryAddress |
target.user.email_addresses |
If the evidence.primaryAddress log field value matches the regular expression pattern ^.+@.+$ , and if the title log field value contain one of the following values, then the evidence.primaryAddress log field is mapped to the target.user.email_addresses UDM field.
|
evidence.primaryAddress |
principal.user.attribute.labels[primary_address] |
If the evidence.primaryAddress log field value does not match the regular expression pattern ^.+@.+$ , and if the title log field value does not contain one of the following values, then the evidence.primaryAddress log field is mapped to the principal.user.attribute.labels UDM field.
|
evidence.primaryAddress |
target.user.attribute.labels[primary_address] |
If the evidence.primaryAddress log field value does not match the regular expression pattern ^.+@.+$ , and if the title log field value contain one of the following values, then the evidence.primaryAddress log field is mapped to the target.user.attribute.labels UDM field.
|
evidence.processCommandLine |
target.process.command_line |
|
evidence.processCreationDateTime |
security_result.detection_fields [process_creation_date_time] |
|
evidence.processId |
target.process.pid |
|
evidence.projectId |
target.resource_ancestors.attribute.labels[project_id] |
|
evidence.projectNumber |
target.resource_ancestors.attribute.labels[project_number] |
|
evidence.protocol |
network.ip_protocol |
|
evidence.publisher |
target.resource_ancestors.attribute.labels[publisher] |
|
evidence.query |
security_result.detection_fields[query] |
|
evidence.rbacGroupId |
security_result.detection_fields[rbac_group_id] |
|
evidence.rbacGroupName |
security_result.detection_fields[rbac_group_name] |
|
evidence.receivedDateTime |
security_result.detection_fields[received_date_time] |
|
evidence.recipientEmailAddress |
principal.network.email.to |
|
evidence.registry |
target.resource_ancestors.attribute.labels[registry] |
|
evidence.registry.createdDateTime |
target.resource_ancestors.attribute.labels[registry_created_date_time] |
|
evidence.registry.registry |
target.resource_ancestors.attribute.labels[registry_registry] |
|
evidence.registry.remediationStatus |
target.resource_ancestors.attribute.labels[registry_remediation_status] |
|
evidence.registry.remediationStatusDetails |
target.resource_ancestors.attribute.labels[registry_remediation_status_details] |
|
evidence.registry.roles |
target.resource_ancestors.attribute.labels[registry_roles] |
|
evidence.registry.tags |
target.resource_ancestors.attribute.labels[registry_tags] |
|
evidence.registry.verdict |
target.resource_ancestors.attribute.labels[registry_verdict] |
|
evidence.registryHive |
security_result.detection_fields[registry_hive] |
|
evidence.registryKey |
target.registry.registry_key |
|
evidence.registryValue |
target.registry.registry_value_data |
|
evidence.registryValueName |
target.registry.registry_value_name |
|
evidence.registryValueType |
security_result.detection_fields [registry_value_type] |
|
evidence.remediationStatus |
principal.user.attribute.labels [remediation_status] |
The evidence.remediationStatus is mapped to principal.user.attribute.labels when all
of the following conditions are met:
|
evidence.remediationStatus |
target.user.attribute.labels [remediation_status] |
The evidence.remediationStatus is mapped to target.user.attribute.labels when all
of the following conditions are met:
|
evidence.remediationStatus |
principal.asset.attribute.labels [remediation_status] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)deviceEvidence , then the evidence.remediationStatus log field is mapped to the principal.asset.attribute.labels UDM field. |
evidence.remediationStatus |
target.resource_ancestors.attribute.labels [remediation_status] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(amazonResourceEvidence or azureResourceEvidence or blobContainerEvidence or blobEvidence or googleCloudResourceEvidence or containerEvidence or containerImageEvidence or containerRegistryEvidence or kubernetesClusterEvidence or kubernetesControllerEvidence or kubernetesNamespaceEvidence or kubernetesPodEvidence or kubernetesSecretEvidence or kubernetesServiceAccountEvidence or kubernetesServiceEvidence or oauthApplicationEvidence) , then the evidence.remediationStatus log field is mapped to the target.resource_ancestors.attribute.labels UDM field. |
evidence.remediationStatus |
target.group.attribute.labels [remediation_status] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)securityGroupEvidence , then the evidence.remediationStatus log field is mapped to the target.group.attribute.labels UDM field. |
evidence.remediationStatus |
security_result.detection_fields [remediation_status] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(ipEvidence or mailClusterEvidence or analyzedMessageEvidence or registryKeyEvidence or registryValueEvidence or urlEvidence or fileEvidence or processEvidence) , then the evidence.remediationStatus log field is mapped to the security_result.detection_fields UDM field. |
evidence.remediationStatus |
target.resource.attribute.labels [remediation_status] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)cloudApplicationEvidence , then the evidence.remediationStatus log field is mapped to the target.resource.attribute.labels UDM field. |
evidence.remediationStatus |
target.group.attribute.labels[remediation_status] |
If the evidence.@odata.type log field value matches the regular expression pattern .*securityGroupEvidence , then the evidence.remediationStatus log field is mapped to the target.group.attribute.labels UDM field. |
evidence.remediationStatus |
target.resource_ancestors.attribute.labels[remediation_status] |
|
evidence.remediationStatusDetails |
principal.user.attribute.labels [remediation_status_details] |
The evidence.remediationStatusDetails is mapped to principal.user.attribute.labels when all
of the following conditions are met:
|
evidence.remediationStatusDetails |
target.user.attribute.labels [remediation_status_details] |
The evidence.remediationStatusDetails is mapped to target.user.attribute.labels when all
of the following conditions are met:
|
evidence.remediationStatusDetails |
principal.asset.attribute.labels [remediation_status_details] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)deviceEvidence , then the evidence.remediationStatusDetails log field is mapped to the principal.asset.attribute.labels UDM field. |
evidence.remediationStatusDetails |
target.resource_ancestors.attribute.labels [remediation_status_details] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(amazonResourceEvidence or azureResourceEvidence or blobContainerEvidence or blobEvidence or googleCloudResourceEvidence or containerEvidence or containerImageEvidence or containerRegistryEvidence or kubernetesClusterEvidence or kubernetesControllerEvidence or kubernetesNamespaceEvidence or kubernetesPodEvidence or kubernetesSecretEvidence or kubernetesServiceAccountEvidence or kubernetesServiceEvidence or oauthApplicationEvidence) , then the evidence.remediationStatusDetails log field is mapped to the target.resource_ancestors.attribute.labels UDM field. |
evidence.remediationStatusDetails |
target.group.attribute.labels [remediation_status_details] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)securityGroupEvidence , then the evidence.remediationStatusDetails log field is mapped to the target.group.attribute.labels UDM field. |
evidence.remediationStatusDetails |
security_result.detection_fields [remediation_status_details] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(ipEvidence or mailClusterEvidence or analyzedMessageEvidence or registryKeyEvidence or registryValueEvidence or urlEvidence or fileEvidence or processEvidence) , then the evidence.remediationStatusDetails log field is mapped to the security_result.detection_fields UDM field. |
evidence.remediationStatusDetails |
target.resource.attribute.labels [remediation_status_details] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)cloudApplicationEvidence , then the evidence.remediationStatusDetails log field is mapped to the target.resource.attribute.labels UDM field. |
evidence.remediationStatusDetails |
target.group.attribute.labels[remediation_status_details] |
If the evidence.@odata.type log field value matches the regular expression pattern .*securityGroupEvidence , then the evidence.remediationStatusDetails log field is mapped to the target.group.attribute.labels UDM field. |
evidence.remediationStatusDetails |
target.resource_ancestors.attribute.labels[remediation_status_details] |
|
evidence.resourceId |
target.resource_ancestors.product_object_id |
|
evidence.resourceName |
target.resource_ancestors.name |
|
evidence.resourceType |
target.resource_ancestors.resource_subtype |
|
evidence.riskScore |
security_result.detection_fields[risk_score] |
|
evidence.roles |
principal.user.attribute.roles.name |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence) , and if the title log field value does not contain one of the following values, then the evidence.roles log field is mapped to the principal.user.attribute.roles.name UDM field.
|
evidence.roles |
target.user.attribute.roles.name |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence) , and if the title log field value contain one of the following values, then the evidence.roles log field is mapped to the target.user.attribute.roles.name UDM field.
|
evidence.roles |
principal.asset.attribute.roles.name |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)deviceEvidence , then the evidence.roles log field is mapped to the principal.asset.attribute.roles.name UDM field. |
evidence.roles |
security_result.detection_fields [roles] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(ipEvidence or mailClusterEvidence or analyzedMessageEvidence or registryKeyEvidence or registryValueEvidence or urlEvidence or fileEvidence or processEvidence) , then the evidence.roles log field is mapped to the security_result.detection_fields UDM field. |
evidence.roles |
target.resource_ancestors.attribute.roles.name |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(amazonResourceEvidence or azureResourceEvidence or blobContainerEvidence or blobEvidence or googleCloudResourceEvidence or containerEvidence or containerImageEvidence or containerRegistryEvidence or kubernetesClusterEvidence or kubernetesControllerEvidence or kubernetesNamespaceEvidence or kubernetesPodEvidence or kubernetesSecretEvidence or kubernetesServiceAccountEvidence or kubernetesServiceEvidence or oauthApplicationEvidence) , then The evidence.roles log field is mapped to the target.resource_ancestors.attribute.roles.name UDM field. |
evidence.roles |
target.group.attribute.roles.name |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)securityGroupEvidence , then the evidence.roles log field is mapped to the target.group.attribute.roles.name UDM field. |
evidence.roles |
target.resource.attribute.roles.name |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)cloudApplicationEvidence , then the evidence.roles log field is mapped to the target.resource.attribute.roles.name UDM field. |
evidence.saasAppId |
target.resource.attribute.labels[saas_app_id] |
|
evidence.secretType |
target.resource_ancestors.attribute.labels[secret_type] |
|
evidence.securityGroupId |
target.group.product_object_id |
If the evidence.@odata.type log field value matches the regular expression pattern .*securityGroupEvidence , then the evidence.securityGroupId log field is mapped to the target.group.product_object_id UDM field. |
evidence.senderIp |
principal.ip |
|
evidence.serviceAccount.createdDateTime |
target.resource_ancestors.attribute.creation_time |
|
evidence.serviceAccount.name |
target.resource_ancestors.name |
|
evidence.serviceAccount.remediationStatus |
target.resource_ancestors.attribute.labels [service_account_remediation_status] |
|
evidence.serviceAccount.remediationStatusDetails |
target.resource_ancestors.attribute.labels [service_account_remediation_status_details] |
|
evidence.serviceAccount.roles |
target.resource_ancestors.attribute.labels [service_account_roles] |
|
evidence.serviceAccount.tags |
target.resource_ancestors.attribute.labels [service_account_tags] |
|
evidence.serviceAccount.verdict |
target.resource_ancestors.attribute.labels [service_account_verdict] |
|
evidence.servicePorts.appProtocol |
about.security_result.detection_fields [service_ports_app_protocol] |
|
evidence.servicePorts.name |
about.security_result.detection_fields [service_ports_name] |
|
evidence.servicePorts.nodePort |
about.security_result.detection_fields [service_ports_node_port] |
|
evidence.servicePorts.port |
about.port |
|
evidence.servicePorts.protocol |
about.network.ip_protocol |
|
evidence.servicePorts.targetPort |
about.security_result.detection_fields [service_ports_target_port] |
|
evidence.serviceType |
target.resource_ancestors.attribute.labels[service_type] |
|
evidence.sourceAddress.countryLetterCode |
security_result.detection_fields[source_address_country_letter_code] |
|
evidence.sourceAddress.createdDateTime |
security_result.detection_fields[source_address_created_date_time] |
|
evidence.sourceAddress.ipAddress |
security_result.about.ip |
|
evidence.sourceAddress.location.city |
security_result.about.location.city |
|
evidence.sourceAddress.location.countryName |
security_result.about.location.name |
|
evidence.sourceAddress.location.latitude |
security_result.about.location.region_coordinates.latitude |
|
evidence.sourceAddress.location.longitude |
security_result.about.location.region_coordinates.longitude |
|
evidence.sourceAddress.location.state |
security_result.about.location.state |
|
evidence.sourceAddress.remediationStatus |
security_result.detection_fields[source_address_remediation_status] |
|
evidence.sourceAddress.remediationStatusDetails |
security_result.detection_fields[source_address_remediation_status_details] |
|
evidence.sourceAddress.stream |
security_result.detection_fields[source_address_stream] |
|
evidence.sourceAddress.verdict |
security_result.detection_fields[source_address_verdict] |
|
evidence.sourcePort |
principal.port |
|
evidence.storageResource.createdDateTime |
target.resource_ancestors.attribute.labels[storage_resource_created_date_time] |
|
evidence.storageResource.detailedRoles |
target.resource_ancestors.attribute.labels[storage_resource_detailed_roles] |
|
evidence.storageResource.remediationStatus |
target.resource_ancestors.attribute.labels[storage_resource_remediation_status] |
|
evidence.storageResource.remediationStatusDetails |
target.resource_ancestors.attribute.labels[storage_resource_remediation_status_details] |
|
evidence.storageResource.resourceId |
target.resource_ancestors.attribute.labels[storage_resource_resource_id] |
|
evidence.storageResource.resourceName |
target.resource_ancestors.attribute.labels[storage_resource_resource_name] |
|
evidence.storageResource.resourceType |
target.resource_ancestors.attribute.labels[storage_resource_resource_type] |
|
evidence.storageResource.roles |
target.resource_ancestors.attribute.labels[storage_resource_roles] |
|
evidence.storageResource.tags |
target.resource_ancestors.attribute.labels[storage_resource_tags] |
|
evidence.storageResource.verdict |
target.resource_ancestors.attribute.labels[storage_resource_verdict] |
|
evidence.stream.name |
target.resource.attribute.labels[stream_name] |
|
evidence.subject |
principal.network.email.subject |
|
evidence.tags |
principal.user.attribute.labels [tags] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence) , then the evidence.tags log field is mapped to the principal.user.attribute.labels UDM field. |
evidence.tags |
target.user.attribute.labels [tags] |
The evidence.tags is mapped to target.user.attribute.labels when all
of the following conditions are met:
|
evidence.tags |
principal.asset.attribute.labels [tags] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)deviceEvidence , then the evidence.tags log field is mapped to the principal.asset.attribute.labels UDM field. |
evidence.tags |
target.resource_ancestors.attribute.labels [tags] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(amazonResourceEvidence or azureResourceEvidence or blobContainerEvidence or blobEvidence or googleCloudResourceEvidence or containerEvidence or containerImageEvidence or containerRegistryEvidence or kubernetesClusterEvidence or kubernetesControllerEvidence or kubernetesNamespaceEvidence or kubernetesPodEvidence or kubernetesSecretEvidence or kubernetesServiceAccountEvidence or kubernetesServiceEvidence or oauthApplicationEvidence) , then the evidence.tags log field is mapped to the target.resource_ancestors.attribute.labels UDM field. |
evidence.tags |
target.group.attribute.labels [tags] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)securityGroupEvidence , then the evidence.tags log field is mapped to the target.group.attribute.labels UDM field. |
evidence.tags |
security_result.detection_fields [tags] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(ipEvidence or mailClusterEvidence or analyzedMessageEvidence or registryKeyEvidence or registryValueEvidence or urlEvidence or fileEvidence or processEvidence) , then the evidence.tags log field is mapped to the security_result.detection_fields UDM field. |
evidence.tags |
target.resource.attribute.labels [tags] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)cloudApplicationEvidence , then the evidence.tags log field is mapped to the target.resource.attribute.labels UDM field. |
evidence.threatDetectionMethods |
security_result.detection_fields[threat_detection_methods] |
|
evidence.threats |
security_result.detection_fields[threats] |
|
evidence.type |
security_result.detection_fields[type] |
|
evidence.url |
target.url |
If the evidence.@odata.type log field value matches the regular expression pattern .*urlEvidence , then the evidence.url log field is mapped to the target.url UDM field. |
evidence.url |
target.resource_ancestors.attribute.labels[url] |
If the evidence.@odata.type log field value matches the regular expression pattern .*blobContainerEvidence , then the evidence.url log field is mapped to the target.resource_ancestors.attribute.labels UDM field. |
evidence.urlCount |
security_result.detection_fields[url_count] |
|
evidence.urls |
security_result.detection_fields[urls] |
|
evidence.urn |
security_result.detection_fields[urn] |
|
evidence.userAccount.accountName |
principal.user.userid |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence) , and if the title log field value does not contain one of the following values, then the evidence.userAccount.accountName log field is mapped to the principal.user.userid UDM field.
|
evidence.userAccount.accountName |
target.user.userid |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence) , and if the title log field value contain one of the following values, then the evidence.userAccount.accountName log field is mapped to the target.user.userid UDM field.
|
evidence.userAccount.azureAdUserId |
principal.user.product_object_id |
If the title log field value does not contain one of the following values, then the evidence.userAccount.azureAdUserId log field is mapped to the principal.user.product_object_id UDM field.
|
evidence.userAccount.azureAdUserId |
target.user.product_object_id |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence) , and if the title log field value contain one of the following values, then the evidence.userAccount.azureAdUserId log field is mapped to the target.user.product_object_id UDM field.
|
evidence.userAccount.displayName |
principal.user.user_display_name |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence) , and if the title log field value does not contain one of the following values, then the evidence.userAccount.displayName log field is mapped to the principal.user.user_display_name UDM field.
|
evidence.userAccount.displayName |
target.user.user_display_name |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence) , and if the title log field value contain one of the following values, then the evidence.userAccount.displayName log field is mapped to the target.user.user_display_name UDM field.
|
evidence.userAccount.domainName |
principal.administrative_domain |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence) , and if the title log field value does not contain one of the following values, then the evidence.userAccount.domainName log field is mapped to the principal.administrative_domain UDM field.
|
evidence.userAccount.domainName |
target.administrative_domain |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence) , and if the title log field value contain one of the following values, then the evidence.userAccount.domainName log field is mapped to the target.administrative_domain UDM field.
|
evidence.userAccount.userPrincipalName |
principal.user.email_addresses |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence) , and if the title log field value does not contain one of the following values, then the evidence.userAccount.userPrincipalName log field is mapped to the principal.user.email_addresses UDM field.
|
evidence.userAccount.userPrincipalName |
target.user.email_addresses |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence) , and if the title log field value contain one of the following values, then the evidence.userAccount.userPrincipalName log field is mapped to the target.user.email_addresses UDM field.
|
evidence.userAccount.userSid |
principal.user.windows_sid |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence) , and if the title log field value does not contain one of the following values, then the evidence.userAccount.userSid log field is mapped to the principal.user.windows_sid UDM field.
|
evidence.userAccount.userSid |
target.user.windows_sid |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence) , and if the title log field value contain one of the following values, then the evidence.userAccount.userSid log field is mapped to the target.user.windows_sid UDM field.
|
evidence.value |
security_result.detection_fields[value] |
|
evidence.verdict |
principal.user.attribute.labels [verdict] |
The evidence.verdict is mapped to principal.user.attribute.labels when all
of the following conditions are met:
|
evidence.verdict |
target.user.attribute.labels[verdict] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence) , and if the title log field value contain one of the following values, and if the target.user.attribute.labels log field value is empty, then the evidence.verdict log field is mapped to the target.user.attribute.labels UDM field.
|
evidence.verdict |
target.group.attribute.labels [verdict] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)securityGroupEvidence , then the evidence.verdict log field is mapped to the target.group.attribute.labels UDM field. |
evidence.verdict |
security_result.detection_fields [verdict] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)(ipEvidence or mailClusterEvidence or analyzedMessageEvidence or registryKeyEvidence or registryValueEvidence or urlEvidence or fileEvidence or processEvidence) , then the evidence.verdict log field is mapped to the security_result.detection_fields UDM field. |
evidence.verdict |
target.resource.attribute.labels [verdict] |
If the evidence.@odata.type log field value matches the regular expression pattern (.*)cloudApplicationEvidence , then the evidence.verdict log field is mapped to the target.resource.attribute.labels UDM field. |
evidence.version |
principal.asset.platform_software.platform_version |
If the evidence.@odata.type log field value matches the regular expression pattern .*deviceEvidence , then the evidence.osPlatform , evidence.version , evidence.osBuild log field is mapped to the principal.asset.platform_software.platform_version UDM field. |
evidence.version |
principal.platform_version |
If the evidence.@odata.type log field value matches the regular expression pattern .*deviceEvidence , then the evidence.osPlatform , evidence.version , evidence.osBuild log field is mapped to the principal.platform_version UDM field. |
evidence.version |
target.resource_ancestors.attribute.labels[version] |
|
evidence.vmMetadata.cloudProvider |
principal.asset.attribute.labels[vm_metadata_cloud_provider] |
|
evidence.vmMetadata.resourceId |
principal.asset.product_object_id |
|
evidence.vmMetadata.subscriptionId |
principal.asset.attribute.labels[vm_metadata_subscription_id] |
|
evidence.vmMetadata.vmId |
principal.asset.attribute.labels[vm_metadata_vm_id] |
|
firstActivityDateTime |
security_result.first_discovered_time |
|
id |
metadata.product_log_id |
|
incidentId |
security_result.detection_fields[incident_id] |
|
incidentWebUrl |
security_result.url_back_to_product |
|
lastActivityDateTime |
security_result.last_discovered_time |
|
lastUpdateDateTime |
security_result.last_updated_time |
|
mitreTechniques |
security_result.attack_details.techniques.id |
|
mitreTechniques |
security_result.attack_details.techniques.name |
|
productName |
metadata.product_name |
|
providerAlertId |
additional.fields[provider_alert_id] |
|
recommendedActions |
security_result.action_details |
|
resolvedDateTime |
security_result.detection_fields[resolved_date_time] |
If the resolvedDateTime log field value is not equal to null , then the resolvedDateTime log field is mapped to the security_result.detection_fields UDM field. |
serviceSource |
additional.fields[service_source] |
|
severity |
security_result.severity |
|
status |
security_result.detection_fields[status] |
|
systemTags |
security_result.detection_fields[system_tags] |
The systemTags log field is mapped to the security_result.detection_fields UDM field. |
tenantId |
metadata.product_deployment_id |
|
threatDisplayName |
security_result.threat_name |
If the threatDisplayName log field value is not equal to null , then the threatDisplayName log field is mapped to the security_result.threat_name UDM field. |
threatFamilyName |
security_result.threat_feed_name |
If the threatFamilyName log field value is not equal to null , then the threatFamilyName log field is mapped to the security_result.threat_feed_name UDM field. |
title |
security_result.rule_name |
次のステップ
さらにサポートが必要な場合 コミュニティ メンバーや Google SecOps のプロフェッショナルから回答を得ることができます。