Change log for SEP
Date | Changes |
---|---|
2023-01-21 | Enhancement:
- Added conditional check for "targetComputerName","event_description1". - Added on_error check for "file_full_path","GroupName","ServerName". - Mapped "Applicationtype" to "principal.resource.attribute.labels". - Mapped "mail" to "target.user.email_addresses". - Mapped "server_name_1" to "principal.hostname". - For logtype "SEC": - Mapped "computer" to "principal.hostname". - Mapped "syslogServer" to "intermediary.hostname". - Mapped "event_description" to "metadata.description". - Added "for loop" for the logtype "SONAR","CVE","SEC". |
2022-11-24 | Enhancement:
- Added grok pattern to parse logs containaing "SONAR detection now allowed". |
2022-11-15 | Enhancement:
- Added grok pattern to parse failed logs of type "Virus Found" and "SONAR Scan". - Added conditional check for "Categorytype". |
2022-10-25 | Enhancement:
- Mapped "EventDescription" to "metadata.description". - Mapped "LocalHostIP","IPAddress","source_ip" to "principal.ip". - Mapped "LocalHostMAC" to "principal.mac". - Mapped "computer" to "principal.hostname" - Mapped "guid" to "principal.asset.asset_id". - Mapped "DeviceID" to "principal.resource.product_object_id". - Mapped "Filesize" to "target.file.size". - Mapped "SHA256" to "target.file.sha256". - Mapped "User1" to "principal.user.userid". - Mapped "file_path" to "target.file.full_path". - Mapped "GroupName" to "principal.group.group_display_name". - Mapped "action_word" to "security_result.action_details". - Mapped "Begin" to "vulnerabilities.scan_start_time". - Mapped "EndTime" to "vulnerabilities.scan_end_time". - Mapped "ScanID" to "principal.process.product_specific_process_id". - Mapped "inter_host" to "intermediary.hostname". - Mapped "inter_ip" to "intermediary.ip". - Mapped "ActionType" to "additional.fields". - Mapped "Rule" to "security_result.rule_name". |
2022-10-10 | - Mapped "category" to "security_result.category_details".
- Mapped "CIDS Signature ID" to "target.resource.attribute.labels". - Mapped "CIDS Signature SubID" to "target.resource.attribute.labels". - Mapped "CIDS Signature string" to "target.resource.attribute.labels". - Mapped "Intrusion URL" to "principal.url". - Mapped "User Name" to "principal.user.userid". - Mapped "Actual action" to "security_result.action_details". - Mapped "Application hash" to "target.file.sha256". - Mapped "Application name" to "target.application". - Mapped "Application type" to "target.resource.attribute.labels". - Mapped "Certificate issuer" to "network.tls.server.certificate.issuer". - Mapped "Certificate serial number" to "network.tls.server.certificate.serial". - Mapped "Certificate signer" to "network.tls.server.certificate.subject". - Mapped "Certificate thumbprint" to "network.tls.server.certificate.sha256". - Mapped "Secondary action" to "target.resource.attribute.labels". - Mapped "First Seen" to "security_result.detection_fields". - Mapped "Risk Name" to "security_result.detection_fields". - Mapped "Risk Type" to "security_result.detection_fields". - Mapped "Permitted application reason" to "security_result.detection_fields". - Mapped "Company name" to "target.user.company_name". - Mapped "Computer name" to "principal.hostname". - Mapped "Server Name" to "principal.asset.network_domain". - Mapped "Confidence" to "security_result.description". - Mapped "Detection Type" to "security_result.summary". - Mapped "Group Name" to "principal.group.group_display_name". - Mapped "Risk Level" to "security_result.severity_details". - Mapped "File size (bytes)" to "target.file.size". |
2022-09-21 | Enhancement - Migrated custom parsers to default parser.
|
2022-08-12 | Enhancement - Modified grok pattern to parse the logs.
Handled the dropped logs and mapped them to valid event_types. - Dropped logs had following logType, which are now handled: "REP", "SubmissionsMan", "SYLINK", "IPS", "SONAR", "SEC", "CVE", "LiveUpdate Manager; Messages related to definition updates", "Antivirus detection submission". - New conditions "msg1" containing "Create Process|GUP|RebootManager|Smc|WSS|Network Intrusion|Mitigation System" are handled. - event_description containing "client-server activity logs|Got a valid certificate.|Replication .*from remote site|The database|received the client log successfully". - Added new code block to handle the logType REP,SONAR,CVE,GUP,Smc,WSS made them parse. - Changed event type from "GENERIC_EVENT" to "STATUS_UPDATE", "USER_UNCATEGORIZED", "NETWORK_CONNECTION", "STATUS_UNCATEGORIZED" wherever possible. - Mapped "eventDescription" to "metadata.description". - Mapped "hostName" to "principal.hostname". - Mapped "machineDomainName" to "principal.administrative_domain". - Mapped "domainName" to "target.administrative_domain". - Mapped "serverName" to "intermediary.hostname". - Mapped "userName" to "principal.user.userid". - Mapped "siteName" to "read_only_udm.additional.fields". |
2022-07-26 | for the logs that has messageTmp as Site mapped the following fields:
- Mapped "eventDescription" to "metadata.description". - Mapped "hostName" to "target.hostname". - Mapped "machineDomainName" to "target.administrative_domain". - Mapped "domainName" to "principal.administrative_domain". - Mapped "serverName" to "principal.hostname". - Mapped "userName" to "principal.user.userid". - Mapped "siteName" to "read_only_udm.additional.fields". |
2022-05-11 | Parsed Event Timestamp log entries with the format "yyyy-MM-dd HH:mm:ss".
|