Key UDM fields for parsers

Supported in:

Some Google Security Operations features depend on data populated in certain UDM fields. If this data is missing or incorrect, the feature may not function as intended.

When creating a parser, make sure the data mapping instructions populate as many important Unified Data Model (UDM) fields as possible. Parser data mapping instructions control how original raw log data is mapped to fields in the UDM data structure. For a list of all UDM fields, see the Unified Data Model field list.

Feature areas

Key UDM fields fall into the following feature areas (and use cases). The Feature area or use cases column in the Key UDM field list includes the following feature areas:

  • Curated detections: Prebuilt rule sets, managed by Google Security Operations, that analyze your data to detect potential threats.
  • Indexing: Lets security analysts search for information about resources, such as assets, domains, IP addresses, users, and files. It also enriches UDM records with details about prevalence, first time seen, last time seen, and more.
  • Artifact aliasing: Enriches UDM records with additional data, such as geolocation data using an external IP address.
  • Asset aliasing: Identifies relationships across individual UDM records related to the same physical asset, such as a server, laptop, or mobile device.
  • Process aliasing: Identifies relationships across individual UDM records that describe one or more related processes, files, and users who executed the process.
  • User aliasing: Identifies relationships across individual UDM records related to the same user.
  • Entity graph: Identifies relationships between entities and resources in your environment.
  • IoC: Matches your data against data ingested from IoC feeds.
  • Threat hunting: This is a use case, not a feature. Fields with this value are recommended to facilitate Threat hunting activities.

Key UDM fields

Use this keyword lookup to find important UDM fields.

Fully qualified field name Feature area or use case
<event>.security_result.threat_id_namespace Indexing
<event>.security_result.threat_id Indexing
<event>.security_result.category Indexing
<event>.security_result.summary Indexing
<event>.security_result.description Indexing
<event>.security_result.action Curated detections
<event>.security_result.detection_fields.key Curated detections
<event>.security_result.detection_fields.value Curated detections
<event>.security_result.threat_name Threat hunting
<event>.metadata.event_timestamp Indexing
<event>.metadata.event_type Curated detections, Indexing
<event>.metadata.product_name Curated detections, Indexing
<event>.metadata.vendor_name Curated detections, Indexing
<event>.metadata.description Curated detections
<event>.metadata.ingestion_labels.key Curated detections
<event>.metadata.ingestion_labels.value Curated detections
<event>.metadata.product_event_type Curated detections
<event>.metadata.product_deployment_id Threat hunting
<event>.metadata.product_log_id Threat hunting
<event>.principal.ip Curated detections, Indexing, Artifact aliasing, Asset aliasing
<event>.principal.mac Indexing, Asset aliasing
<event>.principal.hostname Curated detections, Indexing, Asset aliasing
<event>.principal.asset_id Indexing, Asset aliasing
<event>.principal.asset.ip Indexing
<event>.principal.asset.mac Indexing
<event>.principal.asset.hostname Indexing
<event>.principal.asset.asset_id Indexing
<event>.principal.user.email_address Curated detections, Indexing, User aliasing
<event>.principal.user.userid Indexing, User aliasing
<event>.principal.user.windows_sid Indexing, User aliasing
<event>.principal.user.product_object_id Indexing, User aliasing
<event>.principal.user.attribute.permissions.name Curated detections
<event>.principal.user.attribute.permissions.type Curated detections
<event>.principal.user.attribute.roles.name Curated detections
<event>.principal.user.attribute.roles.description Curated detections
<event>.principal.file.sha1 Artifact aliasing
<event>.principal.file.md5 Artifact aliasing
<event>.principal.file.sha256 Artifact aliasing
<event>.principal.file.full_path Curated detections
<event>.principal.process.parent_process Process aliasing
<event>.principal.process.product_specific_process_id Process aliasing
<event>.principal.process.pid Curated detections
<event>.principal.process.command_line Curated detections
<event>.principal.process.file.full_path Curated detections
<event>.principal.process.parent_process.command_line Curated detections
<event>.principal.process.parent_process.file.full_path Curated detections
<event>.principal.cloud.environment Curated detections
<event>.principal.resource.name Curated detections
<event>.principal.resource.attribute.cloud.project.name Curated detections
<event>.principal.resource.attribute.cloud.project.resource_subtype Curated detections
<event>.principal.registry.registry_key Curated detections
<event>.principal.registry.registry_value_name Curated detections
<event>.principal.url Curated detections
<event>.source.ip Indexing, Artifact aliasing, Asset aliasing
<event>.source.mac Indexing, Asset aliasing
<event>.source.hostname Indexing, Asset aliasing
<event>.source.asset_id Indexing, Asset aliasing
<event>.source.asset.ip Indexing
<event>.source.asset.mac Indexing
<event>.source.asset.hostname Indexing
<event>.source.asset.asset_id Indexing
<event>.source.user.email_address Indexing, User aliasing
<event>.source.user.userid Indexing, User aliasing
<event>.source.user.windows_sid Indexing, User aliasing
<event>.source.user.product_object_id Indexing, User aliasing
<event>.source.file.sha1 Artifact aliasing
<event>.source.file.md5 Artifact aliasing
<event>.source.file.sha256 Artifact aliasing
<event>.source.process.parent_process Process aliasing
<event>.source.process.product_specific_process_id Process aliasing
<event>.target.ip Curated detections, Indexing, Artifact aliasing, Asset aliasing
<event>.target.port Curated detections
<event>.target.mac Indexing, Asset aliasing
<event>.target.hostname Curated detections, Indexing, Asset aliasing
<event>.target.asset_id Indexing, Asset aliasing
<event>.target.asset.ip Indexing
<event>.target.asset.mac Indexing
<event>.target.asset.hostname Indexing
<event>.target.asset.asset_id Indexing
<event>.target.user.email_address Curated detections, Indexing, User aliasing
<event>.target.user.userid Indexing, User aliasing
<event>.target.user.windows_sid Indexing, User aliasing
<event>.target.user.product_object_id Indexing, User aliasing
<event>.target.file.sha1 Artifact aliasing
<event>.target.file.md5 Artifact aliasing
<event>.target.file.sha256 Artifact aliasing
<event>.target.file.full_path Curated detections
<event>.target.process.parent_process Process aliasing
<event>.target.process.product_specific_process_id Process aliasing
<event>.target.process.pid Curated detections
<event>.target.process.command_line Curated detections
<event>.target.process.file.full_path Curated detections
<event>.target.process.parent_process.command_line Curated detections
<event>.target.process.parent_process.file.full_path Curated detections
<event>.target.application Curated detections
<event>.target.cloud.environment Curated detections
<event>.target.cloud.project.name Curated detections
<event>.target.resource.name Curated detections
<event>.target.resource.resource_type Curated detections
<event>.target.registry.registry_key Curated detections
<event>.target.registry.registry_value_name Curated detections
<event>.network.application_protocol Curated detections
<event>.network.ip_protocol Curated detections
<event>.network.dns_domain Threat hunting
<event>.network.http.method Curated detections
<event>.network.http.user_agent Curated detections
<event>.network.http.referral_url Threat hunting
<event>.network.http.response_code Threat hunting
<event>.network.dns.questions.name Curated detections
<event>.network.dns.questions.type Curated detections
<event>.network.dns.answers.name Curated detections
<event>.network.dns.answers.data Threat hunting
<event>.network.dns.answers.type Curated detections
<event>.network.email.bcc Threat hunting
<event>.network.email.email.cc Threat hunting
<event>.network.email.from Threat hunting
<event>.network.email.reply_to Threat hunting
<event>.network.email.subject Threat hunting
<event>.network.email.to Threat hunting
<event>.network.ftp.command Threat hunting
<entity>.entity.user.email_address Entity graph, IoC
<entity>.entity.user.userid Entity graph
<entity>.entity.user.windows_sid Entity graph
<entity>.entity.user.product_object_id Entity graph, IoC
<entity>.entity.user.employee_id Entity graph
<entity>.entity.group.email_address Entity graph
<entity>.entity.group.windows_sid Entity graph
<entity>.entity.group.product_object_id Entity graph, IoC
<entity>.entity.asset.ip Entity graph
<entity>.entity.asset.mac Entity graph
<entity>.entity.asset.hostname Entity graph
<entity>.entity.asset.asset_id Entity graph
<entity>.entity.asset.product_object_id Entity graph, IoC
<entity>.entity.resource.product_object_id Entity graph, IoC
<entity>.entity.resource.name IoC
<entity>.entity.file Entity graph
<entity>.entity.hostname IoC
<entity>.entity.url Threat hunting
<entity>.metadata.threat IoC
<entity>.metadata.collected_timestamp Entity graph, IoC