Stay organized with collections
Save and categorize content based on your preferences.
UDM field list
This document provides a list of fields available in the Unified Data Model
(UDM) schema.
Field name and field type values can look similar. This document uses style
conventions to help you identify the differences:
Field type values use CamelCase characters; for example, Platform and
EventType.
Field name values use lowercase characters; for example, platform and
event_type. When a field name consists of more than one word, an
underscore is used to separate the words.
Use the <prefix> pattern event.idm.entity for UDM Entity fields; for example:
event.idm.entity.entity.user.user_display_name
event.idm.entity.entity.asset.hostname
UDM Entity data model
Entity
An Entity provides additional context about an item in a UDM event. For
example, a PROCESS_LAUNCH event describes that user 'abc@example.corp'
launched process 'shady.exe'.
The event does not include information that user 'abc@example.com' is a
recently terminated employee who administers a server storing finance data.
Information stored in one or more Entities can add this additional context.
Represents the acting entity that originates the activity
described in the event. The principal must include at least one machine
detail (hostname, MACs, IPs, port, product-specific identifiers like an
EDR asset ID) or user detail (for example, username), and optionally
include process details. It must NOT include any of the following fields:
email, files, registry keys, or values.
Represents a source entity being acted upon by the participant along with
the device or process context for the source object (the machine where the
source object resides). For example, if user U copies file A on machine X
to file B on machine Y, both file A and machine X would be specified in the
src portion of the UDM event.
Represents a target entity being referenced by the event or an object on
the target entity. For example, in a firewall connection from device A to
device B, A is described as the principal and B is described as the target.
For a process injection by process C into target process D, process C is
described as the principal and process D is described as the target.
Represents details on one or more intermediate entities processing activity
described in the event. This includes device details about a proxy server
or SMTP relay server. If an active event (that has a principal and
possibly target) passes through any intermediaries, they're added here.
Intermediaries can impact the overall action, for example blocking or
modifying an ongoing request. A rule of thumb here is that 'principal',
'target', and description of the initial action should be the same
regardless of the intermediary or its action. A successful network
connection from A->B should look the same in principal/target/intermediary
as one blocked by firewall C: principal: A, target: B (intermediary: C).
Represents an observer entity (for example, a packet sniffer or
network-based vulnerability scanner), which is not a direct intermediary,
but which observes and reports on the event in question.
Represents entities referenced by the event that are not otherwise
described in principal, src, target, intermediary or observer. For example,
it could be used to track email file attachments, domains/URLs/IPs embedded
within an email body, and DLLs that are loaded during a PROCESS_LAUNCH
event.
The duration of the session as the number of seconds and nanoseconds.
For seconds, network.session_duration.seconds, the type is a 64-bit
integer. For nanoseconds, network.session_duration.nanos, the type is a
32-bit integer.
Associated human-readable IP subnet range (e.g. 10.1.2.0/24).
Noun
The Noun type is used to represent the different entities in an event:
principal, src, target, observer, intermediary, and about. It stores
attributes known about the entity. For example, if the entity is a device
with multiple IP or MAC addresses, it stores the IP and MAC addresses that
are relevant to the event.
Information about the user's management chain (reporting hierarchy).
Note: user_management_chain is only populated when data is exported to
BigQuery since recursive fields (e.g. user.managers) are not supported by
BigQuery.
Information about the process's ancestors ordered from immediate ancestor
(parent process) to root.
Note: process_ancestors is only populated when data is exported to BigQuery
since recursive fields (e.g. process.parent_process) are not supported by
BigQuery.
Namespace which the device belongs to, such as "AD forest".
Uses for this field include Microsoft Windows AD forest, the name of
subsidiary, or the name of acquisition.
Information about the resource (e.g. scheduled task, calendar entry).
This field should not be used for files, registry, or processes because
these objects are already part of Noun.
Labels are key-value pairs.
For example: key = "env", value = "prod".
Deprecated: labels should be populated in entity Attribute as generic
metadata (e.g. user.attribute.labels).
Security related metadata for the event. A security result might be something
like "virus detected and quarantined," "malicious connection blocked," or
"sensitive data included in document foo.doc." Each security result, of which
there may be more than one, may either pertain to the whole event, or to a
specific object or device referenced in the event (e.g. a malicious file
that was detected, or a sensitive document sent as an email attachment). For
security results that apply to a particular object referenced in the event,
the security_results message MUST contain details about the implicated object
(such as process, user, IP, domain, URL, IP, or email address) in the about
field. For security results that apply to the entire event (e.g. SPAM found
in this email), the about field must remain empty.
The curated detection rule set category display name.
(for example, if rule_set_display_name is "CDIR SCC Enhanced Exfiltration",
the rule_set_category is "Cloud Threats").
Version of the security rule.
(e.g. "v1.1", "00001", "1604709794", "2020-11-16T23:04:19+00:00").
Note that rule versions are source-dependant and lexical ordering
should not be assumed.
An ordered list of values, that represent fields in detections for a
security finding. This list represents mapping of names of requested
entities to their values (i.e. the security result matched variables) .
A list of outcomes that represent the results of this security finding.
This list represents a mapping of names of the requested outcomes,
to their values.
The attribute threat_id_namespace qualifies threat_id with an ID namespace
to get an
unique ID. The attribute threat_id by itself is not unique across Google SecOps
as it is a vendor specific ID.
Time the asset system or OS was last updated.
For all other operations that are not system updates (such as resizing a
VM), use Attribute.last_update_time.
Attribute is a container for generic entity attributes including common
attributes across core entities (such as, user or asset). For example, Cloud
is a generic entity attribute since it can apply to an asset (for example, a
VM) or a user (for example, an identity service account).
Set of labels for the entity. Should only be used for product labels (for
example, Google Cloud resource labels or Azure AD sensitivity labels.
Should not be used for arbitrary key-value mappings.
The Authentication extension captures details specific to authentication
events.
General guidelines for authentication events:
Details about the source of the authentication event (for example, client
IP or hostname), should be captured in principal. The principal may be
empty if we have no details about the source of the login.
Details about the target of the authentication event (for example, details
about the machine that is being logged into or logged out of) should be
captured in target.
Some authentication events may involve a third-party. For example, a user
logs into a cloud service (for example, Google Security Operations) using their company's SSO (the
event is logged by their SSO solution). In this case, the principal
captures information about the user's device, the target captures details
about the cloud service they logged into, and the intermediary captures
details about the SSO solution.
The User-Agent request header which includes the application type,
operating system, software vendor or software version of the requesting
software user agent.
The maximum number of assets per day accessing the domain along with
sub-domains over the trailing day_count days. This field is only valid for
domains.
The full name of the resource. For example,
Google Cloud: //cloudresourcemanager.googleapis.com/projects/wombat-123,
and AWS: arn:aws:iam::123456789012:user/johndoe.
The parent of the resource.
For a database table, the parent is the database. For a storage object,
the bucket name. Deprecated: use resource_ancestors.name.
One or more purposes for which the certified public key may be used, in
addition to or in place of the basic purposes indicated in the key usage
extension field.
It can say "Valid" or state the problem with the certificate if any (e.g.
"This certificate or one of the certificates in the certificate chain is
not time valid.").
Tags are event metadata which is set by examining event contents
post-parsing. For example, a UDM event may be assigned a tenant_id based on
certain customer-defined parameters.
Product object identifiers of the group(s) the user belongs to
A vendor-specific identifier to uniquely identify the group(s) the user
belongs to (a GUID, LDAP OID, or similar).
If the vulnerability was discovered during an asset scan, then this
field should be populated with the time the scan started.
This field can be left unset if the start time is not available or not
applicable.
If the vulnerability was discovered during an asset scan, then this field
should be populated with the time the scan ended.
This field can be left unset if the end time is not available or not
applicable.
Asset is pending decommission and no longer deployed.
DECOMMISSIONED
3
Asset is decommissioned.
Authentication.AuthType
Type of system the authentication event is associated with.
Enum Value
Enum Number
Description
AUTHTYPE_UNSPECIFIED
0
The default type.
MACHINE
1
A machine authentication.
SSO
2
An SSO authentication.
VPN
3
A VPN authentication.
PHYSICAL
4
A Physical authentication (e.g. "Badge reader").
TACACS
5
A TACACS family protocol for networked systems authentication
(e.g. TACACS, TACACS+).
Authentication.AuthenticationStatus
Authentication status, can be used to describe the status of authentication
for a user or particular credential.
Enum Value
Enum Number
Description
UNKNOWN_AUTHENTICATION_STATUS
0
The default authentication status.
ACTIVE
1
The authentication method is in active state.
SUSPENDED
2
The authentication method is in suspended/disabled state.
NO_ACTIVE_CREDENTIALS
3
The authentication method has no active credentials.
DELETED
4
The authentication method has been deleted.
Authentication.Mechanism
Mechanism(s) used to authenticate.
Enum Value
Enum Number
Description
MECHANISM_UNSPECIFIED
0
The default mechanism.
USERNAME_PASSWORD
1
Username + password authentication.
OTP
2
OTP authentication.
HARDWARE_KEY
3
Hardware key authentication.
LOCAL
4
Local authentication.
REMOTE
5
Remote authentication.
REMOTE_INTERACTIVE
6
RDP, Terminal Services, or VNC.
MECHANISM_OTHER
7
Some other mechanism that is not defined here.
BADGE_READER
8
Badge reader authentication
NETWORK
9
Network authentication.
BATCH
10
Batch authentication.
SERVICE
11
Service authentication
UNLOCK
12
Direct human-interactive unlock authentication.
NETWORK_CLEAR_TEXT
13
Network clear text authentication.
NEW_CREDENTIALS
14
Authentication with new credentials.
INTERACTIVE
15
Interactive authentication.
CACHED_INTERACTIVE
16
Interactive authentication using cached credentials.
CACHED_REMOTE_INTERACTIVE
17
Cached Remote Interactive authentication using cached credentials.
CACHED_UNLOCK
18
Cached Remote Interactive authentication using cached credentials.
Cloud.CloudEnvironment
The service provider environment.
Enum Value
Enum Number
Description
UNSPECIFIED_CLOUD_ENVIRONMENT
0
Default.
GOOGLE_CLOUD_PLATFORM
1
Google Cloud Platform.
AMAZON_WEB_SERVICES
2
Amazon Web Services.
MICROSOFT_AZURE
3
Microsoft Azure.
Dhcp.MessageType
DHCP message type. See RFC2131, section 3.1.
Enum Value
Enum Number
Description
UNKNOWN_MESSAGE_TYPE
0
Default message type.
DISCOVER
1
DHCPDISCOVER.
OFFER
2
DHCPOFFER.
REQUEST
3
DHCPREQUEST.
DECLINE
4
DHCPDECLINE.
ACK
5
DHCPACK.
NAK
6
DHCPNAK.
RELEASE
7
DHCPRELEASE.
INFORM
8
DHCPINFORM.
WIN_DELETED
100
Microsoft Windows DHCP "lease deleted".
WIN_EXPIRED
101
Microsoft Windows DHCP "lease expired".
Dhcp.OpCode
BOOTP op code. See RFC951, section 3.
Enum Value
Enum Number
Description
UNKNOWN_OPCODE
0
Default opcode.
BOOTREQUEST
1
Request.
BOOTREPLY
2
Reply.
File.FileType
The file type, for example Microsoft Windows executable.
Enum Value
Enum Number
Description
FILE_TYPE_UNSPECIFIED
0
File type is UNSPECIFIED.
FILE_TYPE_PE_EXE
1
File type is PE_EXE.
FILE_TYPE_PE_DLL
2
Although DLLs are actually portable executables, this value
enables the file type to be identified separately.
File type is PE_DLL.
FILE_TYPE_MSI
3
File type is MSI.
FILE_TYPE_NE_EXE
10
File type is NE_EXE.
FILE_TYPE_NE_DLL
11
File type is NE_DLL.
FILE_TYPE_DOS_EXE
20
File type is DOS_EXE.
FILE_TYPE_DOS_COM
21
File type is DOS_COM.
FILE_TYPE_COFF
30
File type is COFF.
FILE_TYPE_ELF
31
File type is ELF.
FILE_TYPE_LINUX_KERNEL
32
File type is LINUX_KERNEL.
FILE_TYPE_RPM
33
File type is RPM.
FILE_TYPE_LINUX
34
File type is LINUX.
FILE_TYPE_MACH_O
35
File type is MACH_O.
FILE_TYPE_JAVA_BYTECODE
36
File type is JAVA_BYTECODE.
FILE_TYPE_DMG
37
File type is DMG.
FILE_TYPE_DEB
38
File type is DEB.
FILE_TYPE_PKG
39
File type is PKG.
FILE_TYPE_PYC
40
File type is PYC.
FILE_TYPE_LNK
50
File type is LNK.
FILE_TYPE_JPEG
100
File type is JPEG.
FILE_TYPE_TIFF
101
File type is TIFF.
FILE_TYPE_GIF
102
File type is GIF.
FILE_TYPE_PNG
103
File type is PNG.
FILE_TYPE_BMP
104
File type is BMP.
FILE_TYPE_GIMP
105
File type is GIMP.
FILE_TYPE_IN_DESIGN
106
File type is Adobe InDesign.
FILE_TYPE_PSD
107
File type is PSD.
Adobe Photoshop.
FILE_TYPE_TARGA
108
File type is TARGA.
FILE_TYPE_XWD
109
File type is XWD.
FILE_TYPE_DIB
110
File type is DIB.
FILE_TYPE_JNG
111
File type is JNG.
FILE_TYPE_ICO
112
File type is ICO.
FILE_TYPE_FPX
113
File type is FPX.
FILE_TYPE_EPS
114
File type is EPS.
FILE_TYPE_SVG
115
File type is SVG.
FILE_TYPE_EMF
116
File type is EMF.
FILE_TYPE_WEBP
117
File type is WEBP.
FILE_TYPE_DWG
118
File type is DWG.
FILE_TYPE_DXF
119
File type is DXF.
FILE_TYPE_THREEDS
120
File type is 3DS.
FILE_TYPE_OGG
150
File type is OGG.
FILE_TYPE_FLC
151
File type is FLC.
FILE_TYPE_FLI
152
File type is FLI.
FILE_TYPE_MP3
153
File type is MP3.
FILE_TYPE_FLAC
154
File type is FLAC.
FILE_TYPE_WAV
155
File type is WAV.
FILE_TYPE_MIDI
156
File type is MIDI.
FILE_TYPE_AVI
157
File type is AVI.
FILE_TYPE_MPEG
158
File type is MPEG.
FILE_TYPE_QUICKTIME
159
File type is QUICKTIME.
FILE_TYPE_ASF
160
File type is ASF.
FILE_TYPE_DIVX
161
File type is DIVX.
FILE_TYPE_FLV
162
File type is FLV.
FILE_TYPE_WMA
163
File type is WMA.
FILE_TYPE_WMV
164
File type is WMV.
FILE_TYPE_RM
165
File type is RM.
RealMedia type.
FILE_TYPE_MOV
166
File type is MOV.
FILE_TYPE_MP4
167
File type is MP4.
FILE_TYPE_T3GP
168
File type is T3GP.
FILE_TYPE_WEBM
169
File type is WEBM.
FILE_TYPE_MKV
170
File type is MKV.
FILE_TYPE_PDF
200
File type is PDF.
FILE_TYPE_PS
201
File type is PS.
FILE_TYPE_DOC
202
File type is DOC.
FILE_TYPE_DOCX
203
File type is DOCX.
FILE_TYPE_PPT
204
File type is PPT.
FILE_TYPE_PPTX
205
File type is PPTX.
FILE_TYPE_PPSX
209
File type is PPSX.
FILE_TYPE_XLS
206
File type is XLS.
FILE_TYPE_XLSX
207
File type is XLSX.
FILE_TYPE_RTF
208
File type is RTF.
FILE_TYPE_ODP
250
File type is ODP.
FILE_TYPE_ODS
251
File type is ODS.
FILE_TYPE_ODT
252
File type is ODT.
FILE_TYPE_HWP
253
File type is HWP.
FILE_TYPE_GUL
254
File type is GUL.
FILE_TYPE_ODF
255
File type is ODF.
FILE_TYPE_ODG
256
File type is ODG.
FILE_TYPE_ONE_NOTE
257
File type is ONE_NOTE.
FILE_TYPE_OOXML
258
File type is OOXML.
FILE_TYPE_EBOOK
260
File type is EBOOK.
FILE_TYPE_LATEX
261
File type is LATEX.
FILE_TYPE_TTF
262
File type is TTF.
FILE_TYPE_EOT
263
File type is EOT.
FILE_TYPE_WOFF
264
File type is WOFF.
FILE_TYPE_CHM
265
File type is CHM.
FILE_TYPE_ZIP
300
File type is ZIP.
FILE_TYPE_GZIP
301
File type is GZIP.
FILE_TYPE_BZIP
302
File type is BZIP.
FILE_TYPE_RZIP
303
File type is RZIP.
FILE_TYPE_DZIP
304
File type is DZIP.
FILE_TYPE_SEVENZIP
305
File type is SEVENZIP.
FILE_TYPE_CAB
306
File type is CAB.
FILE_TYPE_JAR
307
File type is JAR.
FILE_TYPE_RAR
308
File type is RAR.
FILE_TYPE_MSCOMPRESS
309
File type is MSCOMPRESS.
FILE_TYPE_ACE
310
File type is ACE.
FILE_TYPE_ARC
311
File type is ARC.
FILE_TYPE_ARJ
312
File type is ARJ.
FILE_TYPE_ASD
313
File type is ASD.
FILE_TYPE_BLACKHOLE
314
File type is BLACKHOLE.
FILE_TYPE_KGB
315
File type is KGB.
FILE_TYPE_ZLIB
316
File type is ZLIB.
FILE_TYPE_TAR
317
File type is TAR.
FILE_TYPE_ZST
318
File type is ZST.
FILE_TYPE_LZFSE
319
File type is LZFSE.
FILE_TYPE_PYTHON_WHL
320
File type is PYTHON_WHL.
FILE_TYPE_PYTHON_PKG
321
File type is PYTHON_PKG.
FILE_TYPE_TEXT
400
File type is TEXT.
FILE_TYPE_SCRIPT
401
File type is SCRIPT.
FILE_TYPE_PHP
402
File type is PHP.
FILE_TYPE_PYTHON
403
File type is PYTHON.
FILE_TYPE_PERL
404
File type is PERL.
FILE_TYPE_RUBY
405
File type is RUBY.
FILE_TYPE_C
406
File type is C.
FILE_TYPE_CPP
407
File type is CPP.
FILE_TYPE_JAVA
408
File type is JAVA.
FILE_TYPE_SHELLSCRIPT
409
File type is SHELLSCRIPT.
FILE_TYPE_PASCAL
410
File type is PASCAL.
FILE_TYPE_AWK
411
File type is AWK.
FILE_TYPE_DYALOG
412
File type is DYALOG.
FILE_TYPE_FORTRAN
413
File type is FORTRAN.
FILE_TYPE_JAVASCRIPT
414
File type is JAVASCRIPT.
FILE_TYPE_POWERSHELL
415
File type is POWERSHELL.
FILE_TYPE_VBA
416
File type is VBA.
FILE_TYPE_M4
417
File type is M4.
FILE_TYPE_OBJETIVEC
418
File type is OBJETIVEC.
FILE_TYPE_JMOD
419
File type is JMOD.
FILE_TYPE_MAKEFILE
420
File type is MAKEFILE.
FILE_TYPE_INI
421
File type is INI.
FILE_TYPE_CLJ
422
File type is CLJ.
FILE_TYPE_PDB
425
File type is PDB.
FILE_TYPE_SQL
426
File type is SQL.
FILE_TYPE_NEKO
427
File type is NEKO.
FILE_TYPE_WER
428
File type is WER.
FILE_TYPE_GOLANG
429
File type is GOLANG.
FILE_TYPE_SYMBIAN
500
File type is SYMBIAN.
FILE_TYPE_PALMOS
501
File type is PALMOS.
FILE_TYPE_WINCE
502
File type is WINCE.
FILE_TYPE_ANDROID
503
File type is ANDROID.
FILE_TYPE_IPHONE
504
File type is IPHONE.
FILE_TYPE_HTML
600
File type is HTML.
FILE_TYPE_XML
601
File type is XML.
FILE_TYPE_SWF
602
File type is SWF.
FILE_TYPE_FLA
603
File type is FLA.
FILE_TYPE_COOKIE
604
File type is COOKIE.
FILE_TYPE_TORRENT
605
File type is TORRENT.
FILE_TYPE_EMAIL_TYPE
606
File type is EMAIL_TYPE.
FILE_TYPE_OUTLOOK
607
File type is OUTLOOK.
FILE_TYPE_SGML
608
File type is SGML.
FILE_TYPE_JSON
609
File type is JSON.
FILE_TYPE_CSV
610
File type is CSV.
FILE_TYPE_CAP
700
File type is CAP.
FILE_TYPE_ISOIMAGE
800
File type is ISOIMAGE.
FILE_TYPE_SQUASHFS
801
File type is SQUASHFS.
FILE_TYPE_VHD
802
File type is VHD.
FILE_TYPE_APPLE
1000
File type is APPLE.
FILE_TYPE_MACINTOSH
1001
File type is MACINTOSH.
FILE_TYPE_APPLESINGLE
1002
File type is APPLESINGLE.
FILE_TYPE_APPLEDOUBLE
1003
File type is APPLEDOUBLE.
FILE_TYPE_MACINTOSH_HFS
1004
File type is MACINTOSH_HFS.
FILE_TYPE_APPLE_PLIST
1005
File type is APPLE_PLIST.
FILE_TYPE_MACINTOSH_LIB
1006
File type is MACINTOSH_LIB.
FILE_TYPE_APPLESCRIPT
1007
File type is APPLESCRIPT.
FILE_TYPE_APPLESCRIPT_COMPILED
1008
File type is APPLESCRIPT_COMPILED .
FILE_TYPE_CRX
1100
File type is CRX.
FILE_TYPE_XPI
1101
File type is XPI.
FILE_TYPE_ROM
1200
File type is ROM.
FILE_TYPE_IPS
1201
File type is IPS.
FILE_TYPE_PEM
1300
File type is PEM.
FILE_TYPE_PGP
1301
File type is PGP.
FILE_TYPE_CRT
1302
File type is CRT.
Metadata.EnrichmentState
An enrichment state.
Enum Value
Enum Number
Description
ENRICHMENT_STATE_UNSPECIFIED
0
Unspecified.
ENRICHED
1
The event has been enriched by Google Security Operations.
UNENRICHED
2
The event has not been enriched by Google Security Operations.
Metadata.EventType
An event type.
Choose the event type based on the entity that logged the event, rather than the
product that generated it. For example, an antivirus (AV) scanning a client email
would log an SMTP_PROXY event, not an AV event. A DLP device scanning a web
upload would generate an HTTP_PROXY
event and not a DLP or process activity event.
Enum Value
Enum Number
Description
EVENTTYPE_UNSPECIFIED
0
Default event type
PROCESS_UNCATEGORIZED
10000
Activity related to a process which does not match any other event types.
PROCESS_LAUNCH
10001
Process launch.
PROCESS_INJECTION
10002
Process injecting into another process.
PROCESS_PRIVILEGE_ESCALATION
10003
Process privilege escalation.
PROCESS_TERMINATION
10004
Process termination.
PROCESS_OPEN
10005
Process being opened.
PROCESS_MODULE_LOAD
10006
Process loading a module.
REGISTRY_UNCATEGORIZED
11000
Registry event which does not match any of the other event types.
REGISTRY_CREATION
11001
Registry creation.
REGISTRY_MODIFICATION
11002
Registry modification.
REGISTRY_DELETION
11003
Registry deletion.
SETTING_UNCATEGORIZED
12000
Settings-related event which does not match any of the other
event types.
SETTING_CREATION
12001
Setting creation.
SETTING_MODIFICATION
12002
Setting modification.
SETTING_DELETION
12003
Setting deletion.
MUTEX_UNCATEGORIZED
13000
Any mutex event other than creation.
MUTEX_CREATION
13001
Mutex creation.
FILE_UNCATEGORIZED
14000
File event which does not match any of the other event types.
FILE_CREATION
14001
File created.
FILE_DELETION
14002
File deleted.
FILE_MODIFICATION
14003
File modified.
FILE_READ
14004
File read.
FILE_COPY
14005
File copied.
Used for file copies, for example, to a thumb drive.
FILE_OPEN
14006
File opened.
FILE_MOVE
14007
File moved or renamed.
FILE_SYNC
14008
File synced (for example, Google Drive, Dropbox, backup).
USER_UNCATEGORIZED
15000
User activity which does not match any of the other event types.
USER_LOGIN
15001
User login.
USER_LOGOUT
15002
User logout.
USER_CREATION
15003
User creation.
USER_CHANGE_PASSWORD
15004
User password change event.
USER_CHANGE_PERMISSIONS
15005
Change in user permissions.
USER_STATS
15006
Deprecated. Used to update user info for an LDAP dump.
USER_BADGE_IN
15007
User physically badging into a location.
USER_DELETION
15008
User deletion.
USER_RESOURCE_CREATION
15009
User creating a virtual resource.
This is equivalent to RESOURCE_CREATION.
USER_RESOURCE_UPDATE_CONTENT
15010
User updating content of a virtual resource.
This is equivalent to RESOURCE_WRITTEN.
USER_RESOURCE_UPDATE_PERMISSIONS
15011
User updating permissions of a virtual resource.
This is equivalent to RESOURCE_PERMISSIONS_CHANGE.
USER_COMMUNICATION
15012
User initiating communication through a medium (for example, video).
USER_RESOURCE_ACCESS
15013
User accessing a virtual resource.
This is equivalent to RESOURCE_READ.
USER_RESOURCE_DELETION
15014
User deleting a virtual resource.
This is equivalent to RESOURCE_DELETION.
GROUP_UNCATEGORIZED
23000
A group activity that does not fall into one of the other event types.
GROUP_CREATION
23001
A group creation.
GROUP_DELETION
23002
A group deletion.
GROUP_MODIFICATION
23003
A group modification.
EMAIL_UNCATEGORIZED
19000
Email messages
EMAIL_TRANSACTION
19001
An email transaction.
EMAIL_URL_CLICK
19002
Deprecated: use NETWORK_HTTP instead. An email URL click event.
NETWORK_UNCATEGORIZED
16000
A network event that does not fit into one of the other event types.
NETWORK_FLOW
16001
Aggregated flow stats like netflow.
NETWORK_CONNECTION
16002
Network connection details like from a FW.
NETWORK_FTP
16003
FTP telemetry.
NETWORK_DHCP
16004
DHCP payload.
NETWORK_DNS
16005
DNS payload.
NETWORK_HTTP
16006
HTTP telemetry.
NETWORK_SMTP
16007
SMTP telemetry.
STATUS_UNCATEGORIZED
17000
A status message that does not fit into one of the other event types.
STATUS_HEARTBEAT
17001
Heartbeat indicating product is alive.
STATUS_STARTUP
17002
An agent startup.
STATUS_SHUTDOWN
17003
An agent shutdown.
STATUS_UPDATE
17004
A software or fingerprint update.
SCAN_UNCATEGORIZED
18000
Scan item that does not fit into one of the other event types.
SCAN_FILE
18001
A file scan.
SCAN_PROCESS_BEHAVIORS
18002
Scan process behaviors.
Please use SCAN_PROCESS instead.
SCAN_PROCESS
18003
Scan process.
SCAN_HOST
18004
Scan results from scanning an entire host device for threats/sensitive
documents.
SCAN_VULN_HOST
18005
Vulnerability scan logs about host vulnerabilities (e.g., out of date
software) and network vulnerabilities (e.g., unprotected service detected
via a network scan).
SCAN_VULN_NETWORK
18006
Vulnerability scan logs about network vulnerabilities.
SCAN_NETWORK
18007
Scan network for suspicious activity
SCHEDULED_TASK_UNCATEGORIZED
20000
Scheduled task event that does not fall into one of the other
event types.
SCHEDULED_TASK_CREATION
20001
Scheduled task creation.
SCHEDULED_TASK_DELETION
20002
Scheduled task deletion.
SCHEDULED_TASK_ENABLE
20003
Scheduled task being enabled.
SCHEDULED_TASK_DISABLE
20004
Scheduled task being disabled.
SCHEDULED_TASK_MODIFICATION
20005
Scheduled task being modified.
SYSTEM_AUDIT_LOG_UNCATEGORIZED
21000
A system audit log event that is not a wipe.
SYSTEM_AUDIT_LOG_WIPE
21001
A system audit log wipe.
SERVICE_UNSPECIFIED
22000
Service event that does not fit into one of the other event types.
SERVICE_CREATION
22001
A service creation.
SERVICE_DELETION
22002
A service deletion.
SERVICE_START
22003
A service start.
SERVICE_STOP
22004
A service stop.
SERVICE_MODIFICATION
22005
A service modification.
GENERIC_EVENT
100000
Operating system events that are not described by any of the other
event types. Might include uncategorized Microsoft Windows event logs.
RESOURCE_CREATION
1
The resource was created/provisioned.
This is equivalent to USER_RESOURCE_CREATION.
RESOURCE_DELETION
2
The resource was deleted/deprovisioned.
This is equivalent to USER_RESOURCE_DELETION.
RESOURCE_PERMISSIONS_CHANGE
3
The resource had it's permissions or ACLs updated.
This is equivalent to USER_RESOURCE_UPDATE_PERMISSIONS.
RESOURCE_READ
4
The resource was read.
This is equivalent to USER_RESOURCE_ACCESS.
RESOURCE_WRITTEN
5
The resource was written to.
This is equivalent to USER_RESOURCE_UPDATE_CONTENT.
DEVICE_FIRMWARE_UPDATE
25000
Firmware update.
DEVICE_CONFIG_UPDATE
25001
Configuration update.
DEVICE_PROGRAM_UPLOAD
25002
A program or application uploaded to a device.
DEVICE_PROGRAM_DOWNLOAD
25003
A program or application downloaded to a device.
ANALYST_UPDATE_VERDICT
24000
Analyst update about the Verdict (such as true positive, false positive,
or disregard) of a finding.
ANALYST_UPDATE_REPUTATION
24001
Analyst update about the Reputation (such as useful or not useful) of a
finding.
ANALYST_UPDATE_SEVERITY_SCORE
24002
Analyst update about the Severity score (0-100) of a finding.
ANALYST_UPDATE_STATUS
24007
Analyst update about the finding status.
ANALYST_ADD_COMMENT
24008
Analyst addition of a comment for a finding.
ANALYST_UPDATE_PRIORITY
24009
Analyst update about the priority (such as low, medium, or high) for a
finding.
ANALYST_UPDATE_ROOT_CAUSE
24010
Analyst update about the root cause for a finding.
ANALYST_UPDATE_REASON
24011
Analyst update about the reason (such as malicious or not malicious) for
a finding.
ANALYST_UPDATE_RISK_SCORE
24012
Analyst update about the risk score (0-100) of a finding.
Network.ApplicationProtocol
A network application protocol.
Enum Value
Enum Number
Description
UNKNOWN_APPLICATION_PROTOCOL
0
The default application protocol.
AFP
1
Apple Filing Protocol.
APPC
2
Advanced Program-to-Program Communication.
AMQP
3
Advanced Message Queuing Protocol.
ATOM
4
Publishing Protocol.
BEEP
5
Block Extensible Exchange Protocol.
BITCOIN
6
Crypto currency protocol.
BIT_TORRENT
7
Peer-to-peer file sharing.
CFDP
8
Coherent File Distribution Protocol.
CIP
67
Common Industrial Protocol.
COAP
9
Constrained Application Protocol.
COTP
68
Connection Oriented Transport Protocol.
DCERPC
66
DCE/RPC.
DDS
10
Data Distribution Service.
DEVICE_NET
11
Automation industry protocol.
DHCP
4000
DHCP.
DICOM
69
Digital Imaging and Communications in Medicine Protocol.
DNP3
70
Distributed Network Protocol 3 (DNP3)
DNS
3000
DNS.
E_DONKEY
12
Classic file sharing protocol.
ENRP
13
Endpoint Handlespace Redundancy Protocol.
FAST_TRACK
14
Filesharing peer-to-peer protocol.
FINGER
15
User Information Protocol.
FREENET
16
Censorship resistant peer-to-peer network.
FTAM
17
File Transfer Access and Management.
GOOSE
71
GOOSE Protocol.
GOPHER
18
Gopher protocol.
GRPC
77
gRPC Remote Procedure Call.
HL7
19
Health Level Seven.
H323
20
Packet-based multimedia communications system.
HTTP
2000
HTTP.
HTTPS
2001
HTTPS.
IEC104
72
IEC 60870-5-104 (IEC 104) Protocol.
IRCP
21
Internet Relay Chat Protocol.
KADEMLIA
22
Peer-to-peer hashtables.
KRB5
65
Kerberos 5.
LDAP
23
Lightweight Directory Access Protocol.
LPD
24
Line Printer Daemon Protocol.
MIME
25
Multipurpose Internet Mail Extensions and Secure MIME.
MMS
73
Multimedia Messaging Service.
MODBUS
26
Serial communications protocol.
MQTT
27
Message Queuing Telemetry Transport.
NETCONF
28
Network Configuration.
NFS
29
Network File System.
NIS
30
Network Information Service.
NNTP
31
Network News Transfer Protocol.
NTCIP
32
National Transportation Communications for Intelligent Transportation
System.
NTP
33
Network Time Protocol.
OSCAR
34
AOL Instant Messenger Protocol.
PNRP
35
Peer Name Resolution Protocol.
PTP
74
Precision Time Protocol.
QUIC
1000
QUIC.
RDP
36
Remote Desktop Protocol.
RELP
37
Reliable Event Logging Protocol.
RIP
38
Routing Information Protocol.
RLOGIN
39
Remote Login in UNIX Systems.
RPC
40
Remote Procedure Call.
RTMP
41
Real Time Messaging Protocol.
RTP
42
Real-time Transport Protocol.
RTPS
43
Real Time Publish Subscribe.
RTSP
44
Real Time Streaming Protocol.
SAP
45
Session Announcement Protocol.
SDP
46
Session Description Protocol.
SIP
47
Session Initiation Protocol.
SLP
48
Service Location Protocol.
SMB
49
Server Message Block.
SMTP
50
Simple Mail Transfer Protocol.
SNMP
75
Simple Network Management Protocol.
SNTP
51
Simple Network Time Protocol.
SSH
52
Secure Shell.
SSMS
53
Secure SMS Messaging Protocol.
STYX
54
Styx/9P - Plan 9 from Bell Labs distributed file system protocol.
A full token with no privileges removed or groups disabled.
TYPE_2
2
An elevated token with no privileges removed or groups disabled. Used
when running as administrator.
TYPE_3
3
A limited token with administrative privileges removed and
administrative groups disabled.
Reason
Reason for closing an Alert or Case in the SOAR product.
Enum Value
Enum Number
Description
REASON_UNSPECIFIED
0
Default reason.
REASON_NOT_MALICIOUS
1
Case or Alert not malicious.
REASON_MALICIOUS
2
Case or Alert is malicious.
REASON_MAINTENANCE
3
Case or Alert is under maintenance.
Reputation
Categorization options for the usefulness of a Finding.
Enum Value
Enum Number
Description
REPUTATION_UNSPECIFIED
0
An unspecified reputation.
USEFUL
1
A categorization of the finding as useful.
NOT_USEFUL
2
A categorization of the finding as not useful.
Resource.ResourceType
Enum Value
Enum Number
Description
UNSPECIFIED
0
Default type.
MUTEX
1
Mutex.
TASK
2
Task.
PIPE
3
Named pipe.
DEVICE
4
Device.
FIREWALL_RULE
5
Firewall rule.
MAILBOX_FOLDER
6
Mailbox folder.
VPC_NETWORK
7
VPC Network.
VIRTUAL_MACHINE
8
Virtual machine.
STORAGE_BUCKET
9
Storage bucket.
STORAGE_OBJECT
10
Storage object.
DATABASE
11
Database.
TABLE
12
Data table.
CLOUD_PROJECT
13
Cloud project.
CLOUD_ORGANIZATION
14
Cloud organization.
SERVICE_ACCOUNT
15
Service account.
ACCESS_POLICY
16
Access policy.
CLUSTER
17
Cluster.
SETTING
18
Settings.
DATASET
19
Dataset.
BACKEND_SERVICE
20
Endpoint that receive traffic from a load balancer or proxy.
POD
21
Pod, which is a collection of containers. Often used in Kubernetes.
CONTAINER
22
Container.
FUNCTION
23
Cloud function.
RUNTIME
24
Runtime.
IP_ADDRESS
25
IP address.
DISK
26
Disk.
VOLUME
27
Volume.
IMAGE
28
Machine image.
SNAPSHOT
29
Snapshot.
REPOSITORY
30
Repository.
CREDENTIAL
31
Credential, e.g. access keys, ssh keys, tokens, certificates.
LOAD_BALANCER
32
Load balancer.
GATEWAY
33
Gateway.
SUBNET
34
Subnet.
USER
35
User
Role.Type
Well-known system roles.
Enum Value
Enum Number
Description
TYPE_UNSPECIFIED
0
Default user role.
ADMINISTRATOR
1
Product administrator with elevated privileges.
SERVICE_ACCOUNT
2
System service account for automated privilege access.
SecurityResult.Action
Enum representing different possible actions taken by the product that
created the event.
Enum Value
Enum Number
Description
UNKNOWN_ACTION
0
The default action.
ALLOW
1
Allowed.
BLOCK
2
Blocked.
ALLOW_WITH_MODIFICATION
3
Strip, modify something
(e.g. File or email was disinfected or rewritten and still forwarded).
QUARANTINE
4
Put somewhere for later analysis (does NOT imply block).
FAIL
5
Failed (e.g. the event was allowed but failed).
CHALLENGE
6
Challenged (e.g. the user was challenged by a Captcha, 2FA).
SecurityResult.AlertState
The type of alerting set up for a security result.
Enum Value
Enum Number
Description
UNSPECIFIED
0
The security result type is not known.
NOT_ALERTING
1
The security result is not an alert.
ALERTING
2
The security result is an alert.
SecurityResult.Association.AssociationType
Represents different possible Association types. Can be threat or
malware. Used to represent Mandiant threat intelligence.
Enum Value
Enum Number
Description
ASSOCIATION_TYPE_UNSPECIFIED
0
The default Association Type.
THREAT_ACTOR
1
Association type Threat actor.
MALWARE
2
Association type Malware.
SecurityResult.IoCStatsType
Type of IoCStat based on source.
Enum Value
Enum Number
Description
UNSPECIFIED_IOC_STATS_TYPE
0
IoCStat source is unidentified.
MANDIANT_SOURCES
1
IoCStat is from a Mandiant Source.
THIRD_PARTY_SOURCES
2
IoCStat is from a third-party source.
THREAT_INTELLIGENCE_IOC_STATS
3
IoCStat is from a threat intelligence feed.
SecurityResult.ProductConfidence
A level of confidence in the result.
Enum Value
Enum Number
Description
UNKNOWN_CONFIDENCE
0
The default confidence level.
LOW_CONFIDENCE
200
Low confidence.
MEDIUM_CONFIDENCE
300
Medium confidence.
HIGH_CONFIDENCE
400
High confidence.
SecurityResult.ProductPriority
A product priority level.
Enum Value
Enum Number
Description
UNKNOWN_PRIORITY
0
Default priority level.
LOW_PRIORITY
200
Low priority.
MEDIUM_PRIORITY
300
Medium priority.
HIGH_PRIORITY
400
High priority.
SecurityResult.ProductSeverity
Defined by the product
Enum Value
Enum Number
Description
UNKNOWN_SEVERITY
0
The default severity level.
INFORMATIONAL
100
Info severity.
ERROR
150
An error.
NONE
101
No malicious result.
LOW
200
Low-severity malicious result.
MEDIUM
300
Medium-severity malicious result.
HIGH
400
High-severity malicious result.
CRITICAL
500
Critical-severity malicious result.
SecurityResult.SecurityCategory
SecurityCategory is used to standardize security categories across products
so one event is not categorized as "malware" and another as a "virus".
Enum Value
Enum Number
Description
UNKNOWN_CATEGORY
0
The default category.
SOFTWARE_MALICIOUS
10000
Malware, spyware, rootkit.
SOFTWARE_SUSPICIOUS
10100
Below the conviction threshold; probably bad.
SOFTWARE_PUA
10200
Potentially Unwanted App (such as adware).
NETWORK_MALICIOUS
20000
Includes C&C or network exploit.
NETWORK_SUSPICIOUS
20100
Suspicious activity, such as potential reverse tunnel.
NETWORK_CATEGORIZED_CONTENT
20200
Non-security related: URL has category like gambling or porn.
NETWORK_DENIAL_OF_SERVICE
20300
DoS, DDoS.
NETWORK_RECON
20400
Port scan detected by an IDS, probing of web app.
NETWORK_COMMAND_AND_CONTROL
20500
If we know this is a C&C channel.
ACL_VIOLATION
30000
Unauthorized access attempted, including attempted access to files,
web services, processes, web objects, etc.
AUTH_VIOLATION
40000
Authentication failed (e.g. bad password or bad 2-factor authentication).
EXPLOIT
50000
Exploit: For all manner of exploits including attempted overflows, bad
protocol encodings, ROP, SQL injection, etc. For both network and host-
based exploits.
DATA_EXFILTRATION
60000
DLP: Sensitive data transmission, copy to thumb drive.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-12 UTC."],[],[]]