Supported data sets
Chronicle can ingest raw logs from different companies, protocols, systems, and equipment. This document describes the currently supported data sets and is updated regularly. If you're interested in integrating your product with Chronicle, let us know.
To generate the most current list of supported ingestion labels use the Ingestion API method:
APIKEY="[[My_ApiKey]]"; curl --header "Content-Type: application/json" \
--request GET "https://malachiteingestion-pa.googleapis.com/v1/logtypes?key=${APIKEY}"
For information about how data is ingested and normalized, see Data ingestion to Chronicle overview.
For a list of supported default parsers, see Supported default parsers.
For a list of log types supported by Chronicle data feeds, see the Feed Schema API reference.
Alert logs
- Active Countermeasures
- AlphaSOC
- CIS Albert Alerts
- CrowdStrike Falcon Stream
- Customer Alerts
- Cylance Protect
- FireEye
- IBM zSecure Alert
- Microsoft Graph API Alerts
- Microsoft Security Center
- Netskope
Application server logs
- Apache Tomcat
Application Whitelisting
- Windows Applocker
Authentication logs
- Auth0
- Authx
- Barracuda CloudGen Access
- CA LDAP
- Cisco ACS
- Cisco TACACS+
- Cyolo Zero Trust
- Duo Auth
- Duo Network Gateway
- FreeRADIUS
- IBM Security Verify
- Quest Active Directory
- RSA RADIUS
- Thales MFA
- Yubico OTP
Automation and DevOps Tools
- Ansible AWX
- Automation Anywhere
- GitHub
- Gitlab
- Jenkins
AV and endpoint logs
- Apple MacOS
- Automox
- Azure ATP
- Bitdefender
- Cisco AMP
- ClamAV
- Comodo
- Dell OpenManage
- ESET AV
- FireEye HX
- Fortinet FortiSandbox
- Kaspersky AV
- Microsoft System Center Endpoint Protection
- Minerva AV
- Sophos AV
- Superna Eyeglass
- Symantec Endpoint Protection
- Trend Micro AV
- Windows Defender ATP
- Windows Defender AV
AWS-specific logs
- AWS CloudFront
- AWS Cloudtrail
- AWS CloudWatch
- AWS Config
- AWS Elastic Load Balancer
- AWS Key Management Service
- AWS Macie
- AWS Redshift
- AWS S3 Server Access
- AWS Security Hub
- AWS Session Manager
Backup software
- Code42 CrashPlan
- Cohesity
- CommVault
- Rubrik
- Veeam
Bot Protection
- Cequence Bot Defense
- Cloudflare Bot Management
- F5 Bot
- PerimeterX Bot Protection
CASB
- Cisco CloudLock
- Duo Access Gateway
- McAfee MVISION CASB
- McAfee Skyhigh CASB
- Microsoft CASB
- Palo Alto Prisma Access
- Palo Alto Prisma Cloud
- Proofpoint CASB
- Symantec CloudSOC CASB
CMDB logs
- CSV Custom CMDB
- JAMF CMDB
- Medigate CMDB
- ServiceNow CMDB
- Windows Network Policy Server
Collaboration logs
- Appian Cloud
- Atlassian Confluence
- Box
- Design Profit Central Server
- Dropbox
- iManage Cloud Platform
- Kibana audit logs
- Mango Apps
- Microsoft SharePoint
- Puppet
- Slack Audit
Content Management Software
- OnBase CMS
- WordPress
Data Security
- Datadog
- DataLocker SafeConsole
- Dell EMC Data Domain
- Fortanix Data Security Manager
- Imperva Database
- Rubrik Polaris
- Thales Vormetric
- Varonis
Data Transfer
- FileZilla
- Globalscape SFTP
- IBM MQ File Transfer
- Ipswitch MOVEit Automation
- Ipswitch MOVEit Transfer
- Ipswitch SFTP
- Nasuni File Services Platform
- SolarWinds Serv-U
- VanDyke SFTP
- VSFTPD Audit
Database logs
- Azure Cosmos DB
- Azure SQL
- IBM DB2
- IBM Informix
- IBM JDE
- Maria Database
- Microsoft SQL Server
- Mongo Database
- MySQL
- Oracle
- SAP HANA
- SAP Insurance
- Snowflake
DDI logs (DNS, DHCP, IPAM)
- Bluecat DDI
- EfficientIP DDI
DDOS Mitigation
- Akamai Prolexic
Deception software
- Acalvio
DHCP logs
- Akamai DHCP
- Cisco DHCP
- ExtraHop DHCP
- Fortinet
- Infoblox DHCP
- ISC DHCP
- Kea DHCP
- Linux DHCP
- Sophos DHCP
- Static IP
- Windows DHCP
- Zeek DHCP
DLP
- Accellion
- Code42 Incydr
- CoSoSys Protector
- F5 Shape
- Forcepoint DLP
- IBM Guardium
- McAfee DLP
- Preveil Enterprise
- Proofpoint Observeit
- Protegrity Defiance
- Symantec DLP
- Tripwire
DNS logs
- Akamai DNS
- AWS Route 53 DNS
- BIND
- Bluecat Edge DNS Resolver
- Cisco DNS
- Cisco Umbrella DNS
- ExtraHop DNS
- F5 DNS
- Infoblox DNS
- Infoblox RPZ
- Men and Mice DNS
- Passive DNS
- Power DNS
- Splunk DNS
- UltraDNS
- Unbound DNS
- Windows DNS
EDR logs
- Carbon Black
- Carbon Black App Control
- Check Point Sandblast
- CrowdStrike Falcon
- CrowdStrike Falcon CEF
- Cybereason EDR
- Deep Instinct EDR
- Digital Guardian
- eCAR
- eCAR Bro
- EclecticIQ EDR
- Endgame
- ESET
- Fidelis Endpoint
- Fortinet FortiEDR
- JAMF Protect
- LimaCharlie
- Malwarebytes
- McAfee MVISION EDR
- Microsoft Defender for Endpoint
- OSQuery
- Palo Alto Networks Traps
- Rapid7 Insight
- Red Canary
- SentinelOne Deep Visibility
- SentinelOne EDR
- Sophos Capsule8
- Sophos Intercept EDR
- Symantec EDR
- Sysdig
- TrendMicro EDR
- Uptycs EDR
- VMRay Analyzer
- White Cloud
- Windows Event
- Windows Sysmon
Email server logs
- Abnormal Security
- Apache SpamAssassin
- Area1 Security
- Avanan Email Security
- Barracuda Email
- Check Point Email
- Cisco Email Security
- Cofense
- Cofense Vision
- Fireeye eMPS
- Fireeye ETP
- GMAIL Logs
- GreatHorn Email Security
- KnowBe4 PhishER
- MailScanner
- Material Security
- Microsoft Exchange
- Mimecast
- PostFix Mail
- Proofpoint Email Filter
- Proofpoint On Demand
- Proofpoint Tap Alerts
- Proofpoint Threat Response
- Proofpoint Web Browser Isolation
- Sendmail
- Symantec Messaging Gateway
- Symantec VIP Gateway
- Trend Micro Cloud App Security
- Voltage
Financial Services logs
- D3 Banking
- GMV Checker ATM Security
- GMV Checker User Context
- Swift Alliance Messaging Hub
Firewall logs
- Azure Firewall
- Check Point
- Cisco ASA
- Cisco Firepower NGFW
- Cisco Umbrella Cloud Firewall
- Cisco Umbrella IP
- FireMon Firewall
- Forcepoint NGFW
- FortiGate
- Juniper
- Netfilter IPtables
- Palo Alto Networks Firewall
- Radware Web Application Firewall
- Silver Peak Firewall
- SonicWall
- Sophos Firewall (Next Gen)
- Sophos UTM
- Windows Firewall
- ZScaler NGFW
Format specific logs
- BT IPControl
- Cisco Meraki
- Cisco WSA
- Cylance
- Infoblox
- Kubernetes audit logs
- Kubernetes auth proxy logs
- Zeek JSON
- Zeek TSV
Google Cloud-specific logs
- BigQuery Context
- Cloud Audit Logs
- Cloud DNS
- Cloud Firewall
- Cloud Load Balancing
- Cloud NAT
- Cloud Run
- Cloud SQL
- Cloud Storage Context
- Compute Engine Context
- Forseti Security
- Google Cloud Apigee
- Google Cloud Identity Device Users
- Google Cloud IoT
- Google Cloud Firewall Rules
- Google Cloud Threat Detection
- Workspace Activities
- Workspace Alerts
- Workspace ChromeOS Devices
- Workspace Groups
- Workspace Mobile Devices
- Workspace Privileges
- Workspace Users
Hardware Security Modules
- Futurex HSM
- Thales Luna Hardware Security Module
Healthcare
- EPIC Systems
- Oscar Claims
Honeypots
- Attivo Networks
- Guardicore Centra
- Honeyd
- Thinkst Canary
HTTP logs
- Zeek HTTP
Hypervisor and Application Virtualization
- Cameyo Bring Your Own Cloud
- Docker
- VMware ESXi
- VMware HCX
- VMware Horizon
- VMware NSX
- VMware Tanzu Kubernetes Grid
- VMware vCenter
- VMware vRealize Suite
- VMware vShield
- VMware Workspace ONE
IaaS Applications
- Aqua Security
- AT&T Netbond
- GlusterFS
Identity and Access Management
- Avatier Password Management
- AWS Control Tower
- Cisco ISE
- CloudM
- Duo Administrator Logs
- Duo Telephony Logs
- HP Aruba(Clearpass)
- Identity and Access Management Analysis
- Identity and Access Management Context
IDS/IPS logs
- Amazon Guardduty
- Aruba IPS
- Cisco Wireless IPS
- Cloud Passage (LIDS)
- Deepfence Network Monitoring
- Falco IDS
- Juniper IPS
- Lacework Cloud Security
- LookingGlass Aenoik IDPS
- McAfee IPS
- Microsoft ATA
- Orca Cloud Security Platform
- OSSEC
- Snort
- Sourcefire
- Suricata EVE
- Suricata IDS
- Trend Micro
IoC logs
- Anomali
- Centripetal Networks IOC
- COVID-19 Cyber Threat Coalition
- Crowdstrike IOC
- CSV Custom IOC
- Department of Homeland Security
- Digital Shadows Indicators
- Digital Shadows SearchLight
- Emerging Threats Pro
- ESET Threat Intelligence
- Looking Glass
- MISP Threat Intelligence
- Open Source Intelligence
- PAN Autofocus
- Recorded Future
- RH-ISAC
- ThreatConnect
IoT
- Medigate IoT
- Ordr IoT
IT infrastructure
- HPE ILO
- Nutanix Frame
- Nutanix Prism
K8s cluster audit logs only
- Kubernetes Node logs
- McAfee ePolicy Orchestrator
- Nokia VitalQIP
- pfSense
- Red Hat OpenShift
- WatchGuard
- Windows Event (XML)
LDAP software
- ForgeRock OpenDJ
- JumpCloud Directory as a Service
- Open LDAP
- Red Hat Directory Server LDAP
- Semperis ADFR
- Semperis DSP
Load balancers, traffic shapers, and ADC logs
- Akamai Cloud Monitor
- Allot NetEnforcer
- Brocade ServerIron ADX
- Cisco Application Control Engine
- Citrix Netscaler
- F5 BIGIP LTM
- HaProxy LoadBalancer
- Infoblox Loadbalancer
- Kemp Load Balancer
- Peplink Loadbalancer
- VMware Avi Vantage Platform
Log Aggregation and SIEM Systems
- Arcsight CEF
- Cisco FireSIGHT Management Center
- Clearsense Healthcare Analytics
- Confluent Audit
- Custom Security Data Analytics
- Dynatrace
- Elastic Audit Beats
- Elastic File Beats
- Elastic Metric Beats
- Elastic Packet Beats
- Elastic Search
- Elastic Windows Event Log Beats
- Exabeam Fusion XDR
- Fluentd Logs
- McAfee Enterprise Security Manager
- Microsoft Sentinel
- NCR Digital Insight Global Logging
- NXLog Manager
- Snare System Diagnostic Logs
- Splunk Platform
- Wazuh
- ZeroFox Platform
Mainframe logs
- BMC AMI Defender
- CA ACF2
- IBM AS/400
- IBM z/OS
Miscellaneous Windows-specific logs
- Azure AD
- Azure AD Directory Audit
- Azure AD Organizational Context
- ManageEngine ADAudit Plus
- ManageEngine ADManager Plus
- ManageEngine ADSelfService Plus
- Microsoft AD
- Microsoft AD FS
- Microsoft Powershell
Mobile Device Management
- Absolute Mobile Device Management
- Microsoft ActiveSync
- Microsoft Intune
- Mobileiron
NAC logs
- Forescout NAC
- Fortinet FortiNAC
- SafeConnect NAC
NDR logs
- Bricata NDR
- Cato Networks
- Corelight
- Darktrace
- ExtraHop RevealX
- Fidelis Network
- FireEye NX
- Gigamon
- Netscout
- Palo Alto Cortex XDR
- Plixer Scrutinizer
- Vectra Detect
- Vectra Stream
- Verizon Network Detection and Response
Netflow logs
- Cisco Stealthwatch
Network infrastructure
- APC Smart-UPS
- APC StruxureWare Portal
- Eaton UPS
Network Management and Optimization software
- Axonius Cybersecurity Asset Management
- Cisco Prime
- Cradlepoint NetCloud
- Entrust NTP Server
- HCL BigFix
- Infoblox NetMRI
- Kaseya IT Management
- MicroSemi NTP
- NetDisco
- Riverbed Steelhead
- Western Telematic Inc Console Servers
Network Monitoring
- Nagios Infrastructure Monitoring
Nucleus Security Unified Vulnerability Management
- Nucleus Asset Metadata
- Nucleus Unified Vulnerability Management
- Nucleus Vulnerability Scan Delta
OS Logs
- Cisco Internetwork Operating System
- Cisco NX-OS
- Cisco UCS
- Juniper Junos
- Linux Auditing System (AuditD)
- NIMBLE OS
- Plaso Super Timeline
- Red Canary Cloud Protection
- TGDetect
IdP
- 1Password
- Duo Entity context data
- Duo User Context
- ForgeRock OpenAM
- FreeIPA
- IBM DataPower Gateway
- IBM Tivoli
- Imprivata Confirm ID
- Imprivata Identity Governance
- Imprivata OneSign
- Keeper Enterprise Security
- LastPass Password Management
- Liaison NuBridges Platform
- ManageEngine AD360
- ManageEngine Password Manager Pro
- Microsoft Defender for Identity
- NCR Digital Insight FSG
- Okta
- Okta Access Gateway
- Okta RADIUS
- Okta User Context
- Ping Identity
- Preempt Alert
- Preempt Auth
- ProofID
- Red Hat Identity Management
- Red Hat Keycloak
- RSA
- SailPoint IAM
- Shibboleth IDP
- Silverfort Authentication Platform
- Thycotic
- Thycotic devops secret vault
- Venafi
Packet Capture
- Arkime Packet Capture
Physical Security logs
- BRIVO
- Datawatch
- DMP
- Honeywell Pro-Watch
- Kisi Access Management
- Lenel Onguard Badge Management
- LSI Badge Management System
- Matrix Frontier Badge Management
- Openpath
- Siemens SiPass
- Thales Digital Identity and Security
Policy Management
- AlgoSec Security Management
- Cisco Content Security Management Appliance
- Cloud Passage (CSM)
- Cloud Passage (FIM)
- Secberus Cloud Security Governance
Printer logs
- HP Printer logs
- Lexmark Printer logs
Privileged Account Activity
- BeyondTrust
- BeyondTrust BeyondInsight
- BeyondTrust Cloud Privilege Broker
- BeyondTrust Endpoint Privilege Management
- CA Access Control
- CyberArk
- Hashicorp Vault
- Hitachi PAM
- One Identity Active Role Service
- One Identity Change Auditor
- One Identity Defender
- One Identity TPAM
- OneIdentity Balabit
- Remediant SecureONE
- SpyCloud
Remote Access Tools
- Check Point Harmony
- Citrix Storefront
- Dell iDRAC
- Opengear Remote Management
- OpenSSH
- SecureLink
- TeamViewer
SaaS Applications
- AppOmni
- Aptos Enterprise Order Management
- Archer Integrated Risk Management
- Armor Anywhere
- Azure Security Center
- Cloud Passage
- Cloudflare
- Code Worldwide
- CWT SatoTravel
- ETQ Reliance
- IBM MaaS360
- Kyriba Treasury Management
- Logic Monitor
- ManageEngine Reporter Plus
- McAfee Unified Cloud Edge
- McAfee Web Protection
- Microsoft Azure
- Microsoft Azure Activity
- Microsoft Azure Resource
- NCC Scout Suite
- Obsidian
- Office 365
- OpenText Fax2Mail
- Oracle Cloud Infrastructure
- PeopleSoft
- Pivotal
- Salesforce
- Salesforce Context
- ServiceNow Audit
- ServiceNow Roles
- ServiceNow Security
- Snipe-IT
- Sophos Central
- Symantec Event export
- Workday
- Workday Audit Logs
- WP Engine
Sandbox Technologies
- Authentic8 Silo
- File Scanning Framework
- Symantec Web Isolation
Search Engine
- shodan.io
Service Bus
- IBM CICS
- Mulesoft
SOAR Tools
- D3 Security
- Splunk Phantom
- Swimlane Platform
Software-defined Networking (SDN)
- Cisco APIC
- Cisco Application Centric Infrastructure
SSL Handshake type
- SSL pcap
SSO logs
- Centrify
- Citrix Workspace
- Layer7 SiteMinder
- OneLogin
- OneLogin User Context
- SecureAuth
- SiteMinder Web Access Management
STIX providers
- Fox-IT
Storage solutions
- Cloudian hyperstore
- Dell EMC Avamar
- Dell EMC Cloudlink
- Dell EMC Isilon NAS
- Dremio Data Lakehouse
- IBM Spectrum Protect
- NetApp SAN
- Pure Storage
Switches and Routers logs
- Arista Switch
- Big Switch BigCloudFabric
- Brocade Switch
- CATO SD-WAN
- Cisco Router
- Cisco Switch
- Citrix SD-WAN
- CloudGenix SD-WAN
- Dell Switch
- Extreme Networks Switch
- HP Procurve Switch
- IBM Switch
- Juniper MX Router
- Peplink Router
- Peplink Switch
- Ubiquiti UniFi Switch
- Unifi AP
- Unifi Switch
TANIUM Logs
- Tanium Asset
- Tanium Audit
- Tanium Comply
- Tanium Deploy
- Tanium Discover
- Tanium Insight
- Tanium Integrity Monitor
- Tanium Patch
- Tanium Question
- Tanium Reveal
- Tanium Stream
- Tanium Threat Response
TASK Based Access Management
- Armis
- Stealthbits Audit
- Stealthbits Defend
Telephone software
- Cisco CTS
- Cisco UCM
- Kamailio
- Ribbon Analytics Platform
- Ribbon Session Border Controller
- Ring Central
- Zoom Operation Logs
Ticketing Applications
- Atlassian Jira
Unified Data Model
- UDM
Unix specific logs
- AIX system
- cmd.com
- Solaris system
- Unix system
VPN logs
- Array Networks SSL VPN
- Cisco VPN
- F5 VPN
- Fortinet FortiClient
- Microsoft SSTP VPN
- Netmotion
- OpenVPN
- Palo Alto Networks Global Protect
- Pulse Secure
- Strong Swan VPN
- ZScaler VPN
Vulnerability scanners
- Arxan Threat Analytics
- Cisco Secure Malware Analytics
- Cloud Passage (SVM)
- Digital Defense Frontline VM
- Qualys Continuous Monitoring
- Qualys VM
- Rapid7
- RedHat StackRox
- RiskIQ Digital Footprint
- SonarQube
- Tenable Security Center
- tenable.io
- VirusTotal Threat Hunter
- wiz.io
WAF
- Akamai WAF
- AWS WAF
- Barracuda
- Cloudflare WAF
- F5 ASM
- Fastly WAF
- Imperva
- Imperva SecureSphere Management
- Signal Sciences WAF
- Vmware Avinetworks iWAF
Web Proxy logs
- Akamai Enterprise Threat Protector
- Blue Coat Proxy
- Cisco Umbrella Web Proxy
- Citrix Netscaler Web Logs
- Citrix Web Gateway
- Forcepoint Proxy
- Fortinet Proxy
- iBoss Proxy
- McAfee Web Gateway
- Menlo Security
- Mimecast Web Security
- Netskope Web Proxy
- Squid Web Proxy
- Symantec Web Security Service
- TrendMicro Web Proxy
- Zscaler
Web server logs
- Apache
- Apache Cassandra
- Apache Hadoop
- Apache Kafka Audit
- HAProxy
- IBM Websphere Application Server
- Kong API Gateway
- Microsoft IIS
- NGINX
Wireless logs
- Aruba
- Aruba Airwave
- Avaya Wireless
- Cisco WLC/WCS
- Extreme Networks AirDefense
- Ruckus Networks
- VMware AirWatch
- Domain Tools Phisheye
- Stream Alert
- ZScaler DNS