Webhook payload fields
The following tables describe the fields included in detection, incident, and audit log event payloads and are supported when creating custom templates. Example detection and audit log event payloads are also provided.
FortiDLP also provides additional contextual information about policy detection events for advanced analysis and response. This extra information is sent in the extended_metadata
field for applicable detection events, as outlined in the following table and example payload. For detailed information about the extended metadata fields reported per policy template, refer to the FortiDLP Policies Extended Metadata Reference Guide.
If preferred, extended metadata can be excluded from payloads using custom webhook templates that omit the |
Detections are sometimes referred to as "sensors" in these tables. A field preceded by an asterisk (*) contains nested fields. Where possible, nested fields are indented below the containing field. |
JSON field | Custom Field | Type | Description |
---|---|---|---|
customer
|
.Customer
|
String
|
The tenant's unique identifier.
|
tenant_id
|
.TenantUuid
|
String
|
The tenant's unique identifier.
|
tenant_name
|
.TenantName
|
String
|
The tenant's name.
|
tenant_origin
|
.TenantOrigin
|
String
|
The tenant's web address origin.
|
agent_uuid
|
.AgentUuid
|
String
|
The unique identifier of the FortiDLP Agent associated with the detection.
|
agent_hostname
|
.AgentHostname
|
String
|
The hostname of the node associated with the detection.
|
uuid
|
.Uuid
|
String
|
The detection's unique identifier.
|
event_type
|
.EventType
|
String
|
The payload event type, which will always be "sensor".
|
timestamp
|
.Timestamp
|
Timestamp
|
The date/time the detection was generated.
|
sensor_type
|
.SensorType
|
String
|
The detection's type.
|
description
|
.Description
|
String
|
The detection's description.
|
juid
|
.Juid
|
String
|
The unique identifier of the user associated with the detection.
|
username
|
.Username
|
String
|
The username associated with the detection.
|
score
|
.Score
|
Integer
|
The detection's risk score.
|
created_by
|
.CreatedBy
|
String
|
The detection's source, such as the identifier of the policy associated with the detection, or the operator name if the detection was created using the FortiDLP API.
|
tags
|
.Tags
|
Array of strings
|
A list of tag names associated with the detection.
|
anonymised_description
|
.AnonymisedDescription
|
String
|
The detection's description, where identifying information is omitted.
|
requested_actions
|
.RequestedActions
|
Array of strings
|
A list of policy actions requested to execute on the node when the detection occurred.
|
suppressed_actions
|
SuppressedActions
|
Array of strings
|
A list of policy actions that did not execute on the node when the detection occurred, due to Agent rate limiting.
|
label_ids
|
.LabelIds
|
Array of strings
|
A list of identifiers for the labels assigned to the entities associated with the detection.
|
label_names
|
.LabelNames
|
Array of strings
|
A list of names for the labels assigned to the entities associated with the detection.
|
*
metadata |
*
.Metadata |
Object
|
Contains metadata.
|
source_ip
|
.SourceIp
|
Array of strings nested in object metadata
|
A list of source IP addresses associated with the detection.
|
source_port
|
.SourcePort
|
Array of integers nested in object metadata
|
A list of source port numbers associated with the detection.
|
destination_ip
|
.DestinationIp
|
Array of strings nested in object metadata
|
A list of destination IP addresses associated with the detection.
|
destination_port
|
.DestinationPort
|
Array of integers nested in object metadata
|
A list of destination port numbers associated with the detection.
|
url
|
.Url
|
Array of strings nested in object metadata
|
A list of browser request URLs associated with the detection.
|
host
|
.Host
|
Array of strings nested in object metadata
|
A list of hostnames of the URLs associated with the detection.
|
application_name
|
.ApplicationName
|
Array of strings nested in object metadata
|
A list of application binary or friendly names associated with the detection.
|
file_name
|
.FileName
|
Array of strings nested in object metadata
|
A list of filenames that were accessed, created, or deleted associated with the detection.
|
file_path
|
.FilePath
|
Array of strings nested in object metadata
|
A list of paths of the files that were accessed, created, or deleted associated with the detection.
|
target_file_name
|
.TargetFileName
|
Array of strings nested in object metadata
|
A list of target filename associated with the detection, such as the name of a newly created compressed file.
|
target_file_path
|
.TargetFilePath
|
Array of strings nested in object metadata
|
A list of paths of the target files associated with the detection, such as the path of a newly created compressed file.
|
recipient_mail_address
|
.RecipientMailAddress
|
Array of strings nested in object metadata
|
A list of email recipient addresses associated with the detection (includes the To, CC, and BCC fields).
|
sender_mail_address
|
.SenderMailAddress
|
Array of strings nested in object metadata
|
A list of email sender addresses associated with the detection.
|
wifi_ssid
|
.WifiSsid
|
Array of strings nested in object metadata
|
A list of Wi-Fi network SSIDs associated with the detection.
|
wifi_bssid
|
.WifiBssid
|
Array of strings nested in object metadata
|
A list of Wi-Fi network BSSIDs associated with the detection.
|
usb_vid
|
.UsbVid
|
Array of strings nested in object metadata
|
A list of USB device vendor IDs associated with the detection.
|
usb_pid
|
.UsbPid
|
Array of strings nested in object metadata
|
A list of USB device product IDs associated with the detection.
|
usb_serial
|
.UsbSerial
|
Array of strings nested in object metadata
|
A list of USB device serial numbers associated with the detection.
|
content_pattern_name
|
.ContentPatternName
|
Array of strings nested in object metadata
|
A list of content inspection pattern names or custom content inspection pattern values associated with the detection.
|
account_name
|
.AccountName
|
Array of strings nested in object metadata
|
A list of account names or usernames associated with the detection, such as the account name associated with a failed login attempt.
|
certificate_name
|
.CertificateName
|
Array of strings nested in object metadata
|
A list of subject names of root certificates associated with the detection, such as the subject name of a newly installed root certificate.
|
mime_type
|
.MimeType
|
Array of strings nested in object metadata
|
A list of file MIME types associated with the detection.
|
window_title
|
.WindowTitle
|
Array of strings nested in object metadata
|
A list of application window title names associated with the detection.
|
printer_uuid
|
.PrinterUuid
|
Array of strings nested in object metadata |
A list of printer unique identifiers.
|
file_size
|
.FileSize
|
Array of integers nested in object metadata
|
A list of file sizes (measured in bytes) associated with the detection.
|
*
process_info |
*
.ProcessInfo |
Array of objects
|
Contains process information.
|
uuid
|
.Uuid
|
String nested in array process_info
|
The unique identifier of the process that executed an application associated with the detection.
|
binary_name
|
.BinaryName
|
String nested in array process_info
|
The binary name of the process (that is, the name of the application) associated with the detection. This field captures parent and child process values when applicable.
|
binary_path
|
.BinaryPath
|
String nested in array process_info
|
The binary path of the process associated with the detection, such as the binary path from which the process of a connection was executed. This field captures parent and child process values when applicable.
|
username
|
.Username
|
String nested in array process_info
|
The username attribute of the process associated with the detection, such as the username of a person who started a process or accessed a file using a process.
|
app_identifier
|
.AppIdentifier
|
String nested in array process_info
|
The application identifier, typically present on Windows and macOS, associated with the detection.
|
signed
|
.Signed
|
Boolean nested in array process_info
|
The presence/validity of a process binary's digital signature associated with the detection, where
true indicates a process with a valid digital signature and false indicates a process with either an unsigned binary or a binary with an invalid digital signature. |
*
extended_metadata |
*
.ExtendedMetadata |
Object
|
Contains additional policy template-specific metadata.
|
*
schema |
*
.Schema |
Object
|
Contains policy template schema information.
|
id
|
.Id
|
String
|
The identifier of the policy template associated with the metadata.
|
version
|
.Version
|
String
|
The version number of the detection metadata schema, which differs from the FortiDLP Policy Templates release version.
|
*
data |
*
.Data |
Map
|
Contains detection event information that varies by the associated policy template. The nested fields are described in the FortiDLP Policies Extended Metadata Reference Guide.
|
*
data_origin |
*
.DataOrigin |
Array of objects
|
Contains web-based file origin information.
|
timestamp
|
.Timestamp
|
Timestamp nested in object data_origin
|
The date and time the file associated with the detection was downloaded from its origin website.
|
file_path
|
.FilePath
|
String nested in object data_origin
|
The path of the downloaded file on the user's computer.
|
file_size
|
.FileSize
|
Integer nested in object data_origin
|
The size of the downloaded file (measured in bytes).
|
origin_type
|
.OriginType
|
String nested in object data_origin
|
The type of file origin, which will be "browser".
|
*
browser |
*
.Browser |
Object nested in object data_origin
|
Contains origin browser details.
|
tab_url
|
.TabUrl
|
String nested in object browser
|
The URL of the origin website, from which the file was downloaded.
|
tab_title
|
.TabTitle
|
String nested in object browser
|
The title of the browser tab that was open when the file was downloaded from its origin website.
|
account_name
|
.AccountName
|
String nested in object browser
|
The login account name that was used when the file was downloaded from its origin website.
|
url
|
.Url
|
String nested in object browser
|
The downloaded file's origin URL.
|
*
saas_app |
*
.SaasApp |
Object nested in object browser
|
Contains origin SaaS app details.
|
application_id
|
.ApplicationId
|
Integer nested in object saas_app
|
The identifier of the origin SaaS app that was used to download the file.
|
name
|
.Name
|
String nested in object saas_app
|
The name of the origin SaaS app that was used to download the file.
|
category
|
.Category
|
String nested in object saas_app
|
The category of the origin SaaS app that was used to download the file.
|
risk_score
|
.RiskScore
|
Integer nested in object saas_app
|
The risk score assigned to the origin SaaS app that was used to download the file.
|
verdict
|
.Verdict
|
String nested in object saas_app
|
The verdict assigned to the origin SaaS app that was used to download the file.
|
*
indicators |
*
.Indicators |
Array of objects
|
Contains details about the MITRE ATT&CK indicator(s) associated with the detection. For more information, refer to FortiDLP Policies Reference Guide.
|
kind
|
.Kind
|
String nested in object indicators
|
The source or type of the mapped indicator, which will be
mitre . |
*
tactic |
*
.Tactic |
Object nested in object indicators
|
Contains MITRE ATT&CK tactic details.
|
id
|
.Id
|
String nested in object tactic
|
The identifier of the mapped MITRE ATT&CK tactic.
|
title
|
.Title
|
String nested in object tactic
|
The title of the mapped MITRE ATT&CK tactic.
|
*
technique |
*
.Technique |
Object nested in object indicators
|
Contains MITRE ATT&CK technique details. Subtechniques are specified where relevant.
|
id
|
.Id
|
String nested in object technique
|
The identifier of the mapped MITRE ATT&CK technique.
|
title
|
.Title
|
String nested in object technique
|
The title of the mapped MITRE ATT&CK technique.
|
JSON field | Custom field | Type | Description |
---|---|---|---|
detections
|
.Detections
|
Array of objects
|
A batch of detection events, where each detection is an object containing applicable Detection event fields.
|
incidents
|
.Incidents
|
Array of objects
|
A batch of incident events, where each incident is an object containing applicable Incident event fields.
|
audit_logs
|
.AuditLogs
|
Array of objects
|
A batch of audit log events, where each audit log is an object containing applicable Audit log event fields.
|
For details regarding pseudonymization of these fields, see Operator roles. |
Detection event payload
{ "customer": "ecf86a6f-4b70-44fb-7b01-b1a327434e6f", "tenant_id": "ecf86a6f-4b70-44fb-7b01-b1a327434e6f", "tenant_name": "example", "tenant_origin": "https://example.reveal.nextdlp.com", "agent_uuid": "73f2653e-32ed-4e7b-b3e8-bb145f4e76a1", "agent_hostname": "Mark-Laptop", "uuid": "554924f1-faf0-4dfc-87c1-66adb5b192a8", "event_type": "sensor", "timestamp": "2024-02-23T16:40:13.125581231Z", "sensor_type": "AGENT_POLICY", "description": "File upload to \"filebin.net\" from Firefox: secret.txt with size 1GB containing \"confidential\" with at least 1 match.", "juid": "e62915a3-9683-4ad5-923c-b8afeb300141", "username": "Mark Smith", "score": 50, "created_by": "policy:///a99acdf6-cc72-4022-6220-c3/c1f4ce78-68ca-4634-6761-84cafb?instance=b342ca45-8431-4a44-4e01-508eeefab2aa&name=Sensitive+file+uploaded", "tags": [ "datatracking", "blocking", "web", "dataupload", "ml" ], "anonymised_description": "File upload to \"filebin.net\" from Firefox: [REDACTED] with size 1GB containing \"confidential\" with at least 1 match.", "requested_actions": [], "suppressed_actions": [ "message" ], "label_ids": [ "1ae14245-8056-4d3a-6c9d-93e21133e331", "bf8g6ab5-68d0-4ae4-6f8e-babf39b4052b" ], "label_names": [ "Windows", "Sales" ], "metadata": { "source_ip": ["192.0.2.10"], "source_port": [12345], "destination_ip": ["192.0.2.30"], "destination_port": [80], "url": [ "https://filebin.net/" ], "host": [ "filebin.net" ], "application_name": [ "Firefox" ], "file_name": [ "secret.txt" ], "file_path": [ "C:\\Users\\marksmith\\Desktop\\secret.txt" ], "target_file_name": [], "target_file_path": [], "recipient_mail_address": [], "sender_mail_address": [], "wifi_ssid": [], "wifi_bssid": [], "usb_vid": [], "usb_pid": [], "usb_serial": [], "content_pattern_name": [ "\"confidential\"" ], "account_name": [], "certificate_name": [], "mime_type": [], "window_title": [ "Filebin" ], "file_size": [ 1073741824 ], "printer_type": [ "VirtualPrinter" ], "printer_uuid": [ "c7102075-e369-4af5-98a4-5c3fb296111f" ] }, "extended_metadata": { "schema": { "id": "fff50b49_3f86_5821_40be_0e", "version": "ad82d9bcf40cc34c" }, "data": { "blocked": [ false ], "browser_tab": [ { "browser_name": "Firefox", "id": 2, "incognito": false, "title": "Filebin", "url": "https://filebin.net/", "user": "S-1-5-21-567657-768498707-870149045-1002", "window_id": 1 } ], "new_host": [ false ] } }, "process_info": [ { "uuid": "11a466b9-ff10-4698-505c-7fcf74e3ff50", "binary_name": "firefox.exe", "binary_path": "C:\\Program Files\\Mozilla Firefox\\firefox.exe", "username": "Mark-Laptop\\msmith", "app_identifier": "v1.9466bbc96ff3b06205c78e99459e03dad10431e8c5e053a450d807d6ccf723ec", "signed": true } ], "data_origin": [ { "timestamp": "2024-06-20T16:40:13.125581231Z", "file_path": "C:\\Users\\marksmith\\Downloads\\ClientAccounts.xlsx", "file_size": 1000, "origin_type": "browser", "browser": { "tab_url": "https://drive.google.com/drive/u/0/folders/1KD567PICqJgYi8a", "tab_title": "Sales - Google Drive", "account_name": "mark.smith@example.com", "url": "https://drive.google.com/file/d/1VLqSQSyBL9aIzaiuEg8/view", "saas_app": { "application_id": 100, "name": "Google Drive", "category": "Google Apps", "risk_score": 50, "verdict": "sanctioned" } } } ], "indicators": [ { "kind": "mitre", "tactic": { "id": "TA0010", "title": "Exfiltration" }, "technique": { "id": "T10552.001", "title": "Exfiltration over USB" } } ] }
Audit log event payload
{ "tenant_id": "ecf86a6f-4b70-44fb-7b01-b1a327434e6f", "tenant_name": "example", "tenant_origin": "https://example.reveal.nextdlp.com", "type": "OperatorLogin", "fields": { "auth": { "audience": [ "webapp" ], "operator_display_name": "Ellie Smith", "operator_id": "e52c5aba-62b2-4f64-4236-12343f8de78", "operator_login_name": "EllieS", "role": [ "Built-in/Administrator" ], "session_id": "0b362b98-44c3-484c-4779-34717c3d5201" }, "enabled": true, "http": { "host": "example.reveal.nextdlp.com", "method": PUT, "path": "/api/v1/admin/login/banner", "remote_address": "123.45.678.910", "user_agent": "Mozilla/5.0 (platform; rv:geckoversion) Gecko/geckotrail Firefox/firefoxversion", }, "summary": "Login banner updated", "timestamp": "2024-06-27T10:57:46.726255058Z", "title": "Welcome", "trace_id": "11111111111111111111111111111111", "type": "LoginBannerUpdated", "type_id": 75, } }