Fortinet white logo
Fortinet white logo
2024.10.0

Observations

Observations

Field

Type

Description

Example

category

string

The subject of an observation.

relationship

class

string

confidence

string

The confidence in the model output to what was attempted to be observed.

high

context

string

A set of key value pairs providing additional details for this specific observation occurrence.

customer_id

string

The code of the account that owns the event.

chg

dst_ip

string

The IP of the responder to the connection.

1.2.3.4

dst_ip_enrichments

ip_enrichments

Enrichments for an IP.

event_type

string

The type of event recorded.

flow

evidence_end_timestamp

string

The timestamp for which the flagged activity ended.

2019-01-01T00:00:00.000000Z

evidence_iql

string

An IQL statement that attempts to identify the events used to generate the observation.

src.ip = 4.3.2.1' AND customer_id = 'abc' AND dce_rpc:dce_rpc_operation = 'NetrSessionEnum' AND timestamp >= t'2019-01-01T22:00:00.000000Z' AND timestamp <= t'2019-01-01T22:10:00.000000Z'

evidence_start_timestamp

string

The timestamp for which the flagged activity began.

2019-01-01T00:00:00.000000Z

geo_distance

number

The difference between src and dstgeovalues.

1410.373826280689

intel

intel[]

Intel that matched entities in the event.

observation_uuid

string

A unique identifier for the model used to generate the observation. Multiple models may exist for the same title.

ac33589c-ee31-4f5e-b6a1-dcb23da37205

sensor_id

string

The sensor that created the event.

sen1

sensor_ids

string[]

A list of sensors from which activity was used as part of the observation.

[abc1,abc2,abc3]

source

string

The source of the event.

Zeek

src_ip

string

The IP of the initiator of the connection.

4.3.2.1

src_ip_enrichments

ip_enrichments

Enrichments for an IP.

timestamp

string

The time at which traffic for the event began.

2019-01-01T00:00:00.000000Z

title

string

The title of what was attempted to be detected (similar to a suricata sig name).

High Count of NetSession Destinations

uuid

string

A unique identifier for the event.

ac33589c-ee31-4f5e-b6a1-dcb23da37205

category

string

The subject of an observation.

relationship

Observations

Observations

Field

Type

Description

Example

category

string

The subject of an observation.

relationship

class

string

confidence

string

The confidence in the model output to what was attempted to be observed.

high

context

string

A set of key value pairs providing additional details for this specific observation occurrence.

customer_id

string

The code of the account that owns the event.

chg

dst_ip

string

The IP of the responder to the connection.

1.2.3.4

dst_ip_enrichments

ip_enrichments

Enrichments for an IP.

event_type

string

The type of event recorded.

flow

evidence_end_timestamp

string

The timestamp for which the flagged activity ended.

2019-01-01T00:00:00.000000Z

evidence_iql

string

An IQL statement that attempts to identify the events used to generate the observation.

src.ip = 4.3.2.1' AND customer_id = 'abc' AND dce_rpc:dce_rpc_operation = 'NetrSessionEnum' AND timestamp >= t'2019-01-01T22:00:00.000000Z' AND timestamp <= t'2019-01-01T22:10:00.000000Z'

evidence_start_timestamp

string

The timestamp for which the flagged activity began.

2019-01-01T00:00:00.000000Z

geo_distance

number

The difference between src and dstgeovalues.

1410.373826280689

intel

intel[]

Intel that matched entities in the event.

observation_uuid

string

A unique identifier for the model used to generate the observation. Multiple models may exist for the same title.

ac33589c-ee31-4f5e-b6a1-dcb23da37205

sensor_id

string

The sensor that created the event.

sen1

sensor_ids

string[]

A list of sensors from which activity was used as part of the observation.

[abc1,abc2,abc3]

source

string

The source of the event.

Zeek

src_ip

string

The IP of the initiator of the connection.

4.3.2.1

src_ip_enrichments

ip_enrichments

Enrichments for an IP.

timestamp

string

The time at which traffic for the event began.

2019-01-01T00:00:00.000000Z

title

string

The title of what was attempted to be detected (similar to a suricata sig name).

High Count of NetSession Destinations

uuid

string

A unique identifier for the event.

ac33589c-ee31-4f5e-b6a1-dcb23da37205

category

string

The subject of an observation.

relationship