Fortinet white logo
Fortinet white logo

User Guide

Event fields

Event fields

The following topics describe the fields unique to each event type.

Back to Event Fields.

BACnet Device control fields

A BACnet device control event occurs when BACnet messages like Reinitialize-Device or Device-Communication-Control are detected. These events log administrative actions that affect device availability and behavior.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Property

Type

Description

bacnet_device_ctrl_ignore_time

integer

Time in minutes that the device should obey the control command; e.g., in Device-Communication-Control, how long the device is to suppress or enable communications per the request.

Example: 5

bacnet_device_ctrl_invoke_id

integer

Unique identifier used to correlate a confirmed APDU request (such as Device-Communication-Control or Reinitialize-Device) with its acknowledgment or response.

Example: 1

bacnet_device_ctrl_pdu

string

The specific BACnet APDU service invoked for device control (e.g., “ReinitializeDevice” or “DeviceCommunicationControl”).

Example: reinitialize_device

bacnet_device_ctrl_pwd_hash

string

The SHA-256 hash of the password supplied in the Device-Communication-Control or Reinitialize-Device request if required by the device for authentication or to execute the control command.

Example: ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad

bacnet_device_ctrl_result

string

Outcome of the control operation: one of Success, Error, Reject, or Abort.

Example: ERROR

bacnet_device_ctrl_result_code

string

If the result was Error, Reject, or Abort, this is the specific error/reject/abort code returned by the device; otherwise often “OK” or similar success-indicator.

Example:

bacnet_device_ctrl_state

string

The state to which the device is being set by the control service (for instance, the state in Reinitialize-Device such as “coldstart”, “warmstart”, etc.).

Example: coldstart

is_orig

boolean

True if the message is sent from the originator.

Example: true

Back to Event Fields.

BACnet Discovery fields

A BACnet discovery event is created when Who-Is/I-Am/Who-Has/I-Have messages are observed, recording device/object identifiers and vendor information for rapid inventory. This log focuses on unconfirmed services used for discovery.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Property

Type

Description

bacnet_discovery_id

integer

Numerical part of the device’s identifier (the instance number) used in discovery to uniquely address the device on the network.

Example: 1

bacnet_discovery_instance_num

integer

The instance number of the object being discovered, combined with object_type to uniquely identify that object within the device.

Example: 930101

bacnet_discovery_object_name

string

The name property of the object discovered (Object_Name BACnet property), e.g. a human-readable name for the device or object as configured on the BACnet device.

Example: FLR12_DEMAND

bacnet_discovery_object_type

string

The type of BACnet object that is announced/discovered in the discovery process (for example, Device, Analog-Input, Binary-Output, etc.).

Example: device

bacnet_discovery_pdu

string

The specific BACnet discovery service in use (for example, “Who-Is” or “I-Am”)

Example: who-is

bacnet_discovery_range

string

The “Who-Is” discovery range that was used (e.g. “0-4194303”) indicating lower and upper limits of device instance numbers requested to announce themselves; helps scope discovery messages.

Example: 1944802-1944802

bacnet_discovery_type

string

Type of identifier used to represent the device’s identity (often the “Device” object identifier or its subtype)

Example:

bacnet_discovery_vendor

string

The vendor identifier or vendor name of the device responding to the discovery, per the BACnet Vendor ID registry.

Example: Schneider Electric

is_orig

boolean

True if the message is sent from the originator.

Example: true

Back to Event Fields.

BACnet Property fields

A BACnet property event is created when Read-Property-Request, Read-Property-ACK, or Write-Property-Request messages are observed, capturing object type, instance number, property identifier, array index, and value. This log focuses on confirmed services used for reading and writing properties.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Property

Type

Description

bacnet_property_index

integer

If the property is an array, this is the index of the element being accessed; if omitted or zero, it often means the whole array or default behavior per spec.

Example: 1

bacnet_property_instance_num

integer

The instance number of the object within the device.

Example: 111

bacnet_property_invoke_id

integer

The unique identifier used to correlate confirmed APDU property requests (Read-Property or Write-Property) with their acknowledgments in BACnet traffic.

Example: 232

bacnet_property_object_type

string

The type of BACnet object (e.g. Analog Input, Binary Output, Device, etc.) whose property is being accessed or modified.

Example: device

bacnet_property_pdu

string

The specific BACnet APDU service invoked for device control (e.g. “ReinitializeDevice” or “DeviceCommunicationControl”))

Example: read-property-ack

bacnet_property_type

string

The property identifier within the object (e.g. Present_Value, Status_Flags, Description, etc.) being read or written.

Example: object-list

bacnet_property_value

string

The value of the property (for Read-Property-ACK or Write-Property-Request) as represented in the BACnet message; could be numerical, enumeration, string, etc.

Example: device: 111

is_orig

boolean

True if the message is sent from the originator.

Example: false

Back to Event Fields.

BACnet header fields

A BACnet header event is created when any BACnet/IP packet is seen; the log captures header information for both APDU and NPDU messages. BACnet is a building automation/control protocol used for device discovery, property access, and supervisory functions.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Property

Type

Description

bacnet_bvlc_func

string

The BVLC (BACnet Virtual Link Control) function for this BACnet/IP packet (identifies how the packet is being used, e.g. Original-Unicast-NPDU, Forwarded-NPDU, etc.)

Example: BVLC_Result

bacnet_invoke_id

integer

The unique identifier (invoke ID) used to track Confirmed APDU/NPDU requests and their acknowledgements/responses.

Example: 215

bacnet_pdu_service

string

The Bacnet service (which service is being invoked or replied to, e.g. ReadProperty, WriteProperty, WhoIs, etc.)

Example: read_property

bacnet_pdu_type

string

The Bacnet service type (the APDU PDU type, e.g. Confirmed-Request, Unconfirmed-Request, Simple-ACK, Error, etc.)

Example: CONFIRMED_REQUEST

bacnet_result_code

string

The Error/reject/abort code or reason if the APDU is an Error, Reject, or Abort. This field is not applicable for NPDU context, it will be null.

Example: Successful_completion

is_orig

boolean

True if the packet is sent from the originator.

DCE RPC fields

A dce_rpc event is created when a Distributed Computing Environment / Remote Procedure Call message is observed over a connection, capturing RPC operations like bind, request, or response. This protocol enables clients to execute procedures on remote servers.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

dce_rpc_endpoint

string

The remote service targeted by the command

Example: samr

dce_rpc_operation

string

The command submitted to the remote service

Example: SamrOpenDomain

named_pipe

string

The name of the target pipe (or the destination port if not named

Example: \pipe\lsass

round_trip_time

float

The time in seconds between command execution and results returned

Example: 0.01

Back to Event Fields.

DHCP fields

A dhcp event is created when a Dynamic Host C onfiguration Protocol exchange occurs, such as a client requesting or receiving network addressing from a DHCP server. This protocol is used to dynamically assign IP addresses and other network configuration settings.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

assignment

ip-object

The IP assigned to the client

Example: 10.0.0.10

dhcp_msg_type

string

Shows whether a lease is being requested or acknowledged

Example: Request

hostname

string

The client hostname

Example: bob-pc

lease_duration

float

Number of seconds that the lease is valid

Example: 1800

lease_end

timestamp

The time at which the lease expires

Example: 2019-06-24T07:31:35.012Z

mac

string

The client MAC address

Example:

trans_id

int

The transaction ID, ties together requests and acknowledgments.

Example: 1191705957

Back to Event Fields.

DNP3 fields

A dnp3 event is created when DNP3 (Distributed Network Protocol), commonly used in industrial control systems, logs requests or replies. The protocol enables master-to-outstation communication for monitoring and control.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field

Type

Description

dnp3_function_reply

string

The name of the function message in the reply.

Example: RESPONSE

dnp3_function_request

string

The name of the function message in the request.

Example: CONFIRM

dnp3_indication_number

integer

The response's "internal indication number".

Example: 0

Back to Event Fields.

DNP3 3 Control fields

A dnp3_control event is generated when DNP3 control messages—specialized commands for remote control or configuration are observed. It supports supervisory control operations in DNP3 networks.

The following table shows fields unique to the dnp3_control event type:

Field

Type

Description

dnp3_function_code

string

Function code (READ or RESPONSE)

Example: RESPONSE

dnp3_object_count

integer

DNP3 object type

Example: 32-Bit Binary Counter

dnp3_object_type

string

DNP3 object type

Example: 32-Bit Binary Counter

dnp3_range_high

integer

Range (high) of object

Example: 9

dnp3_range_low

integer

Range (low) of object

Example: 0

is_orig

boolean

True if the packet is sent from the originator

Example: true

DNP3 Object fields

A dnp3_object event is generated when DNP3 object-level constructs (such as analog or binary inputs/outputs) are seen in the traffic, facilitating insight into SCADA-style data models. It reflects structured data exchanged via DNP3.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field

Type

Description

dnp3_function_code

string

Function code (READ or RESPONSE)

Example: RESPONSE

dnp3_object_count

integer

DNP3 object type

Example: 32-Bit Binary Counter

dnp3_object_type

string

DNP3 object type

Example: 32-Bit Binary Counter

dnp3_range_high

integer

Range (high) of object

Example: 9

dnp3_range_low

integer

Range (low) of object

Example: 0

is_orig

boolean

True if the packet is sent from the originator

Example: true

Back to Event Fields.

DNS fields

A dns event is created when a Domain Name System query or response message is captured over the network. DNS enables the resolution of human-friendly domain names to IP addresses.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

answers

host-object-array

The answers returned by the DNS server for the query

Example: [103.2.116.79, 103.2.116.83]

proto

string

The transport layer protocol used

Example: udp

qtype

int

The numeric code of the query type

Example: 1

qtype_name

string

The string name of the query type

Example: A

query

domain-object

The domain being queried

Example: www.google.com

rcode

int

The numeric code of the result

Example: 0

rcode_name

int

The string name of the result

Example: NOERROR

rejected

Boolean

Indicates whether the query was rejected by the server

Example: false

ttls

int-array

An array of TTL values, one per result

Example: [299, 299]

Back to Event Fields.

DPI fields

A dpi (Deep Packet Inspection) event is created by the Fortinet IPS (Intrusion Prevention System) engine running on the sensor which logs informative and pattern matching based events. The IPS engine logs AppID (Applications seen by the engine for software and protocols), IDS (signatures for vulnerabilities), OT Protocols/Threats (Operational Technology based protocol parsing and signatures), Botnet (Botnet based traffic patterns), and Info (informational events about protocols).

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Name Type Description

dpi_alert_category

string

Type of category of the IPS signature.

  • Info: IDS with informational severity
  • AppID: Application control
  • IDS: Intrusion Detection
  • Botnet: IDS's botnet specific signature
  • OT - Threats: IDS for Operational Technology
  • OT - Protocol: AppCtrl for Operational Technology

Example:IDS

dpi_alert_severity

integer

Severity of the triggered IPS signature.

  • Info: 0
  • Low: 1
  • Medium: 2
  • High: 3
  • Critical: 4

Example:0

dpi_alert_signature

string

The triggered IPS signature name.

Example:ITCM.Class.D_Wayside.Status.Message.WIUStatus.Timed.Beacon

dpi_alert_signature_id

integer

Attack ID or ID of the IPS signature.

Example:12343

dpi_app_behavior

array

Possible behavior for the application in which the triggered IPS signature refers to.

Example:Evasive

dpi_app_category

string

The application category for the triggered IPS signature, if there is any.

Example:Operational.Technology

dpi_app_language

string

Language used in the application in which the triggered IPS signature refers to.

Example:N/A

dpi_app_name

array

Name of the application.

Example:Other

dpi_app_os

array

OS of the application or vulnerable system/devices.

Example:All

dpi_app_technology

array

Technology group or type for the application in which the triggered IPS signature refers to.

Example:Client-Server

dpi_app_vendor

string

Vendor of the application in which the triggered IPS signature refers to.

Example:Other

dpi_expected_port

string

Default port and protocol for the application in which the triggered IPS signature is referring to.

Example:UDP/1900

dpi_parent_vuln_id

integer

ID of the IPS signature that link to the triggered IPS signature.

Example:56843

dpi_rulegroup

string

Which group the triggered IPS signature belongs to.

Example:SCADA

dpi_ruleset_rev

integer

Version number for the triggered IPS signature.

Example:13401

dpi_session_id

integer

Session ID for the traffic.

Example:0

dpi_sig_cve

array

ID for the CVE reference.

Example:20050380

dpi_ssl_decrypt_req

boolean

Does the current IPS signature need SSL decryption to work.

Example:False

dpi_vuln_id

integer

Vulnerablity ID or Applicatioin ID for the IPS signature (Note: One VID could contain multiple AID).

Example:33456

dpi_vuln_type

string

Type of vulnerability this IPS signature is related to.

Example:Other

Note

The common field of flow_id is not included in the dpi events.

Back to Event Fields.

Flow fields

A flow event is created when a unidirectional or bidirectional network flow is identified, summarizing traffic between endpoints over time, such as packet count, byte count, and states. A network flow is defined by a unique combination of src.ip, src.port, dst.ip, dst.port, and proto.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

community_id

string

An additional flow identifier for joining Flow events.

Example: 1:f69i+MdCEA8QnAKnKVE0Pyyta24=

duration

float

The number of seconds the flow lasted

Example: 7s

flow_state

string

Lifecycle summary of the connection observed for this flow. Includes standard Zeek/Bro connection states and periodic P* states.

Example: SF

Supported values:

flow_state Description

S0

Connection attempt seen, no reply.

S1

Connection established, not terminated.

SF

Normal establishment and termination.

REJ

Connection attempt rejected.

S2

Connection established and close attempt by originator seen (but no reply from responder).

S3

Connection established and close attempt by responder seen (but no reply from originator).

RSTO

Connection established, originator aborted (sent a RST).

RSTR

Responder sent a RST.

RSTOS0

Originator sent a SYN followed by a RST, we never saw a SYN-ACK from the responder.

RSTRH

Responder sent a SYN ACK followed by a RST, we never saw a SYN from the (purported) originator.

SH

Originator sent a SYN followed by a FIN, we never saw a SYN ACK from the responder (hence the connection was “half” open).

SHR

Responder sent a SYN ACK followed by a FIN, we never saw a SYN from the originator.

OTH

No SYN seen, just midstream traffic (a “partial connection” that was not later closed).
Note

Additionally, FortiNDR Cloud logs P* flow states. These states are logged for long‑lived connections once every 24 hours, with the flow_state reflecting the current state of the TCP/UDP state machine. The byte totals logged are cumulative since connection start, rather than incremental since the previous log entry.

In practice, this typically results in PS0 (one‑sided connection, retry under the 5‑minute timeout), PS1 (two‑sided connection where the start was observed), and POTH (the start of the connection was not observed).

proto

string

The transport layer protocol used

Example: tcp

service

string

The application(s) observed in the flow, if any

Example: http

total_ip_bytes

int

The total combined bytes transmitted over the connection

Example: 927 bytes

total_pkts

int

The total combined packets transmitted over the connection

Example: 11

upload_percent

int

The percentage of bytes transmitted by the src for the flow (56% == 56)

Example: 56%

Back to Event Fields.

FTP fields

An ftp event is created when File Transfer Protocol commands or responses are observed during an FTP session. This protocol is used for transferring files between client and server.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

data_channel.dst

ip-object

The destination of the data channel

Example: 10.0.0.2

data_channel.geo_distance

float

The distance (in miles) between the IP addresses of the data channel

Example: 5077.89

data_channel.passive

Boolean

Indicates whether the session is in passive mode

Example: True

data_channel.src

ip-object

The source of the data channel

Example: 10.0.0.10

files

file-array

Files transferred over the session

Example: N/A

ftp_arg

string

The full argument string supplied to the command

Example: ftp://10.0.0.2/secrets.zip

ftp_command

string

The client command

Example:RETR

reply_code

int

The server response code to the command

Example: 227

reply_msg

string

The server response string to the command

Example: Entering Passive Mode (10,0,0,2,197,36)

username

string

The username used to establish the connection

Example: Admin101

Back to Event Fields.

HTTP fields

An http event is created when HTTP requests or responses—including headers and message boundaries are processed over HTTP connections. HTTP is the foundational protocol for web communications.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

cookie_vars

string-array

Variable names extracted from all cookies.

Example: disp.prefs,_utmz ,_utmc,_utma, TS01f95106, _utmb

files

file-object-array

Files downloaded over the HTTP connection

headers.accept

string-array

The content of the Accept header

Example: [image/webp, image/apng, image/*, */*;q=0.8]

headers.client_header_names

string-array

The vector of HTTP header names sent by the client.

Example: Cache-Control, Connection, Pragma, Content-Type, User-Agent, X-Havoc, X-Havoc-Agent, Content-Length, Host

headers.content_md5

string

The computed MD5 hash of the headers content

Example: d41d8cd98f00b204e9800998ecf8427e

headers.content_type

string-array

The contents of the Content Type header

Example: [text/xml; charset="utf-8"]

headers.cookie_length

int

The length of the cookie in bytes

Example: 194

headers.location

url-object

The content of the Location header

Example: http://amupdatedl3.microsoft.com/server/amupdate/metadata/UniversalManifest.cab

headers.origin

url-object

The content of the Origin header

Example: http://go.com

headers.proxied_ip_clients

ip-object-array

The sequence of IPs the HTTP connection is proxied through

Example: [172.16.0.1, 172.16.0.2]

headers.refresh.refresh

string

The full content of the Refresh header

Example: 1;URL=http://travelingtravelerhome.wordpress.com/

headers.refresh.timeout

int

The timeout period in seconds

Example: 1

headers.refresh.uri

uri-object

The URI of the Refresh header

Example: http://travelingtravelerhome.wordpress.com/

headers.server

string

The web server software

Example: Microsoft-IIS/6.0

headers.server_header_names

string-array

The vector of HTTP header names sent by the server.

Example: VIA, DATE SERVER, CONNECTION, X-2SENDPT1, X-WSENDPT2, CONTENT-LENGTH

headers.x_powered_by

string

The application software running on the server

Example: ASP.NET

host

host-object

The content Host header

Example: www.google.com

info_msg

string

The message returned with a 100-level response code

Example: Continue

method

string

The HTTP method selected

Example: GET

proxied

string-array

A list of proxy steps

Example: PROXY-CONNECTION -> Keep-Alive

referrer

url-object

The content of the Referrer header

Example: http://au.search.yahoo.com/search?p=planetside.co.uk&fr=sfp&fr2=sb-top-search

request_len

int

The length in bytes of the request

Example: 0

request_mimes

string-array

The fingerprinted MIME-type(s) of the request content, use instead of request_mime

Example: text/plain

response_len

int

The length in bytes of the response

Example: 24

response_mimes

string-array

The fingerprinted MIME-type of the response content, use instead of response_mime

Example: text/html

status_code

int

The numeric code of the server's response

Example: 200

status_msg

string

The string name of the server's response

Example: OK

trans_depth

int

The depth of redirects

Example: 4

uri

uri-object

The full URI of the request

Example:/index.php

user_agent

string

The content of the UserAgent header

Example: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

username

string

The username used with Basic Auth, if any

Example: dave

Back to Event Fields.

Kerberos fields

A kerberos event is generated when Kerberos authentication messages (e.g., AS or TGS requests/replies) are detected. Kerberos is a network authentication protocol that uses tickets to allow nodes to prove their identity.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

cipher

string

The cipher suite used to encrypt the ticket

Example: aes256-cts-hmac-sha1-96

client

string

The client that requested the ticket; machine accounts have a $ at the end of their name but user accounts do not.

Example: jane.doe/ACME.CORP, financewks008$/ACME.CORP

client_cert_fuid

string

Client certificate file unique ID

Example: Xbtku3TdsfdsdfasdfA8VNsk

client_cert_subject

string

Client certificate Subject field

Example: CN=C865433

error_msg

string

The error message returned for failed requests

Example: KDC_ERR_CLIENT_NAME_MISMATCH

forwardable

Boolean

Indicates whether the ticket's forwardable flag is set

Example: True

renewable

Boolean

Indicates whether the ticket's renewable flag is set

Example: True

request_type

string

The type of ticket requested, either a ticket-granting ticket from the authentication server (AS) or a service ticket from the ticket-granting server (TGS)

Example: AS, TGS

server_cert_fuid

string

Server certificate file unique ID

Example: FvAdJGsjeXuhSvE9m

server_cert_subject

string

Server certificate Subject field

Example: CN=dc09.google.com

service

string

The service for which a ticket is being requested

Example: krbtgt/ACME.CORP

success

Boolean

Indicates whether the request was successful

Example: True

ticket_duration

float

The ticket duration in seconds

Example: 86400

ticket_from

timestamp

Time the ticket is good from

Example: 2015-09-13T02:48:05.000Z

ticket_till

timestamp

Time the ticket is good until

Example: 2037-09-13T02:48:05.000Z

Back to Event Fields.

LDAP fields

An ldap event is generated when LDAP (Lightweight Directory Access Protocol) messages—such as authentication, search, or directory operations—are observed. This protocol provides directory services, like querying user or organizational data.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Note

This event type is supported in Sensor version 2.2.0 and later.

The following table shows fields unique to the ldap event type:

Field Type Description

ldap_argument

string

Additional arguments this message includes.

Example: REDACTED

ldap_diagnostic_message

string Diagnostic message if the LDAP message contains a result.

ldap_message_id

integer

The unique identifier that is used to correlate requests and responses.

Example: 2

ldap_object

string

The objects names this message refers to.

Example: ATRLAB\\Administrator

ldap_opcode

string

The operation code indicating what type of message it is.

Example: bind, simple

ldap_result

string

The result code if the message contains a result.

Example: success

ldap_version

integer

LDAP version.

Example: 3

Back to Event Fields.

LDAP Search fields

A ldap_search event is created when a client performs an LDAP search operation.

Note

This event type is supported in Sensor version 2.2.0 and later.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

ldap_diagnostic_message

string Diagnostic message if the LDAP message contains a result.

ldap_message_id

integer

The unique identifier that is used to correlate requests and responses.

Example: 2

ldap_result

string

Result code of search operation.

Example: success

ldap_search_attribute

string

A list of attributes that were returned in the search.

Example: 2

ldap_search_base_object

string

Base search objects.

Example: 2

ldap_search_deref_aliases

string

Set of deref alias.

Example: 2

ldap_search_filter

string

A string representation of the search filter used in the query.

Example: 2

ldap_search_result_count

integer

Number of results returned.

Example: 2

ldap_search_scope

string

Set of search scopes.

Example: 2

source

string

The source of the event.

Example: Zeek

Back to Event Fields.

Modbus fields

A modbus event is created when Modbus protocol commands or responses—typically used in industrial automation systems—are captured. This allows reading or writing of registers or coil values in connected devices.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field

Type

Description

is_orig

boolean

Example: true

modbus_address

integer

Starting address of value(s) field.

modbus_function

string

The name of the function message that was sent.

Example: READ_INPUT_REGISTERS

modbus_quantity

integer

Number of addresses/values read or written to.

modbus_request_response

string

REQUEST or RESPONSE

modbus_tid

integer

Modbus transaction identifier

modbus_unit

integer

Modbus terminal unit identifier.

modbus_values

string[]

Value(s) of coils, discrete_inputs, or registers read/written to.

Example: 555,0,100

Back to Event Fields.

Netflow fields

A netflow event is created when IP traffic flow data—typically collected by routers or switches—is captured and exported for analysis. This allows visibility into network usage patterns, including source and destination IPs, protocols, ports, and byte counts.

Note
  • A NetFlow annual subscription license is required for FortiNDR Cloud to ingest third-party logs for anomaly detection.
  • Only NetFlow-based botnet detections are currently displayed. Detections for spam, phishing, Tor, and proxy traffic are available at this time. Additionally, an IOC (Indicator of Compromise) risk score may not be shown for every IP address.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field

Type

Description

netflow_bytes

integer

Number of bytes in a flow.

Example: 106

netflow_dst_net

string

Destination network address associated with a particular network flow with the mask.

Example: 0.0.0.0/0

netflow_dst_vlan

integer

Virtual LAN identifier associated with egress interface.

Example: 0

netflow_etype

string

Ethernet type (0x0800 for IPv4). Entire list is here: https://en.wikipedia.org/wiki/EtherType

Example: IPv4

netflow_forwarding_status

integer Forwarding status is encoded on 1 byte with the 2 left bits giving the status and the 6 remaining bits giving the reason code.Status is either unknown (00), Forwarded (10), Dropped (10) or Consumed (11). Example: 0

netflow_frag_id

integer

The fragment ID.

Example: 19093

netflow_frag_offset

integer

The fragment-offset value from fragmented IP packets.

Example: 0

netflow_icmp_code

integer

Code of the ICMP message.

Example: 0

netflow_icmp_type

integer

ICMP flags

Example: 0

netflow_input_interface

integer

Input interface.

Example: 512

netflow_ip_flags

integer

IP flags

Example: 0

netflow_ip_tos

integer

IP Type of Service.

Example: 0

netflow_ip_ttl

integer

TTL value observed for packets of the flow.

Example: 64

netflow_ipv6_flow_label

integer

IPv6 flow label as in RFC 2460 definition.

Example: 0

netflow_layer_size

array

Size of protocols seen in the flow.

Example: [14, 4, 20, 8]

netflow_layer_stack

array

Protocols seen in this flow.

Example: [Ethernet, MPLS, IPv4, ICMP]

netflow_output_interface

integer

Output interface.

Example: 0

netflow_sampled

integer

Denominator of how frequently data is collected. Meaning a sampling rate of 100 means one out of every 100 packets is sampled. Helps reduce the load on network devices and collectors by only exporting a portion of the traffic.

Example: 1

netflow_sampler_address

string

The IP address of the network device (typically a router) that is performing packet sampling and exporting NetFlow data.

Example: 169.254.0.2

netflow_seq_num

integer A cumulative counter that increments with each exported datagram to detect and account for any missing or dropped NetFlow datagrams. Example: 766

netflow_source

string

Type of netflow

Example: IPFIX

netflow_src_net

string

Source network address associated with a particular network flow with the mask.

Example: 0.0.0.0/0

netflow_src_vlan

integer

Virtual LAN identifier associated with ingress interface.

Example: 0

netflow_tcp_flags

integer

TCP flags

Example: 0

netflow_timestamp_end

string Time the flow ended in nanoseconds.

netflow_timestamp_received

string Timestamp in nanoseconds when the flow message was received by the NetFlow collector or analysis system.

netflow_vlan_id

integer

Allows you to associate network traffic flows with their respective VLANs.

Example: 0

proto

string

Protocol used in the traffic.

Example: TCP

tag

string

The type of event

Example: flow

total_pkts

integer

Number of packets in a flow.

Example: 1

dst.ip_bytes

integer

The number of bytes transmitted by the IP address

dst.pkts

integer

The number of packets transmitted by the IP address

switched

boolean

If the source and destination IPs are switched due to port values.

Example: false

src.ip_bytes

integer

The number of bytes transmitted by the IP address

src.pkts

integer

The number of packets transmitted by the IP address

Note

In NetFlow events, the src (source) and dst (destination) fields are replaced with interface_enriched, a type based on ip-object. This enriched type includes everything in ip-object. Unique to Netflow, the src and dst also include the mac (MAC address) field

Back to Event Fields.

Notice Fields

A notice event is raised when unusual or noteworthy activity is detected and logged as a security or policy notification. It flags anomalies or policy-triggered events across Zeek’s analysis.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

application

application

The classified application for a flow

dst_ip

string

The IP of the responder to the connection

Example: 8.8.8.8

dst_ip_enrichments

ip_enrichments

Enrichments for an IP

dst_port

integer

The port of the responder to the connection

Example: 53

file_desc

string

Description of a file to provide more context. For example, if a notice was related to a file over HTTP, the URL of the request would be shown.

file_mime_type

string

If the notice event is related to a file, this will be the mime type of the file.

fuid

string

A file unique ID if this notice is related to a file.

msg

string

Description of activity noticed.

Example: 10.1.0.47 appears to be guessing SSH passwords (seen in 30 connections).

n

integer

Associated count, or perhaps a status code.

note

string

Notice type

Example: SSH::Password_Guessing

notice_actions

string

The actions which have been applied to this notice.

Example: [Notice::ACTION_LOG]

peer_descr

string

Textual description for the peer that raised this notice, including name, host address and port.

proto

string

The transport protocol.

src_ip

string

The IP of the initiator of the connection

Example: 10.10.10.10

src_ip_enrichments

ip_enrichments

Enrichments for an IP

src_port

integer

The port of the initiator of the connection

Example: 52843

sub

string

Technical details of the activity.

Example: Sampled servers: 10.1.0.86, 10.1.0.86, 10.1.0.86, 10.1.0.86, 10.1.0.86

suppress_for

number

This field indicates the length of time that this unique notice should be suppressed.

tag

string

| The type of event

Example: flow

Back to Event Fields.

NTLM fields

An ntlm event is generated when NT LAN Manager authentication exchanges are seen, including domain, username, hostname, and whether authentication succeeded. This is a Microsoft authentication protocol.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

auth_domain

string

The domain used to authenticate the client

Example: ACME

hostname

string

The client hostname used

Example: FINANCEWKS008

ntlm_status

string

String indicating the result of the authentication

Example: SUCCESS

success

Boolean

Indicates whether the authentication succeeded

Example: True

username

string

The client username used

Example: sqlservice

Back to Event Fields.

Observation fields

An observation event is created when the FortiNDR Cloud analytics backend identifies a correlation of information of interest. See below for valid values for the following fields:

Tooltip

You can view the list of observations in the Observations widget in the Default Dashboard . For more information, see:

  • observation_category: asset, account, software, flow, file, relationship

  • observation_class: anomalous, newly observed, specific

Note

Observations run independently from the metadata extraction process, and are not tied to flow events with a flow_id. Additionally, an observation event may only have one of src.ip or dst.ip, although it could contain both.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

evidence_end_timestamp

timestamp

The timestamp for which the flagged activity ended.

Example: 2019-01-01T00:00:00.000Z

evidence_iql

string

An IQL statement that attempts to identify the events used to generate the observation.

Example: src.ip = '10.10.10.10' AND customer_id = 'chg' AND dce_rpc:dce_rpc_operation = 'NetrSessionEnum' AND timestamp >= t'2019-01-01T22:00:00.000000Z' AND timestamp <= t'2019-01-01T22:10:00.000000Z'

evidence_start_timestamp

timestamp

The timestamp for which the flagged activity began.

Example: 2019-01-01T00:00:00.000Z

observation_category

string

The subject of an observation.

Example: relationship

observation_class

string

The class of what was observed about the subject.

Example: specific

observation_confidence

string

The confidence (high, medium, or low) in the model output to what was attempted to be observed.

Example: high

observation_title

string

The title of what was attempted to be detected - similar to a suricata sig name.

Example: High Count of NetSession Destinations

observation_uuid

string

A unique identifier for the model used to generate the observation. Multiple models may exist for the same title.

Example: ac33189b-ee31-4f5e-b6a1-dcb63d9a7295

sensor_ids

string array

A list of sensors from which activity was used as part of the observation.

Example: [chg1,chg2,chg3]

Back to Event Fields.

PE fields

A pe event is created when a Portable Executable file (e.g., Windows .exe or .dll) is transferred or extracted during file analysis. The PE format is the executable file format for Windows binaries.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

compile_timestamp

timestamp

The compile timestamp extracted from the file

Example: 2015-11-12T10:23:51.000Z

file

file-object

The enriched file properties (hashes, size, MIME-type)

Example: N/A

has_cert_table

Boolean

Indicates whether the file has an attribute certificate table

Example: True

has_debug_data

Boolean

Indicates whether the file has a debug table

Example: True

has_export_table

Boolean

Indicates whether the file has an export table

Example: True

has_import_table

Boolean

Indicates whether the file has an import table

Example: True

id

string

An internal unique identifier for the file

Example: FrkSk6Y0mqKGxMBF6

is64_bit

Boolean

Indicates whether the file is 64-bit

Example: True

is_exe

Boolean

Indicates whether the file is executable or just an object

Example: True

machine

string

The architecture the file was compiled for

Example: I386

os

string

The OS the file was compiled for

Example: Windows XP

section_names

string-array

An array of section names extracted from the file

Example: [.text, .rdata, .data, .rsrc]

subsystem

string

The subsystem the file was compiled for

Example: WINDOWS_GUI

uses_aslr

Boolean

Indicates whether the file supports ASLR

Example: True

uses_code_integrity

Boolean

Indicates whether the file enforces code integrity checks

Example: True

uses_dep

Boolean

Indicates whether the file supports DEP

Example: True

uses_seh

Boolean

Indicates whether the file uses SEH

Example: True

Back to Event Fields.

Profinet event

A profinet event is created by the use of PROFINET an Ethernet protocol for communication between devices in industrial automation systems.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Name

Type

Description

profinet_activity_uuid

string

Identifies communication relationships

profinet_auth

integer

Authentication protocol - set to 0 for no authentication

profinet_broadcast

boolean

Flag 1 Bit 6 Broadcast (is the call a broadcast)

profinet_cancel_req

boolean

Flag 2 Bit 1 Cancel was pending at call end (a cancellation request was received from the client for a specific remote procedure call (RPC), but the call completed before the cancellation could be processed. )

profinet_char_encoding

string

Character encoding: ASCII, EBCDIC

profinet_fack

string

Version Fack

profinet_float_encoding

string

Floating point representations: IEEE, VAX, CRAY, etc.

profinet_frag

boolean

Flag 1 Bit 2 Fragment

profinet_frag_num

integer

Fragment number set to the number of the current fragment.

profinet_hint

integer

Activity hint

profinet_idempotent

boolean

Flag 1 Bit 5 Idempotent

profinet_int_endian

string

Integer encoding: Big Endian or Little Endian

profinet_interface_hint

integer

Interface hint

profinet_interface_major

integer

Interface version major

profinet_interface_minor

integer

Interface version minor

profinet_interface_uuid

string

Identifies the interface of an IO device, controller, etc.

profinet_last_frag

boolean

Flag 1 Bit 1 Last Fragment

profinet_length

integer

Length of body set to the number of octets of NDRDdata in the current frame.

profinet_max_frag

integer

Maximum fragment size

profinet_max_tsdu

integer

Maximum Tsdu

profinet_maybe

boolean

Flag 1 Bit 4 Maybe (the client sends a request but does not wait for a response)

profinet_no_frag

boolean

Flag 1 Bit 3 No fragment acknowledge requested

profinet_object_uuid

string

Object instance within a physical device

profinet_operation_num

string

Operation number identifies the PNIO service supported by the PNIO interfaces.

profinet_request_type

string

Packet Type: Request, Response, Fault, etc.

profinet_reserved_bit0

boolean

Flag 1 Bit 0 Reserved for implementation

profinet_reserved_bit7

boolean

Flag 1 Bit 7 Reserved for implementation

profinet_rpc_version

integer

Used RPC version

profinet_sel_ack

array

Array of selective ACK

profinet_sel_ack_len

integer

Selective ACK length

profinet_seq_num

integer

Used with activity_UUID to uniquely identify a RPC call.

profinet_serial_high

integer

The high octet of the fragment number of the call

profinet_serial_low

integer

The low octet of the fragment number of the call

profinet_serial_num

integer

Serial number

profinet_server_boot_time

integer

Server boot time

profinet_win_size

integer

Window size

proto

string

Transport protocol

Back to Event Fields.

QUIC fields

A quic event is generated when QUIC protocol activity—Google’s transport layer network protocol combining UDP and TLS—is detected, providing performance and security for web traffic.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field

Type

Description

quic_client_initial_dst_conn_id

string

Destination Connection ID (DCID). This DCID is used for routing and packet protection by client and server.

Example: 95412c47018cdfe8

quic_client_protocol

string

QUIC Application-Layer Protocol Negotiation (ALPN) extension. This is the extension’s first entry.

Example: h3

quic_client_src_conn_id

string

Source Connection ID chosen by the client in its INITIAL packet. This ID is used for packet protection and is typically random and unpredictable.

Example: 4823dfc5a047e6acd230b5c5e047ced9b0a6b542

quic_history

string

Provides a history of QUIC protocol activity in a connection, similar to the history field in Conn.

Example: ISisH

quic_server_src_conn_id

string

A QUIC-supported server responds to a DCID by selecting a Source Connection ID (SCID). Occurs within the server’s first INITIAL packet.

Example: 0130dfc5a047e6acd230b5c5e047ced9b0a6bbf0

quic_version

string

A string interpretation of the QUIC version number, usually “1” or “quicv2”

Example: 1

server_name_indication

ip_or_domain_enriched

An IP or domain with its enrichments

Back to Event Fields.

RDP fields

An rdp event is created when Remote Desktop Protocol sessions are observed, capturing details like client build, keyboard layout, desktop size, and security negotiation. It tracks remote Windows desktop connections.

Note

Authentication cannot always be determined as the necessary data may be encapsulated within an encrypted tunnel. Therefore, the result field may contain a "best-guess" based on available data.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

cert_count

int

The number of certificates seen

Example: 0

cert_permanent

Boolean

Indicates if the provided certificate or certificate chain is permanent

Example: True

cert_type

string

The type of certificate used if the connection is encrypted with native RDP encryption

Example: RSA

client_build

string

The client RDP version

Example: RDP 5.1

client_dig_product_id

string

The client product ID

Example: 715e03e8-6eef-4c53-b022-rbcd967

client_name

string

The client hostname

Example: bob-PC

cookie

string

The truncated account name used by the client

Example: bob

desktop_height

int

The client desktop height

Example: 1080

desktop_width

int

The client desktop width

Example: 1920

encryption_level

string

The encryption level used

Example: Client compatible

encryption_method

string

The encryption method used

Example: 128bit

keyboard_layout

string

The client keyboard layout (language)

Example: English -United States

requested_color_depth

string

The color depth requested by the client in the high_color_depth field

Example: 32bit

result

string

The result for the connection, derived from a mix of RDP negotiation failure messages and GCC server create response messages

Example: Succeed

security_protocol

string

Security protocol chosen by the server

Example: RDP

Back to Event Fields.

SMB file fields

An smb_file event is generated when files transferred over SMB/CIFS are observed, logging file-related actions like creation, modification, renaming, with metadata like paths and timestamps. This monitors file-level operations in SMB sessions.

The following table shows the fields contained in this event type excluding the previously identified common fields:.

Field Type Description

files

file-array

Files transferred over the SMB connection

Example: N/A

files.accessed_timestamp

timestamp

The last time the file was accessed

Example: 2018-04-08T22:48:07.958Z

files.bytes

int

The file's size in kilobytes

Example: 145922

files.changed_timestamp

timestamp

The last time the file's metadata changed

Example: 2018-04-08T22:48:07.958Z

files.created_timestamp

timestamp

The time the file was created

Example: 2018-04-08T22:48:07.958Z

files.modified_timestamp

timestamp

The last time the file's content changed

Example: 2018-04-08T22:48:07.958Z

files.name

string

The post-transfer name of the file (can be renamed before writing to disk)

Example: secrets.zip

files.previous_name

string

The pre-transfer name of the file

Example: exfil.zip

files.smb_path.path

string

The full network path to the target share

Example: \\DYNACCOUNTIC-DC.dynaccountic.com\sysvol

files.smb_path.share

string

The target network share

Example: sysvol

files.smb_path.system

string The target host

Example: DYNACCOUNTIC-DC.dynaccountic.com

smb_action

string

The action taken on the files

Example: SMB::FILE_OPEN

Back to Event Fields.

SMB mapping fields

An smb_mapping event is created when an SMB share is mapped, capturing tree paths, share types (disk, printer, pipe), and native file system info. It tracks resource sharing mappings over SMB.

The following table shows the fields contained in this event type excluding the previously identified common fields:.

Field Type Description

native_file_system

string

The file system type on the target host (for Disk shares)

Example: NTFS

share_type

string

The type of share established

Example: DISK

smb_path.path

string

The full network path to the target share

Example: \\DYNACCOUNTIC-DC.dynaccountic.com\sysvol

smb_path.share

string

The target network share

Example: sysvol

smb_path.system

string

The target host

Example: DYNACCOUNTIC-DC.dynaccountic.com

smb_service

string

The service used to establish a connection to the share

Example: IPC

Back to Event Fields.

SMTP fields

An smtp event is created when Simple Mail Transfer Protocol messages—such as MAIL FROM, RCPT TO, HELO/EHLO—are observed during an email session. This protocol is used to send email between servers.

The following table shows the fields contained in this event type excluding the previously identified common fields::

Field Type Description

date

string

The content of the Date header

Example: Thu, 12 Jul 2015 17:59:01 -0400 (EDT)

files

file-object-array An array of the files attached to the email

first_received

string

The full content of the first Received header

Example: from JIM@GMAIL.COM ([198.51.100.1]) by SALLY@GMAIL.COM ([101.9.210.120]) with mapi id 14.01.1039.013; Thu, 12 Jul 2015 18:09:44 -0500

from

email-object

The content of the From header

Example: jdoe@gmail.com

helo

host-object

The argument supplied to the HELO command

Example: client.example.com

in_reply_to

string

The Message-ID in the In-Reply-To header

Example: <b8bba2baae4c2a08fdff4e223458577d@gmail.com>

is_webmail

Boolean

Indicates whether the message was sent through a webmail interface

Example: true

last_reply

string

The last message the server sent to the client

Example: 250 Message accepted for delivery

mailfrom

string

The argument supplied to the MAIL FROM command

Example: support@acme.corp

msg_id

string

The Message-ID of the message

Example: <b8bba2baae4c2a08fdff4e223458577d@gmail.com>

path

ip-object-array

The message transmission path extracted from the Received headers

Example: [192.161.0.200, 204.148.78.113]

rcptto

string

The argument supplied to the RCPT TO command

Example: jdoe@gmail.com

reply_to

email-object

The content of the Reply-To header

Example: jdoe@gmail.com

second_received

string

The content of the second Received header

Example: from JIM@GMAIL.COM ([198.51.100.1]) by SALLY@GMAIL.COM ([101.9.210.120]) with mapi id 14.01.1039.013; Thu, 12 Jul 2015 18:09:44 -0500

subject

string

The content of the Subject header

Example: Click this link!

tls

Boolean

Indicates whether the connection switched to using TLS

Example: true

to

email-object-array

The content of the To header

Example: [jdoe@gmail.com, kdoe@gmail.com]

trans_depth

int

The depth of this message transaction where multiple messages were transferred in a single connection

Example: 1

urls

string-array

A list of URLs extracted from the message

Example: [http://malware.pwn//root.ps1, https://www.google.com]

user_agent

string

The content of the client's User-Agent header

Example: SquirrelMail/1.4.22

x_originating_ip

ip-object

The content of the X-Originating-IP header

Example: 8.8.8.8

Back to Event Fields.

SNMP fields

An snmp event is created when Simple Network Management Protocol messages—used for monitoring and managing network devices—are detected, including version, community string, and request types. It supports network device telemetry.

The following table shows the fields contained in this event type excluding the previously identified common fields::

Field

Type

Description

snmp_community

string

Community string of the first packet associated with the session

Example: public

snmp_display_string

string

A system description of the SNMP responder endpoint

Example: Roma v1.9 v9.5.0_W EQ

snmp_duration

number

Amount of time between the first in the session and the latest one seen in seconds

Example: 12.209241

snmp_get_bulk_requests

integer

Number of variable bindings in GetBulkRequest PDUs seen for the session

Example: 3

snmp_get_requests

integer

Number of variable bindings in GetRequest/GetNextRequest PDUs seen for the session

Example: 7

snmp_get_responses

integer

Number of variable bindings in GetResponse/Response PDUs seen for the session

Example: 2

snmp_set_requests

integer

number of variable bindings in SetRequest PDUs seen for the session

Example: 10

snmp_up_since

string

Time at which the SNMP responder endpoint claims it’s been up since

Example: 2024-09-19T00:00:49.536262Z

snmp_version

string

Version of the protocol being used

Example: 2c

Back to Event Fields.

Software fields

A software event is generated when software metadata—such as client or server software versions—is detected via protocol-specific exchanges (e.g. DHCP client, HTTP user-agent).

Note

Software events do not have a src or dst column like all other event types because they only refer to behavior observed from one host and not the underlying connection.

The following table shows the fields contained in this event type excluding the previously identified common fields::

Field Type Description

host

ip-object

The host from which the software was observed

Example: 10.0.0.10

software_name

string

The name of the observed software

Example: Wget

software_type

string

The category of the observed software

Example: HTTP::BROWSER

software_version.additional

string

Arbitrary notes about the software

Example: linux-gnu

software_version.major

int

The major version number

Example: 1

software_version.minor

int

The first minor version number

Example: 19

software_version.minor2

int

The second minor version number

Example: 1

software_version.minor3

int

The third minor version number

Example: 0

software_version.version

string

The full version string

Example: Wget/1.19.1 (linux-gnu)

software_version.version_number

string

The full version number

Example: 1.19.1

Back to Event Fields.

SSH fields

An ssh event is created when SSH connection metadata or authentication results—like client/server version strings or auth success/failure—are captured. SSH provides secure remote shell and file transfer capabilities.

Note

Authentication cannot be accurately determined because the necessary data is encapsulated within the encrypted tunnel. Therefore, the auth_success field contains a "best-guess" based on available data.

The following table shows the fields contained in this event type excluding the previously identified common fields::

Field Type Description

auth_success

Boolean

The inferred authentication result

Example: True

cipher_alg

string

The encryption algorithm used

Example: aes128-ctr

client

string

The client version string

Example: SSH-2.0-OpenSSH_7.6

compression_alg

string

The compression algorithm used

Example: none

direction

string

The direction of the connection, Outbound if the client was a local host logging into an external host and Inbound in the opposite situation

Example: Inbound

hassh

string

Network fingerprinting which can be used to identify specific Client and Server SSH implementations.

Example: 98ddc5604ef6a1006a2b49a58759fbe6

hassh_server

string

Network fingerprinting which can be used to identify specific Server SSH implementations.

Example: cd77a550c195f0e4ea637e367fa499e8

host_key

string

The server fingerprint

Example: a1:a2:79:80:6d:b1:77:82:d8:6c:aa:ee:25:19:23:42

host_key_alg

string

The server's key algorithm.

Example: ssh-rsa

kex_alg

string

The key exchange algorithm used

Example: ecdh-sha2-nistp256

mac_alg

string

The signing (MAC) algorithm used

Example: hmac-sha1

server

string

The server version string

Example: SSH-2.0-OpenSSH_7.4

ssh_version

int

The SSH major version (1 or 2)

Example: 2

Back to Event Fields.

SSL fields

An ssl event is generated when secure session negotiations are observed, logging details like cipher suite, certificate chain, server name, and session resume status. It provides insight about encrypted communications by parsing and logging the connection's metadata.

The following table shows the fields contained in this event type excluding the previously identified common fields::

Field Type Description

cipher

string

The cipher suite selected by the server

Example: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256

client_issuer

string

The Issuer field of the client's certificate

Example: CN=Google Internet Authority G2,O=Google Inc,C=US

client_subject

string

The Subject field of the client's certificate

Example: CN=*.google.com,O=Google Inc

issuer

string

The Issuer field of the server's certificate

Example: CN=Google Internet Authority G2,O=Google Inc,C=US

ja3

string

The computed JA3 hash for the client

Example: 4d7a28d6f2263ed61de88ca66eb011e3

ja3s

string

The computed JA3 hash of the server

Example: 4d7a28d6f2263ed61de88ca66eb011e3

ja4

string

The computed JA4 hash for the client hello packet

Example: t13d1516h2_acb858a92679_e5627efa2ab1

server_name_indication

domain-object

The enriched Server Name Indication set by the client

Example: www.google.com

session_id

string

The ID used for session resumption (deprecated)

Example: N/A

subject

string

The Subject field of the server's certificate

Example: CN=*.google.com,O=Google Inc

validation_status

string

Result of certificate validation for this connection (deprecated)

Example: Success

version

string

The SSL/TLS version being used (period omitted)

Example: TLSv10

Back to Event Fields.

Suricata fields

A suricata event is created when Suricata (an intrusion detection tool) alerts or metadata are integrated into Zeek logs, highlighting threat detection signatures and behaviors.

Note

Suricata runs independently from the metadata extraction process, and thus is not tied to flow events with a flow_id even though both a suricata and flow event will exist for the traffic. Additionally, directionality is not maintained by Suricata, so the src.ip and dst.ip fields for a suricata event may be reversed from the related flow.

The following table shows the fields contained in this event type excluding the previously identified common fields::

Field Type Description
community_id

string

An additional flow identifier for joining Suricata and Conn events.

payload byte-array

Payloads are generated by the sensor’s IDS engine. This field displays the raw payload from traffic that matched a detection signature. This ASCII representation helps you determine whether the traffic is malicious or benign.

Payloads are disabled by default due to the potential exposure of sensitive or personally identifiable information (PII). When enabled, you can click the field to view the payload in FortiNDR Cloud.

Payloads can be enabled upon request through Fortinet Support.

proto string

The transport layer protocol used.

Example: tcp

sig_category string

The query's category.

Example: A Network Trojan was Detected

sig_id int

The query's ID.

Example: 2024290

sig_name string

The query's name.

Example: ET TROJAN Jaff Ransomware Checkin M1

sig_rev float

The query's revision number.

Example: 2

sig_severity int

The query's severity rating (1 = high, 3 = low)

Example: 1

Back to Event Fields.

Tunnel fields

A tunnel event is generated when tunneled sessions—such as VPN, SSH tunnels, or other encapsulations—are detected, noting tunnel types and actions. This event helps trace encapsulated traffic flows.

The following table shows the fields contained in this event type excluding the previously identified common fields::

Field Type Description

tunnel_action

string

The action taken on the tunnel

Example: Tunnel::DISCOVER

tunnel_type

string

The protocol/application running over the tunnel

Example: Tunnel::HTTP

Back to Event Fields.

VPC Flow fields

A VPC Flow fields event occurs when raw VPC Flow Log data is parsed and its individual fields are extracted and normalized into a structured event. These events are only visible when the VPC feature is enabled. To enable it, contact your TSM or Customer Support.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

proto

string

Protocol used in the traffic.

Example: TCP

switched

boolean

If the source and destination IPs are switched due to port values.

Example: false

tag

string The type of event. Example: flow

total_ip_bytes

integer The number of bytes transferred during the flow. Example: 76

vpc_account_id

string

AWS account ID owning the source network interface.

Example: 123456789101

vpc_action

string

The action associated with the traffic.

Example: ACCEPT

vpc_availability_zone

string

Availability Zone ID of the network interface.

Example: usw2-az1

vpc_dst_ip

null or ip_enriched object The preserved original dstaddr field when dst.ip was overridden with pkt-dstaddr.

vpc_end_timestamp

string

The time when the last packet was received in the aggregation interval.

Example: 2019-01-01T00:00:00.000000Z

vpc_flow_direction

string

The direction of the flow relative to the interface.

Example: ingress

vpc_id

string

ID of the VPC containing the network interface.

Example: vpc-123f7d9bb71e45e11

vpc_instance_id

string

ID of the associated instance.

Example: i-123b3953f10184bde

vpc_interface_id

string

ID of the network interface.

Example: eni-0ff7168c44159f431

vpc_ip_version

string

Type of traffic IP version.

Example: IPv4

vpc_log_status

string

Logging status of the flow log.

Example: OK

vpc_pkt_dst_ip

null or ip_enriched object

Packet-level original destination IP address.

Example: 10.1.0.1

vpc_pkt_dst_subnet_name

string

Subnet name for packet destination IP.

Example: AMAZON

vpc_pkt_src_ip

null or ip_enriched object

Packet-level original source IP address.

Example: 10.1.0.2

vpc_pkt_src_subnet_name

string

Subnet name for packet source IP.

Example: S3

vpc_proto

integer

IANA protocol number of the traffic.

Example: 6

vpc_region

string

AWS region containing the network interface.

Example: us-west-2

vpc_reject_reason

string

Reason the traffic was rejected.

Example: BPA

vpc_src_ip

null or ip_enriched object The preserved original srcaddr field when src.ip was overridden with pkt-srcaddr

vpc_subnet_id

string

ID of the subnet containing the interface.

Example: subnet-12356986a7885a583

vpc_tcp_flags

integer

Bitmask value for TCP flags.

Example: 2

vpc_total_pkts

integer

Number of packets transferred during the flow.

Example: 1

vpc_version

integer

VPC Flow Logs version.

Example: 8

x509 fields

An x509 event is created when X.509 certificates exchanged in TLS/SSL sessions are parsed and logged, capturing certificate metadata, fingerprints, extensions, and alternate names.

The following table shows the fields contained in this event type excluding the previously identified common fields::

Field Type Description

ca_constraints

Boolean

Indicates whether the CA flag is set

Example: False

ca_constraints_len

int

The maximum path length

Example: 10

cert_id

string

The file ID of the certificate

Example: FNbDqq2ZxjNk10D7ie

issuer

string

The content of the Issuer field

Example: O=Internet Widgits Pty Ltd,ST=Some-State,C=AU

key_len

int

The length of the key

Example: 2048

key_type

string

The type of key used

Example: rsa

san_dns

host-array

The list of DNS entries in the SAN

Example: [*.outlook.com, *.office365.com]

san_email

email-array

The list of email entries in the SAN

Example: [dave@email.corp]

san_ip

ip-array

The list of IP entries in the SAN

Example: [169.254.1.1]

san_uri

uri-array

The list of URI entries in the SAN

Example: [https://169.254.1.1]

serial

string

The serial number of the certificate

Example: E3BD4F4F884EADDA

subject

string

The content of the Subject field

Example: O=Internet Widgits Pty Ltd,ST=Some-State,C=AU

valid_end

timestamp

The time before the certificate became valid

Example: 2018-01-11T14:35:34.000Z

valid_start

timestamp

The time once the certificate becomes invalid

Example: 2018-01-11T14:35:34.000Z

version

string

The X.509 version

Example: 3

Back to Event Fields.

Event fields

Event fields

The following topics describe the fields unique to each event type.

Back to Event Fields.

BACnet Device control fields

A BACnet device control event occurs when BACnet messages like Reinitialize-Device or Device-Communication-Control are detected. These events log administrative actions that affect device availability and behavior.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Property

Type

Description

bacnet_device_ctrl_ignore_time

integer

Time in minutes that the device should obey the control command; e.g., in Device-Communication-Control, how long the device is to suppress or enable communications per the request.

Example: 5

bacnet_device_ctrl_invoke_id

integer

Unique identifier used to correlate a confirmed APDU request (such as Device-Communication-Control or Reinitialize-Device) with its acknowledgment or response.

Example: 1

bacnet_device_ctrl_pdu

string

The specific BACnet APDU service invoked for device control (e.g., “ReinitializeDevice” or “DeviceCommunicationControl”).

Example: reinitialize_device

bacnet_device_ctrl_pwd_hash

string

The SHA-256 hash of the password supplied in the Device-Communication-Control or Reinitialize-Device request if required by the device for authentication or to execute the control command.

Example: ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad

bacnet_device_ctrl_result

string

Outcome of the control operation: one of Success, Error, Reject, or Abort.

Example: ERROR

bacnet_device_ctrl_result_code

string

If the result was Error, Reject, or Abort, this is the specific error/reject/abort code returned by the device; otherwise often “OK” or similar success-indicator.

Example:

bacnet_device_ctrl_state

string

The state to which the device is being set by the control service (for instance, the state in Reinitialize-Device such as “coldstart”, “warmstart”, etc.).

Example: coldstart

is_orig

boolean

True if the message is sent from the originator.

Example: true

Back to Event Fields.

BACnet Discovery fields

A BACnet discovery event is created when Who-Is/I-Am/Who-Has/I-Have messages are observed, recording device/object identifiers and vendor information for rapid inventory. This log focuses on unconfirmed services used for discovery.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Property

Type

Description

bacnet_discovery_id

integer

Numerical part of the device’s identifier (the instance number) used in discovery to uniquely address the device on the network.

Example: 1

bacnet_discovery_instance_num

integer

The instance number of the object being discovered, combined with object_type to uniquely identify that object within the device.

Example: 930101

bacnet_discovery_object_name

string

The name property of the object discovered (Object_Name BACnet property), e.g. a human-readable name for the device or object as configured on the BACnet device.

Example: FLR12_DEMAND

bacnet_discovery_object_type

string

The type of BACnet object that is announced/discovered in the discovery process (for example, Device, Analog-Input, Binary-Output, etc.).

Example: device

bacnet_discovery_pdu

string

The specific BACnet discovery service in use (for example, “Who-Is” or “I-Am”)

Example: who-is

bacnet_discovery_range

string

The “Who-Is” discovery range that was used (e.g. “0-4194303”) indicating lower and upper limits of device instance numbers requested to announce themselves; helps scope discovery messages.

Example: 1944802-1944802

bacnet_discovery_type

string

Type of identifier used to represent the device’s identity (often the “Device” object identifier or its subtype)

Example:

bacnet_discovery_vendor

string

The vendor identifier or vendor name of the device responding to the discovery, per the BACnet Vendor ID registry.

Example: Schneider Electric

is_orig

boolean

True if the message is sent from the originator.

Example: true

Back to Event Fields.

BACnet Property fields

A BACnet property event is created when Read-Property-Request, Read-Property-ACK, or Write-Property-Request messages are observed, capturing object type, instance number, property identifier, array index, and value. This log focuses on confirmed services used for reading and writing properties.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Property

Type

Description

bacnet_property_index

integer

If the property is an array, this is the index of the element being accessed; if omitted or zero, it often means the whole array or default behavior per spec.

Example: 1

bacnet_property_instance_num

integer

The instance number of the object within the device.

Example: 111

bacnet_property_invoke_id

integer

The unique identifier used to correlate confirmed APDU property requests (Read-Property or Write-Property) with their acknowledgments in BACnet traffic.

Example: 232

bacnet_property_object_type

string

The type of BACnet object (e.g. Analog Input, Binary Output, Device, etc.) whose property is being accessed or modified.

Example: device

bacnet_property_pdu

string

The specific BACnet APDU service invoked for device control (e.g. “ReinitializeDevice” or “DeviceCommunicationControl”))

Example: read-property-ack

bacnet_property_type

string

The property identifier within the object (e.g. Present_Value, Status_Flags, Description, etc.) being read or written.

Example: object-list

bacnet_property_value

string

The value of the property (for Read-Property-ACK or Write-Property-Request) as represented in the BACnet message; could be numerical, enumeration, string, etc.

Example: device: 111

is_orig

boolean

True if the message is sent from the originator.

Example: false

Back to Event Fields.

BACnet header fields

A BACnet header event is created when any BACnet/IP packet is seen; the log captures header information for both APDU and NPDU messages. BACnet is a building automation/control protocol used for device discovery, property access, and supervisory functions.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Property

Type

Description

bacnet_bvlc_func

string

The BVLC (BACnet Virtual Link Control) function for this BACnet/IP packet (identifies how the packet is being used, e.g. Original-Unicast-NPDU, Forwarded-NPDU, etc.)

Example: BVLC_Result

bacnet_invoke_id

integer

The unique identifier (invoke ID) used to track Confirmed APDU/NPDU requests and their acknowledgements/responses.

Example: 215

bacnet_pdu_service

string

The Bacnet service (which service is being invoked or replied to, e.g. ReadProperty, WriteProperty, WhoIs, etc.)

Example: read_property

bacnet_pdu_type

string

The Bacnet service type (the APDU PDU type, e.g. Confirmed-Request, Unconfirmed-Request, Simple-ACK, Error, etc.)

Example: CONFIRMED_REQUEST

bacnet_result_code

string

The Error/reject/abort code or reason if the APDU is an Error, Reject, or Abort. This field is not applicable for NPDU context, it will be null.

Example: Successful_completion

is_orig

boolean

True if the packet is sent from the originator.

DCE RPC fields

A dce_rpc event is created when a Distributed Computing Environment / Remote Procedure Call message is observed over a connection, capturing RPC operations like bind, request, or response. This protocol enables clients to execute procedures on remote servers.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

dce_rpc_endpoint

string

The remote service targeted by the command

Example: samr

dce_rpc_operation

string

The command submitted to the remote service

Example: SamrOpenDomain

named_pipe

string

The name of the target pipe (or the destination port if not named

Example: \pipe\lsass

round_trip_time

float

The time in seconds between command execution and results returned

Example: 0.01

Back to Event Fields.

DHCP fields

A dhcp event is created when a Dynamic Host C onfiguration Protocol exchange occurs, such as a client requesting or receiving network addressing from a DHCP server. This protocol is used to dynamically assign IP addresses and other network configuration settings.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

assignment

ip-object

The IP assigned to the client

Example: 10.0.0.10

dhcp_msg_type

string

Shows whether a lease is being requested or acknowledged

Example: Request

hostname

string

The client hostname

Example: bob-pc

lease_duration

float

Number of seconds that the lease is valid

Example: 1800

lease_end

timestamp

The time at which the lease expires

Example: 2019-06-24T07:31:35.012Z

mac

string

The client MAC address

Example:

trans_id

int

The transaction ID, ties together requests and acknowledgments.

Example: 1191705957

Back to Event Fields.

DNP3 fields

A dnp3 event is created when DNP3 (Distributed Network Protocol), commonly used in industrial control systems, logs requests or replies. The protocol enables master-to-outstation communication for monitoring and control.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field

Type

Description

dnp3_function_reply

string

The name of the function message in the reply.

Example: RESPONSE

dnp3_function_request

string

The name of the function message in the request.

Example: CONFIRM

dnp3_indication_number

integer

The response's "internal indication number".

Example: 0

Back to Event Fields.

DNP3 3 Control fields

A dnp3_control event is generated when DNP3 control messages—specialized commands for remote control or configuration are observed. It supports supervisory control operations in DNP3 networks.

The following table shows fields unique to the dnp3_control event type:

Field

Type

Description

dnp3_function_code

string

Function code (READ or RESPONSE)

Example: RESPONSE

dnp3_object_count

integer

DNP3 object type

Example: 32-Bit Binary Counter

dnp3_object_type

string

DNP3 object type

Example: 32-Bit Binary Counter

dnp3_range_high

integer

Range (high) of object

Example: 9

dnp3_range_low

integer

Range (low) of object

Example: 0

is_orig

boolean

True if the packet is sent from the originator

Example: true

DNP3 Object fields

A dnp3_object event is generated when DNP3 object-level constructs (such as analog or binary inputs/outputs) are seen in the traffic, facilitating insight into SCADA-style data models. It reflects structured data exchanged via DNP3.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field

Type

Description

dnp3_function_code

string

Function code (READ or RESPONSE)

Example: RESPONSE

dnp3_object_count

integer

DNP3 object type

Example: 32-Bit Binary Counter

dnp3_object_type

string

DNP3 object type

Example: 32-Bit Binary Counter

dnp3_range_high

integer

Range (high) of object

Example: 9

dnp3_range_low

integer

Range (low) of object

Example: 0

is_orig

boolean

True if the packet is sent from the originator

Example: true

Back to Event Fields.

DNS fields

A dns event is created when a Domain Name System query or response message is captured over the network. DNS enables the resolution of human-friendly domain names to IP addresses.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

answers

host-object-array

The answers returned by the DNS server for the query

Example: [103.2.116.79, 103.2.116.83]

proto

string

The transport layer protocol used

Example: udp

qtype

int

The numeric code of the query type

Example: 1

qtype_name

string

The string name of the query type

Example: A

query

domain-object

The domain being queried

Example: www.google.com

rcode

int

The numeric code of the result

Example: 0

rcode_name

int

The string name of the result

Example: NOERROR

rejected

Boolean

Indicates whether the query was rejected by the server

Example: false

ttls

int-array

An array of TTL values, one per result

Example: [299, 299]

Back to Event Fields.

DPI fields

A dpi (Deep Packet Inspection) event is created by the Fortinet IPS (Intrusion Prevention System) engine running on the sensor which logs informative and pattern matching based events. The IPS engine logs AppID (Applications seen by the engine for software and protocols), IDS (signatures for vulnerabilities), OT Protocols/Threats (Operational Technology based protocol parsing and signatures), Botnet (Botnet based traffic patterns), and Info (informational events about protocols).

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Name Type Description

dpi_alert_category

string

Type of category of the IPS signature.

  • Info: IDS with informational severity
  • AppID: Application control
  • IDS: Intrusion Detection
  • Botnet: IDS's botnet specific signature
  • OT - Threats: IDS for Operational Technology
  • OT - Protocol: AppCtrl for Operational Technology

Example:IDS

dpi_alert_severity

integer

Severity of the triggered IPS signature.

  • Info: 0
  • Low: 1
  • Medium: 2
  • High: 3
  • Critical: 4

Example:0

dpi_alert_signature

string

The triggered IPS signature name.

Example:ITCM.Class.D_Wayside.Status.Message.WIUStatus.Timed.Beacon

dpi_alert_signature_id

integer

Attack ID or ID of the IPS signature.

Example:12343

dpi_app_behavior

array

Possible behavior for the application in which the triggered IPS signature refers to.

Example:Evasive

dpi_app_category

string

The application category for the triggered IPS signature, if there is any.

Example:Operational.Technology

dpi_app_language

string

Language used in the application in which the triggered IPS signature refers to.

Example:N/A

dpi_app_name

array

Name of the application.

Example:Other

dpi_app_os

array

OS of the application or vulnerable system/devices.

Example:All

dpi_app_technology

array

Technology group or type for the application in which the triggered IPS signature refers to.

Example:Client-Server

dpi_app_vendor

string

Vendor of the application in which the triggered IPS signature refers to.

Example:Other

dpi_expected_port

string

Default port and protocol for the application in which the triggered IPS signature is referring to.

Example:UDP/1900

dpi_parent_vuln_id

integer

ID of the IPS signature that link to the triggered IPS signature.

Example:56843

dpi_rulegroup

string

Which group the triggered IPS signature belongs to.

Example:SCADA

dpi_ruleset_rev

integer

Version number for the triggered IPS signature.

Example:13401

dpi_session_id

integer

Session ID for the traffic.

Example:0

dpi_sig_cve

array

ID for the CVE reference.

Example:20050380

dpi_ssl_decrypt_req

boolean

Does the current IPS signature need SSL decryption to work.

Example:False

dpi_vuln_id

integer

Vulnerablity ID or Applicatioin ID for the IPS signature (Note: One VID could contain multiple AID).

Example:33456

dpi_vuln_type

string

Type of vulnerability this IPS signature is related to.

Example:Other

Note

The common field of flow_id is not included in the dpi events.

Back to Event Fields.

Flow fields

A flow event is created when a unidirectional or bidirectional network flow is identified, summarizing traffic between endpoints over time, such as packet count, byte count, and states. A network flow is defined by a unique combination of src.ip, src.port, dst.ip, dst.port, and proto.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

community_id

string

An additional flow identifier for joining Flow events.

Example: 1:f69i+MdCEA8QnAKnKVE0Pyyta24=

duration

float

The number of seconds the flow lasted

Example: 7s

flow_state

string

Lifecycle summary of the connection observed for this flow. Includes standard Zeek/Bro connection states and periodic P* states.

Example: SF

Supported values:

flow_state Description

S0

Connection attempt seen, no reply.

S1

Connection established, not terminated.

SF

Normal establishment and termination.

REJ

Connection attempt rejected.

S2

Connection established and close attempt by originator seen (but no reply from responder).

S3

Connection established and close attempt by responder seen (but no reply from originator).

RSTO

Connection established, originator aborted (sent a RST).

RSTR

Responder sent a RST.

RSTOS0

Originator sent a SYN followed by a RST, we never saw a SYN-ACK from the responder.

RSTRH

Responder sent a SYN ACK followed by a RST, we never saw a SYN from the (purported) originator.

SH

Originator sent a SYN followed by a FIN, we never saw a SYN ACK from the responder (hence the connection was “half” open).

SHR

Responder sent a SYN ACK followed by a FIN, we never saw a SYN from the originator.

OTH

No SYN seen, just midstream traffic (a “partial connection” that was not later closed).
Note

Additionally, FortiNDR Cloud logs P* flow states. These states are logged for long‑lived connections once every 24 hours, with the flow_state reflecting the current state of the TCP/UDP state machine. The byte totals logged are cumulative since connection start, rather than incremental since the previous log entry.

In practice, this typically results in PS0 (one‑sided connection, retry under the 5‑minute timeout), PS1 (two‑sided connection where the start was observed), and POTH (the start of the connection was not observed).

proto

string

The transport layer protocol used

Example: tcp

service

string

The application(s) observed in the flow, if any

Example: http

total_ip_bytes

int

The total combined bytes transmitted over the connection

Example: 927 bytes

total_pkts

int

The total combined packets transmitted over the connection

Example: 11

upload_percent

int

The percentage of bytes transmitted by the src for the flow (56% == 56)

Example: 56%

Back to Event Fields.

FTP fields

An ftp event is created when File Transfer Protocol commands or responses are observed during an FTP session. This protocol is used for transferring files between client and server.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

data_channel.dst

ip-object

The destination of the data channel

Example: 10.0.0.2

data_channel.geo_distance

float

The distance (in miles) between the IP addresses of the data channel

Example: 5077.89

data_channel.passive

Boolean

Indicates whether the session is in passive mode

Example: True

data_channel.src

ip-object

The source of the data channel

Example: 10.0.0.10

files

file-array

Files transferred over the session

Example: N/A

ftp_arg

string

The full argument string supplied to the command

Example: ftp://10.0.0.2/secrets.zip

ftp_command

string

The client command

Example:RETR

reply_code

int

The server response code to the command

Example: 227

reply_msg

string

The server response string to the command

Example: Entering Passive Mode (10,0,0,2,197,36)

username

string

The username used to establish the connection

Example: Admin101

Back to Event Fields.

HTTP fields

An http event is created when HTTP requests or responses—including headers and message boundaries are processed over HTTP connections. HTTP is the foundational protocol for web communications.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

cookie_vars

string-array

Variable names extracted from all cookies.

Example: disp.prefs,_utmz ,_utmc,_utma, TS01f95106, _utmb

files

file-object-array

Files downloaded over the HTTP connection

headers.accept

string-array

The content of the Accept header

Example: [image/webp, image/apng, image/*, */*;q=0.8]

headers.client_header_names

string-array

The vector of HTTP header names sent by the client.

Example: Cache-Control, Connection, Pragma, Content-Type, User-Agent, X-Havoc, X-Havoc-Agent, Content-Length, Host

headers.content_md5

string

The computed MD5 hash of the headers content

Example: d41d8cd98f00b204e9800998ecf8427e

headers.content_type

string-array

The contents of the Content Type header

Example: [text/xml; charset="utf-8"]

headers.cookie_length

int

The length of the cookie in bytes

Example: 194

headers.location

url-object

The content of the Location header

Example: http://amupdatedl3.microsoft.com/server/amupdate/metadata/UniversalManifest.cab

headers.origin

url-object

The content of the Origin header

Example: http://go.com

headers.proxied_ip_clients

ip-object-array

The sequence of IPs the HTTP connection is proxied through

Example: [172.16.0.1, 172.16.0.2]

headers.refresh.refresh

string

The full content of the Refresh header

Example: 1;URL=http://travelingtravelerhome.wordpress.com/

headers.refresh.timeout

int

The timeout period in seconds

Example: 1

headers.refresh.uri

uri-object

The URI of the Refresh header

Example: http://travelingtravelerhome.wordpress.com/

headers.server

string

The web server software

Example: Microsoft-IIS/6.0

headers.server_header_names

string-array

The vector of HTTP header names sent by the server.

Example: VIA, DATE SERVER, CONNECTION, X-2SENDPT1, X-WSENDPT2, CONTENT-LENGTH

headers.x_powered_by

string

The application software running on the server

Example: ASP.NET

host

host-object

The content Host header

Example: www.google.com

info_msg

string

The message returned with a 100-level response code

Example: Continue

method

string

The HTTP method selected

Example: GET

proxied

string-array

A list of proxy steps

Example: PROXY-CONNECTION -> Keep-Alive

referrer

url-object

The content of the Referrer header

Example: http://au.search.yahoo.com/search?p=planetside.co.uk&fr=sfp&fr2=sb-top-search

request_len

int

The length in bytes of the request

Example: 0

request_mimes

string-array

The fingerprinted MIME-type(s) of the request content, use instead of request_mime

Example: text/plain

response_len

int

The length in bytes of the response

Example: 24

response_mimes

string-array

The fingerprinted MIME-type of the response content, use instead of response_mime

Example: text/html

status_code

int

The numeric code of the server's response

Example: 200

status_msg

string

The string name of the server's response

Example: OK

trans_depth

int

The depth of redirects

Example: 4

uri

uri-object

The full URI of the request

Example:/index.php

user_agent

string

The content of the UserAgent header

Example: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

username

string

The username used with Basic Auth, if any

Example: dave

Back to Event Fields.

Kerberos fields

A kerberos event is generated when Kerberos authentication messages (e.g., AS or TGS requests/replies) are detected. Kerberos is a network authentication protocol that uses tickets to allow nodes to prove their identity.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

cipher

string

The cipher suite used to encrypt the ticket

Example: aes256-cts-hmac-sha1-96

client

string

The client that requested the ticket; machine accounts have a $ at the end of their name but user accounts do not.

Example: jane.doe/ACME.CORP, financewks008$/ACME.CORP

client_cert_fuid

string

Client certificate file unique ID

Example: Xbtku3TdsfdsdfasdfA8VNsk

client_cert_subject

string

Client certificate Subject field

Example: CN=C865433

error_msg

string

The error message returned for failed requests

Example: KDC_ERR_CLIENT_NAME_MISMATCH

forwardable

Boolean

Indicates whether the ticket's forwardable flag is set

Example: True

renewable

Boolean

Indicates whether the ticket's renewable flag is set

Example: True

request_type

string

The type of ticket requested, either a ticket-granting ticket from the authentication server (AS) or a service ticket from the ticket-granting server (TGS)

Example: AS, TGS

server_cert_fuid

string

Server certificate file unique ID

Example: FvAdJGsjeXuhSvE9m

server_cert_subject

string

Server certificate Subject field

Example: CN=dc09.google.com

service

string

The service for which a ticket is being requested

Example: krbtgt/ACME.CORP

success

Boolean

Indicates whether the request was successful

Example: True

ticket_duration

float

The ticket duration in seconds

Example: 86400

ticket_from

timestamp

Time the ticket is good from

Example: 2015-09-13T02:48:05.000Z

ticket_till

timestamp

Time the ticket is good until

Example: 2037-09-13T02:48:05.000Z

Back to Event Fields.

LDAP fields

An ldap event is generated when LDAP (Lightweight Directory Access Protocol) messages—such as authentication, search, or directory operations—are observed. This protocol provides directory services, like querying user or organizational data.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Note

This event type is supported in Sensor version 2.2.0 and later.

The following table shows fields unique to the ldap event type:

Field Type Description

ldap_argument

string

Additional arguments this message includes.

Example: REDACTED

ldap_diagnostic_message

string Diagnostic message if the LDAP message contains a result.

ldap_message_id

integer

The unique identifier that is used to correlate requests and responses.

Example: 2

ldap_object

string

The objects names this message refers to.

Example: ATRLAB\\Administrator

ldap_opcode

string

The operation code indicating what type of message it is.

Example: bind, simple

ldap_result

string

The result code if the message contains a result.

Example: success

ldap_version

integer

LDAP version.

Example: 3

Back to Event Fields.

LDAP Search fields

A ldap_search event is created when a client performs an LDAP search operation.

Note

This event type is supported in Sensor version 2.2.0 and later.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

ldap_diagnostic_message

string Diagnostic message if the LDAP message contains a result.

ldap_message_id

integer

The unique identifier that is used to correlate requests and responses.

Example: 2

ldap_result

string

Result code of search operation.

Example: success

ldap_search_attribute

string

A list of attributes that were returned in the search.

Example: 2

ldap_search_base_object

string

Base search objects.

Example: 2

ldap_search_deref_aliases

string

Set of deref alias.

Example: 2

ldap_search_filter

string

A string representation of the search filter used in the query.

Example: 2

ldap_search_result_count

integer

Number of results returned.

Example: 2

ldap_search_scope

string

Set of search scopes.

Example: 2

source

string

The source of the event.

Example: Zeek

Back to Event Fields.

Modbus fields

A modbus event is created when Modbus protocol commands or responses—typically used in industrial automation systems—are captured. This allows reading or writing of registers or coil values in connected devices.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field

Type

Description

is_orig

boolean

Example: true

modbus_address

integer

Starting address of value(s) field.

modbus_function

string

The name of the function message that was sent.

Example: READ_INPUT_REGISTERS

modbus_quantity

integer

Number of addresses/values read or written to.

modbus_request_response

string

REQUEST or RESPONSE

modbus_tid

integer

Modbus transaction identifier

modbus_unit

integer

Modbus terminal unit identifier.

modbus_values

string[]

Value(s) of coils, discrete_inputs, or registers read/written to.

Example: 555,0,100

Back to Event Fields.

Netflow fields

A netflow event is created when IP traffic flow data—typically collected by routers or switches—is captured and exported for analysis. This allows visibility into network usage patterns, including source and destination IPs, protocols, ports, and byte counts.

Note
  • A NetFlow annual subscription license is required for FortiNDR Cloud to ingest third-party logs for anomaly detection.
  • Only NetFlow-based botnet detections are currently displayed. Detections for spam, phishing, Tor, and proxy traffic are available at this time. Additionally, an IOC (Indicator of Compromise) risk score may not be shown for every IP address.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field

Type

Description

netflow_bytes

integer

Number of bytes in a flow.

Example: 106

netflow_dst_net

string

Destination network address associated with a particular network flow with the mask.

Example: 0.0.0.0/0

netflow_dst_vlan

integer

Virtual LAN identifier associated with egress interface.

Example: 0

netflow_etype

string

Ethernet type (0x0800 for IPv4). Entire list is here: https://en.wikipedia.org/wiki/EtherType

Example: IPv4

netflow_forwarding_status

integer Forwarding status is encoded on 1 byte with the 2 left bits giving the status and the 6 remaining bits giving the reason code.Status is either unknown (00), Forwarded (10), Dropped (10) or Consumed (11). Example: 0

netflow_frag_id

integer

The fragment ID.

Example: 19093

netflow_frag_offset

integer

The fragment-offset value from fragmented IP packets.

Example: 0

netflow_icmp_code

integer

Code of the ICMP message.

Example: 0

netflow_icmp_type

integer

ICMP flags

Example: 0

netflow_input_interface

integer

Input interface.

Example: 512

netflow_ip_flags

integer

IP flags

Example: 0

netflow_ip_tos

integer

IP Type of Service.

Example: 0

netflow_ip_ttl

integer

TTL value observed for packets of the flow.

Example: 64

netflow_ipv6_flow_label

integer

IPv6 flow label as in RFC 2460 definition.

Example: 0

netflow_layer_size

array

Size of protocols seen in the flow.

Example: [14, 4, 20, 8]

netflow_layer_stack

array

Protocols seen in this flow.

Example: [Ethernet, MPLS, IPv4, ICMP]

netflow_output_interface

integer

Output interface.

Example: 0

netflow_sampled

integer

Denominator of how frequently data is collected. Meaning a sampling rate of 100 means one out of every 100 packets is sampled. Helps reduce the load on network devices and collectors by only exporting a portion of the traffic.

Example: 1

netflow_sampler_address

string

The IP address of the network device (typically a router) that is performing packet sampling and exporting NetFlow data.

Example: 169.254.0.2

netflow_seq_num

integer A cumulative counter that increments with each exported datagram to detect and account for any missing or dropped NetFlow datagrams. Example: 766

netflow_source

string

Type of netflow

Example: IPFIX

netflow_src_net

string

Source network address associated with a particular network flow with the mask.

Example: 0.0.0.0/0

netflow_src_vlan

integer

Virtual LAN identifier associated with ingress interface.

Example: 0

netflow_tcp_flags

integer

TCP flags

Example: 0

netflow_timestamp_end

string Time the flow ended in nanoseconds.

netflow_timestamp_received

string Timestamp in nanoseconds when the flow message was received by the NetFlow collector or analysis system.

netflow_vlan_id

integer

Allows you to associate network traffic flows with their respective VLANs.

Example: 0

proto

string

Protocol used in the traffic.

Example: TCP

tag

string

The type of event

Example: flow

total_pkts

integer

Number of packets in a flow.

Example: 1

dst.ip_bytes

integer

The number of bytes transmitted by the IP address

dst.pkts

integer

The number of packets transmitted by the IP address

switched

boolean

If the source and destination IPs are switched due to port values.

Example: false

src.ip_bytes

integer

The number of bytes transmitted by the IP address

src.pkts

integer

The number of packets transmitted by the IP address

Note

In NetFlow events, the src (source) and dst (destination) fields are replaced with interface_enriched, a type based on ip-object. This enriched type includes everything in ip-object. Unique to Netflow, the src and dst also include the mac (MAC address) field

Back to Event Fields.

Notice Fields

A notice event is raised when unusual or noteworthy activity is detected and logged as a security or policy notification. It flags anomalies or policy-triggered events across Zeek’s analysis.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

application

application

The classified application for a flow

dst_ip

string

The IP of the responder to the connection

Example: 8.8.8.8

dst_ip_enrichments

ip_enrichments

Enrichments for an IP

dst_port

integer

The port of the responder to the connection

Example: 53

file_desc

string

Description of a file to provide more context. For example, if a notice was related to a file over HTTP, the URL of the request would be shown.

file_mime_type

string

If the notice event is related to a file, this will be the mime type of the file.

fuid

string

A file unique ID if this notice is related to a file.

msg

string

Description of activity noticed.

Example: 10.1.0.47 appears to be guessing SSH passwords (seen in 30 connections).

n

integer

Associated count, or perhaps a status code.

note

string

Notice type

Example: SSH::Password_Guessing

notice_actions

string

The actions which have been applied to this notice.

Example: [Notice::ACTION_LOG]

peer_descr

string

Textual description for the peer that raised this notice, including name, host address and port.

proto

string

The transport protocol.

src_ip

string

The IP of the initiator of the connection

Example: 10.10.10.10

src_ip_enrichments

ip_enrichments

Enrichments for an IP

src_port

integer

The port of the initiator of the connection

Example: 52843

sub

string

Technical details of the activity.

Example: Sampled servers: 10.1.0.86, 10.1.0.86, 10.1.0.86, 10.1.0.86, 10.1.0.86

suppress_for

number

This field indicates the length of time that this unique notice should be suppressed.

tag

string

| The type of event

Example: flow

Back to Event Fields.

NTLM fields

An ntlm event is generated when NT LAN Manager authentication exchanges are seen, including domain, username, hostname, and whether authentication succeeded. This is a Microsoft authentication protocol.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

auth_domain

string

The domain used to authenticate the client

Example: ACME

hostname

string

The client hostname used

Example: FINANCEWKS008

ntlm_status

string

String indicating the result of the authentication

Example: SUCCESS

success

Boolean

Indicates whether the authentication succeeded

Example: True

username

string

The client username used

Example: sqlservice

Back to Event Fields.

Observation fields

An observation event is created when the FortiNDR Cloud analytics backend identifies a correlation of information of interest. See below for valid values for the following fields:

Tooltip

You can view the list of observations in the Observations widget in the Default Dashboard . For more information, see:

  • observation_category: asset, account, software, flow, file, relationship

  • observation_class: anomalous, newly observed, specific

Note

Observations run independently from the metadata extraction process, and are not tied to flow events with a flow_id. Additionally, an observation event may only have one of src.ip or dst.ip, although it could contain both.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

evidence_end_timestamp

timestamp

The timestamp for which the flagged activity ended.

Example: 2019-01-01T00:00:00.000Z

evidence_iql

string

An IQL statement that attempts to identify the events used to generate the observation.

Example: src.ip = '10.10.10.10' AND customer_id = 'chg' AND dce_rpc:dce_rpc_operation = 'NetrSessionEnum' AND timestamp >= t'2019-01-01T22:00:00.000000Z' AND timestamp <= t'2019-01-01T22:10:00.000000Z'

evidence_start_timestamp

timestamp

The timestamp for which the flagged activity began.

Example: 2019-01-01T00:00:00.000Z

observation_category

string

The subject of an observation.

Example: relationship

observation_class

string

The class of what was observed about the subject.

Example: specific

observation_confidence

string

The confidence (high, medium, or low) in the model output to what was attempted to be observed.

Example: high

observation_title

string

The title of what was attempted to be detected - similar to a suricata sig name.

Example: High Count of NetSession Destinations

observation_uuid

string

A unique identifier for the model used to generate the observation. Multiple models may exist for the same title.

Example: ac33189b-ee31-4f5e-b6a1-dcb63d9a7295

sensor_ids

string array

A list of sensors from which activity was used as part of the observation.

Example: [chg1,chg2,chg3]

Back to Event Fields.

PE fields

A pe event is created when a Portable Executable file (e.g., Windows .exe or .dll) is transferred or extracted during file analysis. The PE format is the executable file format for Windows binaries.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

compile_timestamp

timestamp

The compile timestamp extracted from the file

Example: 2015-11-12T10:23:51.000Z

file

file-object

The enriched file properties (hashes, size, MIME-type)

Example: N/A

has_cert_table

Boolean

Indicates whether the file has an attribute certificate table

Example: True

has_debug_data

Boolean

Indicates whether the file has a debug table

Example: True

has_export_table

Boolean

Indicates whether the file has an export table

Example: True

has_import_table

Boolean

Indicates whether the file has an import table

Example: True

id

string

An internal unique identifier for the file

Example: FrkSk6Y0mqKGxMBF6

is64_bit

Boolean

Indicates whether the file is 64-bit

Example: True

is_exe

Boolean

Indicates whether the file is executable or just an object

Example: True

machine

string

The architecture the file was compiled for

Example: I386

os

string

The OS the file was compiled for

Example: Windows XP

section_names

string-array

An array of section names extracted from the file

Example: [.text, .rdata, .data, .rsrc]

subsystem

string

The subsystem the file was compiled for

Example: WINDOWS_GUI

uses_aslr

Boolean

Indicates whether the file supports ASLR

Example: True

uses_code_integrity

Boolean

Indicates whether the file enforces code integrity checks

Example: True

uses_dep

Boolean

Indicates whether the file supports DEP

Example: True

uses_seh

Boolean

Indicates whether the file uses SEH

Example: True

Back to Event Fields.

Profinet event

A profinet event is created by the use of PROFINET an Ethernet protocol for communication between devices in industrial automation systems.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Name

Type

Description

profinet_activity_uuid

string

Identifies communication relationships

profinet_auth

integer

Authentication protocol - set to 0 for no authentication

profinet_broadcast

boolean

Flag 1 Bit 6 Broadcast (is the call a broadcast)

profinet_cancel_req

boolean

Flag 2 Bit 1 Cancel was pending at call end (a cancellation request was received from the client for a specific remote procedure call (RPC), but the call completed before the cancellation could be processed. )

profinet_char_encoding

string

Character encoding: ASCII, EBCDIC

profinet_fack

string

Version Fack

profinet_float_encoding

string

Floating point representations: IEEE, VAX, CRAY, etc.

profinet_frag

boolean

Flag 1 Bit 2 Fragment

profinet_frag_num

integer

Fragment number set to the number of the current fragment.

profinet_hint

integer

Activity hint

profinet_idempotent

boolean

Flag 1 Bit 5 Idempotent

profinet_int_endian

string

Integer encoding: Big Endian or Little Endian

profinet_interface_hint

integer

Interface hint

profinet_interface_major

integer

Interface version major

profinet_interface_minor

integer

Interface version minor

profinet_interface_uuid

string

Identifies the interface of an IO device, controller, etc.

profinet_last_frag

boolean

Flag 1 Bit 1 Last Fragment

profinet_length

integer

Length of body set to the number of octets of NDRDdata in the current frame.

profinet_max_frag

integer

Maximum fragment size

profinet_max_tsdu

integer

Maximum Tsdu

profinet_maybe

boolean

Flag 1 Bit 4 Maybe (the client sends a request but does not wait for a response)

profinet_no_frag

boolean

Flag 1 Bit 3 No fragment acknowledge requested

profinet_object_uuid

string

Object instance within a physical device

profinet_operation_num

string

Operation number identifies the PNIO service supported by the PNIO interfaces.

profinet_request_type

string

Packet Type: Request, Response, Fault, etc.

profinet_reserved_bit0

boolean

Flag 1 Bit 0 Reserved for implementation

profinet_reserved_bit7

boolean

Flag 1 Bit 7 Reserved for implementation

profinet_rpc_version

integer

Used RPC version

profinet_sel_ack

array

Array of selective ACK

profinet_sel_ack_len

integer

Selective ACK length

profinet_seq_num

integer

Used with activity_UUID to uniquely identify a RPC call.

profinet_serial_high

integer

The high octet of the fragment number of the call

profinet_serial_low

integer

The low octet of the fragment number of the call

profinet_serial_num

integer

Serial number

profinet_server_boot_time

integer

Server boot time

profinet_win_size

integer

Window size

proto

string

Transport protocol

Back to Event Fields.

QUIC fields

A quic event is generated when QUIC protocol activity—Google’s transport layer network protocol combining UDP and TLS—is detected, providing performance and security for web traffic.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field

Type

Description

quic_client_initial_dst_conn_id

string

Destination Connection ID (DCID). This DCID is used for routing and packet protection by client and server.

Example: 95412c47018cdfe8

quic_client_protocol

string

QUIC Application-Layer Protocol Negotiation (ALPN) extension. This is the extension’s first entry.

Example: h3

quic_client_src_conn_id

string

Source Connection ID chosen by the client in its INITIAL packet. This ID is used for packet protection and is typically random and unpredictable.

Example: 4823dfc5a047e6acd230b5c5e047ced9b0a6b542

quic_history

string

Provides a history of QUIC protocol activity in a connection, similar to the history field in Conn.

Example: ISisH

quic_server_src_conn_id

string

A QUIC-supported server responds to a DCID by selecting a Source Connection ID (SCID). Occurs within the server’s first INITIAL packet.

Example: 0130dfc5a047e6acd230b5c5e047ced9b0a6bbf0

quic_version

string

A string interpretation of the QUIC version number, usually “1” or “quicv2”

Example: 1

server_name_indication

ip_or_domain_enriched

An IP or domain with its enrichments

Back to Event Fields.

RDP fields

An rdp event is created when Remote Desktop Protocol sessions are observed, capturing details like client build, keyboard layout, desktop size, and security negotiation. It tracks remote Windows desktop connections.

Note

Authentication cannot always be determined as the necessary data may be encapsulated within an encrypted tunnel. Therefore, the result field may contain a "best-guess" based on available data.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

cert_count

int

The number of certificates seen

Example: 0

cert_permanent

Boolean

Indicates if the provided certificate or certificate chain is permanent

Example: True

cert_type

string

The type of certificate used if the connection is encrypted with native RDP encryption

Example: RSA

client_build

string

The client RDP version

Example: RDP 5.1

client_dig_product_id

string

The client product ID

Example: 715e03e8-6eef-4c53-b022-rbcd967

client_name

string

The client hostname

Example: bob-PC

cookie

string

The truncated account name used by the client

Example: bob

desktop_height

int

The client desktop height

Example: 1080

desktop_width

int

The client desktop width

Example: 1920

encryption_level

string

The encryption level used

Example: Client compatible

encryption_method

string

The encryption method used

Example: 128bit

keyboard_layout

string

The client keyboard layout (language)

Example: English -United States

requested_color_depth

string

The color depth requested by the client in the high_color_depth field

Example: 32bit

result

string

The result for the connection, derived from a mix of RDP negotiation failure messages and GCC server create response messages

Example: Succeed

security_protocol

string

Security protocol chosen by the server

Example: RDP

Back to Event Fields.

SMB file fields

An smb_file event is generated when files transferred over SMB/CIFS are observed, logging file-related actions like creation, modification, renaming, with metadata like paths and timestamps. This monitors file-level operations in SMB sessions.

The following table shows the fields contained in this event type excluding the previously identified common fields:.

Field Type Description

files

file-array

Files transferred over the SMB connection

Example: N/A

files.accessed_timestamp

timestamp

The last time the file was accessed

Example: 2018-04-08T22:48:07.958Z

files.bytes

int

The file's size in kilobytes

Example: 145922

files.changed_timestamp

timestamp

The last time the file's metadata changed

Example: 2018-04-08T22:48:07.958Z

files.created_timestamp

timestamp

The time the file was created

Example: 2018-04-08T22:48:07.958Z

files.modified_timestamp

timestamp

The last time the file's content changed

Example: 2018-04-08T22:48:07.958Z

files.name

string

The post-transfer name of the file (can be renamed before writing to disk)

Example: secrets.zip

files.previous_name

string

The pre-transfer name of the file

Example: exfil.zip

files.smb_path.path

string

The full network path to the target share

Example: \\DYNACCOUNTIC-DC.dynaccountic.com\sysvol

files.smb_path.share

string

The target network share

Example: sysvol

files.smb_path.system

string The target host

Example: DYNACCOUNTIC-DC.dynaccountic.com

smb_action

string

The action taken on the files

Example: SMB::FILE_OPEN

Back to Event Fields.

SMB mapping fields

An smb_mapping event is created when an SMB share is mapped, capturing tree paths, share types (disk, printer, pipe), and native file system info. It tracks resource sharing mappings over SMB.

The following table shows the fields contained in this event type excluding the previously identified common fields:.

Field Type Description

native_file_system

string

The file system type on the target host (for Disk shares)

Example: NTFS

share_type

string

The type of share established

Example: DISK

smb_path.path

string

The full network path to the target share

Example: \\DYNACCOUNTIC-DC.dynaccountic.com\sysvol

smb_path.share

string

The target network share

Example: sysvol

smb_path.system

string

The target host

Example: DYNACCOUNTIC-DC.dynaccountic.com

smb_service

string

The service used to establish a connection to the share

Example: IPC

Back to Event Fields.

SMTP fields

An smtp event is created when Simple Mail Transfer Protocol messages—such as MAIL FROM, RCPT TO, HELO/EHLO—are observed during an email session. This protocol is used to send email between servers.

The following table shows the fields contained in this event type excluding the previously identified common fields::

Field Type Description

date

string

The content of the Date header

Example: Thu, 12 Jul 2015 17:59:01 -0400 (EDT)

files

file-object-array An array of the files attached to the email

first_received

string

The full content of the first Received header

Example: from JIM@GMAIL.COM ([198.51.100.1]) by SALLY@GMAIL.COM ([101.9.210.120]) with mapi id 14.01.1039.013; Thu, 12 Jul 2015 18:09:44 -0500

from

email-object

The content of the From header

Example: jdoe@gmail.com

helo

host-object

The argument supplied to the HELO command

Example: client.example.com

in_reply_to

string

The Message-ID in the In-Reply-To header

Example: <b8bba2baae4c2a08fdff4e223458577d@gmail.com>

is_webmail

Boolean

Indicates whether the message was sent through a webmail interface

Example: true

last_reply

string

The last message the server sent to the client

Example: 250 Message accepted for delivery

mailfrom

string

The argument supplied to the MAIL FROM command

Example: support@acme.corp

msg_id

string

The Message-ID of the message

Example: <b8bba2baae4c2a08fdff4e223458577d@gmail.com>

path

ip-object-array

The message transmission path extracted from the Received headers

Example: [192.161.0.200, 204.148.78.113]

rcptto

string

The argument supplied to the RCPT TO command

Example: jdoe@gmail.com

reply_to

email-object

The content of the Reply-To header

Example: jdoe@gmail.com

second_received

string

The content of the second Received header

Example: from JIM@GMAIL.COM ([198.51.100.1]) by SALLY@GMAIL.COM ([101.9.210.120]) with mapi id 14.01.1039.013; Thu, 12 Jul 2015 18:09:44 -0500

subject

string

The content of the Subject header

Example: Click this link!

tls

Boolean

Indicates whether the connection switched to using TLS

Example: true

to

email-object-array

The content of the To header

Example: [jdoe@gmail.com, kdoe@gmail.com]

trans_depth

int

The depth of this message transaction where multiple messages were transferred in a single connection

Example: 1

urls

string-array

A list of URLs extracted from the message

Example: [http://malware.pwn//root.ps1, https://www.google.com]

user_agent

string

The content of the client's User-Agent header

Example: SquirrelMail/1.4.22

x_originating_ip

ip-object

The content of the X-Originating-IP header

Example: 8.8.8.8

Back to Event Fields.

SNMP fields

An snmp event is created when Simple Network Management Protocol messages—used for monitoring and managing network devices—are detected, including version, community string, and request types. It supports network device telemetry.

The following table shows the fields contained in this event type excluding the previously identified common fields::

Field

Type

Description

snmp_community

string

Community string of the first packet associated with the session

Example: public

snmp_display_string

string

A system description of the SNMP responder endpoint

Example: Roma v1.9 v9.5.0_W EQ

snmp_duration

number

Amount of time between the first in the session and the latest one seen in seconds

Example: 12.209241

snmp_get_bulk_requests

integer

Number of variable bindings in GetBulkRequest PDUs seen for the session

Example: 3

snmp_get_requests

integer

Number of variable bindings in GetRequest/GetNextRequest PDUs seen for the session

Example: 7

snmp_get_responses

integer

Number of variable bindings in GetResponse/Response PDUs seen for the session

Example: 2

snmp_set_requests

integer

number of variable bindings in SetRequest PDUs seen for the session

Example: 10

snmp_up_since

string

Time at which the SNMP responder endpoint claims it’s been up since

Example: 2024-09-19T00:00:49.536262Z

snmp_version

string

Version of the protocol being used

Example: 2c

Back to Event Fields.

Software fields

A software event is generated when software metadata—such as client or server software versions—is detected via protocol-specific exchanges (e.g. DHCP client, HTTP user-agent).

Note

Software events do not have a src or dst column like all other event types because they only refer to behavior observed from one host and not the underlying connection.

The following table shows the fields contained in this event type excluding the previously identified common fields::

Field Type Description

host

ip-object

The host from which the software was observed

Example: 10.0.0.10

software_name

string

The name of the observed software

Example: Wget

software_type

string

The category of the observed software

Example: HTTP::BROWSER

software_version.additional

string

Arbitrary notes about the software

Example: linux-gnu

software_version.major

int

The major version number

Example: 1

software_version.minor

int

The first minor version number

Example: 19

software_version.minor2

int

The second minor version number

Example: 1

software_version.minor3

int

The third minor version number

Example: 0

software_version.version

string

The full version string

Example: Wget/1.19.1 (linux-gnu)

software_version.version_number

string

The full version number

Example: 1.19.1

Back to Event Fields.

SSH fields

An ssh event is created when SSH connection metadata or authentication results—like client/server version strings or auth success/failure—are captured. SSH provides secure remote shell and file transfer capabilities.

Note

Authentication cannot be accurately determined because the necessary data is encapsulated within the encrypted tunnel. Therefore, the auth_success field contains a "best-guess" based on available data.

The following table shows the fields contained in this event type excluding the previously identified common fields::

Field Type Description

auth_success

Boolean

The inferred authentication result

Example: True

cipher_alg

string

The encryption algorithm used

Example: aes128-ctr

client

string

The client version string

Example: SSH-2.0-OpenSSH_7.6

compression_alg

string

The compression algorithm used

Example: none

direction

string

The direction of the connection, Outbound if the client was a local host logging into an external host and Inbound in the opposite situation

Example: Inbound

hassh

string

Network fingerprinting which can be used to identify specific Client and Server SSH implementations.

Example: 98ddc5604ef6a1006a2b49a58759fbe6

hassh_server

string

Network fingerprinting which can be used to identify specific Server SSH implementations.

Example: cd77a550c195f0e4ea637e367fa499e8

host_key

string

The server fingerprint

Example: a1:a2:79:80:6d:b1:77:82:d8:6c:aa:ee:25:19:23:42

host_key_alg

string

The server's key algorithm.

Example: ssh-rsa

kex_alg

string

The key exchange algorithm used

Example: ecdh-sha2-nistp256

mac_alg

string

The signing (MAC) algorithm used

Example: hmac-sha1

server

string

The server version string

Example: SSH-2.0-OpenSSH_7.4

ssh_version

int

The SSH major version (1 or 2)

Example: 2

Back to Event Fields.

SSL fields

An ssl event is generated when secure session negotiations are observed, logging details like cipher suite, certificate chain, server name, and session resume status. It provides insight about encrypted communications by parsing and logging the connection's metadata.

The following table shows the fields contained in this event type excluding the previously identified common fields::

Field Type Description

cipher

string

The cipher suite selected by the server

Example: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256

client_issuer

string

The Issuer field of the client's certificate

Example: CN=Google Internet Authority G2,O=Google Inc,C=US

client_subject

string

The Subject field of the client's certificate

Example: CN=*.google.com,O=Google Inc

issuer

string

The Issuer field of the server's certificate

Example: CN=Google Internet Authority G2,O=Google Inc,C=US

ja3

string

The computed JA3 hash for the client

Example: 4d7a28d6f2263ed61de88ca66eb011e3

ja3s

string

The computed JA3 hash of the server

Example: 4d7a28d6f2263ed61de88ca66eb011e3

ja4

string

The computed JA4 hash for the client hello packet

Example: t13d1516h2_acb858a92679_e5627efa2ab1

server_name_indication

domain-object

The enriched Server Name Indication set by the client

Example: www.google.com

session_id

string

The ID used for session resumption (deprecated)

Example: N/A

subject

string

The Subject field of the server's certificate

Example: CN=*.google.com,O=Google Inc

validation_status

string

Result of certificate validation for this connection (deprecated)

Example: Success

version

string

The SSL/TLS version being used (period omitted)

Example: TLSv10

Back to Event Fields.

Suricata fields

A suricata event is created when Suricata (an intrusion detection tool) alerts or metadata are integrated into Zeek logs, highlighting threat detection signatures and behaviors.

Note

Suricata runs independently from the metadata extraction process, and thus is not tied to flow events with a flow_id even though both a suricata and flow event will exist for the traffic. Additionally, directionality is not maintained by Suricata, so the src.ip and dst.ip fields for a suricata event may be reversed from the related flow.

The following table shows the fields contained in this event type excluding the previously identified common fields::

Field Type Description
community_id

string

An additional flow identifier for joining Suricata and Conn events.

payload byte-array

Payloads are generated by the sensor’s IDS engine. This field displays the raw payload from traffic that matched a detection signature. This ASCII representation helps you determine whether the traffic is malicious or benign.

Payloads are disabled by default due to the potential exposure of sensitive or personally identifiable information (PII). When enabled, you can click the field to view the payload in FortiNDR Cloud.

Payloads can be enabled upon request through Fortinet Support.

proto string

The transport layer protocol used.

Example: tcp

sig_category string

The query's category.

Example: A Network Trojan was Detected

sig_id int

The query's ID.

Example: 2024290

sig_name string

The query's name.

Example: ET TROJAN Jaff Ransomware Checkin M1

sig_rev float

The query's revision number.

Example: 2

sig_severity int

The query's severity rating (1 = high, 3 = low)

Example: 1

Back to Event Fields.

Tunnel fields

A tunnel event is generated when tunneled sessions—such as VPN, SSH tunnels, or other encapsulations—are detected, noting tunnel types and actions. This event helps trace encapsulated traffic flows.

The following table shows the fields contained in this event type excluding the previously identified common fields::

Field Type Description

tunnel_action

string

The action taken on the tunnel

Example: Tunnel::DISCOVER

tunnel_type

string

The protocol/application running over the tunnel

Example: Tunnel::HTTP

Back to Event Fields.

VPC Flow fields

A VPC Flow fields event occurs when raw VPC Flow Log data is parsed and its individual fields are extracted and normalized into a structured event. These events are only visible when the VPC feature is enabled. To enable it, contact your TSM or Customer Support.

The following table shows the fields contained in this event type excluding the previously identified common fields:

Field Type Description

proto

string

Protocol used in the traffic.

Example: TCP

switched

boolean

If the source and destination IPs are switched due to port values.

Example: false

tag

string The type of event. Example: flow

total_ip_bytes

integer The number of bytes transferred during the flow. Example: 76

vpc_account_id

string

AWS account ID owning the source network interface.

Example: 123456789101

vpc_action

string

The action associated with the traffic.

Example: ACCEPT

vpc_availability_zone

string

Availability Zone ID of the network interface.

Example: usw2-az1

vpc_dst_ip

null or ip_enriched object The preserved original dstaddr field when dst.ip was overridden with pkt-dstaddr.

vpc_end_timestamp

string

The time when the last packet was received in the aggregation interval.

Example: 2019-01-01T00:00:00.000000Z

vpc_flow_direction

string

The direction of the flow relative to the interface.

Example: ingress

vpc_id

string

ID of the VPC containing the network interface.

Example: vpc-123f7d9bb71e45e11

vpc_instance_id

string

ID of the associated instance.

Example: i-123b3953f10184bde

vpc_interface_id

string

ID of the network interface.

Example: eni-0ff7168c44159f431

vpc_ip_version

string

Type of traffic IP version.

Example: IPv4

vpc_log_status

string

Logging status of the flow log.

Example: OK

vpc_pkt_dst_ip

null or ip_enriched object

Packet-level original destination IP address.

Example: 10.1.0.1

vpc_pkt_dst_subnet_name

string

Subnet name for packet destination IP.

Example: AMAZON

vpc_pkt_src_ip

null or ip_enriched object

Packet-level original source IP address.

Example: 10.1.0.2

vpc_pkt_src_subnet_name

string

Subnet name for packet source IP.

Example: S3

vpc_proto

integer

IANA protocol number of the traffic.

Example: 6

vpc_region

string

AWS region containing the network interface.

Example: us-west-2

vpc_reject_reason

string

Reason the traffic was rejected.

Example: BPA

vpc_src_ip

null or ip_enriched object The preserved original srcaddr field when src.ip was overridden with pkt-srcaddr

vpc_subnet_id

string

ID of the subnet containing the interface.

Example: subnet-12356986a7885a583

vpc_tcp_flags

integer

Bitmask value for TCP flags.

Example: 2

vpc_total_pkts

integer

Number of packets transferred during the flow.

Example: 1

vpc_version

integer

VPC Flow Logs version.

Example: 8

x509 fields

An x509 event is created when X.509 certificates exchanged in TLS/SSL sessions are parsed and logged, capturing certificate metadata, fingerprints, extensions, and alternate names.

The following table shows the fields contained in this event type excluding the previously identified common fields::

Field Type Description

ca_constraints

Boolean

Indicates whether the CA flag is set

Example: False

ca_constraints_len

int

The maximum path length

Example: 10

cert_id

string

The file ID of the certificate

Example: FNbDqq2ZxjNk10D7ie

issuer

string

The content of the Issuer field

Example: O=Internet Widgits Pty Ltd,ST=Some-State,C=AU

key_len

int

The length of the key

Example: 2048

key_type

string

The type of key used

Example: rsa

san_dns

host-array

The list of DNS entries in the SAN

Example: [*.outlook.com, *.office365.com]

san_email

email-array

The list of email entries in the SAN

Example: [dave@email.corp]

san_ip

ip-array

The list of IP entries in the SAN

Example: [169.254.1.1]

san_uri

uri-array

The list of URI entries in the SAN

Example: [https://169.254.1.1]

serial

string

The serial number of the certificate

Example: E3BD4F4F884EADDA

subject

string

The content of the Subject field

Example: O=Internet Widgits Pty Ltd,ST=Some-State,C=AU

valid_end

timestamp

The time before the certificate became valid

Example: 2018-01-11T14:35:34.000Z

valid_start

timestamp

The time once the certificate becomes invalid

Example: 2018-01-11T14:35:34.000Z

version

string

The X.509 version

Example: 3

Back to Event Fields.