Event fields
The following topics describe the fields unique to each event type.
BACnet Device control fields
A BACnet device control event occurs when BACnet messages like Reinitialize-Device or Device-Communication-Control are detected. These events log administrative actions that affect device availability and behavior.
The following table shows the fields contained in this event type excluding the previously identified common fields:
|
Property |
Type |
Description |
|---|---|---|
|
bacnet_device_ctrl_ignore_time |
integer |
Time in minutes that the device should obey the control command; e.g., in Device-Communication-Control, how long the device is to suppress or enable communications per the request. Example: 5 |
|
bacnet_device_ctrl_invoke_id |
integer |
Unique identifier used to correlate a confirmed APDU request (such as Device-Communication-Control or Reinitialize-Device) with its acknowledgment or response. Example: 1 |
|
bacnet_device_ctrl_pdu |
string |
The specific BACnet APDU service invoked for device control (e.g., “ReinitializeDevice” or “DeviceCommunicationControl”). Example: reinitialize_device |
|
bacnet_device_ctrl_pwd_hash |
string |
The SHA-256 hash of the password supplied in the Device-Communication-Control or Reinitialize-Device request if required by the device for authentication or to execute the control command. Example: ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad |
|
bacnet_device_ctrl_result |
string |
Outcome of the control operation: one of Success, Error, Reject, or Abort. Example: ERROR |
|
bacnet_device_ctrl_result_code |
string |
If the result was Error, Reject, or Abort, this is the specific error/reject/abort code returned by the device; otherwise often “OK” or similar success-indicator. Example: |
|
bacnet_device_ctrl_state |
string |
The state to which the device is being set by the control service (for instance, the state in Reinitialize-Device such as “coldstart”, “warmstart”, etc.). Example: coldstart |
|
is_orig |
boolean |
True if the message is sent from the originator. Example: true |
BACnet Discovery fields
A BACnet discovery event is created when Who-Is/I-Am/Who-Has/I-Have messages are observed, recording device/object identifiers and vendor information for rapid inventory. This log focuses on unconfirmed services used for discovery.
The following table shows the fields contained in this event type excluding the previously identified common fields:
|
Property |
Type |
Description |
|---|---|---|
|
bacnet_discovery_id |
integer |
Numerical part of the device’s identifier (the instance number) used in discovery to uniquely address the device on the network. Example: 1 |
|
bacnet_discovery_instance_num |
integer |
The instance number of the object being discovered, combined with object_type to uniquely identify that object within the device. Example: 930101 |
|
bacnet_discovery_object_name |
string |
The name property of the object discovered (Object_Name BACnet property), e.g. a human-readable name for the device or object as configured on the BACnet device. Example: FLR12_DEMAND |
|
bacnet_discovery_object_type |
string |
The type of BACnet object that is announced/discovered in the discovery process (for example, Device, Analog-Input, Binary-Output, etc.). Example: device |
|
bacnet_discovery_pdu |
string |
The specific BACnet discovery service in use (for example, “Who-Is” or “I-Am”) Example: who-is |
|
bacnet_discovery_range |
string |
The “Who-Is” discovery range that was used (e.g. “0-4194303”) indicating lower and upper limits of device instance numbers requested to announce themselves; helps scope discovery messages. Example: 1944802-1944802 |
|
bacnet_discovery_type |
string |
Type of identifier used to represent the device’s identity (often the “Device” object identifier or its subtype) Example: |
|
bacnet_discovery_vendor |
string |
The vendor identifier or vendor name of the device responding to the discovery, per the BACnet Vendor ID registry. Example: Schneider Electric |
|
is_orig |
boolean |
True if the message is sent from the originator. Example: true |
BACnet Property fields
A BACnet property event is created when Read-Property-Request, Read-Property-ACK, or Write-Property-Request messages are observed, capturing object type, instance number, property identifier, array index, and value. This log focuses on confirmed services used for reading and writing properties.
The following table shows the fields contained in this event type excluding the previously identified common fields:
|
Property |
Type |
Description |
|---|---|---|
|
bacnet_property_index |
integer |
If the property is an array, this is the index of the element being accessed; if omitted or zero, it often means the whole array or default behavior per spec. Example: 1 |
|
bacnet_property_instance_num |
integer |
The instance number of the object within the device. Example: 111 |
|
bacnet_property_invoke_id |
integer |
The unique identifier used to correlate confirmed APDU property requests (Read-Property or Write-Property) with their acknowledgments in BACnet traffic. Example: 232 |
|
bacnet_property_object_type |
string |
The type of BACnet object (e.g. Analog Input, Binary Output, Device, etc.) whose property is being accessed or modified. Example: device |
|
bacnet_property_pdu |
string |
The specific BACnet APDU service invoked for device control (e.g. “ReinitializeDevice” or “DeviceCommunicationControl”)) Example: read-property-ack |
|
bacnet_property_type |
string |
The property identifier within the object (e.g. Present_Value, Status_Flags, Description, etc.) being read or written. Example: object-list |
|
bacnet_property_value |
string |
The value of the property (for Read-Property-ACK or Write-Property-Request) as represented in the BACnet message; could be numerical, enumeration, string, etc. Example: device: 111 |
|
is_orig |
boolean |
True if the message is sent from the originator. Example: false |
BACnet header fields
A BACnet header event is created when any BACnet/IP packet is seen; the log captures header information for both APDU and NPDU messages. BACnet is a building automation/control protocol used for device discovery, property access, and supervisory functions.
The following table shows the fields contained in this event type excluding the previously identified common fields:
|
Property |
Type |
Description |
|---|---|---|
|
bacnet_bvlc_func |
string |
The BVLC (BACnet Virtual Link Control) function for this BACnet/IP packet (identifies how the packet is being used, e.g. Original-Unicast-NPDU, Forwarded-NPDU, etc.) Example: BVLC_Result |
|
bacnet_invoke_id |
integer |
The unique identifier (invoke ID) used to track Confirmed APDU/NPDU requests and their acknowledgements/responses. Example: 215 |
|
bacnet_pdu_service |
string |
The Bacnet service (which service is being invoked or replied to, e.g. ReadProperty, WriteProperty, WhoIs, etc.) Example: read_property |
|
bacnet_pdu_type |
string |
The Bacnet service type (the APDU PDU type, e.g. Confirmed-Request, Unconfirmed-Request, Simple-ACK, Error, etc.) Example: CONFIRMED_REQUEST |
|
bacnet_result_code |
string |
The Error/reject/abort code or reason if the APDU is an Error, Reject, or Abort. This field is not applicable for NPDU context, it will be null. Example: Successful_completion |
|
is_orig |
boolean |
True if the packet is sent from the originator. |
DCE RPC fields
A dce_rpc event is created when a Distributed Computing Environment / Remote Procedure Call message is observed over a connection, capturing RPC operations like bind, request, or response. This protocol enables clients to execute procedures on remote servers.
The following table shows the fields contained in this event type excluding the previously identified common fields:
| Field | Type | Description |
|---|---|---|
|
dce_rpc_endpoint |
string |
The remote service targeted by the command Example: |
|
dce_rpc_operation |
string |
The command submitted to the remote service Example: |
|
named_pipe |
string |
The name of the target pipe (or the destination port if not named Example: |
|
round_trip_time |
float |
The time in seconds between command execution and results returned Example: |
DHCP fields
A dhcp event is created when a Dynamic Host C onfiguration Protocol exchange occurs, such as a client requesting or receiving network addressing from a DHCP server. This protocol is used to dynamically assign IP addresses and other network configuration settings.
The following table shows the fields contained in this event type excluding the previously identified common fields:
| Field | Type | Description |
|---|---|---|
|
assignment |
ip-object |
The IP assigned to the client Example: |
|
dhcp_msg_type |
string |
Shows whether a lease is being requested or acknowledged Example: |
|
hostname |
string |
The client hostname Example: |
|
lease_duration |
float |
Number of seconds that the lease is valid Example: |
|
lease_end |
timestamp |
The time at which the lease expires Example: |
|
mac |
string |
The client MAC address Example: |
|
trans_id |
int |
The transaction ID, ties together requests and acknowledgments. Example: |
DNP3 fields
A dnp3 event is created when DNP3 (Distributed Network Protocol), commonly used in industrial control systems, logs requests or replies. The protocol enables master-to-outstation communication for monitoring and control.
The following table shows the fields contained in this event type excluding the previously identified common fields:
|
Field |
Type |
Description |
|---|---|---|
|
dnp3_function_reply |
string |
The name of the function message in the reply. Example: |
|
dnp3_function_request |
string |
The name of the function message in the request. Example: |
|
dnp3_indication_number |
integer |
The response's "internal indication number". Example: |
DNP3 3 Control fields
A dnp3_control event is generated when DNP3 control messages—specialized commands for remote control or configuration are observed. It supports supervisory control operations in DNP3 networks.
The following table shows fields unique to the dnp3_control event type:
|
Field |
Type |
Description |
|---|---|---|
|
dnp3_function_code |
string |
Function code (READ or RESPONSE) Example: |
|
dnp3_object_count |
integer |
DNP3 object type Example: |
|
dnp3_object_type |
string |
DNP3 object type Example: |
|
dnp3_range_high |
integer |
Range (high) of object Example: |
|
dnp3_range_low |
integer |
Range (low) of object Example: |
|
is_orig |
boolean |
True if the packet is sent from the originator Example: |
DNP3 Object fields
A dnp3_object event is generated when DNP3 object-level constructs (such as analog or binary inputs/outputs) are seen in the traffic, facilitating insight into SCADA-style data models. It reflects structured data exchanged via DNP3.
The following table shows the fields contained in this event type excluding the previously identified common fields:
|
Field |
Type |
Description |
|---|---|---|
|
dnp3_function_code |
string |
Function code (READ or RESPONSE) Example: |
|
dnp3_object_count |
integer |
DNP3 object type Example: |
|
dnp3_object_type |
string |
DNP3 object type Example: |
|
dnp3_range_high |
integer |
Range (high) of object Example: |
|
dnp3_range_low |
integer |
Range (low) of object Example: |
|
is_orig |
boolean |
True if the packet is sent from the originator Example: |
DNS fields
A dns event is created when a Domain Name System query or response message is captured over the network. DNS enables the resolution of human-friendly domain names to IP addresses.
The following table shows the fields contained in this event type excluding the previously identified common fields:
| Field | Type | Description |
|---|---|---|
|
answers |
host-object-array |
The answers returned by the DNS server for the query Example: |
|
proto |
string |
The transport layer protocol used Example: |
|
qtype |
int |
The numeric code of the query type Example: |
|
qtype_name |
string |
The string name of the query type Example: |
|
query |
domain-object |
The domain being queried Example: |
|
rcode |
int |
The numeric code of the result Example: |
|
rcode_name |
int |
The string name of the result Example: |
|
rejected |
Boolean |
Indicates whether the query was rejected by the server Example: |
|
ttls |
int-array |
An array of TTL values, one per result Example: |
DPI fields
A dpi (Deep Packet Inspection) event is created by the Fortinet IPS (Intrusion Prevention System) engine running on the sensor which logs informative and pattern matching based events. The IPS engine logs AppID (Applications seen by the engine for software and protocols), IDS (signatures for vulnerabilities), OT Protocols/Threats (Operational Technology based protocol parsing and signatures), Botnet (Botnet based traffic patterns), and Info (informational events about protocols).
The following table shows the fields contained in this event type excluding the previously identified common fields:
| Field Name | Type | Description |
|---|---|---|
|
dpi_alert_category |
string |
Type of category of the IPS signature.
Example: |
|
dpi_alert_severity |
integer |
Severity of the triggered IPS signature.
Example: |
|
dpi_alert_signature |
string |
The triggered IPS signature name. Example: |
|
dpi_alert_signature_id |
integer |
Attack ID or ID of the IPS signature. Example: |
|
dpi_app_behavior |
array |
Possible behavior for the application in which the triggered IPS signature refers to. Example: |
|
dpi_app_category |
string |
The application category for the triggered IPS signature, if there is any. Example: |
|
dpi_app_language |
string |
Language used in the application in which the triggered IPS signature refers to. Example: |
|
dpi_app_name |
array |
Name of the application. Example: |
|
dpi_app_os |
array |
OS of the application or vulnerable system/devices. Example: |
|
dpi_app_technology |
array |
Technology group or type for the application in which the triggered IPS signature refers to. Example: |
|
dpi_app_vendor |
string |
Vendor of the application in which the triggered IPS signature refers to. Example: |
|
dpi_expected_port |
string |
Default port and protocol for the application in which the triggered IPS signature is referring to. Example: |
|
dpi_parent_vuln_id |
integer |
ID of the IPS signature that link to the triggered IPS signature. Example: |
|
dpi_rulegroup |
string |
Which group the triggered IPS signature belongs to. Example: |
|
dpi_ruleset_rev |
integer |
Version number for the triggered IPS signature. Example: |
|
dpi_session_id |
integer |
Session ID for the traffic. Example: |
|
dpi_sig_cve |
array |
ID for the CVE reference. Example: |
|
dpi_ssl_decrypt_req |
boolean |
Does the current IPS signature need SSL decryption to work. Example: |
|
dpi_vuln_id |
integer |
Vulnerablity ID or Applicatioin ID for the IPS signature (Note: One VID could contain multiple AID). Example: |
|
dpi_vuln_type |
string |
Type of vulnerability this IPS signature is related to. Example: |
|
|
The common field of |
Flow fields
A flow event is created when a unidirectional or bidirectional network flow is identified, summarizing traffic between endpoints over time, such as packet count, byte count, and states. A network flow is defined by a unique combination of src.ip, src.port, dst.ip, dst.port, and proto.
The following table shows the fields contained in this event type excluding the previously identified common fields:
| Field | Type | Description | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
community_id |
string |
An additional flow identifier for joining Flow events. Example: |
||||||||||||||||||||||||||||||
|
duration |
float |
The number of seconds the flow lasted Example: |
||||||||||||||||||||||||||||||
|
flow_state |
string |
Lifecycle summary of the connection observed for this flow. Includes standard Zeek/Bro connection states and periodic P* states. Example: Supported values:
|
||||||||||||||||||||||||||||||
|
proto |
string |
The transport layer protocol used Example: |
||||||||||||||||||||||||||||||
|
service |
string |
The application(s) observed in the flow, if any Example: |
||||||||||||||||||||||||||||||
|
total_ip_bytes |
int |
The total combined bytes transmitted over the connection Example: |
||||||||||||||||||||||||||||||
|
total_pkts |
int |
The total combined packets transmitted over the connection Example: |
||||||||||||||||||||||||||||||
|
upload_percent |
int |
The percentage of bytes transmitted by the src for the flow (56% == 56) Example: |
FTP fields
An ftp event is created when File Transfer Protocol commands or responses are observed during an FTP session. This protocol is used for transferring files between client and server.
The following table shows the fields contained in this event type excluding the previously identified common fields:
| Field | Type | Description |
|---|---|---|
|
data_channel.dst |
ip-object |
The destination of the data channel Example: |
|
data_channel.geo_distance |
float |
The distance (in miles) between the IP addresses of the data channel Example: |
|
data_channel.passive |
Boolean |
Indicates whether the session is in passive mode Example: |
|
data_channel.src |
ip-object |
The source of the data channel Example: |
|
files |
file-array |
Files transferred over the session Example: N/A |
|
ftp_arg |
string |
The full argument string supplied to the command Example: |
|
ftp_command |
string |
The client command Example:RETR |
|
reply_code |
int |
The server response code to the command Example: |
|
reply_msg |
string |
The server response string to the command Example: |
|
username |
string |
The username used to establish the connection Example: |
HTTP fields
An http event is created when HTTP requests or responses—including headers and message boundaries are processed over HTTP connections. HTTP is the foundational protocol for web communications.
The following table shows the fields contained in this event type excluding the previously identified common fields:
| Field | Type | Description |
|---|---|---|
|
cookie_vars |
string-array |
Variable names extracted from all cookies. Example: |
|
files |
file-object-array |
Files downloaded over the HTTP connection |
|
headers.accept |
string-array |
The content of the Accept header Example: |
|
headers.client_header_names |
string-array |
The vector of HTTP header names sent by the client. Example |
|
headers.content_md5 |
string |
The computed MD5 hash of the headers content Example: |
|
headers.content_type |
string-array |
The contents of the Content Type header Example: |
|
headers.cookie_length |
int |
The length of the cookie in bytes Example: |
|
headers.location |
url-object |
The content of the Location header Example: |
|
headers.origin |
url-object |
The content of the Origin header Example: |
|
headers.proxied_ip_clients |
ip-object-array |
The sequence of IPs the HTTP connection is proxied through Example: |
|
headers.refresh.refresh |
string |
The full content of the Refresh header Example: |
|
headers.refresh.timeout |
int |
The timeout period in seconds Example: |
|
headers.refresh.uri |
uri-object |
The URI of the Refresh header Example: |
|
headers.server |
string |
The web server software Example: |
|
headers.server_header_names |
string-array |
The vector of HTTP header names sent by the server. Example: |
|
headers.x_powered_by |
string |
The application software running on the server Example: |
|
host |
host-object |
The content Host header Example: |
|
info_msg |
string |
The message returned with a 100-level response code Example: |
|
method |
string |
The HTTP method selected Example: |
|
proxied |
string-array |
A list of proxy steps Example: |
|
referrer |
url-object |
The content of the Referrer header Example: |
|
request_len |
int |
The length in bytes of the request Example: |
|
request_mimes |
string-array |
The fingerprinted MIME-type(s) of the request content, use instead of request_mimeExample: text/plain |
|
response_len |
int |
The length in bytes of the response Example: |
|
response_mimes |
string-array |
The fingerprinted MIME-type of the response content, use instead of response_mimeExample: |
|
status_code |
int |
The numeric code of the server's response Example: |
|
status_msg |
string |
The string name of the server's response Example: |
|
trans_depth |
int |
The depth of redirects Example: |
|
uri |
uri-object |
The full URI of the request Example: |
|
user_agent |
string |
The content of the UserAgent header Example: |
|
username |
string |
The username used with Basic Auth, if any Example: |
Kerberos fields
A kerberos event is generated when Kerberos authentication messages (e.g., AS or TGS requests/replies) are detected. Kerberos is a network authentication protocol that uses tickets to allow nodes to prove their identity.
The following table shows the fields contained in this event type excluding the previously identified common fields:
| Field | Type | Description |
|---|---|---|
|
cipher |
string |
The cipher suite used to encrypt the ticket Example: |
|
client |
string |
The client that requested the ticket; machine accounts have a Example: |
|
client_cert_fuid |
string |
Client certificate file unique ID Example: |
|
client_cert_subject |
string |
Client certificate Subject field Example: |
|
error_msg |
string |
The error message returned for failed requests Example: |
|
forwardable |
Boolean |
Indicates whether the ticket's forwardable flag is set Example: |
|
renewable |
Boolean |
Indicates whether the ticket's renewable flag is set Example: |
|
request_type |
string |
The type of ticket requested, either a ticket-granting ticket from the authentication server (AS) or a service ticket from the ticket-granting server (TGS) Example: |
|
server_cert_fuid |
string |
Server certificate file unique ID Example: |
|
server_cert_subject |
string |
Server certificate Subject field Example: |
|
service |
string |
The service for which a ticket is being requested Example: |
|
success |
Boolean |
Indicates whether the request was successful Example: |
|
ticket_duration |
float |
The ticket duration in seconds Example: |
|
ticket_from |
timestamp |
Time the ticket is good from Example: |
|
ticket_till |
timestamp |
Time the ticket is good until Example: |
LDAP fields
An ldap event is generated when LDAP (Lightweight Directory Access Protocol) messages—such as authentication, search, or directory operations—are observed. This protocol provides directory services, like querying user or organizational data.
The following table shows the fields contained in this event type excluding the previously identified common fields:
|
|
This event type is supported in Sensor version 2.2.0 and later. |
The following table shows fields unique to the ldap event type:
| Field | Type | Description |
|---|---|---|
|
ldap_argument |
string |
Additional arguments this message includes. Example: |
|
ldap_diagnostic_message |
string | Diagnostic message if the LDAP message contains a result. |
|
ldap_message_id |
integer |
The unique identifier that is used to correlate requests and responses. Example: |
|
ldap_object |
string |
The objects names this message refers to. Example: |
|
ldap_opcode |
string |
The operation code indicating what type of message it is. Example: |
|
ldap_result |
string |
The result code if the message contains a result. Example: |
|
ldap_version |
integer |
LDAP version. Example: |
LDAP Search fields
A ldap_search event is created when a client performs an LDAP search operation.
|
|
This event type is supported in Sensor version 2.2.0 and later. |
The following table shows the fields contained in this event type excluding the previously identified common fields:
| Field | Type | Description |
|---|---|---|
|
ldap_diagnostic_message |
string | Diagnostic message if the LDAP message contains a result. |
|
ldap_message_id |
integer |
The unique identifier that is used to correlate requests and responses. Example: 2 |
|
ldap_result |
string |
Result code of search operation. Example: |
|
ldap_search_attribute |
string |
A list of attributes that were returned in the search. Example: |
|
ldap_search_base_object |
string |
Base search objects. Example: |
|
ldap_search_deref_aliases |
string |
Set of deref alias. Example: |
|
ldap_search_filter |
string |
A string representation of the search filter used in the query. Example: |
|
ldap_search_result_count |
integer |
Number of results returned. Example: |
|
ldap_search_scope |
string |
Set of search scopes. Example: |
|
source |
string |
The source of the event. Example: Zeek |
Modbus fields
A modbus event is created when Modbus protocol commands or responses—typically used in industrial automation systems—are captured. This allows reading or writing of registers or coil values in connected devices.
The following table shows the fields contained in this event type excluding the previously identified common fields:
|
Field |
Type |
Description |
|---|---|---|
|
is_orig |
boolean |
Example: |
|
modbus_address |
integer |
Starting address of value(s) field. |
|
modbus_function |
string |
The name of the function message that was sent. Example: |
|
modbus_quantity |
integer |
Number of addresses/values read or written to. |
|
modbus_request_response |
string |
REQUEST or RESPONSE |
|
modbus_tid |
integer |
Modbus transaction identifier |
|
modbus_unit |
integer |
Modbus terminal unit identifier. |
|
modbus_values |
string[] |
Value(s) of coils, discrete_inputs, or registers read/written to. Example: |
Netflow fields
A netflow event is created when IP traffic flow data—typically collected by routers or switches—is captured and exported for analysis. This allows visibility into network usage patterns, including source and destination IPs, protocols, ports, and byte counts.
|
|
|
The following table shows the fields contained in this event type excluding the previously identified common fields:
|
Field |
Type |
Description |
|---|---|---|
|
netflow_bytes |
integer |
Number of bytes in a flow. Example: |
|
netflow_dst_net |
string |
Destination network address associated with a particular network flow with the mask. Example: |
|
netflow_dst_vlan |
integer |
Virtual LAN identifier associated with egress interface. Example: |
|
netflow_etype |
string |
Ethernet type (0x0800 for IPv4). Entire list is here: https://en.wikipedia.org/wiki/EtherType Example: |
|
netflow_forwarding_status |
integer | Forwarding status is encoded on 1 byte with the 2 left bits giving the
status and the 6 remaining bits giving the reason code.Status is either
unknown (00), Forwarded (10), Dropped (10) or Consumed (11). Example: 0 |
|
netflow_frag_id |
integer |
The fragment ID. Example: |
|
netflow_frag_offset |
integer |
The fragment-offset value from fragmented IP packets. Example: |
|
netflow_icmp_code |
integer |
Code of the ICMP message. Example: |
|
netflow_icmp_type |
integer |
ICMP flags Example: |
|
netflow_input_interface |
integer |
Input interface. Example: |
|
netflow_ip_flags |
integer |
IP flags Example: |
|
netflow_ip_tos |
integer |
IP Type of Service. Example: |
|
netflow_ip_ttl |
integer |
TTL value observed for packets of the flow. Example: |
|
netflow_ipv6_flow_label |
integer |
IPv6 flow label as in RFC 2460 definition. Example: |
|
netflow_layer_size |
array |
Size of protocols seen in the flow. Example: |
|
netflow_layer_stack |
array |
Protocols seen in this flow. Example: |
|
netflow_output_interface |
integer |
Output interface. Example: |
|
netflow_sampled |
integer |
Denominator of how frequently data is collected. Meaning a sampling rate of 100 means one out of every 100 packets is sampled. Helps reduce the load on network devices and collectors by only exporting a portion of the traffic. Example: |
|
netflow_sampler_address |
string |
The IP address of the network device (typically a router) that is performing packet sampling and exporting NetFlow data. Example: |
|
netflow_seq_num |
integer | A cumulative counter that increments with each exported datagram to
detect and account for any missing or dropped NetFlow datagrams. Example: 766 |
|
netflow_source |
string |
Type of netflow Example: |
|
netflow_src_net |
string |
Source network address associated with a particular network flow with the mask. Example: |
|
netflow_src_vlan |
integer |
Virtual LAN identifier associated with ingress interface. Example: |
|
netflow_tcp_flags |
integer |
TCP flags Example: |
|
netflow_timestamp_end |
string | Time the flow ended in nanoseconds. |
|
netflow_timestamp_received |
string | Timestamp in nanoseconds when the flow message was received by the NetFlow collector or analysis system. |
|
netflow_vlan_id |
integer |
Allows you to associate network traffic flows with their respective VLANs. Example: |
|
proto |
string |
Protocol used in the traffic. Example: |
|
tag |
string |
The type of event Example: |
|
total_pkts |
integer |
Number of packets in a flow. Example: |
|
dst.ip_bytes |
integer |
The number of bytes transmitted by the IP address |
|
dst.pkts |
integer |
The number of packets transmitted by the IP address |
|
switched |
boolean |
If the source and destination IPs are switched due to port values. Example: |
|
src.ip_bytes |
integer |
The number of bytes transmitted by the IP address |
|
src.pkts |
integer |
The number of packets transmitted by the IP address |
|
|
In NetFlow events, the |
Notice Fields
A notice event is raised when unusual or noteworthy activity is detected and logged as a security or policy notification. It flags anomalies or policy-triggered events across Zeek’s analysis.
The following table shows the fields contained in this event type excluding the previously identified common fields:
| Field | Type | Description |
|---|---|---|
|
application |
application |
The classified application for a flow |
|
dst_ip |
string |
The IP of the responder to the connection Example: |
|
dst_ip_enrichments |
ip_enrichments |
Enrichments for an IP |
|
dst_port |
integer |
The port of the responder to the connection Example: |
|
file_desc |
string |
Description of a file to provide more context. For example, if a notice was related to a file over HTTP, the URL of the request would be shown. |
|
file_mime_type |
string |
If the notice event is related to a file, this will be the mime type of the file. |
|
fuid |
string |
A file unique ID if this notice is related to a file. |
|
msg |
string |
Description of activity noticed. Example: |
|
n |
integer |
Associated count, or perhaps a status code. |
|
note |
string |
Notice type Example: |
|
notice_actions |
string |
The actions which have been applied to this notice. Example: |
|
peer_descr |
string |
Textual description for the peer that raised this notice, including name, host address and port. |
|
proto |
string |
The transport protocol. |
|
src_ip |
string |
The IP of the initiator of the connection Example: |
|
src_ip_enrichments |
ip_enrichments |
Enrichments for an IP |
|
src_port |
integer |
The port of the initiator of the connection Example: |
|
sub |
string |
Technical details of the activity. Example: |
|
suppress_for |
number |
This field indicates the length of time that this unique notice should be suppressed. |
|
tag |
string |
| The type of event Example: |
NTLM fields
An ntlm event is generated when NT LAN Manager authentication exchanges are seen, including domain, username, hostname, and whether authentication succeeded. This is a Microsoft authentication protocol.
The following table shows the fields contained in this event type excluding the previously identified common fields:
| Field | Type | Description |
|---|---|---|
|
auth_domain |
string |
The domain used to authenticate the client Example: |
|
hostname |
string |
The client hostname used Example: |
|
ntlm_status |
string |
String indicating the result of the authentication Example: |
|
success |
Boolean |
Indicates whether the authentication succeeded Example: |
|
username |
string |
The client username used Example: |
Observation fields
An observation event is created when the FortiNDR Cloud analytics backend identifies a correlation of information of interest. See below for valid values for the following fields:
|
|
You can view the list of observations in the Observations widget in the Default Dashboard . For more information, see:
|
|
|
Observations run independently from the metadata extraction process, and are not tied to |
The following table shows the fields contained in this event type excluding the previously identified common fields:
| Field | Type | Description |
|---|---|---|
|
evidence_end_timestamp |
timestamp |
The timestamp for which the flagged activity ended. Example: |
|
evidence_iql |
string |
An IQL statement that attempts to identify the events used to generate the observation. Example: |
|
evidence_start_timestamp |
timestamp |
The timestamp for which the flagged activity began. Example: |
|
observation_category |
string |
The subject of an observation. Example: |
|
observation_class |
string |
The class of what was observed about the subject. Example: |
|
observation_confidence |
string |
The confidence (high, medium, or low) in the model output to what was attempted to be observed. Example: |
|
observation_title |
string |
The title of what was attempted to be detected - similar to a suricata sig name. Example: |
|
observation_uuid |
string |
A unique identifier for the model used to generate the observation. Multiple models may exist for the same title. Example: |
|
sensor_ids |
string array |
A list of sensors from which activity was used as part of the observation. Example: |
PE fields
A pe event is created when a Portable Executable file (e.g., Windows .exe or .dll) is transferred or extracted during file analysis. The PE format is the executable file format for Windows binaries.
The following table shows the fields contained in this event type excluding the previously identified common fields:
| Field | Type | Description |
|---|---|---|
|
compile_timestamp |
timestamp |
The compile timestamp extracted from the file Example: |
|
file |
file-object |
The enriched file properties (hashes, size, MIME-type) Example: N/A |
|
has_cert_table |
Boolean |
Indicates whether the file has an attribute certificate table Example: |
|
has_debug_data |
Boolean |
Indicates whether the file has a debug table Example: |
|
has_export_table |
Boolean |
Indicates whether the file has an export table Example: True |
|
has_import_table |
Boolean |
Indicates whether the file has an import table Example: |
|
id |
string |
An internal unique identifier for the file Example: |
|
is64_bit |
Boolean |
Indicates whether the file is 64-bit Example: |
|
is_exe |
Boolean |
Indicates whether the file is executable or just an object Example: |
|
machine |
string |
The architecture the file was compiled for Example: |
|
os |
string |
The OS the file was compiled for Example: |
|
section_names |
string-array |
An array of section names extracted from the file Example: |
|
subsystem |
string |
The subsystem the file was compiled for Example: |
|
uses_aslr |
Boolean |
Indicates whether the file supports ASLR Example: |
|
uses_code_integrity |
Boolean |
Indicates whether the file enforces code integrity checks Example: |
|
uses_dep |
Boolean |
Indicates whether the file supports DEP Example: |
|
uses_seh |
Boolean |
Indicates whether the file uses SEH Example: |
Profinet event
A profinet event is created by the use of PROFINET an Ethernet protocol for communication between devices in industrial automation systems.
The following table shows the fields contained in this event type excluding the previously identified common fields:
|
Field Name |
Type |
Description |
|---|---|---|
|
profinet_activity_uuid |
string |
Identifies communication relationships |
|
profinet_auth |
integer |
Authentication protocol - set to 0 for no authentication |
|
profinet_broadcast |
boolean |
Flag 1 Bit 6 Broadcast (is the call a broadcast) |
|
profinet_cancel_req |
boolean |
Flag 2 Bit 1 Cancel was pending at call end (a cancellation request was received from the client for a specific remote procedure call (RPC), but the call completed before the cancellation could be processed. ) |
|
profinet_char_encoding |
string |
Character encoding: ASCII, EBCDIC |
|
profinet_fack |
string |
Version Fack |
|
profinet_float_encoding |
string |
Floating point representations: IEEE, VAX, CRAY, etc. |
|
profinet_frag |
boolean |
Flag 1 Bit 2 Fragment |
|
profinet_frag_num |
integer |
Fragment number set to the number of the current fragment. |
|
profinet_hint |
integer |
Activity hint |
|
profinet_idempotent |
boolean |
Flag 1 Bit 5 Idempotent |
|
profinet_int_endian |
string |
Integer encoding: Big Endian or Little Endian |
|
profinet_interface_hint |
integer |
Interface hint |
|
profinet_interface_major |
integer |
Interface version major |
|
profinet_interface_minor |
integer |
Interface version minor |
|
profinet_interface_uuid |
string |
Identifies the interface of an IO device, controller, etc. |
|
profinet_last_frag |
boolean |
Flag 1 Bit 1 Last Fragment |
|
profinet_length |
integer |
Length of body set to the number of octets of NDRDdata in the current frame. |
|
profinet_max_frag |
integer |
Maximum fragment size |
|
profinet_max_tsdu |
integer |
Maximum Tsdu |
|
profinet_maybe |
boolean |
Flag 1 Bit 4 Maybe (the client sends a request but does not wait for a response) |
|
profinet_no_frag |
boolean |
Flag 1 Bit 3 No fragment acknowledge requested |
|
profinet_object_uuid |
string |
Object instance within a physical device |
|
profinet_operation_num |
string |
Operation number identifies the PNIO service supported by the PNIO interfaces. |
|
profinet_request_type |
string |
Packet Type: Request, Response, Fault, etc. |
|
profinet_reserved_bit0 |
boolean |
Flag 1 Bit 0 Reserved for implementation |
|
profinet_reserved_bit7 |
boolean |
Flag 1 Bit 7 Reserved for implementation |
|
profinet_rpc_version |
integer |
Used RPC version |
|
profinet_sel_ack |
array |
Array of selective ACK |
|
profinet_sel_ack_len |
integer |
Selective ACK length |
|
profinet_seq_num |
integer |
Used with activity_UUID to uniquely identify a RPC call. |
|
profinet_serial_high |
integer |
The high octet of the fragment number of the call |
|
profinet_serial_low |
integer |
The low octet of the fragment number of the call |
|
profinet_serial_num |
integer |
Serial number |
|
profinet_server_boot_time |
integer |
Server boot time |
|
profinet_win_size |
integer |
Window size |
|
proto |
string |
Transport protocol |
QUIC fields
A quic event is generated when QUIC protocol activity—Google’s transport layer network protocol combining UDP and TLS—is detected, providing performance and security for web traffic.
The following table shows the fields contained in this event type excluding the previously identified common fields:
|
Field |
Type |
Description |
|---|---|---|
|
quic_client_initial_dst_conn_id |
string |
Destination Connection ID (DCID). This DCID is used for routing and packet protection by client and server. Example: |
|
quic_client_protocol |
string |
QUIC Application-Layer Protocol Negotiation (ALPN) extension. This is the extension’s first entry. Example: |
|
quic_client_src_conn_id |
string |
Source Connection ID chosen by the client in its INITIAL packet. This ID is used for packet protection and is typically random and unpredictable. Example: |
|
quic_history |
string |
Provides a history of QUIC protocol activity in a connection, similar to the history field in Conn. Example: |
|
quic_server_src_conn_id |
string |
A QUIC-supported server responds to a DCID by selecting a Source Connection ID (SCID). Occurs within the server’s first INITIAL packet. Example: |
|
quic_version |
string |
A string interpretation of the QUIC version number, usually “1” or “quicv2” Example: |
|
server_name_indication |
ip_or_domain_enriched |
An IP or domain with its enrichments |
RDP fields
An rdp event is created when Remote Desktop Protocol sessions are observed, capturing details like client build, keyboard layout, desktop size, and security negotiation. It tracks remote Windows desktop connections.
|
|
Authentication cannot always be determined as the necessary data may be encapsulated within an encrypted tunnel. Therefore, the |
The following table shows the fields contained in this event type excluding the previously identified common fields:
| Field | Type | Description |
|---|---|---|
|
cert_count |
int |
The number of certificates seen Example: |
|
cert_permanent |
Boolean |
Indicates if the provided certificate or certificate chain is permanent Example: |
|
cert_type |
string |
The type of certificate used if the connection is encrypted with native RDP encryption Example: |
|
client_build |
string |
The client RDP version Example: |
|
client_dig_product_id |
string |
The client product ID Example: |
|
client_name |
string |
The client hostname Example: |
|
cookie |
string |
The truncated account name used by the client Example: |
|
desktop_height |
int |
The client desktop height Example: |
|
desktop_width |
int |
The client desktop width Example: |
|
encryption_level |
string |
The encryption level used Example: |
|
encryption_method |
string |
The encryption method used Example: |
|
keyboard_layout |
string |
The client keyboard layout (language) Example: |
|
requested_color_depth |
string |
The color depth requested by the client in the high_color_depth field Example: |
|
result |
string |
The result for the connection, derived from a mix of RDP negotiation failure messages and GCC server create response messages Example: |
|
security_protocol |
string |
Security protocol chosen by the server Example: |
SMB file fields
An smb_file event is generated when files transferred over SMB/CIFS are observed, logging file-related actions like creation, modification, renaming, with metadata like paths and timestamps. This monitors file-level operations in SMB sessions.
The following table shows the fields contained in this event type excluding the previously identified common fields:.
| Field | Type | Description |
|---|---|---|
|
files |
file-array |
Files transferred over the SMB connection Example: N/A |
|
files.accessed_timestamp |
timestamp |
The last time the file was accessed Example: |
|
files.bytes |
int |
The file's size in kilobytes Example: |
|
files.changed_timestamp |
timestamp |
The last time the file's metadata changed Example: |
|
files.created_timestamp |
timestamp |
The time the file was created Example: |
|
files.modified_timestamp |
timestamp |
The last time the file's content changed Example: |
|
files.name |
string |
The post-transfer name of the file (can be renamed before writing to disk) Example: |
|
files.previous_name |
string |
The pre-transfer name of the file Example: |
|
files.smb_path.path |
string |
The full network path to the target share Example: |
|
files.smb_path.share |
string |
The target network share Example: |
|
files.smb_path.system |
string | The target host Example: |
|
smb_action |
string |
The action taken on the files Example: |
SMB mapping fields
An smb_mapping event is created when an SMB share is mapped, capturing tree paths, share types (disk, printer, pipe), and native file system info. It tracks resource sharing mappings over SMB.
The following table shows the fields contained in this event type excluding the previously identified common fields:.
| Field | Type | Description |
|---|---|---|
|
native_file_system |
string |
The file system type on the target host (for Disk shares) Example: |
|
share_type |
string |
The type of share established Example: |
|
smb_path.path |
string |
The full network path to the target share Example: |
|
smb_path.share |
string |
The target network share Example: |
|
smb_path.system |
string |
The target host Example: |
|
smb_service |
string |
The service used to establish a connection to the share Example: |
SMTP fields
An smtp event is created when Simple Mail Transfer Protocol messages—such as MAIL FROM, RCPT TO, HELO/EHLO—are observed during an email session. This protocol is used to send email between servers.
The following table shows the fields contained in this event type excluding the previously identified common fields::
| Field | Type | Description |
|---|---|---|
|
date |
string |
The content of the Date header Example: |
|
files |
file-object-array | An array of the files attached to the email |
|
first_received |
string |
The full content of the first Received header Example: |
|
from |
email-object |
The content of the From header Example: |
|
helo |
host-object |
The argument supplied to the HELO command Example: |
|
in_reply_to |
string |
The Message-ID in the In-Reply-To header Example: |
|
is_webmail |
Boolean |
Indicates whether the message was sent through a webmail interface Example: |
|
last_reply |
string |
The last message the server sent to the client Example: |
|
mailfrom |
string |
The argument supplied to the MAIL FROM command Example: |
|
msg_id |
string |
The Message-ID of the message Example: |
|
path |
ip-object-array |
The message transmission path extracted from the Received headers Example: |
|
rcptto |
string |
The argument supplied to the RCPT TO command Example: |
|
reply_to |
email-object |
The content of the Reply-To header Example: |
|
second_received |
string |
The content of the second Received header Example: |
|
subject |
string |
The content of the Subject header Example: |
|
tls |
Boolean |
Indicates whether the connection switched to using TLS Example: |
|
to |
email-object-array |
The content of the To header Example: |
|
trans_depth |
int |
The depth of this message transaction where multiple messages were transferred in a single connection Example: |
|
urls |
string-array |
A list of URLs extracted from the message Example: |
|
user_agent |
string |
The content of the client's User-Agent header Example: |
|
x_originating_ip |
ip-object |
The content of the X-Originating-IP header Example: |
SNMP fields
An snmp event is created when Simple Network Management Protocol messages—used for monitoring and managing network devices—are detected, including version, community string, and request types. It supports network device telemetry.
The following table shows the fields contained in this event type excluding the previously identified common fields::
|
Field |
Type |
Description |
|---|---|---|
|
snmp_community |
string |
Community string of the first packet associated with the session Example: |
|
snmp_display_string |
string |
A system description of the SNMP responder endpoint Example: |
|
snmp_duration |
number |
Amount of time between the first in the session and the latest one seen in seconds Example: |
|
snmp_get_bulk_requests |
integer |
Number of variable bindings in GetBulkRequest PDUs seen for the session Example: |
|
snmp_get_requests |
integer |
Number of variable bindings in GetRequest/GetNextRequest PDUs seen for the session Example: |
|
snmp_get_responses |
integer |
Number of variable bindings in GetResponse/Response PDUs seen for the session Example: |
|
snmp_set_requests |
integer |
number of variable bindings in SetRequest PDUs seen for the session Example: |
|
snmp_up_since |
string |
Time at which the SNMP responder endpoint claims it’s been up since Example: |
|
snmp_version |
string |
Version of the protocol being used Example: |
Software fields
A software event is generated when software metadata—such as client or server software versions—is detected via protocol-specific exchanges (e.g. DHCP client, HTTP user-agent).
|
|
Software events do not have a |
The following table shows the fields contained in this event type excluding the previously identified common fields::
| Field | Type | Description |
|---|---|---|
|
host |
ip-object |
The host from which the software was observed Example: |
|
software_name |
string |
The name of the observed software Example: |
|
software_type |
string |
The category of the observed software Example: |
|
software_version.additional |
string |
Arbitrary notes about the software Example: |
|
software_version.major |
int |
The major version number Example: |
|
software_version.minor |
int |
The first minor version number Example: |
|
software_version.minor2 |
int |
The second minor version number Example: |
|
software_version.minor3 |
int |
The third minor version number Example: |
|
software_version.version |
string |
The full version string Example: |
|
software_version.version_number |
string |
The full version number Example: |
SSH fields
An ssh event is created when SSH connection metadata or authentication results—like client/server version strings or auth success/failure—are captured. SSH provides secure remote shell and file transfer capabilities.
|
|
Authentication cannot be accurately determined because the necessary data is encapsulated within the encrypted tunnel. Therefore, the |
The following table shows the fields contained in this event type excluding the previously identified common fields::
| Field | Type | Description |
|---|---|---|
|
auth_success |
Boolean |
The inferred authentication result Example: |
|
cipher_alg |
string |
The encryption algorithm used Example: |
|
client |
string |
The client version string Example: |
|
compression_alg |
string |
The compression algorithm used Example: |
|
direction |
string |
The direction of the connection, Example: |
|
hassh |
string |
Network fingerprinting which can be used to identify specific Client and Server SSH implementations. Example: |
|
hassh_server |
string |
Network fingerprinting which can be used to identify specific Server SSH implementations. Example: |
|
host_key |
string |
The server fingerprint Example: |
|
host_key_alg |
string |
The server's key algorithm. Example: |
|
kex_alg |
string |
The key exchange algorithm used Example: |
|
mac_alg |
string |
The signing (MAC) algorithm used Example: |
|
server |
string |
The server version string Example: |
|
ssh_version |
int |
The SSH major version (1 or 2) Example: |
SSL fields
An ssl event is generated when secure session negotiations are observed, logging details like cipher suite, certificate chain, server name, and session resume status. It provides insight about encrypted communications by parsing and logging the connection's metadata.
The following table shows the fields contained in this event type excluding the previously identified common fields::
| Field | Type | Description |
|---|---|---|
|
cipher |
string |
The cipher suite selected by the server Example: |
|
client_issuer |
string |
The Issuer field of the client's certificate Example: |
|
client_subject |
string |
The Subject field of the client's certificate Example: |
|
issuer |
string |
The Issuer field of the server's certificate Example: |
|
ja3 |
string |
The computed JA3 hash for the client Example: |
|
ja3s |
string |
The computed JA3 hash of the server Example: |
|
ja4 |
string |
The computed JA4 hash for the client hello packet Example: |
|
server_name_indication |
domain-object |
The enriched Server Name Indication set by the client Example: |
|
session_id |
string |
The ID used for session resumption (deprecated) Example: N/A |
|
subject |
string |
The Subject field of the server's certificate Example: |
|
validation_status |
string |
Result of certificate validation for this connection (deprecated) Example: |
|
version |
string |
The SSL/TLS version being used (period omitted) Example: |
Suricata fields
A suricata event is created when Suricata (an intrusion detection tool) alerts or metadata are integrated into Zeek logs, highlighting threat detection signatures and behaviors.
|
|
Suricata runs independently from the metadata extraction process, and thus is not tied to |
The following table shows the fields contained in this event type excluding the previously identified common fields::
| Field | Type | Description |
|---|---|---|
| community_id |
string |
An additional flow identifier for joining Suricata and Conn events. |
| payload | byte-array |
Payloads are generated by the sensor’s IDS engine. This field displays the raw payload from traffic that matched a detection signature. This ASCII representation helps you determine whether the traffic is malicious or benign. Payloads are disabled by default due to the potential exposure of sensitive or personally identifiable information (PII). When enabled, you can click the field to view the payload in FortiNDR Cloud. Payloads can be enabled upon request through Fortinet Support. |
| proto | string |
The transport layer protocol used. Example: |
| sig_category | string |
The query's category. Example: |
| sig_id | int |
The query's ID. Example: |
| sig_name | string |
The query's name. Example: |
| sig_rev | float |
The query's revision number. Example: |
| sig_severity | int |
The query's severity rating (1 = high, 3 = low) Example: |
Tunnel fields
A tunnel event is generated when tunneled sessions—such as VPN, SSH tunnels, or other encapsulations—are detected, noting tunnel types and actions. This event helps trace encapsulated traffic flows.
The following table shows the fields contained in this event type excluding the previously identified common fields::
| Field | Type | Description |
|---|---|---|
|
tunnel_action |
string |
The action taken on the tunnel Example: |
|
tunnel_type |
string |
The protocol/application running over the tunnel Example: |
VPC Flow fields
A VPC Flow fields event occurs when raw VPC Flow Log data is parsed and its individual fields are extracted and normalized into a structured event. These events are only visible when the VPC feature is enabled. To enable it, contact your TSM or Customer Support.
The following table shows the fields contained in this event type excluding the previously identified common fields:
| Field | Type | Description |
|---|---|---|
|
proto |
string |
Protocol used in the traffic. Example: TCP |
|
switched |
boolean |
If the source and destination IPs are switched due to port values. Example: false |
|
tag |
string | The type of event. Example: flow |
|
total_ip_bytes |
integer | The number of bytes transferred during the flow. Example: 76 |
|
vpc_account_id |
string |
AWS account ID owning the source network interface. Example: 123456789101 |
|
vpc_action |
string |
The action associated with the traffic. Example: ACCEPT |
|
vpc_availability_zone |
string |
Availability Zone ID of the network interface. Example: usw2-az1 |
|
vpc_dst_ip |
null or ip_enriched object | The preserved original dstaddr field when dst.ip was overridden with pkt-dstaddr. |
|
vpc_end_timestamp |
string |
The time when the last packet was received in the aggregation interval. Example: 2019-01-01T00:00:00.000000Z |
|
vpc_flow_direction |
string |
The direction of the flow relative to the interface. Example: ingress |
|
vpc_id |
string |
ID of the VPC containing the network interface. Example: vpc-123f7d9bb71e45e11 |
|
vpc_instance_id |
string |
ID of the associated instance. Example: i-123b3953f10184bde |
|
vpc_interface_id |
string |
ID of the network interface. Example: eni-0ff7168c44159f431 |
|
vpc_ip_version |
string |
Type of traffic IP version. Example: IPv4 |
|
vpc_log_status |
string |
Logging status of the flow log. Example: OK |
|
vpc_pkt_dst_ip |
null or ip_enriched object |
Packet-level original destination IP address. Example: 10.1.0.1 |
|
vpc_pkt_dst_subnet_name |
string |
Subnet name for packet destination IP. Example: AMAZON |
|
vpc_pkt_src_ip |
null or ip_enriched object |
Packet-level original source IP address. Example: 10.1.0.2 |
|
vpc_pkt_src_subnet_name |
string |
Subnet name for packet source IP. Example: S3 |
|
vpc_proto |
integer |
IANA protocol number of the traffic. Example: 6 |
|
vpc_region |
string |
AWS region containing the network interface. Example: us-west-2 |
|
vpc_reject_reason |
string |
Reason the traffic was rejected. Example: BPA |
|
vpc_src_ip |
null or ip_enriched object | The preserved original srcaddr field when src.ip was overridden with pkt-srcaddr |
|
vpc_subnet_id |
string |
ID of the subnet containing the interface. Example: subnet-12356986a7885a583 |
|
vpc_tcp_flags |
integer |
Bitmask value for TCP flags. Example: 2 |
|
vpc_total_pkts |
integer |
Number of packets transferred during the flow. Example: 1 |
|
vpc_version |
integer |
VPC Flow Logs version. Example: 8 |
x509 fields
An x509 event is created when X.509 certificates exchanged in TLS/SSL sessions are parsed and logged, capturing certificate metadata, fingerprints, extensions, and alternate names.
The following table shows the fields contained in this event type excluding the previously identified common fields::
| Field | Type | Description |
|---|---|---|
|
ca_constraints |
Boolean |
Indicates whether the CA flag is set Example: |
|
ca_constraints_len |
int |
The maximum path length Example: |
|
cert_id |
string |
The file ID of the certificate Example: |
|
issuer |
string |
The content of the Issuer field Example: |
|
key_len |
int |
The length of the key Example: |
|
key_type |
string |
The type of key used Example: |
|
san_dns |
host-array |
The list of DNS entries in the SAN Example: |
|
san_email |
email-array |
The list of email entries in the SAN Example: |
|
san_ip |
ip-array |
The list of IP entries in the SAN Example: |
|
san_uri |
uri-array |
The list of URI entries in the SAN Example: |
|
serial |
string |
The serial number of the certificate Example: |
|
subject |
string |
The content of the Subject field Example: |
|
valid_end |
timestamp |
The time before the certificate became valid Example: |
|
valid_start |
timestamp |
The time once the certificate becomes invalid Example: |
|
version |
string |
The X.509 version Example: |