input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
839 <6> 2024-07-26T19:45:36Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722023131-111801-12662-2586-1","src_ip":"91.227.2.58","hdr_from":"American Express \u003cUservice@interus.net\u003e","account_id":"ESS70460","domain_id":"184810","ptr_record":"host-91-227-2-58.fiberlink.pl","attwaynements":[{"name":"spacer.gif"}],"recipients":[{"action":"blocked","reason":"brts","reason_extra":"Spam.Other","delivered":"not_delivered","delivery_detail":"","email":"tmilledge@crisiscenterbham.com","taxonomy":"spam"}],"hdr_to":"tmilledge@crisiscenterbham.com","recipient_count":1,"dst_domain":"crisiscenterbham.com","size":18175,"subject":"Amex Reference Number: C-43642707: Pending credit will be posted after your approval","env_from":"Uservice@interus.net","timestamp":"2024-07-26T19:45:32+0000","geoip":"POL","tls":false} | This is a syslog message from a product called Barracuda ESS by Barracuda. The following fields were extracted from the message:
fieldExtractorName: barracuda_ess
messageType: email_protection
senderHost: egress.ess.barracudanetworks.com
sensitivity: normal
sourceInfo: unknown
streamName: barracuda_ess
tags: ['barracuda_ess', 'email_protection'] | Explain this syslog message |
1012 <6> 2024-07-26T19:45:31Z ip-100-69-13-151.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722023126-104628-12669-2690-1","src_ip":"209.85.216.47","hdr_from":"\"Maxwell, Carol\" \u003cmaxwellc@vmcmail.com\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"mail-pj1-f47.google.com","attwaynements":null,"recipients":[{"action":"allowed","reason":"","reason_extra":"","delivered":"delivered","delivery_detail":"wayne-org.mail.protection.outlook.com.:25:250 2.6.0 \u003cCAAZM1fEmHsvmWcFRbwXN2jCpd5HAB+LfJ9buBgUvpo2ZWbb1Xg@mail.gmail.com\u003e [InternalId=11720965773629, Hostname=BY3PR15MB4852.namprd15.prod.outlook.com] 15692 bytes in 0.239, 64.077 KB/sec Queued mail for delivery","email":"lindsey.sauder@wayne.org","taxonomy":"none"}],"hdr_to":"lindsey.sauder@wayne.org","recipient_count":1,"dst_domain":"wayne.org","size":3193,"subject":"CBMaxwell - Out of Office Re: Vulcan Pacesetter Campaign","env_from":"maxwellc@vmcmail.com","timestamp":"2024-07-26T19:45:29+0000","geoip":"USA","tls":true} | {
"fieldExtractorName": "barracuda_ess",
"message": "1012 <6> 2024-07-26T19:45:31Z ip-100-69-13-151.us-east-2.compute.internal ESS70460[1]: {\"message_id\":\"1722023126-104628-12669-2690-1\",\"src_ip\":\"209.85.216.47\",\"hdr_from\":\"\\\"Maxwell, Carol\\\" \\u003cmaxwellc@vmcmail.com\\u003e\",\"account_id\":\"ESS70460\",\"domain_id\":\"158260\",\"ptr_record\":\"mail-pj1-f47.google.com\",\"attwaynements\":null,\"recipients\":[{\"action\":\"allowed\",\"reason\":\"\",\"reason_extra\":\"\",\"delivered\":\"delivered\",\"delivery_detail\":\"wayne-org.mail.protection.outlook.com.:25:250 2.6.0 \\u003cCAAZM1fEmHsvmWcFRbwXN2jCpd5HAB+LfJ9buBgUvpo2ZWbb1Xg@mail.gmail.com\\u003e [InternalId=11720965773629, Hostname=BY3PR15MB4852.namprd15.prod.outlook.com] 15692 bytes in 0.239, 64.077 KB/sec Queued mail for delivery\",\"email\":\"lindsey.sauder@wayne.org\",\"taxonomy\":\"none\"}],\"hdr_to\":\"lindsey.sauder@wayne.org\",\"recipient_count\":1,\"dst_domain\":\"wayne.org\",\"size\":3193,\"subject\":\"CBMaxwell - Out of Office Re: Vulcan Pacesetter Campaign\",\"env_from\":\"maxwellc@vmcmail.com\",\"timestamp\":\"2024-07-26T19:45:29+0000\",\"geoip\":\"USA\",\"tls\":true}",
"messageType": "email_protection",
"senderHost": "egress.ess.barracudanetworks.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "barracuda_ess",
"tags": [
"barracuda_ess",
"email_protection"
]
} | Create a JSON artifact from the message |
1012 <6> 2024-07-26T19:45:31Z ip-100-69-13-151.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722023126-104628-12669-2690-1","src_ip":"209.85.216.47","hdr_from":"\"Maxwell, Carol\" \u003cmaxwellc@vmcmail.com\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"mail-pj1-f47.google.com","attwaynements":null,"recipients":[{"action":"allowed","reason":"","reason_extra":"","delivered":"delivered","delivery_detail":"wayne-org.mail.protection.outlook.com.:25:250 2.6.0 \u003cCAAZM1fEmHsvmWcFRbwXN2jCpd5HAB+LfJ9buBgUvpo2ZWbb1Xg@mail.gmail.com\u003e [InternalId=11720965773629, Hostname=BY3PR15MB4852.namprd15.prod.outlook.com] 15692 bytes in 0.239, 64.077 KB/sec Queued mail for delivery","email":"lindsey.sauder@wayne.org","taxonomy":"none"}],"hdr_to":"lindsey.sauder@wayne.org","recipient_count":1,"dst_domain":"wayne.org","size":3193,"subject":"CBMaxwell - Out of Office Re: Vulcan Pacesetter Campaign","env_from":"maxwellc@vmcmail.com","timestamp":"2024-07-26T19:45:29+0000","geoip":"USA","tls":true} | Product: Barracuda ESS
Vendor: Barracuda | Identify this syslog message |
1012 <6> 2024-07-26T19:45:31Z ip-100-69-13-151.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722023126-104628-12669-2690-1","src_ip":"209.85.216.47","hdr_from":"\"Maxwell, Carol\" \u003cmaxwellc@vmcmail.com\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"mail-pj1-f47.google.com","attwaynements":null,"recipients":[{"action":"allowed","reason":"","reason_extra":"","delivered":"delivered","delivery_detail":"wayne-org.mail.protection.outlook.com.:25:250 2.6.0 \u003cCAAZM1fEmHsvmWcFRbwXN2jCpd5HAB+LfJ9buBgUvpo2ZWbb1Xg@mail.gmail.com\u003e [InternalId=11720965773629, Hostname=BY3PR15MB4852.namprd15.prod.outlook.com] 15692 bytes in 0.239, 64.077 KB/sec Queued mail for delivery","email":"lindsey.sauder@wayne.org","taxonomy":"none"}],"hdr_to":"lindsey.sauder@wayne.org","recipient_count":1,"dst_domain":"wayne.org","size":3193,"subject":"CBMaxwell - Out of Office Re: Vulcan Pacesetter Campaign","env_from":"maxwellc@vmcmail.com","timestamp":"2024-07-26T19:45:29+0000","geoip":"USA","tls":true} | This is a syslog message from a product called Barracuda ESS by Barracuda. The following fields were extracted from the message:
fieldExtractorName: barracuda_ess
messageType: email_protection
senderHost: egress.ess.barracudanetworks.com
sensitivity: normal
sourceInfo: unknown
streamName: barracuda_ess
tags: ['barracuda_ess', 'email_protection'] | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T03:09:50.379Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T03:09:52.177Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.umbrella.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":11316}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319400,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T03:09:50.379Z\",\"agent\":{\"ephemeral_id\":\"964d0404-9b18-4f2b-a3fe-7db4be557fbf\",\"id\":\"8809f950-580f-4473-8f56-fd5ca481b748\",\"name\":\"Proteus\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"36887\",\"created\":\"2024-07-27T03:09:52.177Z\",\"kind\":\"event\",\"provider\":\"Schannel\"},\"host\":{\"name\":\"Proteus.umbrella.com\"},\"log\":{\"level\":\"error\"},\"message\":\"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.\",\"organization\":\"umbrella\",\"senderHost\":\"Proteus.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"Proteus.umbrella.com\",\"event_data\":{\"AlertDesc\":\"70\"},\"event_id\":\"36887\",\"opcode\":\"Info\",\"process\":{\"pid\":1532,\"thread\":{\"id\":11316}},\"provider_guid\":\"{1F678132-5938-4686-9FDC-C8FF68F15C85}\",\"provider_name\":\"Schannel\",\"record_id\":7319400,\"task\":\"None\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-18\",\"name\":\"SYSTEM\",\"type\":\"User\"}}}",
"messageType": "36887",
"senderHost": "Proteus.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "schannel",
"tags": [
"v8",
"eventId:36887",
"schannel",
"36887"
],
"vendorCode": "7319400"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T03:09:50.379Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T03:09:52.177Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.umbrella.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":11316}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319400,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | Product: schannel
Vendor: schannel | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T03:09:50.379Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T03:09:52.177Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.umbrella.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":11316}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319400,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | This is a syslog message from a product called schannel by schannel. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 36887
senderHost: Proteus.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: schannel
tags: ['v8', 'eventId:36887', 'schannel', '36887']
vendorCode: 7319400 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T03:09:50.363Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T03:09:52.177Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.acme.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"acme","senderHost":"Proteus.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.acme.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":11316}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319399,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T03:09:50.363Z\",\"agent\":{\"ephemeral_id\":\"964d0404-9b18-4f2b-a3fe-7db4be557fbf\",\"id\":\"8809f950-580f-4473-8f56-fd5ca481b748\",\"name\":\"Proteus\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"36887\",\"created\":\"2024-07-27T03:09:52.177Z\",\"kind\":\"event\",\"provider\":\"Schannel\"},\"host\":{\"name\":\"Proteus.acme.com\"},\"log\":{\"level\":\"error\"},\"message\":\"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.\",\"organization\":\"acme\",\"senderHost\":\"Proteus.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"Proteus.acme.com\",\"event_data\":{\"AlertDesc\":\"70\"},\"event_id\":\"36887\",\"opcode\":\"Info\",\"process\":{\"pid\":1532,\"thread\":{\"id\":11316}},\"provider_guid\":\"{1F678132-5938-4686-9FDC-C8FF68F15C85}\",\"provider_name\":\"Schannel\",\"record_id\":7319399,\"task\":\"None\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-18\",\"name\":\"SYSTEM\",\"type\":\"User\"}}}",
"messageType": "36887",
"senderHost": "Proteus.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "schannel",
"tags": [
"v8",
"eventId:36887",
"schannel",
"36887"
],
"vendorCode": "7319399"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T03:09:50.363Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T03:09:52.177Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.acme.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"acme","senderHost":"Proteus.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.acme.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":11316}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319399,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | Product: schannel
Vendor: schannel | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T03:09:50.363Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T03:09:52.177Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.acme.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"acme","senderHost":"Proteus.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.acme.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":11316}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319399,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | This is a syslog message from a product called schannel by schannel. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 36887
senderHost: Proteus.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: schannel
tags: ['v8', 'eventId:36887', 'schannel', '36887']
vendorCode: 7319399 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T19:12:55.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"16385","created":"2024-07-26T19:12:56.195Z","kind":"event","provider":"Microsoft-Windows-Security-SPP"},"host":{"name":"Proteus.wayne.com"},"log":{"level":"error"},"message":"Failed to schedule Software Protection service for re-start at 2124-07-02T19:12:55Z. Error Code: 0x80041316.","organization":"wayne","senderHost":"Proteus.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.wayne.com","event_data":{"param1":"0x80041316","param2":"2124-07-02T19:12:55Z"},"event_id":"16385","keywords":["Classic"],"opcode":"Info","provider_guid":"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}","provider_name":"Microsoft-Windows-Security-SPP","record_id":1290338,"task":"None"}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-26T19:12:55.000Z\",\"agent\":{\"ephemeral_id\":\"964d0404-9b18-4f2b-a3fe-7db4be557fbf\",\"id\":\"8809f950-580f-4473-8f56-fd5ca481b748\",\"name\":\"Proteus\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"16385\",\"created\":\"2024-07-26T19:12:56.195Z\",\"kind\":\"event\",\"provider\":\"Microsoft-Windows-Security-SPP\"},\"host\":{\"name\":\"Proteus.wayne.com\"},\"log\":{\"level\":\"error\"},\"message\":\"Failed to schedule Software Protection service for re-start at 2124-07-02T19:12:55Z. Error Code: 0x80041316.\",\"organization\":\"wayne\",\"senderHost\":\"Proteus.wayne.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"Proteus.wayne.com\",\"event_data\":{\"param1\":\"0x80041316\",\"param2\":\"2124-07-02T19:12:55Z\"},\"event_id\":\"16385\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_guid\":\"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}\",\"provider_name\":\"Microsoft-Windows-Security-SPP\",\"record_id\":1290338,\"task\":\"None\"}}",
"messageType": "16385",
"senderHost": "Proteus.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "microsoft-windows-security-spp",
"tags": [
"v8",
"eventId:16385",
"microsoft-windows-security-spp",
"16385"
],
"vendorCode": "1290338"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T19:12:55.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"16385","created":"2024-07-26T19:12:56.195Z","kind":"event","provider":"Microsoft-Windows-Security-SPP"},"host":{"name":"Proteus.wayne.com"},"log":{"level":"error"},"message":"Failed to schedule Software Protection service for re-start at 2124-07-02T19:12:55Z. Error Code: 0x80041316.","organization":"wayne","senderHost":"Proteus.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.wayne.com","event_data":{"param1":"0x80041316","param2":"2124-07-02T19:12:55Z"},"event_id":"16385","keywords":["Classic"],"opcode":"Info","provider_guid":"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}","provider_name":"Microsoft-Windows-Security-SPP","record_id":1290338,"task":"None"}} | Product: microsoft-windows-security-spp
Vendor: microsoft-windows-security-spp | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T19:12:55.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"16385","created":"2024-07-26T19:12:56.195Z","kind":"event","provider":"Microsoft-Windows-Security-SPP"},"host":{"name":"Proteus.wayne.com"},"log":{"level":"error"},"message":"Failed to schedule Software Protection service for re-start at 2124-07-02T19:12:55Z. Error Code: 0x80041316.","organization":"wayne","senderHost":"Proteus.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.wayne.com","event_data":{"param1":"0x80041316","param2":"2124-07-02T19:12:55Z"},"event_id":"16385","keywords":["Classic"],"opcode":"Info","provider_guid":"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}","provider_name":"Microsoft-Windows-Security-SPP","record_id":1290338,"task":"None"}} | This is a syslog message from a product called microsoft-windows-security-spp by microsoft-windows-security-spp. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 16385
senderHost: Proteus.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: microsoft-windows-security-spp
tags: ['v8', 'eventId:16385', 'microsoft-windows-security-spp', '16385']
vendorCode: 1290338 | Explain this syslog message |
851 <6> 2024-07-26T18:35:39Z ip-100-69-13-151.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722018932-111569-12637-2154-1","src_ip":"159.183.85.229","hdr_from":"UNice Hair Official \u003csupport@unice.com\u003e","account_id":"ESS70460","domain_id":"184835","ptr_record":"wfbtrrzr.outbound-mail.sendgrid.net","attstarkments":null,"recipients":[{"action":"blocked","reason":"brts","reason_extra":"dgqdga9s2781o.cloudfront.net","delivered":"not_delivered","delivery_detail":"","email":"nzanders@priorityveteran.org","taxonomy":"spam"}],"hdr_to":"nzanders@priorityveteran.org","recipient_count":1,"dst_domain":"priorityveteran.org","size":54802,"subject":"Last Chance Tonight: Pay $0 for the Second Wig!","env_from":"bounces+33940005-740f-nzanders=priorityveteran.org@em9975.unice.com","timestamp":"2024-07-26T18:35:34+0000","geoip":"USA","tls":true} | {
"fieldExtractorName": "barracuda_ess",
"message": "851 <6> 2024-07-26T18:35:39Z ip-100-69-13-151.us-east-2.compute.internal ESS70460[1]: {\"message_id\":\"1722018932-111569-12637-2154-1\",\"src_ip\":\"159.183.85.229\",\"hdr_from\":\"UNice Hair Official \\u003csupport@unice.com\\u003e\",\"account_id\":\"ESS70460\",\"domain_id\":\"184835\",\"ptr_record\":\"wfbtrrzr.outbound-mail.sendgrid.net\",\"attstarkments\":null,\"recipients\":[{\"action\":\"blocked\",\"reason\":\"brts\",\"reason_extra\":\"dgqdga9s2781o.cloudfront.net\",\"delivered\":\"not_delivered\",\"delivery_detail\":\"\",\"email\":\"nzanders@priorityveteran.org\",\"taxonomy\":\"spam\"}],\"hdr_to\":\"nzanders@priorityveteran.org\",\"recipient_count\":1,\"dst_domain\":\"priorityveteran.org\",\"size\":54802,\"subject\":\"Last Chance Tonight: Pay $0 for the Second Wig!\",\"env_from\":\"bounces+33940005-740f-nzanders=priorityveteran.org@em9975.unice.com\",\"timestamp\":\"2024-07-26T18:35:34+0000\",\"geoip\":\"USA\",\"tls\":true}",
"messageType": "email_protection",
"senderHost": "egress.ess.barracudanetworks.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "barracuda_ess",
"tags": [
"barracuda_ess",
"email_protection"
]
} | Create a JSON artifact from the message |
851 <6> 2024-07-26T18:35:39Z ip-100-69-13-151.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722018932-111569-12637-2154-1","src_ip":"159.183.85.229","hdr_from":"UNice Hair Official \u003csupport@unice.com\u003e","account_id":"ESS70460","domain_id":"184835","ptr_record":"wfbtrrzr.outbound-mail.sendgrid.net","attstarkments":null,"recipients":[{"action":"blocked","reason":"brts","reason_extra":"dgqdga9s2781o.cloudfront.net","delivered":"not_delivered","delivery_detail":"","email":"nzanders@priorityveteran.org","taxonomy":"spam"}],"hdr_to":"nzanders@priorityveteran.org","recipient_count":1,"dst_domain":"priorityveteran.org","size":54802,"subject":"Last Chance Tonight: Pay $0 for the Second Wig!","env_from":"bounces+33940005-740f-nzanders=priorityveteran.org@em9975.unice.com","timestamp":"2024-07-26T18:35:34+0000","geoip":"USA","tls":true} | Product: Barracuda ESS
Vendor: Barracuda | Identify this syslog message |
851 <6> 2024-07-26T18:35:39Z ip-100-69-13-151.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722018932-111569-12637-2154-1","src_ip":"159.183.85.229","hdr_from":"UNice Hair Official \u003csupport@unice.com\u003e","account_id":"ESS70460","domain_id":"184835","ptr_record":"wfbtrrzr.outbound-mail.sendgrid.net","attstarkments":null,"recipients":[{"action":"blocked","reason":"brts","reason_extra":"dgqdga9s2781o.cloudfront.net","delivered":"not_delivered","delivery_detail":"","email":"nzanders@priorityveteran.org","taxonomy":"spam"}],"hdr_to":"nzanders@priorityveteran.org","recipient_count":1,"dst_domain":"priorityveteran.org","size":54802,"subject":"Last Chance Tonight: Pay $0 for the Second Wig!","env_from":"bounces+33940005-740f-nzanders=priorityveteran.org@em9975.unice.com","timestamp":"2024-07-26T18:35:34+0000","geoip":"USA","tls":true} | This is a syslog message from a product called Barracuda ESS by Barracuda. The following fields were extracted from the message:
fieldExtractorName: barracuda_ess
messageType: email_protection
senderHost: egress.ess.barracudanetworks.com
sensitivity: normal
sourceInfo: unknown
streamName: barracuda_ess
tags: ['barracuda_ess', 'email_protection'] | Explain this syslog message |
870 <6> 2024-07-26T18:35:38Z ip-100-69-13-151.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722018934-106124-12688-6273-1","src_ip":"38.64.68.160","hdr_from":"\"American Airlines\" \u003cnon-aadvantage@mail.ms.aa.com\u003e","account_id":"ESS70460","domain_id":"184811","ptr_record":"p1-068160.mail.ms.aa.com","attwaynements":null,"recipients":[{"action":"blocked","reason":"brts","reason_extra":"Spam.Other","delivered":"not_delivered","delivery_detail":"","email":"jbayles@crisiscenterbham.org","taxonomy":"spam"}],"hdr_to":"\"JBAYLES@CRISISCENTERBHAM.ORG\" \u003cJBAYLES@CRISISCENTERBHAM.ORG\u003e","recipient_count":1,"dst_domain":"crisiscenterbham.org","size":83084,"subject":"Thanks for booking: Use these tips to prepare for your trip to Indianapolis","env_from":"non-aadvantage@mail.ms.aa.com","timestamp":"2024-07-26T18:35:35+0000","geoip":"USA","tls":true} | {
"fieldExtractorName": "barracuda_ess",
"message": "870 <6> 2024-07-26T18:35:38Z ip-100-69-13-151.us-east-2.compute.internal ESS70460[1]: {\"message_id\":\"1722018934-106124-12688-6273-1\",\"src_ip\":\"38.64.68.160\",\"hdr_from\":\"\\\"American Airlines\\\" \\u003cnon-aadvantage@mail.ms.aa.com\\u003e\",\"account_id\":\"ESS70460\",\"domain_id\":\"184811\",\"ptr_record\":\"p1-068160.mail.ms.aa.com\",\"attwaynements\":null,\"recipients\":[{\"action\":\"blocked\",\"reason\":\"brts\",\"reason_extra\":\"Spam.Other\",\"delivered\":\"not_delivered\",\"delivery_detail\":\"\",\"email\":\"jbayles@crisiscenterbham.org\",\"taxonomy\":\"spam\"}],\"hdr_to\":\"\\\"JBAYLES@CRISISCENTERBHAM.ORG\\\" \\u003cJBAYLES@CRISISCENTERBHAM.ORG\\u003e\",\"recipient_count\":1,\"dst_domain\":\"crisiscenterbham.org\",\"size\":83084,\"subject\":\"Thanks for booking: Use these tips to prepare for your trip to Indianapolis\",\"env_from\":\"non-aadvantage@mail.ms.aa.com\",\"timestamp\":\"2024-07-26T18:35:35+0000\",\"geoip\":\"USA\",\"tls\":true}",
"messageType": "email_protection",
"senderHost": "egress.ess.barracudanetworks.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "barracuda_ess",
"tags": [
"barracuda_ess",
"email_protection"
]
} | Create a JSON artifact from the message |
870 <6> 2024-07-26T18:35:38Z ip-100-69-13-151.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722018934-106124-12688-6273-1","src_ip":"38.64.68.160","hdr_from":"\"American Airlines\" \u003cnon-aadvantage@mail.ms.aa.com\u003e","account_id":"ESS70460","domain_id":"184811","ptr_record":"p1-068160.mail.ms.aa.com","attwaynements":null,"recipients":[{"action":"blocked","reason":"brts","reason_extra":"Spam.Other","delivered":"not_delivered","delivery_detail":"","email":"jbayles@crisiscenterbham.org","taxonomy":"spam"}],"hdr_to":"\"JBAYLES@CRISISCENTERBHAM.ORG\" \u003cJBAYLES@CRISISCENTERBHAM.ORG\u003e","recipient_count":1,"dst_domain":"crisiscenterbham.org","size":83084,"subject":"Thanks for booking: Use these tips to prepare for your trip to Indianapolis","env_from":"non-aadvantage@mail.ms.aa.com","timestamp":"2024-07-26T18:35:35+0000","geoip":"USA","tls":true} | Product: Barracuda ESS
Vendor: Barracuda | Identify this syslog message |
870 <6> 2024-07-26T18:35:38Z ip-100-69-13-151.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722018934-106124-12688-6273-1","src_ip":"38.64.68.160","hdr_from":"\"American Airlines\" \u003cnon-aadvantage@mail.ms.aa.com\u003e","account_id":"ESS70460","domain_id":"184811","ptr_record":"p1-068160.mail.ms.aa.com","attwaynements":null,"recipients":[{"action":"blocked","reason":"brts","reason_extra":"Spam.Other","delivered":"not_delivered","delivery_detail":"","email":"jbayles@crisiscenterbham.org","taxonomy":"spam"}],"hdr_to":"\"JBAYLES@CRISISCENTERBHAM.ORG\" \u003cJBAYLES@CRISISCENTERBHAM.ORG\u003e","recipient_count":1,"dst_domain":"crisiscenterbham.org","size":83084,"subject":"Thanks for booking: Use these tips to prepare for your trip to Indianapolis","env_from":"non-aadvantage@mail.ms.aa.com","timestamp":"2024-07-26T18:35:35+0000","geoip":"USA","tls":true} | This is a syslog message from a product called Barracuda ESS by Barracuda. The following fields were extracted from the message:
fieldExtractorName: barracuda_ess
messageType: email_protection
senderHost: egress.ess.barracudanetworks.com
sensitivity: normal
sourceInfo: unknown
streamName: barracuda_ess
tags: ['barracuda_ess', 'email_protection'] | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T12:44:43.503Z","agent":{"ephemeral_id":"973656c4-8721-4cde-9ecd-9b9bce2db3ef","id":"e7af9e12-e634-42b8-a5c0-98459f1c4a8f","name":"NORDC-SS1-WEBD4","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"16384","created":"2024-07-26T12:44:43.849Z","kind":"event","provider":"Microsoft-Windows-Security-SPP"},"host":{"name":"NORDC-SS1-WEBD4.oscorp.com"},"log":{"level":"information"},"message":"Successfully scheduled Software Protection service for re-start at 2124-07-02T12:44:43Z. Reason: RulesEngine.","organization":"oscorp","senderHost":"10.20.30.113","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NORDC-SS1-WEBD4.oscorp.com","event_data":{"param1":"2124-07-02T12:44:43Z","param2":"RulesEngine"},"event_id":"16384","keywords":["Classic"],"opcode":"Info","provider_guid":"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}","provider_name":"Microsoft-Windows-Security-SPP","record_id":42886,"task":"None"}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-26T12:44:43.503Z\",\"agent\":{\"ephemeral_id\":\"973656c4-8721-4cde-9ecd-9b9bce2db3ef\",\"id\":\"e7af9e12-e634-42b8-a5c0-98459f1c4a8f\",\"name\":\"NORDC-SS1-WEBD4\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"16384\",\"created\":\"2024-07-26T12:44:43.849Z\",\"kind\":\"event\",\"provider\":\"Microsoft-Windows-Security-SPP\"},\"host\":{\"name\":\"NORDC-SS1-WEBD4.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"Successfully scheduled Software Protection service for re-start at 2124-07-02T12:44:43Z. Reason: RulesEngine.\",\"organization\":\"oscorp\",\"senderHost\":\"10.20.30.113\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"NORDC-SS1-WEBD4.oscorp.com\",\"event_data\":{\"param1\":\"2124-07-02T12:44:43Z\",\"param2\":\"RulesEngine\"},\"event_id\":\"16384\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_guid\":\"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}\",\"provider_name\":\"Microsoft-Windows-Security-SPP\",\"record_id\":42886,\"task\":\"None\"}}",
"messageType": "16384",
"senderHost": "10.20.30.113",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "microsoft-windows-security-spp",
"tags": [
"v8",
"eventId:16384",
"microsoft-windows-security-spp",
"16384"
],
"vendorCode": "42886"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T12:44:43.503Z","agent":{"ephemeral_id":"973656c4-8721-4cde-9ecd-9b9bce2db3ef","id":"e7af9e12-e634-42b8-a5c0-98459f1c4a8f","name":"NORDC-SS1-WEBD4","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"16384","created":"2024-07-26T12:44:43.849Z","kind":"event","provider":"Microsoft-Windows-Security-SPP"},"host":{"name":"NORDC-SS1-WEBD4.oscorp.com"},"log":{"level":"information"},"message":"Successfully scheduled Software Protection service for re-start at 2124-07-02T12:44:43Z. Reason: RulesEngine.","organization":"oscorp","senderHost":"10.20.30.113","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NORDC-SS1-WEBD4.oscorp.com","event_data":{"param1":"2124-07-02T12:44:43Z","param2":"RulesEngine"},"event_id":"16384","keywords":["Classic"],"opcode":"Info","provider_guid":"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}","provider_name":"Microsoft-Windows-Security-SPP","record_id":42886,"task":"None"}} | Product: microsoft-windows-security-spp
Vendor: microsoft-windows-security-spp | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T12:44:43.503Z","agent":{"ephemeral_id":"973656c4-8721-4cde-9ecd-9b9bce2db3ef","id":"e7af9e12-e634-42b8-a5c0-98459f1c4a8f","name":"NORDC-SS1-WEBD4","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"16384","created":"2024-07-26T12:44:43.849Z","kind":"event","provider":"Microsoft-Windows-Security-SPP"},"host":{"name":"NORDC-SS1-WEBD4.oscorp.com"},"log":{"level":"information"},"message":"Successfully scheduled Software Protection service for re-start at 2124-07-02T12:44:43Z. Reason: RulesEngine.","organization":"oscorp","senderHost":"10.20.30.113","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NORDC-SS1-WEBD4.oscorp.com","event_data":{"param1":"2124-07-02T12:44:43Z","param2":"RulesEngine"},"event_id":"16384","keywords":["Classic"],"opcode":"Info","provider_guid":"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}","provider_name":"Microsoft-Windows-Security-SPP","record_id":42886,"task":"None"}} | This is a syslog message from a product called microsoft-windows-security-spp by microsoft-windows-security-spp. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 16384
senderHost: 10.20.30.113
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: microsoft-windows-security-spp
tags: ['v8', 'eventId:16384', 'microsoft-windows-security-spp', '16384']
vendorCode: 42886 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T19:08:25.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"16385","created":"2024-07-26T19:08:26.377Z","kind":"event","provider":"Microsoft-Windows-Security-SPP"},"host":{"name":"Proteus.acme.com"},"log":{"level":"error"},"message":"Failed to schedule Software Protection service for re-start at 2124-07-02T19:08:25Z. Error Code: 0x80041316.","organization":"acme","senderHost":"Proteus.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.acme.com","event_data":{"param1":"0x80041316","param2":"2124-07-02T19:08:25Z"},"event_id":"16385","keywords":["Classic"],"opcode":"Info","provider_guid":"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}","provider_name":"Microsoft-Windows-Security-SPP","record_id":1290329,"task":"None"}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-26T19:08:25.000Z\",\"agent\":{\"ephemeral_id\":\"964d0404-9b18-4f2b-a3fe-7db4be557fbf\",\"id\":\"8809f950-580f-4473-8f56-fd5ca481b748\",\"name\":\"Proteus\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"16385\",\"created\":\"2024-07-26T19:08:26.377Z\",\"kind\":\"event\",\"provider\":\"Microsoft-Windows-Security-SPP\"},\"host\":{\"name\":\"Proteus.acme.com\"},\"log\":{\"level\":\"error\"},\"message\":\"Failed to schedule Software Protection service for re-start at 2124-07-02T19:08:25Z. Error Code: 0x80041316.\",\"organization\":\"acme\",\"senderHost\":\"Proteus.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"Proteus.acme.com\",\"event_data\":{\"param1\":\"0x80041316\",\"param2\":\"2124-07-02T19:08:25Z\"},\"event_id\":\"16385\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_guid\":\"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}\",\"provider_name\":\"Microsoft-Windows-Security-SPP\",\"record_id\":1290329,\"task\":\"None\"}}",
"messageType": "16385",
"senderHost": "Proteus.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "microsoft-windows-security-spp",
"tags": [
"v8",
"eventId:16385",
"microsoft-windows-security-spp",
"16385"
],
"vendorCode": "1290329"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T19:08:25.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"16385","created":"2024-07-26T19:08:26.377Z","kind":"event","provider":"Microsoft-Windows-Security-SPP"},"host":{"name":"Proteus.acme.com"},"log":{"level":"error"},"message":"Failed to schedule Software Protection service for re-start at 2124-07-02T19:08:25Z. Error Code: 0x80041316.","organization":"acme","senderHost":"Proteus.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.acme.com","event_data":{"param1":"0x80041316","param2":"2124-07-02T19:08:25Z"},"event_id":"16385","keywords":["Classic"],"opcode":"Info","provider_guid":"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}","provider_name":"Microsoft-Windows-Security-SPP","record_id":1290329,"task":"None"}} | Product: microsoft-windows-security-spp
Vendor: microsoft-windows-security-spp | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T19:08:25.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"16385","created":"2024-07-26T19:08:26.377Z","kind":"event","provider":"Microsoft-Windows-Security-SPP"},"host":{"name":"Proteus.acme.com"},"log":{"level":"error"},"message":"Failed to schedule Software Protection service for re-start at 2124-07-02T19:08:25Z. Error Code: 0x80041316.","organization":"acme","senderHost":"Proteus.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.acme.com","event_data":{"param1":"0x80041316","param2":"2124-07-02T19:08:25Z"},"event_id":"16385","keywords":["Classic"],"opcode":"Info","provider_guid":"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}","provider_name":"Microsoft-Windows-Security-SPP","record_id":1290329,"task":"None"}} | This is a syslog message from a product called microsoft-windows-security-spp by microsoft-windows-security-spp. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 16385
senderHost: Proteus.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: microsoft-windows-security-spp
tags: ['v8', 'eventId:16385', 'microsoft-windows-security-spp', '16385']
vendorCode: 1290329 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T17:37:25.774Z","agent":{"ephemeral_id":"970ead45-d705-467a-802a-cd059c8f9fbb","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"255","created":"2024-07-26T17:37:25.869Z","kind":"event","provider":"Nutanix Guest Agent"},"host":{"name":"TS01-2016.umbrella.com"},"log":{"level":"information"},"message":"NGA Child with PID 7112 exited with status 0","organization":"umbrella","senderHost":"TS01-2016.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"TS01-2016.umbrella.com","event_data":{"param1":"NGA Child with PID 7112 exited with status 0"},"event_id":"255","keywords":["Classic"],"provider_name":"Nutanix Guest Agent","record_id":151639,"task":"None"}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-26T17:37:25.774Z\",\"agent\":{\"ephemeral_id\":\"970ead45-d705-467a-802a-cd059c8f9fbb\",\"id\":\"1e289ed9-fa81-478d-9ec3-98d5119c9f2e\",\"name\":\"TS01-2016\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"255\",\"created\":\"2024-07-26T17:37:25.869Z\",\"kind\":\"event\",\"provider\":\"Nutanix Guest Agent\"},\"host\":{\"name\":\"TS01-2016.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"NGA Child with PID 7112 exited with status 0\",\"organization\":\"umbrella\",\"senderHost\":\"TS01-2016.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"TS01-2016.umbrella.com\",\"event_data\":{\"param1\":\"NGA Child with PID 7112 exited with status 0\"},\"event_id\":\"255\",\"keywords\":[\"Classic\"],\"provider_name\":\"Nutanix Guest Agent\",\"record_id\":151639,\"task\":\"None\"}}",
"messageType": "255",
"senderHost": "TS01-2016.mingledorffs.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "nutanix guest agent",
"tags": [
"v8",
"eventId:255",
"nutanix guest agent",
"255"
],
"vendorCode": "151639"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T17:37:25.774Z","agent":{"ephemeral_id":"970ead45-d705-467a-802a-cd059c8f9fbb","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"255","created":"2024-07-26T17:37:25.869Z","kind":"event","provider":"Nutanix Guest Agent"},"host":{"name":"TS01-2016.umbrella.com"},"log":{"level":"information"},"message":"NGA Child with PID 7112 exited with status 0","organization":"umbrella","senderHost":"TS01-2016.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"TS01-2016.umbrella.com","event_data":{"param1":"NGA Child with PID 7112 exited with status 0"},"event_id":"255","keywords":["Classic"],"provider_name":"Nutanix Guest Agent","record_id":151639,"task":"None"}} | Product: nutanix guest agent
Vendor: nutanix guest agent | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T17:37:25.774Z","agent":{"ephemeral_id":"970ead45-d705-467a-802a-cd059c8f9fbb","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"255","created":"2024-07-26T17:37:25.869Z","kind":"event","provider":"Nutanix Guest Agent"},"host":{"name":"TS01-2016.umbrella.com"},"log":{"level":"information"},"message":"NGA Child with PID 7112 exited with status 0","organization":"umbrella","senderHost":"TS01-2016.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"TS01-2016.umbrella.com","event_data":{"param1":"NGA Child with PID 7112 exited with status 0"},"event_id":"255","keywords":["Classic"],"provider_name":"Nutanix Guest Agent","record_id":151639,"task":"None"}} | This is a syslog message from a product called nutanix guest agent by nutanix guest agent. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 255
senderHost: TS01-2016.mingledorffs.com
sensitivity: normal
sourceInfo: unknown
streamName: nutanix guest agent
tags: ['v8', 'eventId:255', 'nutanix guest agent', '255']
vendorCode: 151639 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T17:37:25.774Z","agent":{"ephemeral_id":"970ead45-d705-467a-802a-cd059c8f9fbb","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"255","created":"2024-07-26T17:37:25.869Z","kind":"event","provider":"Nutanix Guest Agent"},"host":{"name":"TS01-2016.umbrella.com"},"log":{"level":"information"},"message":"Waiting for 30 minutes before starting Nutanix Guest Agent Service...","organization":"umbrella","senderHost":"TS01-2016.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"TS01-2016.umbrella.com","event_data":{"param1":"Waiting for 30 minutes before starting Nutanix Guest Agent Service..."},"event_id":"255","keywords":["Classic"],"provider_name":"Nutanix Guest Agent","record_id":151641,"task":"None"}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-26T17:37:25.774Z\",\"agent\":{\"ephemeral_id\":\"970ead45-d705-467a-802a-cd059c8f9fbb\",\"id\":\"1e289ed9-fa81-478d-9ec3-98d5119c9f2e\",\"name\":\"TS01-2016\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"255\",\"created\":\"2024-07-26T17:37:25.869Z\",\"kind\":\"event\",\"provider\":\"Nutanix Guest Agent\"},\"host\":{\"name\":\"TS01-2016.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"Waiting for 30 minutes before starting Nutanix Guest Agent Service...\",\"organization\":\"umbrella\",\"senderHost\":\"TS01-2016.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"TS01-2016.umbrella.com\",\"event_data\":{\"param1\":\"Waiting for 30 minutes before starting Nutanix Guest Agent Service...\"},\"event_id\":\"255\",\"keywords\":[\"Classic\"],\"provider_name\":\"Nutanix Guest Agent\",\"record_id\":151641,\"task\":\"None\"}}",
"messageType": "255",
"senderHost": "TS01-2016.mingledorffs.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "nutanix guest agent",
"tags": [
"v8",
"eventId:255",
"nutanix guest agent",
"255"
],
"vendorCode": "151641"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T17:37:25.774Z","agent":{"ephemeral_id":"970ead45-d705-467a-802a-cd059c8f9fbb","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"255","created":"2024-07-26T17:37:25.869Z","kind":"event","provider":"Nutanix Guest Agent"},"host":{"name":"TS01-2016.umbrella.com"},"log":{"level":"information"},"message":"Waiting for 30 minutes before starting Nutanix Guest Agent Service...","organization":"umbrella","senderHost":"TS01-2016.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"TS01-2016.umbrella.com","event_data":{"param1":"Waiting for 30 minutes before starting Nutanix Guest Agent Service..."},"event_id":"255","keywords":["Classic"],"provider_name":"Nutanix Guest Agent","record_id":151641,"task":"None"}} | Product: nutanix guest agent
Vendor: nutanix guest agent | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T17:37:25.774Z","agent":{"ephemeral_id":"970ead45-d705-467a-802a-cd059c8f9fbb","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"255","created":"2024-07-26T17:37:25.869Z","kind":"event","provider":"Nutanix Guest Agent"},"host":{"name":"TS01-2016.umbrella.com"},"log":{"level":"information"},"message":"Waiting for 30 minutes before starting Nutanix Guest Agent Service...","organization":"umbrella","senderHost":"TS01-2016.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"TS01-2016.umbrella.com","event_data":{"param1":"Waiting for 30 minutes before starting Nutanix Guest Agent Service..."},"event_id":"255","keywords":["Classic"],"provider_name":"Nutanix Guest Agent","record_id":151641,"task":"None"}} | This is a syslog message from a product called nutanix guest agent by nutanix guest agent. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 255
senderHost: TS01-2016.mingledorffs.com
sensitivity: normal
sourceInfo: unknown
streamName: nutanix guest agent
tags: ['v8', 'eventId:255', 'nutanix guest agent', '255']
vendorCode: 151641 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T17:37:25.774Z","agent":{"ephemeral_id":"970ead45-d705-467a-802a-cd059c8f9fbb","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"255","created":"2024-07-26T17:37:25.869Z","kind":"event","provider":"Nutanix Guest Agent"},"host":{"name":"TS01-2016.wayne.com"},"log":{"level":"information"},"message":"Current successive failure count : 37","organization":"wayne","senderHost":"TS01-2016.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"TS01-2016.wayne.com","event_data":{"param1":"Current successive failure count : 37"},"event_id":"255","keywords":["Classic"],"provider_name":"Nutanix Guest Agent","record_id":151640,"task":"None"}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-26T17:37:25.774Z\",\"agent\":{\"ephemeral_id\":\"970ead45-d705-467a-802a-cd059c8f9fbb\",\"id\":\"1e289ed9-fa81-478d-9ec3-98d5119c9f2e\",\"name\":\"TS01-2016\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"255\",\"created\":\"2024-07-26T17:37:25.869Z\",\"kind\":\"event\",\"provider\":\"Nutanix Guest Agent\"},\"host\":{\"name\":\"TS01-2016.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"Current successive failure count : 37\",\"organization\":\"wayne\",\"senderHost\":\"TS01-2016.wayne.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"TS01-2016.wayne.com\",\"event_data\":{\"param1\":\"Current successive failure count : 37\"},\"event_id\":\"255\",\"keywords\":[\"Classic\"],\"provider_name\":\"Nutanix Guest Agent\",\"record_id\":151640,\"task\":\"None\"}}",
"messageType": "255",
"senderHost": "TS01-2016.mingledorffs.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "nutanix guest agent",
"tags": [
"v8",
"eventId:255",
"nutanix guest agent",
"255"
],
"vendorCode": "151640"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T17:37:25.774Z","agent":{"ephemeral_id":"970ead45-d705-467a-802a-cd059c8f9fbb","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"255","created":"2024-07-26T17:37:25.869Z","kind":"event","provider":"Nutanix Guest Agent"},"host":{"name":"TS01-2016.wayne.com"},"log":{"level":"information"},"message":"Current successive failure count : 37","organization":"wayne","senderHost":"TS01-2016.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"TS01-2016.wayne.com","event_data":{"param1":"Current successive failure count : 37"},"event_id":"255","keywords":["Classic"],"provider_name":"Nutanix Guest Agent","record_id":151640,"task":"None"}} | Product: nutanix guest agent
Vendor: nutanix guest agent | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T17:37:25.774Z","agent":{"ephemeral_id":"970ead45-d705-467a-802a-cd059c8f9fbb","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"255","created":"2024-07-26T17:37:25.869Z","kind":"event","provider":"Nutanix Guest Agent"},"host":{"name":"TS01-2016.wayne.com"},"log":{"level":"information"},"message":"Current successive failure count : 37","organization":"wayne","senderHost":"TS01-2016.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"TS01-2016.wayne.com","event_data":{"param1":"Current successive failure count : 37"},"event_id":"255","keywords":["Classic"],"provider_name":"Nutanix Guest Agent","record_id":151640,"task":"None"}} | This is a syslog message from a product called nutanix guest agent by nutanix guest agent. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 255
senderHost: TS01-2016.mingledorffs.com
sensitivity: normal
sourceInfo: unknown
streamName: nutanix guest agent
tags: ['v8', 'eventId:255', 'nutanix guest agent', '255']
vendorCode: 151640 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T17:40:10.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"16385","created":"2024-07-26T17:40:10.810Z","kind":"event","provider":"Microsoft-Windows-Security-SPP"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"error"},"message":"Failed to schedule Software Protection service for re-start at 2124-07-02T17:40:10Z. Error Code: 0x80041316.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.umbrella.com","event_data":{"param1":"0x80041316","param2":"2124-07-02T17:40:10Z"},"event_id":"16385","keywords":["Classic"],"opcode":"Info","provider_guid":"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}","provider_name":"Microsoft-Windows-Security-SPP","record_id":1290147,"task":"None"}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-26T17:40:10.000Z\",\"agent\":{\"ephemeral_id\":\"964d0404-9b18-4f2b-a3fe-7db4be557fbf\",\"id\":\"8809f950-580f-4473-8f56-fd5ca481b748\",\"name\":\"Proteus\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"16385\",\"created\":\"2024-07-26T17:40:10.810Z\",\"kind\":\"event\",\"provider\":\"Microsoft-Windows-Security-SPP\"},\"host\":{\"name\":\"Proteus.umbrella.com\"},\"log\":{\"level\":\"error\"},\"message\":\"Failed to schedule Software Protection service for re-start at 2124-07-02T17:40:10Z. Error Code: 0x80041316.\",\"organization\":\"umbrella\",\"senderHost\":\"Proteus.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"Proteus.umbrella.com\",\"event_data\":{\"param1\":\"0x80041316\",\"param2\":\"2124-07-02T17:40:10Z\"},\"event_id\":\"16385\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_guid\":\"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}\",\"provider_name\":\"Microsoft-Windows-Security-SPP\",\"record_id\":1290147,\"task\":\"None\"}}",
"messageType": "16385",
"senderHost": "Proteus.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "microsoft-windows-security-spp",
"tags": [
"v8",
"eventId:16385",
"microsoft-windows-security-spp",
"16385"
],
"vendorCode": "1290147"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T17:40:10.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"16385","created":"2024-07-26T17:40:10.810Z","kind":"event","provider":"Microsoft-Windows-Security-SPP"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"error"},"message":"Failed to schedule Software Protection service for re-start at 2124-07-02T17:40:10Z. Error Code: 0x80041316.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.umbrella.com","event_data":{"param1":"0x80041316","param2":"2124-07-02T17:40:10Z"},"event_id":"16385","keywords":["Classic"],"opcode":"Info","provider_guid":"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}","provider_name":"Microsoft-Windows-Security-SPP","record_id":1290147,"task":"None"}} | Product: microsoft-windows-security-spp
Vendor: microsoft-windows-security-spp | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T17:40:10.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"16385","created":"2024-07-26T17:40:10.810Z","kind":"event","provider":"Microsoft-Windows-Security-SPP"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"error"},"message":"Failed to schedule Software Protection service for re-start at 2124-07-02T17:40:10Z. Error Code: 0x80041316.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.umbrella.com","event_data":{"param1":"0x80041316","param2":"2124-07-02T17:40:10Z"},"event_id":"16385","keywords":["Classic"],"opcode":"Info","provider_guid":"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}","provider_name":"Microsoft-Windows-Security-SPP","record_id":1290147,"task":"None"}} | This is a syslog message from a product called microsoft-windows-security-spp by microsoft-windows-security-spp. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 16385
senderHost: Proteus.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: microsoft-windows-security-spp
tags: ['v8', 'eventId:16385', 'microsoft-windows-security-spp', '16385']
vendorCode: 1290147 | Explain this syslog message |
1084 <6> 2024-07-26T14:07:11Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722002824-105197-12632-5170-1","src_ip":"54.240.36.30","hdr_from":"The Washington Post \u003cemail@washingtonpost.com\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"a36-30.smtp-out.amazonses.com","attstarkments":null,"recipients":[{"action":"allowed","reason":"","reason_extra":"","delivered":"delivered","delivery_detail":"stark-org.mail.protection.outlook.com.:25:250 2.6.0 \u003c01000190ef5dda42-5c4f6289-421e-4981-9d9f-61a35248d374-000000@email.amazonses.com\u003e [InternalId=28080496185521, Hostname=SN7PR15MB5795.namprd15.prod.outlook.com] 44494 bytes in 0.237, 182.991 KB/sec Queued mail for delivery","email":"katrina.watson@stark.org","taxonomy":"none"}],"hdr_to":"katrina.watson@stark.org","recipient_count":1,"dst_domain":"stark.org","size":30214,"subject":"Unlock unlimited access for $1 a week","env_from":"01000190ef5dda42-5c4f6289-421e-4981-9d9f-61a35248d374-000000@email.washingtonpost.com","timestamp":"2024-07-26T14:07:07+0000","geoip":"USA","tls":true} | {
"fieldExtractorName": "barracuda_ess",
"message": "1084 <6> 2024-07-26T14:07:11Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {\"message_id\":\"1722002824-105197-12632-5170-1\",\"src_ip\":\"54.240.36.30\",\"hdr_from\":\"The Washington Post \\u003cemail@washingtonpost.com\\u003e\",\"account_id\":\"ESS70460\",\"domain_id\":\"158260\",\"ptr_record\":\"a36-30.smtp-out.amazonses.com\",\"attstarkments\":null,\"recipients\":[{\"action\":\"allowed\",\"reason\":\"\",\"reason_extra\":\"\",\"delivered\":\"delivered\",\"delivery_detail\":\"stark-org.mail.protection.outlook.com.:25:250 2.6.0 \\u003c01000190ef5dda42-5c4f6289-421e-4981-9d9f-61a35248d374-000000@email.amazonses.com\\u003e [InternalId=28080496185521, Hostname=SN7PR15MB5795.namprd15.prod.outlook.com] 44494 bytes in 0.237, 182.991 KB/sec Queued mail for delivery\",\"email\":\"katrina.watson@stark.org\",\"taxonomy\":\"none\"}],\"hdr_to\":\"katrina.watson@stark.org\",\"recipient_count\":1,\"dst_domain\":\"stark.org\",\"size\":30214,\"subject\":\"Unlock unlimited access for $1 a week\",\"env_from\":\"01000190ef5dda42-5c4f6289-421e-4981-9d9f-61a35248d374-000000@email.washingtonpost.com\",\"timestamp\":\"2024-07-26T14:07:07+0000\",\"geoip\":\"USA\",\"tls\":true}",
"messageType": "email_protection",
"senderHost": "egress.ess.barracudanetworks.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "barracuda_ess",
"tags": [
"barracuda_ess",
"email_protection"
]
} | Create a JSON artifact from the message |
1084 <6> 2024-07-26T14:07:11Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722002824-105197-12632-5170-1","src_ip":"54.240.36.30","hdr_from":"The Washington Post \u003cemail@washingtonpost.com\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"a36-30.smtp-out.amazonses.com","attstarkments":null,"recipients":[{"action":"allowed","reason":"","reason_extra":"","delivered":"delivered","delivery_detail":"stark-org.mail.protection.outlook.com.:25:250 2.6.0 \u003c01000190ef5dda42-5c4f6289-421e-4981-9d9f-61a35248d374-000000@email.amazonses.com\u003e [InternalId=28080496185521, Hostname=SN7PR15MB5795.namprd15.prod.outlook.com] 44494 bytes in 0.237, 182.991 KB/sec Queued mail for delivery","email":"katrina.watson@stark.org","taxonomy":"none"}],"hdr_to":"katrina.watson@stark.org","recipient_count":1,"dst_domain":"stark.org","size":30214,"subject":"Unlock unlimited access for $1 a week","env_from":"01000190ef5dda42-5c4f6289-421e-4981-9d9f-61a35248d374-000000@email.washingtonpost.com","timestamp":"2024-07-26T14:07:07+0000","geoip":"USA","tls":true} | Product: Barracuda ESS
Vendor: Barracuda | Identify this syslog message |
1084 <6> 2024-07-26T14:07:11Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722002824-105197-12632-5170-1","src_ip":"54.240.36.30","hdr_from":"The Washington Post \u003cemail@washingtonpost.com\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"a36-30.smtp-out.amazonses.com","attstarkments":null,"recipients":[{"action":"allowed","reason":"","reason_extra":"","delivered":"delivered","delivery_detail":"stark-org.mail.protection.outlook.com.:25:250 2.6.0 \u003c01000190ef5dda42-5c4f6289-421e-4981-9d9f-61a35248d374-000000@email.amazonses.com\u003e [InternalId=28080496185521, Hostname=SN7PR15MB5795.namprd15.prod.outlook.com] 44494 bytes in 0.237, 182.991 KB/sec Queued mail for delivery","email":"katrina.watson@stark.org","taxonomy":"none"}],"hdr_to":"katrina.watson@stark.org","recipient_count":1,"dst_domain":"stark.org","size":30214,"subject":"Unlock unlimited access for $1 a week","env_from":"01000190ef5dda42-5c4f6289-421e-4981-9d9f-61a35248d374-000000@email.washingtonpost.com","timestamp":"2024-07-26T14:07:07+0000","geoip":"USA","tls":true} | This is a syslog message from a product called Barracuda ESS by Barracuda. The following fields were extracted from the message:
fieldExtractorName: barracuda_ess
messageType: email_protection
senderHost: egress.ess.barracudanetworks.com
sensitivity: normal
sourceInfo: unknown
streamName: barracuda_ess
tags: ['barracuda_ess', 'email_protection'] | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:35:38.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"16385","created":"2024-07-27T02:35:39.070Z","kind":"event","provider":"Microsoft-Windows-Security-SPP"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"error"},"message":"Failed to schedule Software Protection service for re-start at 2124-07-03T02:35:38Z. Error Code: 0x80041316.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.umbrella.com","event_data":{"param1":"0x80041316","param2":"2124-07-03T02:35:38Z"},"event_id":"16385","keywords":["Classic"],"opcode":"Info","provider_guid":"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}","provider_name":"Microsoft-Windows-Security-SPP","record_id":1291264,"task":"None"}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T02:35:38.000Z\",\"agent\":{\"ephemeral_id\":\"964d0404-9b18-4f2b-a3fe-7db4be557fbf\",\"id\":\"8809f950-580f-4473-8f56-fd5ca481b748\",\"name\":\"Proteus\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"16385\",\"created\":\"2024-07-27T02:35:39.070Z\",\"kind\":\"event\",\"provider\":\"Microsoft-Windows-Security-SPP\"},\"host\":{\"name\":\"Proteus.umbrella.com\"},\"log\":{\"level\":\"error\"},\"message\":\"Failed to schedule Software Protection service for re-start at 2124-07-03T02:35:38Z. Error Code: 0x80041316.\",\"organization\":\"umbrella\",\"senderHost\":\"Proteus.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"Proteus.umbrella.com\",\"event_data\":{\"param1\":\"0x80041316\",\"param2\":\"2124-07-03T02:35:38Z\"},\"event_id\":\"16385\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_guid\":\"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}\",\"provider_name\":\"Microsoft-Windows-Security-SPP\",\"record_id\":1291264,\"task\":\"None\"}}",
"messageType": "16385",
"senderHost": "Proteus.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "microsoft-windows-security-spp",
"tags": [
"v8",
"eventId:16385",
"microsoft-windows-security-spp",
"16385"
],
"vendorCode": "1291264"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:35:38.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"16385","created":"2024-07-27T02:35:39.070Z","kind":"event","provider":"Microsoft-Windows-Security-SPP"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"error"},"message":"Failed to schedule Software Protection service for re-start at 2124-07-03T02:35:38Z. Error Code: 0x80041316.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.umbrella.com","event_data":{"param1":"0x80041316","param2":"2124-07-03T02:35:38Z"},"event_id":"16385","keywords":["Classic"],"opcode":"Info","provider_guid":"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}","provider_name":"Microsoft-Windows-Security-SPP","record_id":1291264,"task":"None"}} | Product: microsoft-windows-security-spp
Vendor: microsoft-windows-security-spp | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:35:38.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"16385","created":"2024-07-27T02:35:39.070Z","kind":"event","provider":"Microsoft-Windows-Security-SPP"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"error"},"message":"Failed to schedule Software Protection service for re-start at 2124-07-03T02:35:38Z. Error Code: 0x80041316.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.umbrella.com","event_data":{"param1":"0x80041316","param2":"2124-07-03T02:35:38Z"},"event_id":"16385","keywords":["Classic"],"opcode":"Info","provider_guid":"{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}","provider_name":"Microsoft-Windows-Security-SPP","record_id":1291264,"task":"None"}} | This is a syslog message from a product called microsoft-windows-security-spp by microsoft-windows-security-spp. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 16385
senderHost: Proteus.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: microsoft-windows-security-spp
tags: ['v8', 'eventId:16385', 'microsoft-windows-security-spp', '16385']
vendorCode: 1291264 | Explain this syslog message |
<134>Jul 30 05:27:30 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3018|1909|AWS Account Synchronization Finished|3|src=72.144.134.70 suser=janedoe target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 | {
"clientIP": "72.144.134.70",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "cef",
"localHostname": "deepsecurity",
"localStartTime": "Jul 30 05:27:30",
"message": "<134>Jul 30 05:27:30 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3018|1909|AWS Account Synchronization Finished|3|src=72.144.134.70 suser=janedoe target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 ",
"messageType": "AWS Account Synchronization Finished",
"priority": 134,
"senderHost": "34.205.5.4",
"sensitivity": "normal",
"severityCode": 7,
"severityLabel": "debug",
"sourceInfo": "unknown",
"streamName": "trend micro_deep security manager",
"tags": [
"AWS Account Synchronization Finished",
"trend micro_deep security manager",
"rfc3164",
"cef",
"trend micro_deep security manager_AWS Account Synchronization Finished"
],
"userName": "janedoe",
"vendorCode": "1909"
} | Create a JSON artifact from the message |
<134>Jul 30 05:27:30 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3018|1909|AWS Account Synchronization Finished|3|src=72.144.134.70 suser=janedoe target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 | Product: trend micro_deep security manager
Vendor: trend micro_deep security manager | Identify this syslog message |
<134>Jul 30 05:27:30 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3018|1909|AWS Account Synchronization Finished|3|src=72.144.134.70 suser=janedoe target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 | This is a syslog message from a product called trend micro_deep security manager by trend micro_deep security manager. The following fields were extracted from the message:
clientIP: 72.144.134.70
facilityCode: 16
facilityLabel: local0
fieldExtractorName: cef
localHostname: deepsecurity
localStartTime: Jul 30 05:27:30
messageType: AWS Account Synchronization Finished
priority: 134
senderHost: 34.205.5.4
sensitivity: normal
severityCode: 7
severityLabel: debug
sourceInfo: unknown
streamName: trend micro_deep security manager
tags: ['AWS Account Synchronization Finished', 'trend micro_deep security manager', 'rfc3164', 'cef', 'trend micro_deep security manager_AWS Account Synchronization Finished']
userName: janedoe
vendorCode: 1909 | Explain this syslog message |
1147 <6> 2024-07-26T18:31:07Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722018660-103421-12670-5931-1","src_ip":"108.174.6.185","hdr_from":"LinkedIn Job Alerts \u003cjobalerts-noreply@linkedin.com\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"maild-da.linkedin.com","attacmements":null,"recipients":[{"action":"allowed","reason":"emailcat","reason_extra":"acmeialmedia","delivered":"delivered","delivery_detail":"acme-org.mail.protection.outlook.com.:25:250 2.6.0 \u003c770479930.2702389.1722018659694@lor1-app77304.prod.linkedin.com\u003e [InternalId=142476950126667, Hostname=SN7PR15MB4208.namprd15.prod.outlook.com] 158619 bytes in 0.405, 382.426 KB/sec Queued mail for delivery","email":"lawrencia.richardson@acme.org","taxonomy":"policy"}],"hdr_to":"\"Lawrencia Richardson, MBA, RN, PHR\" \u003clawrencia.richardson@acme.org\u003e","recipient_count":1,"dst_domain":"acme.org","size":145156,"subject":"30+ new jobs for “human resources”","env_from":"s-2rtk6r2ysxzahcm8mwo21kwl8wlrr0d4nf02odc5f4w5sec40vdiap9g@bounce.linkedin.com","timestamp":"2024-07-26T18:31:04+0000","geoip":"USA","tls":true} | {
"fieldExtractorName": "barracuda_ess",
"message": "1147 <6> 2024-07-26T18:31:07Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {\"message_id\":\"1722018660-103421-12670-5931-1\",\"src_ip\":\"108.174.6.185\",\"hdr_from\":\"LinkedIn Job Alerts \\u003cjobalerts-noreply@linkedin.com\\u003e\",\"account_id\":\"ESS70460\",\"domain_id\":\"158260\",\"ptr_record\":\"maild-da.linkedin.com\",\"attacmements\":null,\"recipients\":[{\"action\":\"allowed\",\"reason\":\"emailcat\",\"reason_extra\":\"acmeialmedia\",\"delivered\":\"delivered\",\"delivery_detail\":\"acme-org.mail.protection.outlook.com.:25:250 2.6.0 \\u003c770479930.2702389.1722018659694@lor1-app77304.prod.linkedin.com\\u003e [InternalId=142476950126667, Hostname=SN7PR15MB4208.namprd15.prod.outlook.com] 158619 bytes in 0.405, 382.426 KB/sec Queued mail for delivery\",\"email\":\"lawrencia.richardson@acme.org\",\"taxonomy\":\"policy\"}],\"hdr_to\":\"\\\"Lawrencia Richardson, MBA, RN, PHR\\\" \\u003clawrencia.richardson@acme.org\\u003e\",\"recipient_count\":1,\"dst_domain\":\"acme.org\",\"size\":145156,\"subject\":\"30+ new jobs for \u201chuman resources\u201d\",\"env_from\":\"s-2rtk6r2ysxzahcm8mwo21kwl8wlrr0d4nf02odc5f4w5sec40vdiap9g@bounce.linkedin.com\",\"timestamp\":\"2024-07-26T18:31:04+0000\",\"geoip\":\"USA\",\"tls\":true}",
"messageType": "email_protection",
"senderHost": "egress.ess.barracudanetworks.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "barracuda_ess",
"tags": [
"barracuda_ess",
"email_protection"
]
} | Create a JSON artifact from the message |
1147 <6> 2024-07-26T18:31:07Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722018660-103421-12670-5931-1","src_ip":"108.174.6.185","hdr_from":"LinkedIn Job Alerts \u003cjobalerts-noreply@linkedin.com\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"maild-da.linkedin.com","attacmements":null,"recipients":[{"action":"allowed","reason":"emailcat","reason_extra":"acmeialmedia","delivered":"delivered","delivery_detail":"acme-org.mail.protection.outlook.com.:25:250 2.6.0 \u003c770479930.2702389.1722018659694@lor1-app77304.prod.linkedin.com\u003e [InternalId=142476950126667, Hostname=SN7PR15MB4208.namprd15.prod.outlook.com] 158619 bytes in 0.405, 382.426 KB/sec Queued mail for delivery","email":"lawrencia.richardson@acme.org","taxonomy":"policy"}],"hdr_to":"\"Lawrencia Richardson, MBA, RN, PHR\" \u003clawrencia.richardson@acme.org\u003e","recipient_count":1,"dst_domain":"acme.org","size":145156,"subject":"30+ new jobs for “human resources”","env_from":"s-2rtk6r2ysxzahcm8mwo21kwl8wlrr0d4nf02odc5f4w5sec40vdiap9g@bounce.linkedin.com","timestamp":"2024-07-26T18:31:04+0000","geoip":"USA","tls":true} | Product: Barracuda ESS
Vendor: Barracuda | Identify this syslog message |
1147 <6> 2024-07-26T18:31:07Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722018660-103421-12670-5931-1","src_ip":"108.174.6.185","hdr_from":"LinkedIn Job Alerts \u003cjobalerts-noreply@linkedin.com\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"maild-da.linkedin.com","attacmements":null,"recipients":[{"action":"allowed","reason":"emailcat","reason_extra":"acmeialmedia","delivered":"delivered","delivery_detail":"acme-org.mail.protection.outlook.com.:25:250 2.6.0 \u003c770479930.2702389.1722018659694@lor1-app77304.prod.linkedin.com\u003e [InternalId=142476950126667, Hostname=SN7PR15MB4208.namprd15.prod.outlook.com] 158619 bytes in 0.405, 382.426 KB/sec Queued mail for delivery","email":"lawrencia.richardson@acme.org","taxonomy":"policy"}],"hdr_to":"\"Lawrencia Richardson, MBA, RN, PHR\" \u003clawrencia.richardson@acme.org\u003e","recipient_count":1,"dst_domain":"acme.org","size":145156,"subject":"30+ new jobs for “human resources”","env_from":"s-2rtk6r2ysxzahcm8mwo21kwl8wlrr0d4nf02odc5f4w5sec40vdiap9g@bounce.linkedin.com","timestamp":"2024-07-26T18:31:04+0000","geoip":"USA","tls":true} | This is a syslog message from a product called Barracuda ESS by Barracuda. The following fields were extracted from the message:
fieldExtractorName: barracuda_ess
messageType: email_protection
senderHost: egress.ess.barracudanetworks.com
sensitivity: normal
sourceInfo: unknown
streamName: barracuda_ess
tags: ['barracuda_ess', 'email_protection'] | Explain this syslog message |
1022 <6> 2024-07-26T17:51:34Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722016287-103472-12629-7357-1","src_ip":"199.15.212.196","hdr_from":"SHRM Membership \u003cshrm.membership@e.shrm.org\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"b.e.shrm.org","attumbrellaments":null,"recipients":[{"action":"allowed","reason":"","reason_extra":"","delivered":"delivered","delivery_detail":"umbrella-org.mail.protection.outlook.com.:25:250 2.6.0 \u003c1421486661.434081871.1722016287487@abmktmail-batch1f.marketo.org\u003e [InternalId=1163936163130, Hostname=DS0PR15MB5621.namprd15.prod.outlook.com] 67257 bytes in 0.208, 314.357 KB/sec Queued mail for delivery","email":"kcarlton@umbrella.org","taxonomy":"none"}],"hdr_to":"kcarlton@umbrella.org","recipient_count":1,"dst_domain":"umbrella.org","size":45693,"subject":"Get a FREE Picnic Blanket and Stanley! Join Today!","env_from":"823-TWS-984.0.194367.0.0.169576.9.122883111@b.e.shrm.org","timestamp":"2024-07-26T17:51:31+0000","geoip":"USA","tls":true} | {
"fieldExtractorName": "barracuda_ess",
"message": "1022 <6> 2024-07-26T17:51:34Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {\"message_id\":\"1722016287-103472-12629-7357-1\",\"src_ip\":\"199.15.212.196\",\"hdr_from\":\"SHRM Membership \\u003cshrm.membership@e.shrm.org\\u003e\",\"account_id\":\"ESS70460\",\"domain_id\":\"158260\",\"ptr_record\":\"b.e.shrm.org\",\"attumbrellaments\":null,\"recipients\":[{\"action\":\"allowed\",\"reason\":\"\",\"reason_extra\":\"\",\"delivered\":\"delivered\",\"delivery_detail\":\"umbrella-org.mail.protection.outlook.com.:25:250 2.6.0 \\u003c1421486661.434081871.1722016287487@abmktmail-batch1f.marketo.org\\u003e [InternalId=1163936163130, Hostname=DS0PR15MB5621.namprd15.prod.outlook.com] 67257 bytes in 0.208, 314.357 KB/sec Queued mail for delivery\",\"email\":\"kcarlton@umbrella.org\",\"taxonomy\":\"none\"}],\"hdr_to\":\"kcarlton@umbrella.org\",\"recipient_count\":1,\"dst_domain\":\"umbrella.org\",\"size\":45693,\"subject\":\"Get a FREE Picnic Blanket and Stanley! Join Today!\",\"env_from\":\"823-TWS-984.0.194367.0.0.169576.9.122883111@b.e.shrm.org\",\"timestamp\":\"2024-07-26T17:51:31+0000\",\"geoip\":\"USA\",\"tls\":true}",
"messageType": "email_protection",
"senderHost": "egress.ess.barracudanetworks.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "barracuda_ess",
"tags": [
"barracuda_ess",
"email_protection"
]
} | Create a JSON artifact from the message |
1022 <6> 2024-07-26T17:51:34Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722016287-103472-12629-7357-1","src_ip":"199.15.212.196","hdr_from":"SHRM Membership \u003cshrm.membership@e.shrm.org\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"b.e.shrm.org","attumbrellaments":null,"recipients":[{"action":"allowed","reason":"","reason_extra":"","delivered":"delivered","delivery_detail":"umbrella-org.mail.protection.outlook.com.:25:250 2.6.0 \u003c1421486661.434081871.1722016287487@abmktmail-batch1f.marketo.org\u003e [InternalId=1163936163130, Hostname=DS0PR15MB5621.namprd15.prod.outlook.com] 67257 bytes in 0.208, 314.357 KB/sec Queued mail for delivery","email":"kcarlton@umbrella.org","taxonomy":"none"}],"hdr_to":"kcarlton@umbrella.org","recipient_count":1,"dst_domain":"umbrella.org","size":45693,"subject":"Get a FREE Picnic Blanket and Stanley! Join Today!","env_from":"823-TWS-984.0.194367.0.0.169576.9.122883111@b.e.shrm.org","timestamp":"2024-07-26T17:51:31+0000","geoip":"USA","tls":true} | Product: Barracuda ESS
Vendor: Barracuda | Identify this syslog message |
1022 <6> 2024-07-26T17:51:34Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722016287-103472-12629-7357-1","src_ip":"199.15.212.196","hdr_from":"SHRM Membership \u003cshrm.membership@e.shrm.org\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"b.e.shrm.org","attumbrellaments":null,"recipients":[{"action":"allowed","reason":"","reason_extra":"","delivered":"delivered","delivery_detail":"umbrella-org.mail.protection.outlook.com.:25:250 2.6.0 \u003c1421486661.434081871.1722016287487@abmktmail-batch1f.marketo.org\u003e [InternalId=1163936163130, Hostname=DS0PR15MB5621.namprd15.prod.outlook.com] 67257 bytes in 0.208, 314.357 KB/sec Queued mail for delivery","email":"kcarlton@umbrella.org","taxonomy":"none"}],"hdr_to":"kcarlton@umbrella.org","recipient_count":1,"dst_domain":"umbrella.org","size":45693,"subject":"Get a FREE Picnic Blanket and Stanley! Join Today!","env_from":"823-TWS-984.0.194367.0.0.169576.9.122883111@b.e.shrm.org","timestamp":"2024-07-26T17:51:31+0000","geoip":"USA","tls":true} | This is a syslog message from a product called Barracuda ESS by Barracuda. The following fields were extracted from the message:
fieldExtractorName: barracuda_ess
messageType: email_protection
senderHost: egress.ess.barracudanetworks.com
sensitivity: normal
sourceInfo: unknown
streamName: barracuda_ess
tags: ['barracuda_ess', 'email_protection'] | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T01:34:32.818Z","agent":{"ephemeral_id":"50030cf9-cc76-41fc-97cb-53aac2067d01","id":"d8ff39c6-36da-4469-b7a0-13fb607ab79c","name":"TS03-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"6","created":"2024-07-27T01:34:34.243Z","kind":"event","provider":"Microsoft-Windows-FilterManager"},"host":{"name":"TS03-2016.oscorp.com"},"log":{"level":"information"},"message":"File System Filter 'cdrv' (10.0, 2024-05-07T03:52:22.000000000Z) has successfully loaded and registered with Filter Manager.","organization":"oscorp","senderHost":"nordc-app-wis02.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS03-2016.oscorp.com","event_data":{"DeviceName":"cdrv","DeviceNameLength":"4","DeviceTime":"2024-05-07T03:52:22.000000000Z","DeviceVersionMajor":"10","DeviceVersionMinor":"0","ExtraInfoLength":"203","ExtraInfoString":"{ \"flags\" : \"0x00000018\" , \"registration_version\" : \"0x00000203\" , \"tx\" : false , \"sections\" : false , \"frame\" : 0 , \"class_name\" : \"FSFilter Activity Monitor\" , \"instances\" : [[\"371337\",\"0x00000000\"]] }","FilterID":"{02000000-001E-0000-6ABE-B821C5DFDA01}","FinalStatus":"0x0"},"event_id":"6","keywords":["ms:Measures"],"opcode":"Info","process":{"pid":4,"thread":{"id":9116}},"provider_guid":"{F3C5E28E-63F6-49C7-A204-E48A1BC4B09D}","provider_name":"Microsoft-Windows-FilterManager","record_id":258501,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"},"version":1}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T01:34:32.818Z\",\"agent\":{\"ephemeral_id\":\"50030cf9-cc76-41fc-97cb-53aac2067d01\",\"id\":\"d8ff39c6-36da-4469-b7a0-13fb607ab79c\",\"name\":\"TS03-2016\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"6\",\"created\":\"2024-07-27T01:34:34.243Z\",\"kind\":\"event\",\"provider\":\"Microsoft-Windows-FilterManager\"},\"host\":{\"name\":\"TS03-2016.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"File System Filter 'cdrv' (10.0, \u200e2024\u200e-\u200e05\u200e-\u200e07T03:52:22.000000000Z) has successfully loaded and registered with Filter Manager.\",\"organization\":\"oscorp\",\"senderHost\":\"nordc-app-wis02.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"TS03-2016.oscorp.com\",\"event_data\":{\"DeviceName\":\"cdrv\",\"DeviceNameLength\":\"4\",\"DeviceTime\":\"2024-05-07T03:52:22.000000000Z\",\"DeviceVersionMajor\":\"10\",\"DeviceVersionMinor\":\"0\",\"ExtraInfoLength\":\"203\",\"ExtraInfoString\":\"{ \\\"flags\\\" : \\\"0x00000018\\\" , \\\"registration_version\\\" : \\\"0x00000203\\\" , \\\"tx\\\" : false , \\\"sections\\\" : false , \\\"frame\\\" : 0 , \\\"class_name\\\" : \\\"FSFilter Activity Monitor\\\" , \\\"instances\\\" : [[\\\"371337\\\",\\\"0x00000000\\\"]] }\",\"FilterID\":\"{02000000-001E-0000-6ABE-B821C5DFDA01}\",\"FinalStatus\":\"0x0\"},\"event_id\":\"6\",\"keywords\":[\"ms:Measures\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":9116}},\"provider_guid\":\"{F3C5E28E-63F6-49C7-A204-E48A1BC4B09D}\",\"provider_name\":\"Microsoft-Windows-FilterManager\",\"record_id\":258501,\"task\":\"None\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-18\",\"name\":\"SYSTEM\",\"type\":\"User\"},\"version\":1}}",
"messageType": "6",
"senderHost": "nordc-app-wis02.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "microsoft-windows-filtermanager",
"tags": [
"v8",
"eventId:6",
"microsoft-windows-filtermanager",
"6"
],
"vendorCode": "258501"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T01:34:32.818Z","agent":{"ephemeral_id":"50030cf9-cc76-41fc-97cb-53aac2067d01","id":"d8ff39c6-36da-4469-b7a0-13fb607ab79c","name":"TS03-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"6","created":"2024-07-27T01:34:34.243Z","kind":"event","provider":"Microsoft-Windows-FilterManager"},"host":{"name":"TS03-2016.oscorp.com"},"log":{"level":"information"},"message":"File System Filter 'cdrv' (10.0, 2024-05-07T03:52:22.000000000Z) has successfully loaded and registered with Filter Manager.","organization":"oscorp","senderHost":"nordc-app-wis02.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS03-2016.oscorp.com","event_data":{"DeviceName":"cdrv","DeviceNameLength":"4","DeviceTime":"2024-05-07T03:52:22.000000000Z","DeviceVersionMajor":"10","DeviceVersionMinor":"0","ExtraInfoLength":"203","ExtraInfoString":"{ \"flags\" : \"0x00000018\" , \"registration_version\" : \"0x00000203\" , \"tx\" : false , \"sections\" : false , \"frame\" : 0 , \"class_name\" : \"FSFilter Activity Monitor\" , \"instances\" : [[\"371337\",\"0x00000000\"]] }","FilterID":"{02000000-001E-0000-6ABE-B821C5DFDA01}","FinalStatus":"0x0"},"event_id":"6","keywords":["ms:Measures"],"opcode":"Info","process":{"pid":4,"thread":{"id":9116}},"provider_guid":"{F3C5E28E-63F6-49C7-A204-E48A1BC4B09D}","provider_name":"Microsoft-Windows-FilterManager","record_id":258501,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"},"version":1}} | Product: microsoft-windows-filtermanager
Vendor: microsoft-windows-filtermanager | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T01:34:32.818Z","agent":{"ephemeral_id":"50030cf9-cc76-41fc-97cb-53aac2067d01","id":"d8ff39c6-36da-4469-b7a0-13fb607ab79c","name":"TS03-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"6","created":"2024-07-27T01:34:34.243Z","kind":"event","provider":"Microsoft-Windows-FilterManager"},"host":{"name":"TS03-2016.oscorp.com"},"log":{"level":"information"},"message":"File System Filter 'cdrv' (10.0, 2024-05-07T03:52:22.000000000Z) has successfully loaded and registered with Filter Manager.","organization":"oscorp","senderHost":"nordc-app-wis02.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS03-2016.oscorp.com","event_data":{"DeviceName":"cdrv","DeviceNameLength":"4","DeviceTime":"2024-05-07T03:52:22.000000000Z","DeviceVersionMajor":"10","DeviceVersionMinor":"0","ExtraInfoLength":"203","ExtraInfoString":"{ \"flags\" : \"0x00000018\" , \"registration_version\" : \"0x00000203\" , \"tx\" : false , \"sections\" : false , \"frame\" : 0 , \"class_name\" : \"FSFilter Activity Monitor\" , \"instances\" : [[\"371337\",\"0x00000000\"]] }","FilterID":"{02000000-001E-0000-6ABE-B821C5DFDA01}","FinalStatus":"0x0"},"event_id":"6","keywords":["ms:Measures"],"opcode":"Info","process":{"pid":4,"thread":{"id":9116}},"provider_guid":"{F3C5E28E-63F6-49C7-A204-E48A1BC4B09D}","provider_name":"Microsoft-Windows-FilterManager","record_id":258501,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"},"version":1}} | This is a syslog message from a product called microsoft-windows-filtermanager by microsoft-windows-filtermanager. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 6
senderHost: nordc-app-wis02.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: microsoft-windows-filtermanager
tags: ['v8', 'eventId:6', 'microsoft-windows-filtermanager', '6']
vendorCode: 258501 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T23:18:01.691Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Web Event","code":"1309","created":"2024-07-27T23:18:02.411Z","kind":"event","provider":"ASP.NET 4.0.30319.0"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com"},"log":{"level":"warning"},"message":"Event code: 3005 \nEvent message: An unhandled exception has occurred. \nEvent time: 7/27/2024 7:18:01 PM \nEvent time (UTC): 7/27/2024 11:18:01 PM \nEvent ID: b117df64dd61400cae1434f79a70b1da \nEvent sequence: 5393 \nEvent occurrence: 5 \nEvent detail code: 0 \n \nApplication information: \n Application domain: /LM/W3SVC/3/ROOT-1-133665372213621745 \n Trust level: Full \n Application Virtual Path: / \n Application Path: D:\\PayGo\\PRD_Processing\\CheckOutWeb\\ \n Mumbrellaine name: NVIPROCPRDWEB01 \n \nProcess information: \n Process ID: 1324 \n Process name: w3wp.exe \n Account name: prdnvi\\procprd-appuser \n \nException information: \n Exception type: PayGoDALException \n Exception message: An exception occurred while attempting to call the read method using the ReadStoredProcedureName.\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 155\n at ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment.ReadById(Int32 PaymentHistoryID, String clientCode) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Client\\DAL\\Payment\\AuthorizedPayment.cs:line 682\n\nAn exception occurred while attempting to call the stored procedure 'pgb_view_payment_AuthorizedPayments_Fetch' to read all of the records for class 'ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment'.\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](String storedProcedureName, Dictionary`2 storedProcedureParameters, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 201\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 145\n\nError occured while getting connection string for client \n at ProcessorBusiness.Core.ClientBase.GetConnectionString(String databaseConnectionIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Core\\ClientBase.cs:line 86\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](String storedProcedureName, Dictionary`2 storedProcedureParameters, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 183\n\n \n \nRequest information: \n Request URL: https://www.georgiapowercheckout.com:443/PaymentHistory/ViewReceipt \n Request path: /PaymentHistory/ViewReceipt \n User host address: 10.160.18.49 \n User: \n Is authenticated: False \n Authentication Type: \n Thread account name: prdnvi\\procprd-appuser \n \nThread information: \n Thread ID: 34 \n Thread account name: prdnvi\\procprd-appuser \n Is impersonating: False \n Stack trace: at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 155\n at ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment.ReadById(Int32 PaymentHistoryID, String clientCode) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Client\\DAL\\Payment\\AuthorizedPayment.cs:line 682\n \n \nCustom event details: ","organization":"umbrella","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com","event_data":{"param1":"3005","param10":"Full","param11":"/","param12":"D:\\PayGo\\PRD_Processing\\CheckOutWeb\\","param13":"NVIPROCPRDWEB01","param15":"1324","param16":"w3wp.exe","param17":"prdnvi\\procprd-appuser","param18":"PayGoDALException","param19":"An exception occurred while attempting to call the read method using the ReadStoredProcedureName.\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 155\n at ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment.ReadById(Int32 PaymentHistoryID, String clientCode) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Client\\DAL\\Payment\\AuthorizedPayment.cs:line 682\n\nAn exception occurred while attempting to call the stored procedure 'pgb_view_payment_AuthorizedPayments_Fetch' to read all of the records for class 'ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment'.\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](String storedProcedureName, Dictionary`2 storedProcedureParameters, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 201\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 145\n\nError occured while getting connection string for client \n at ProcessorBusiness.Core.ClientBase.GetConnectionString(String databaseConnectionIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Core\\ClientBase.cs:line 86\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](String storedProcedureName, Dictionary`2 storedProcedureParameters, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 183","param2":"An unhandled exception has occurred.","param20":"https://www.georgiapowercheckout.com:443/PaymentHistory/ViewReceipt","param21":"/PaymentHistory/ViewReceipt","param22":"10.160.18.49","param24":"False","param26":"prdnvi\\procprd-appuser","param27":"34","param28":"prdnvi\\procprd-appuser","param29":"False","param3":"7/27/2024 7:18:01 PM","param30":" at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 155\n at ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment.ReadById(Int32 PaymentHistoryID, String clientCode) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Client\\DAL\\Payment\\AuthorizedPayment.cs:line 682","param4":"7/27/2024 11:18:01 PM","param5":"b117df64dd61400cae1434f79a70b1da","param6":"5393","param7":"5","param8":"0","param9":"/LM/W3SVC/3/ROOT-1-133665372213621745"},"event_id":"1309","keywords":["Classic"],"provider_name":"ASP.NET 4.0.30319.0","record_id":1477677,"task":"Web Event"}} | {
"fieldExtractorName": "symantec_dlp",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T23:18:01.691Z\",\"agent\":{\"ephemeral_id\":\"a668c636-ec70-4103-9c98-53517f0df854\",\"id\":\"040c78f0-1741-4108-a30c-aaf00e9af961\",\"name\":\"NVIPROCPRDWEB01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Web Event\",\"code\":\"1309\",\"created\":\"2024-07-27T23:18:02.411Z\",\"kind\":\"event\",\"provider\":\"ASP.NET 4.0.30319.0\"},\"host\":{\"name\":\"NVIPROCPRDWEB01.prdnvi.umbrellaint.com\"},\"log\":{\"level\":\"warning\"},\"message\":\"Event code: 3005 \\nEvent message: An unhandled exception has occurred. \\nEvent time: 7/27/2024 7:18:01 PM \\nEvent time (UTC): 7/27/2024 11:18:01 PM \\nEvent ID: b117df64dd61400cae1434f79a70b1da \\nEvent sequence: 5393 \\nEvent occurrence: 5 \\nEvent detail code: 0 \\n \\nApplication information: \\n Application domain: /LM/W3SVC/3/ROOT-1-133665372213621745 \\n Trust level: Full \\n Application Virtual Path: / \\n Application Path: D:\\\\PayGo\\\\PRD_Processing\\\\CheckOutWeb\\\\ \\n Mumbrellaine name: NVIPROCPRDWEB01 \\n \\nProcess information: \\n Process ID: 1324 \\n Process name: w3wp.exe \\n Account name: prdnvi\\\\procprd-appuser \\n \\nException information: \\n Exception type: PayGoDALException \\n Exception message: An exception occurred while attempting to call the read method using the ReadStoredProcedureName.\\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\\\AzureAgents\\\\Processing\\\\Agent-01\\\\_work\\\\2\\\\s\\\\Applications\\\\Utilities\\\\PayGoDBObjectBase\\\\PayGoDBObjectBase\\\\PayGoBusinessBase.cs:line 155\\n at ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment.ReadById(Int32 PaymentHistoryID, String clientCode) in D:\\\\AzureAgents\\\\Processing\\\\Agent-01\\\\_work\\\\2\\\\s\\\\Applications\\\\ProcessorBusiness\\\\ProcessorBusiness\\\\Client\\\\DAL\\\\Payment\\\\AuthorizedPayment.cs:line 682\\n\\nAn exception occurred while attempting to call the stored procedure 'pgb_view_payment_AuthorizedPayments_Fetch' to read all of the records for class 'ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment'.\\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](String storedProcedureName, Dictionary`2 storedProcedureParameters, String databaseIdentifier) in D:\\\\AzureAgents\\\\Processing\\\\Agent-01\\\\_work\\\\2\\\\s\\\\Applications\\\\Utilities\\\\PayGoDBObjectBase\\\\PayGoDBObjectBase\\\\PayGoBusinessBase.cs:line 201\\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\\\AzureAgents\\\\Processing\\\\Agent-01\\\\_work\\\\2\\\\s\\\\Applications\\\\Utilities\\\\PayGoDBObjectBase\\\\PayGoDBObjectBase\\\\PayGoBusinessBase.cs:line 145\\n\\nError occured while getting connection string for client \\n at ProcessorBusiness.Core.ClientBase.GetConnectionString(String databaseConnectionIdentifier) in D:\\\\AzureAgents\\\\Processing\\\\Agent-01\\\\_work\\\\2\\\\s\\\\Applications\\\\ProcessorBusiness\\\\ProcessorBusiness\\\\Core\\\\ClientBase.cs:line 86\\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](String storedProcedureName, Dictionary`2 storedProcedureParameters, String databaseIdentifier) in D:\\\\AzureAgents\\\\Processing\\\\Agent-01\\\\_work\\\\2\\\\s\\\\Applications\\\\Utilities\\\\PayGoDBObjectBase\\\\PayGoDBObjectBase\\\\PayGoBusinessBase.cs:line 183\\n\\n \\n \\nRequest information: \\n Request URL: https://www.georgiapowercheckout.com:443/PaymentHistory/ViewReceipt \\n Request path: /PaymentHistory/ViewReceipt \\n User host address: 10.160.18.49 \\n User: \\n Is authenticated: False \\n Authentication Type: \\n Thread account name: prdnvi\\\\procprd-appuser \\n \\nThread information: \\n Thread ID: 34 \\n Thread account name: prdnvi\\\\procprd-appuser \\n Is impersonating: False \\n Stack trace: at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\\\AzureAgents\\\\Processing\\\\Agent-01\\\\_work\\\\2\\\\s\\\\Applications\\\\Utilities\\\\PayGoDBObjectBase\\\\PayGoDBObjectBase\\\\PayGoBusinessBase.cs:line 155\\n at ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment.ReadById(Int32 PaymentHistoryID, String clientCode) in D:\\\\AzureAgents\\\\Processing\\\\Agent-01\\\\_work\\\\2\\\\s\\\\Applications\\\\ProcessorBusiness\\\\ProcessorBusiness\\\\Client\\\\DAL\\\\Payment\\\\AuthorizedPayment.cs:line 682\\n \\n \\nCustom event details: \",\"organization\":\"umbrella\",\"senderHost\":\"10.160.18.44\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"NVIPROCPRDWEB01.prdnvi.umbrellaint.com\",\"event_data\":{\"param1\":\"3005\",\"param10\":\"Full\",\"param11\":\"/\",\"param12\":\"D:\\\\PayGo\\\\PRD_Processing\\\\CheckOutWeb\\\\\",\"param13\":\"NVIPROCPRDWEB01\",\"param15\":\"1324\",\"param16\":\"w3wp.exe\",\"param17\":\"prdnvi\\\\procprd-appuser\",\"param18\":\"PayGoDALException\",\"param19\":\"An exception occurred while attempting to call the read method using the ReadStoredProcedureName.\\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\\\AzureAgents\\\\Processing\\\\Agent-01\\\\_work\\\\2\\\\s\\\\Applications\\\\Utilities\\\\PayGoDBObjectBase\\\\PayGoDBObjectBase\\\\PayGoBusinessBase.cs:line 155\\n at ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment.ReadById(Int32 PaymentHistoryID, String clientCode) in D:\\\\AzureAgents\\\\Processing\\\\Agent-01\\\\_work\\\\2\\\\s\\\\Applications\\\\ProcessorBusiness\\\\ProcessorBusiness\\\\Client\\\\DAL\\\\Payment\\\\AuthorizedPayment.cs:line 682\\n\\nAn exception occurred while attempting to call the stored procedure 'pgb_view_payment_AuthorizedPayments_Fetch' to read all of the records for class 'ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment'.\\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](String storedProcedureName, Dictionary`2 storedProcedureParameters, String databaseIdentifier) in D:\\\\AzureAgents\\\\Processing\\\\Agent-01\\\\_work\\\\2\\\\s\\\\Applications\\\\Utilities\\\\PayGoDBObjectBase\\\\PayGoDBObjectBase\\\\PayGoBusinessBase.cs:line 201\\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\\\AzureAgents\\\\Processing\\\\Agent-01\\\\_work\\\\2\\\\s\\\\Applications\\\\Utilities\\\\PayGoDBObjectBase\\\\PayGoDBObjectBase\\\\PayGoBusinessBase.cs:line 145\\n\\nError occured while getting connection string for client \\n at ProcessorBusiness.Core.ClientBase.GetConnectionString(String databaseConnectionIdentifier) in D:\\\\AzureAgents\\\\Processing\\\\Agent-01\\\\_work\\\\2\\\\s\\\\Applications\\\\ProcessorBusiness\\\\ProcessorBusiness\\\\Core\\\\ClientBase.cs:line 86\\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](String storedProcedureName, Dictionary`2 storedProcedureParameters, String databaseIdentifier) in D:\\\\AzureAgents\\\\Processing\\\\Agent-01\\\\_work\\\\2\\\\s\\\\Applications\\\\Utilities\\\\PayGoDBObjectBase\\\\PayGoDBObjectBase\\\\PayGoBusinessBase.cs:line 183\",\"param2\":\"An unhandled exception has occurred.\",\"param20\":\"https://www.georgiapowercheckout.com:443/PaymentHistory/ViewReceipt\",\"param21\":\"/PaymentHistory/ViewReceipt\",\"param22\":\"10.160.18.49\",\"param24\":\"False\",\"param26\":\"prdnvi\\\\procprd-appuser\",\"param27\":\"34\",\"param28\":\"prdnvi\\\\procprd-appuser\",\"param29\":\"False\",\"param3\":\"7/27/2024 7:18:01 PM\",\"param30\":\" at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\\\AzureAgents\\\\Processing\\\\Agent-01\\\\_work\\\\2\\\\s\\\\Applications\\\\Utilities\\\\PayGoDBObjectBase\\\\PayGoDBObjectBase\\\\PayGoBusinessBase.cs:line 155\\n at ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment.ReadById(Int32 PaymentHistoryID, String clientCode) in D:\\\\AzureAgents\\\\Processing\\\\Agent-01\\\\_work\\\\2\\\\s\\\\Applications\\\\ProcessorBusiness\\\\ProcessorBusiness\\\\Client\\\\DAL\\\\Payment\\\\AuthorizedPayment.cs:line 682\",\"param4\":\"7/27/2024 11:18:01 PM\",\"param5\":\"b117df64dd61400cae1434f79a70b1da\",\"param6\":\"5393\",\"param7\":\"5\",\"param8\":\"0\",\"param9\":\"/LM/W3SVC/3/ROOT-1-133665372213621745\"},\"event_id\":\"1309\",\"keywords\":[\"Classic\"],\"provider_name\":\"ASP.NET 4.0.30319.0\",\"record_id\":1477677,\"task\":\"Web Event\"}}",
"messageType": "data_loss",
"productIds": [
44
],
"senderHost": "10.160.18.44",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "symantec_dlp",
"tags": [
"symantec_dlp",
"data_loss"
]
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T23:18:01.691Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Web Event","code":"1309","created":"2024-07-27T23:18:02.411Z","kind":"event","provider":"ASP.NET 4.0.30319.0"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com"},"log":{"level":"warning"},"message":"Event code: 3005 \nEvent message: An unhandled exception has occurred. \nEvent time: 7/27/2024 7:18:01 PM \nEvent time (UTC): 7/27/2024 11:18:01 PM \nEvent ID: b117df64dd61400cae1434f79a70b1da \nEvent sequence: 5393 \nEvent occurrence: 5 \nEvent detail code: 0 \n \nApplication information: \n Application domain: /LM/W3SVC/3/ROOT-1-133665372213621745 \n Trust level: Full \n Application Virtual Path: / \n Application Path: D:\\PayGo\\PRD_Processing\\CheckOutWeb\\ \n Mumbrellaine name: NVIPROCPRDWEB01 \n \nProcess information: \n Process ID: 1324 \n Process name: w3wp.exe \n Account name: prdnvi\\procprd-appuser \n \nException information: \n Exception type: PayGoDALException \n Exception message: An exception occurred while attempting to call the read method using the ReadStoredProcedureName.\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 155\n at ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment.ReadById(Int32 PaymentHistoryID, String clientCode) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Client\\DAL\\Payment\\AuthorizedPayment.cs:line 682\n\nAn exception occurred while attempting to call the stored procedure 'pgb_view_payment_AuthorizedPayments_Fetch' to read all of the records for class 'ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment'.\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](String storedProcedureName, Dictionary`2 storedProcedureParameters, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 201\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 145\n\nError occured while getting connection string for client \n at ProcessorBusiness.Core.ClientBase.GetConnectionString(String databaseConnectionIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Core\\ClientBase.cs:line 86\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](String storedProcedureName, Dictionary`2 storedProcedureParameters, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 183\n\n \n \nRequest information: \n Request URL: https://www.georgiapowercheckout.com:443/PaymentHistory/ViewReceipt \n Request path: /PaymentHistory/ViewReceipt \n User host address: 10.160.18.49 \n User: \n Is authenticated: False \n Authentication Type: \n Thread account name: prdnvi\\procprd-appuser \n \nThread information: \n Thread ID: 34 \n Thread account name: prdnvi\\procprd-appuser \n Is impersonating: False \n Stack trace: at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 155\n at ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment.ReadById(Int32 PaymentHistoryID, String clientCode) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Client\\DAL\\Payment\\AuthorizedPayment.cs:line 682\n \n \nCustom event details: ","organization":"umbrella","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com","event_data":{"param1":"3005","param10":"Full","param11":"/","param12":"D:\\PayGo\\PRD_Processing\\CheckOutWeb\\","param13":"NVIPROCPRDWEB01","param15":"1324","param16":"w3wp.exe","param17":"prdnvi\\procprd-appuser","param18":"PayGoDALException","param19":"An exception occurred while attempting to call the read method using the ReadStoredProcedureName.\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 155\n at ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment.ReadById(Int32 PaymentHistoryID, String clientCode) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Client\\DAL\\Payment\\AuthorizedPayment.cs:line 682\n\nAn exception occurred while attempting to call the stored procedure 'pgb_view_payment_AuthorizedPayments_Fetch' to read all of the records for class 'ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment'.\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](String storedProcedureName, Dictionary`2 storedProcedureParameters, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 201\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 145\n\nError occured while getting connection string for client \n at ProcessorBusiness.Core.ClientBase.GetConnectionString(String databaseConnectionIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Core\\ClientBase.cs:line 86\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](String storedProcedureName, Dictionary`2 storedProcedureParameters, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 183","param2":"An unhandled exception has occurred.","param20":"https://www.georgiapowercheckout.com:443/PaymentHistory/ViewReceipt","param21":"/PaymentHistory/ViewReceipt","param22":"10.160.18.49","param24":"False","param26":"prdnvi\\procprd-appuser","param27":"34","param28":"prdnvi\\procprd-appuser","param29":"False","param3":"7/27/2024 7:18:01 PM","param30":" at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 155\n at ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment.ReadById(Int32 PaymentHistoryID, String clientCode) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Client\\DAL\\Payment\\AuthorizedPayment.cs:line 682","param4":"7/27/2024 11:18:01 PM","param5":"b117df64dd61400cae1434f79a70b1da","param6":"5393","param7":"5","param8":"0","param9":"/LM/W3SVC/3/ROOT-1-133665372213621745"},"event_id":"1309","keywords":["Classic"],"provider_name":"ASP.NET 4.0.30319.0","record_id":1477677,"task":"Web Event"}} | Product: Symantec Data Loss Prevention
Vendor: Symantec | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T23:18:01.691Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Web Event","code":"1309","created":"2024-07-27T23:18:02.411Z","kind":"event","provider":"ASP.NET 4.0.30319.0"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com"},"log":{"level":"warning"},"message":"Event code: 3005 \nEvent message: An unhandled exception has occurred. \nEvent time: 7/27/2024 7:18:01 PM \nEvent time (UTC): 7/27/2024 11:18:01 PM \nEvent ID: b117df64dd61400cae1434f79a70b1da \nEvent sequence: 5393 \nEvent occurrence: 5 \nEvent detail code: 0 \n \nApplication information: \n Application domain: /LM/W3SVC/3/ROOT-1-133665372213621745 \n Trust level: Full \n Application Virtual Path: / \n Application Path: D:\\PayGo\\PRD_Processing\\CheckOutWeb\\ \n Mumbrellaine name: NVIPROCPRDWEB01 \n \nProcess information: \n Process ID: 1324 \n Process name: w3wp.exe \n Account name: prdnvi\\procprd-appuser \n \nException information: \n Exception type: PayGoDALException \n Exception message: An exception occurred while attempting to call the read method using the ReadStoredProcedureName.\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 155\n at ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment.ReadById(Int32 PaymentHistoryID, String clientCode) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Client\\DAL\\Payment\\AuthorizedPayment.cs:line 682\n\nAn exception occurred while attempting to call the stored procedure 'pgb_view_payment_AuthorizedPayments_Fetch' to read all of the records for class 'ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment'.\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](String storedProcedureName, Dictionary`2 storedProcedureParameters, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 201\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 145\n\nError occured while getting connection string for client \n at ProcessorBusiness.Core.ClientBase.GetConnectionString(String databaseConnectionIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Core\\ClientBase.cs:line 86\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](String storedProcedureName, Dictionary`2 storedProcedureParameters, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 183\n\n \n \nRequest information: \n Request URL: https://www.georgiapowercheckout.com:443/PaymentHistory/ViewReceipt \n Request path: /PaymentHistory/ViewReceipt \n User host address: 10.160.18.49 \n User: \n Is authenticated: False \n Authentication Type: \n Thread account name: prdnvi\\procprd-appuser \n \nThread information: \n Thread ID: 34 \n Thread account name: prdnvi\\procprd-appuser \n Is impersonating: False \n Stack trace: at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 155\n at ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment.ReadById(Int32 PaymentHistoryID, String clientCode) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Client\\DAL\\Payment\\AuthorizedPayment.cs:line 682\n \n \nCustom event details: ","organization":"umbrella","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com","event_data":{"param1":"3005","param10":"Full","param11":"/","param12":"D:\\PayGo\\PRD_Processing\\CheckOutWeb\\","param13":"NVIPROCPRDWEB01","param15":"1324","param16":"w3wp.exe","param17":"prdnvi\\procprd-appuser","param18":"PayGoDALException","param19":"An exception occurred while attempting to call the read method using the ReadStoredProcedureName.\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 155\n at ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment.ReadById(Int32 PaymentHistoryID, String clientCode) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Client\\DAL\\Payment\\AuthorizedPayment.cs:line 682\n\nAn exception occurred while attempting to call the stored procedure 'pgb_view_payment_AuthorizedPayments_Fetch' to read all of the records for class 'ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment'.\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](String storedProcedureName, Dictionary`2 storedProcedureParameters, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 201\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 145\n\nError occured while getting connection string for client \n at ProcessorBusiness.Core.ClientBase.GetConnectionString(String databaseConnectionIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Core\\ClientBase.cs:line 86\n at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](String storedProcedureName, Dictionary`2 storedProcedureParameters, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 183","param2":"An unhandled exception has occurred.","param20":"https://www.georgiapowercheckout.com:443/PaymentHistory/ViewReceipt","param21":"/PaymentHistory/ViewReceipt","param22":"10.160.18.49","param24":"False","param26":"prdnvi\\procprd-appuser","param27":"34","param28":"prdnvi\\procprd-appuser","param29":"False","param3":"7/27/2024 7:18:01 PM","param30":" at PayGoBusiness.DAL.PayGoBusinessBase.Read[T](Int32 idToRead, String databaseIdentifier) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\Utilities\\PayGoDBObjectBase\\PayGoDBObjectBase\\PayGoBusinessBase.cs:line 155\n at ProcessorBusiness.Client.DAL.Payment.AuthorizedPayment.ReadById(Int32 PaymentHistoryID, String clientCode) in D:\\AzureAgents\\Processing\\Agent-01\\_work\\2\\s\\Applications\\ProcessorBusiness\\ProcessorBusiness\\Client\\DAL\\Payment\\AuthorizedPayment.cs:line 682","param4":"7/27/2024 11:18:01 PM","param5":"b117df64dd61400cae1434f79a70b1da","param6":"5393","param7":"5","param8":"0","param9":"/LM/W3SVC/3/ROOT-1-133665372213621745"},"event_id":"1309","keywords":["Classic"],"provider_name":"ASP.NET 4.0.30319.0","record_id":1477677,"task":"Web Event"}} | This is a syslog message from a product called Symantec Data Loss Prevention by Symantec. The following fields were extracted from the message:
fieldExtractorName: symantec_dlp
messageType: data_loss
productIds: [44]
senderHost: 10.160.18.44
sensitivity: normal
sourceInfo: unknown
streamName: symantec_dlp
tags: ['symantec_dlp', 'data_loss'] | Explain this syslog message |
1007 <6> 2024-07-26T13:39:58Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722001193-105315-12646-2800-1","src_ip":"147.160.167.15","hdr_from":"KnowBe4 \u003cdo-not-reply@training.knowbe4.com\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"psm.knowbe4.com","attstarkments":null,"recipients":[{"action":"allowed","reason":"sender","reason_extra":"psm.knowbe4.com","delivered":"delivered","delivery_detail":"stark-org.mail.protection.outlook.com.:25:250 2.6.0 \u003ceb74ae96.6cca9a30@psm.knowbe4.com\u003e [InternalId=167465069860207, Hostname=SA0PR15MB4015.namprd15.prod.outlook.com] 13376 bytes in 0.110, 118.345 KB/sec Queued mail for delivery","email":"natalie.woodward@stark.org","taxonomy":"policy"}],"hdr_to":"natalie.woodward@stark.org","recipient_count":1,"dst_domain":"stark.org","size":1106,"subject":"Users have completed their training assignments","env_from":"eb74ae96.6cca9a30@psm.knowbe4.com","timestamp":"2024-07-26T13:39:55+0000","geoip":"USA","tls":true} | {
"fieldExtractorName": "barracuda_ess",
"message": "1007 <6> 2024-07-26T13:39:58Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {\"message_id\":\"1722001193-105315-12646-2800-1\",\"src_ip\":\"147.160.167.15\",\"hdr_from\":\"KnowBe4 \\u003cdo-not-reply@training.knowbe4.com\\u003e\",\"account_id\":\"ESS70460\",\"domain_id\":\"158260\",\"ptr_record\":\"psm.knowbe4.com\",\"attstarkments\":null,\"recipients\":[{\"action\":\"allowed\",\"reason\":\"sender\",\"reason_extra\":\"psm.knowbe4.com\",\"delivered\":\"delivered\",\"delivery_detail\":\"stark-org.mail.protection.outlook.com.:25:250 2.6.0 \\u003ceb74ae96.6cca9a30@psm.knowbe4.com\\u003e [InternalId=167465069860207, Hostname=SA0PR15MB4015.namprd15.prod.outlook.com] 13376 bytes in 0.110, 118.345 KB/sec Queued mail for delivery\",\"email\":\"natalie.woodward@stark.org\",\"taxonomy\":\"policy\"}],\"hdr_to\":\"natalie.woodward@stark.org\",\"recipient_count\":1,\"dst_domain\":\"stark.org\",\"size\":1106,\"subject\":\"Users have completed their training assignments\",\"env_from\":\"eb74ae96.6cca9a30@psm.knowbe4.com\",\"timestamp\":\"2024-07-26T13:39:55+0000\",\"geoip\":\"USA\",\"tls\":true}",
"messageType": "email_protection",
"senderHost": "egress.ess.barracudanetworks.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "barracuda_ess",
"tags": [
"barracuda_ess",
"email_protection"
]
} | Create a JSON artifact from the message |
1007 <6> 2024-07-26T13:39:58Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722001193-105315-12646-2800-1","src_ip":"147.160.167.15","hdr_from":"KnowBe4 \u003cdo-not-reply@training.knowbe4.com\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"psm.knowbe4.com","attstarkments":null,"recipients":[{"action":"allowed","reason":"sender","reason_extra":"psm.knowbe4.com","delivered":"delivered","delivery_detail":"stark-org.mail.protection.outlook.com.:25:250 2.6.0 \u003ceb74ae96.6cca9a30@psm.knowbe4.com\u003e [InternalId=167465069860207, Hostname=SA0PR15MB4015.namprd15.prod.outlook.com] 13376 bytes in 0.110, 118.345 KB/sec Queued mail for delivery","email":"natalie.woodward@stark.org","taxonomy":"policy"}],"hdr_to":"natalie.woodward@stark.org","recipient_count":1,"dst_domain":"stark.org","size":1106,"subject":"Users have completed their training assignments","env_from":"eb74ae96.6cca9a30@psm.knowbe4.com","timestamp":"2024-07-26T13:39:55+0000","geoip":"USA","tls":true} | Product: Barracuda ESS
Vendor: Barracuda | Identify this syslog message |
1007 <6> 2024-07-26T13:39:58Z ip-100-69-16-230.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722001193-105315-12646-2800-1","src_ip":"147.160.167.15","hdr_from":"KnowBe4 \u003cdo-not-reply@training.knowbe4.com\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"psm.knowbe4.com","attstarkments":null,"recipients":[{"action":"allowed","reason":"sender","reason_extra":"psm.knowbe4.com","delivered":"delivered","delivery_detail":"stark-org.mail.protection.outlook.com.:25:250 2.6.0 \u003ceb74ae96.6cca9a30@psm.knowbe4.com\u003e [InternalId=167465069860207, Hostname=SA0PR15MB4015.namprd15.prod.outlook.com] 13376 bytes in 0.110, 118.345 KB/sec Queued mail for delivery","email":"natalie.woodward@stark.org","taxonomy":"policy"}],"hdr_to":"natalie.woodward@stark.org","recipient_count":1,"dst_domain":"stark.org","size":1106,"subject":"Users have completed their training assignments","env_from":"eb74ae96.6cca9a30@psm.knowbe4.com","timestamp":"2024-07-26T13:39:55+0000","geoip":"USA","tls":true} | This is a syslog message from a product called Barracuda ESS by Barracuda. The following fields were extracted from the message:
fieldExtractorName: barracuda_ess
messageType: email_protection
senderHost: egress.ess.barracudanetworks.com
sensitivity: normal
sourceInfo: unknown
streamName: barracuda_ess
tags: ['barracuda_ess', 'email_protection'] | Explain this syslog message |
1039 <6> 2024-07-26T13:39:58Z ip-100-69-13-151.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722001193-105197-12639-2894-1","src_ip":"147.160.167.14","hdr_from":"Information Security Team \u003cinformationsecurity@oscorp.org\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"psm.knowbe4.com","attoscorpments":null,"recipients":[{"action":"allowed","reason":"sender","reason_extra":"header:informationsecurity@oscorp.org","delivered":"delivered","delivery_detail":"oscorp-org.mail.protection.outlook.com.:25:250 2.6.0 \u003ceb74aed6.6cca9a70@psm.knowbe4.com\u003e [InternalId=167215961757141, Hostname=MW3PR15MB3947.namprd15.prod.outlook.com] 17650 bytes in 0.172, 99.816 KB/sec Queued mail for delivery","email":"erika.williams@oscorp.org","taxonomy":"policy"}],"hdr_to":"erika.williams@oscorp.org","recipient_count":1,"dst_domain":"oscorp.org","size":5731,"subject":"You've Completed Your OSCORP Policies Acknowledgement","env_from":"eb74aed6.6cca9a70@psm.knowbe4.com","timestamp":"2024-07-26T13:39:55+0000","geoip":"USA","tls":true} | {
"fieldExtractorName": "barracuda_ess",
"message": "1039 <6> 2024-07-26T13:39:58Z ip-100-69-13-151.us-east-2.compute.internal ESS70460[1]: {\"message_id\":\"1722001193-105197-12639-2894-1\",\"src_ip\":\"147.160.167.14\",\"hdr_from\":\"Information Security Team \\u003cinformationsecurity@oscorp.org\\u003e\",\"account_id\":\"ESS70460\",\"domain_id\":\"158260\",\"ptr_record\":\"psm.knowbe4.com\",\"attoscorpments\":null,\"recipients\":[{\"action\":\"allowed\",\"reason\":\"sender\",\"reason_extra\":\"header:informationsecurity@oscorp.org\",\"delivered\":\"delivered\",\"delivery_detail\":\"oscorp-org.mail.protection.outlook.com.:25:250 2.6.0 \\u003ceb74aed6.6cca9a70@psm.knowbe4.com\\u003e [InternalId=167215961757141, Hostname=MW3PR15MB3947.namprd15.prod.outlook.com] 17650 bytes in 0.172, 99.816 KB/sec Queued mail for delivery\",\"email\":\"erika.williams@oscorp.org\",\"taxonomy\":\"policy\"}],\"hdr_to\":\"erika.williams@oscorp.org\",\"recipient_count\":1,\"dst_domain\":\"oscorp.org\",\"size\":5731,\"subject\":\"You've Completed Your OSCORP Policies Acknowledgement\",\"env_from\":\"eb74aed6.6cca9a70@psm.knowbe4.com\",\"timestamp\":\"2024-07-26T13:39:55+0000\",\"geoip\":\"USA\",\"tls\":true}",
"messageType": "email_protection",
"senderHost": "egress.ess.barracudanetworks.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "barracuda_ess",
"tags": [
"barracuda_ess",
"email_protection"
]
} | Create a JSON artifact from the message |
1039 <6> 2024-07-26T13:39:58Z ip-100-69-13-151.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722001193-105197-12639-2894-1","src_ip":"147.160.167.14","hdr_from":"Information Security Team \u003cinformationsecurity@oscorp.org\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"psm.knowbe4.com","attoscorpments":null,"recipients":[{"action":"allowed","reason":"sender","reason_extra":"header:informationsecurity@oscorp.org","delivered":"delivered","delivery_detail":"oscorp-org.mail.protection.outlook.com.:25:250 2.6.0 \u003ceb74aed6.6cca9a70@psm.knowbe4.com\u003e [InternalId=167215961757141, Hostname=MW3PR15MB3947.namprd15.prod.outlook.com] 17650 bytes in 0.172, 99.816 KB/sec Queued mail for delivery","email":"erika.williams@oscorp.org","taxonomy":"policy"}],"hdr_to":"erika.williams@oscorp.org","recipient_count":1,"dst_domain":"oscorp.org","size":5731,"subject":"You've Completed Your OSCORP Policies Acknowledgement","env_from":"eb74aed6.6cca9a70@psm.knowbe4.com","timestamp":"2024-07-26T13:39:55+0000","geoip":"USA","tls":true} | Product: Barracuda ESS
Vendor: Barracuda | Identify this syslog message |
1039 <6> 2024-07-26T13:39:58Z ip-100-69-13-151.us-east-2.compute.internal ESS70460[1]: {"message_id":"1722001193-105197-12639-2894-1","src_ip":"147.160.167.14","hdr_from":"Information Security Team \u003cinformationsecurity@oscorp.org\u003e","account_id":"ESS70460","domain_id":"158260","ptr_record":"psm.knowbe4.com","attoscorpments":null,"recipients":[{"action":"allowed","reason":"sender","reason_extra":"header:informationsecurity@oscorp.org","delivered":"delivered","delivery_detail":"oscorp-org.mail.protection.outlook.com.:25:250 2.6.0 \u003ceb74aed6.6cca9a70@psm.knowbe4.com\u003e [InternalId=167215961757141, Hostname=MW3PR15MB3947.namprd15.prod.outlook.com] 17650 bytes in 0.172, 99.816 KB/sec Queued mail for delivery","email":"erika.williams@oscorp.org","taxonomy":"policy"}],"hdr_to":"erika.williams@oscorp.org","recipient_count":1,"dst_domain":"oscorp.org","size":5731,"subject":"You've Completed Your OSCORP Policies Acknowledgement","env_from":"eb74aed6.6cca9a70@psm.knowbe4.com","timestamp":"2024-07-26T13:39:55+0000","geoip":"USA","tls":true} | This is a syslog message from a product called Barracuda ESS by Barracuda. The following fields were extracted from the message:
fieldExtractorName: barracuda_ess
messageType: email_protection
senderHost: egress.ess.barracudanetworks.com
sensitivity: normal
sourceInfo: unknown
streamName: barracuda_ess
tags: ['barracuda_ess', 'email_protection'] | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T04:24:29.804Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T04:24:31.399Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.umbrella.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":11316}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319876,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T04:24:29.804Z\",\"agent\":{\"ephemeral_id\":\"964d0404-9b18-4f2b-a3fe-7db4be557fbf\",\"id\":\"8809f950-580f-4473-8f56-fd5ca481b748\",\"name\":\"Proteus\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"36887\",\"created\":\"2024-07-27T04:24:31.399Z\",\"kind\":\"event\",\"provider\":\"Schannel\"},\"host\":{\"name\":\"Proteus.umbrella.com\"},\"log\":{\"level\":\"error\"},\"message\":\"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.\",\"organization\":\"umbrella\",\"senderHost\":\"Proteus.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"Proteus.umbrella.com\",\"event_data\":{\"AlertDesc\":\"70\"},\"event_id\":\"36887\",\"opcode\":\"Info\",\"process\":{\"pid\":1532,\"thread\":{\"id\":11316}},\"provider_guid\":\"{1F678132-5938-4686-9FDC-C8FF68F15C85}\",\"provider_name\":\"Schannel\",\"record_id\":7319876,\"task\":\"None\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-18\",\"name\":\"SYSTEM\",\"type\":\"User\"}}}",
"messageType": "36887",
"senderHost": "Proteus.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "schannel",
"tags": [
"v8",
"eventId:36887",
"schannel",
"36887"
],
"vendorCode": "7319876"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T04:24:29.804Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T04:24:31.399Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.umbrella.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":11316}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319876,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | Product: schannel
Vendor: schannel | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T04:24:29.804Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T04:24:31.399Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.umbrella.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":11316}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319876,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | This is a syslog message from a product called schannel by schannel. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 36887
senderHost: Proteus.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: schannel
tags: ['v8', 'eventId:36887', 'schannel', '36887']
vendorCode: 7319876 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T04:24:29.804Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T04:24:31.399Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.stark.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"stark","senderHost":"Proteus.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.stark.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":11316}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319875,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T04:24:29.804Z\",\"agent\":{\"ephemeral_id\":\"964d0404-9b18-4f2b-a3fe-7db4be557fbf\",\"id\":\"8809f950-580f-4473-8f56-fd5ca481b748\",\"name\":\"Proteus\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"36887\",\"created\":\"2024-07-27T04:24:31.399Z\",\"kind\":\"event\",\"provider\":\"Schannel\"},\"host\":{\"name\":\"Proteus.stark.com\"},\"log\":{\"level\":\"error\"},\"message\":\"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.\",\"organization\":\"stark\",\"senderHost\":\"Proteus.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"Proteus.stark.com\",\"event_data\":{\"AlertDesc\":\"70\"},\"event_id\":\"36887\",\"opcode\":\"Info\",\"process\":{\"pid\":1532,\"thread\":{\"id\":11316}},\"provider_guid\":\"{1F678132-5938-4686-9FDC-C8FF68F15C85}\",\"provider_name\":\"Schannel\",\"record_id\":7319875,\"task\":\"None\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-18\",\"name\":\"SYSTEM\",\"type\":\"User\"}}}",
"messageType": "36887",
"senderHost": "Proteus.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "schannel",
"tags": [
"v8",
"eventId:36887",
"schannel",
"36887"
],
"vendorCode": "7319875"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T04:24:29.804Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T04:24:31.399Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.stark.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"stark","senderHost":"Proteus.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.stark.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":11316}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319875,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | Product: schannel
Vendor: schannel | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T04:24:29.804Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T04:24:31.399Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.stark.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"stark","senderHost":"Proteus.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.stark.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":11316}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319875,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | This is a syslog message from a product called schannel by schannel. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 36887
senderHost: Proteus.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: schannel
tags: ['v8', 'eventId:36887', 'schannel', '36887']
vendorCode: 7319875 | Explain this syslog message |
<134>Jul 30 10:05:28 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3018|1909|AWS Account Synchronization Finished|3|src=161.186.26.23 suser=nighthawk target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 | {
"clientIP": "161.186.26.23",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "cef",
"localHostname": "deepsecurity",
"localStartTime": "Jul 30 10:05:28",
"message": "<134>Jul 30 10:05:28 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3018|1909|AWS Account Synchronization Finished|3|src=161.186.26.23 suser=nighthawk target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 ",
"messageType": "AWS Account Synchronization Finished",
"priority": 134,
"senderHost": "34.205.5.4",
"sensitivity": "normal",
"severityCode": 7,
"severityLabel": "debug",
"sourceInfo": "unknown",
"streamName": "trend micro_deep security manager",
"tags": [
"AWS Account Synchronization Finished",
"trend micro_deep security manager",
"rfc3164",
"cef",
"trend micro_deep security manager_AWS Account Synchronization Finished"
],
"userName": "nighthawk",
"vendorCode": "1909"
} | Create a JSON artifact from the message |
<134>Jul 30 10:05:28 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3018|1909|AWS Account Synchronization Finished|3|src=161.186.26.23 suser=nighthawk target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 | Product: trend micro_deep security manager
Vendor: trend micro_deep security manager | Identify this syslog message |
<134>Jul 30 10:05:28 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3018|1909|AWS Account Synchronization Finished|3|src=161.186.26.23 suser=nighthawk target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 | This is a syslog message from a product called trend micro_deep security manager by trend micro_deep security manager. The following fields were extracted from the message:
clientIP: 161.186.26.23
facilityCode: 16
facilityLabel: local0
fieldExtractorName: cef
localHostname: deepsecurity
localStartTime: Jul 30 10:05:28
messageType: AWS Account Synchronization Finished
priority: 134
senderHost: 34.205.5.4
sensitivity: normal
severityCode: 7
severityLabel: debug
sourceInfo: unknown
streamName: trend micro_deep security manager
tags: ['AWS Account Synchronization Finished', 'trend micro_deep security manager', 'rfc3164', 'cef', 'trend micro_deep security manager_AWS Account Synchronization Finished']
userName: nighthawk
vendorCode: 1909 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T03:12:20.585Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T03:12:22.571Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.umbrella.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":13752}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319415,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T03:12:20.585Z\",\"agent\":{\"ephemeral_id\":\"964d0404-9b18-4f2b-a3fe-7db4be557fbf\",\"id\":\"8809f950-580f-4473-8f56-fd5ca481b748\",\"name\":\"Proteus\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"36887\",\"created\":\"2024-07-27T03:12:22.571Z\",\"kind\":\"event\",\"provider\":\"Schannel\"},\"host\":{\"name\":\"Proteus.umbrella.com\"},\"log\":{\"level\":\"error\"},\"message\":\"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.\",\"organization\":\"umbrella\",\"senderHost\":\"Proteus.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"Proteus.umbrella.com\",\"event_data\":{\"AlertDesc\":\"70\"},\"event_id\":\"36887\",\"opcode\":\"Info\",\"process\":{\"pid\":1532,\"thread\":{\"id\":13752}},\"provider_guid\":\"{1F678132-5938-4686-9FDC-C8FF68F15C85}\",\"provider_name\":\"Schannel\",\"record_id\":7319415,\"task\":\"None\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-18\",\"name\":\"SYSTEM\",\"type\":\"User\"}}}",
"messageType": "36887",
"senderHost": "Proteus.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "schannel",
"tags": [
"v8",
"eventId:36887",
"schannel",
"36887"
],
"vendorCode": "7319415"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T03:12:20.585Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T03:12:22.571Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.umbrella.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":13752}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319415,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | Product: schannel
Vendor: schannel | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T03:12:20.585Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T03:12:22.571Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.umbrella.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":13752}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319415,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | This is a syslog message from a product called schannel by schannel. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 36887
senderHost: Proteus.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: schannel
tags: ['v8', 'eventId:36887', 'schannel', '36887']
vendorCode: 7319415 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T03:12:20.569Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T03:12:22.571Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.acme.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"acme","senderHost":"Proteus.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.acme.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":13752}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319414,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T03:12:20.569Z\",\"agent\":{\"ephemeral_id\":\"964d0404-9b18-4f2b-a3fe-7db4be557fbf\",\"id\":\"8809f950-580f-4473-8f56-fd5ca481b748\",\"name\":\"Proteus\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"36887\",\"created\":\"2024-07-27T03:12:22.571Z\",\"kind\":\"event\",\"provider\":\"Schannel\"},\"host\":{\"name\":\"Proteus.acme.com\"},\"log\":{\"level\":\"error\"},\"message\":\"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.\",\"organization\":\"acme\",\"senderHost\":\"Proteus.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"Proteus.acme.com\",\"event_data\":{\"AlertDesc\":\"70\"},\"event_id\":\"36887\",\"opcode\":\"Info\",\"process\":{\"pid\":1532,\"thread\":{\"id\":13752}},\"provider_guid\":\"{1F678132-5938-4686-9FDC-C8FF68F15C85}\",\"provider_name\":\"Schannel\",\"record_id\":7319414,\"task\":\"None\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-18\",\"name\":\"SYSTEM\",\"type\":\"User\"}}}",
"messageType": "36887",
"senderHost": "Proteus.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "schannel",
"tags": [
"v8",
"eventId:36887",
"schannel",
"36887"
],
"vendorCode": "7319414"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T03:12:20.569Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T03:12:22.571Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.acme.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"acme","senderHost":"Proteus.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.acme.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":13752}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319414,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | Product: schannel
Vendor: schannel | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T03:12:20.569Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"36887","created":"2024-07-27T03:12:22.571Z","kind":"event","provider":"Schannel"},"host":{"name":"Proteus.acme.com"},"log":{"level":"error"},"message":"A fatal alert was received from the remote endpoint. The TLS protocol defined fatal alert code is 70.","organization":"acme","senderHost":"Proteus.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"Proteus.acme.com","event_data":{"AlertDesc":"70"},"event_id":"36887","opcode":"Info","process":{"pid":1532,"thread":{"id":13752}},"provider_guid":"{1F678132-5938-4686-9FDC-C8FF68F15C85}","provider_name":"Schannel","record_id":7319414,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | This is a syslog message from a product called schannel by schannel. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 36887
senderHost: Proteus.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: schannel
tags: ['v8', 'eventId:36887', 'schannel', '36887']
vendorCode: 7319414 | Explain this syslog message |
<77>1 2024-07-26T09:01:09.013073-05:00 vcenter run-parts 11634 - - (/etc/cron.hourly) starting 0anacron
| {
"facilityCode": 9,
"facilityLabel": "clock",
"fieldExtractorName": "general_info",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T09:01:09.013073-05:00",
"message": "<77>1 2024-07-26T09:01:09.013073-05:00 vcenter run-parts 11634 - - (/etc/cron.hourly) starting 0anacron\n",
"messageType": "management_message",
"pid": 11634,
"priority": 77,
"program": "run-parts",
"sampleTime": "1.722002469925896E9",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"severityCode": 5,
"severityLabel": "notice",
"sourceInfo": "unknown",
"streamName": "general_info",
"tags": [
"rfc5424",
"general_info",
"management_message"
]
} | Create a JSON artifact from the message |
<77>1 2024-07-26T09:01:09.013073-05:00 vcenter run-parts 11634 - - (/etc/cron.hourly) starting 0anacron
| Product: general_info
Vendor: general_info | Identify this syslog message |
<77>1 2024-07-26T09:01:09.013073-05:00 vcenter run-parts 11634 - - (/etc/cron.hourly) starting 0anacron
| This is a syslog message from a product called general_info by general_info. The following fields were extracted from the message:
facilityCode: 9
facilityLabel: clock
fieldExtractorName: general_info
localHostname: vcenter
localStartTime: 2024-07-26T09:01:09.013073-05:00
messageType: management_message
pid: 11634
priority: 77
program: run-parts
sampleTime: 1.722002469925896E9
senderHost: 10.0.0.20
sensitivity: normal
severityCode: 5
severityLabel: notice
sourceInfo: unknown
streamName: general_info
tags: ['rfc5424', 'general_info', 'management_message'] | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T05:32:55.045Z","agent":{"ephemeral_id":"6ac353d2-5811-4f48-be57-8a2a0c675eca","id":"aac25b4f-0ad8-4d8a-a376-dd5d77ec4ba9","name":"NORDC-SS1-WEBD1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"58","created":"2024-07-27T05:32:56.831Z","kind":"event","provider":"Volsnap"},"host":{"name":"NORDC-SS1-WEBD1.wayne.com"},"log":{"level":"information"},"message":"The oldest shadow copy of volume D: was deleted to keep the total number of shadow copies of volume D: below a limit.","organization":"wayne","senderHost":"10.20.30.110","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"NORDC-SS1-WEBD1.wayne.com","event_data":{"Binary":"0000000006003000000000003A000640B10000000000000090040000000000000000000000000000","DeviceName":"\\Device\\HarddiskVolumeShadowCopy708","NTSTATUS":"00000000","SourceFileID":"0x0001","SourceLine":"6377","SourceTag":"177","VolumeName":"D:"},"event_id":"58","keywords":["Classic"],"opcode":"Info","process":{"pid":4,"thread":{"id":7188}},"provider_guid":"{cb017cd2-1f37-4e65-82bc-3e91f6a37559}","provider_name":"Volsnap","record_id":73423,"task":"None"}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T05:32:55.045Z\",\"agent\":{\"ephemeral_id\":\"6ac353d2-5811-4f48-be57-8a2a0c675eca\",\"id\":\"aac25b4f-0ad8-4d8a-a376-dd5d77ec4ba9\",\"name\":\"NORDC-SS1-WEBD1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"58\",\"created\":\"2024-07-27T05:32:56.831Z\",\"kind\":\"event\",\"provider\":\"Volsnap\"},\"host\":{\"name\":\"NORDC-SS1-WEBD1.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"The oldest shadow copy of volume D: was deleted to keep the total number of shadow copies of volume D: below a limit.\",\"organization\":\"wayne\",\"senderHost\":\"10.20.30.110\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"NORDC-SS1-WEBD1.wayne.com\",\"event_data\":{\"Binary\":\"0000000006003000000000003A000640B10000000000000090040000000000000000000000000000\",\"DeviceName\":\"\\\\Device\\\\HarddiskVolumeShadowCopy708\",\"NTSTATUS\":\"00000000\",\"SourceFileID\":\"0x0001\",\"SourceLine\":\"6377\",\"SourceTag\":\"177\",\"VolumeName\":\"D:\"},\"event_id\":\"58\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":7188}},\"provider_guid\":\"{cb017cd2-1f37-4e65-82bc-3e91f6a37559}\",\"provider_name\":\"Volsnap\",\"record_id\":73423,\"task\":\"None\"}}",
"messageType": "58",
"senderHost": "10.20.30.110",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "volsnap",
"tags": [
"v8",
"eventId:58",
"volsnap",
"58"
],
"vendorCode": "73423"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T05:32:55.045Z","agent":{"ephemeral_id":"6ac353d2-5811-4f48-be57-8a2a0c675eca","id":"aac25b4f-0ad8-4d8a-a376-dd5d77ec4ba9","name":"NORDC-SS1-WEBD1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"58","created":"2024-07-27T05:32:56.831Z","kind":"event","provider":"Volsnap"},"host":{"name":"NORDC-SS1-WEBD1.wayne.com"},"log":{"level":"information"},"message":"The oldest shadow copy of volume D: was deleted to keep the total number of shadow copies of volume D: below a limit.","organization":"wayne","senderHost":"10.20.30.110","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"NORDC-SS1-WEBD1.wayne.com","event_data":{"Binary":"0000000006003000000000003A000640B10000000000000090040000000000000000000000000000","DeviceName":"\\Device\\HarddiskVolumeShadowCopy708","NTSTATUS":"00000000","SourceFileID":"0x0001","SourceLine":"6377","SourceTag":"177","VolumeName":"D:"},"event_id":"58","keywords":["Classic"],"opcode":"Info","process":{"pid":4,"thread":{"id":7188}},"provider_guid":"{cb017cd2-1f37-4e65-82bc-3e91f6a37559}","provider_name":"Volsnap","record_id":73423,"task":"None"}} | Product: volsnap
Vendor: volsnap | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T05:32:55.045Z","agent":{"ephemeral_id":"6ac353d2-5811-4f48-be57-8a2a0c675eca","id":"aac25b4f-0ad8-4d8a-a376-dd5d77ec4ba9","name":"NORDC-SS1-WEBD1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"58","created":"2024-07-27T05:32:56.831Z","kind":"event","provider":"Volsnap"},"host":{"name":"NORDC-SS1-WEBD1.wayne.com"},"log":{"level":"information"},"message":"The oldest shadow copy of volume D: was deleted to keep the total number of shadow copies of volume D: below a limit.","organization":"wayne","senderHost":"10.20.30.110","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"NORDC-SS1-WEBD1.wayne.com","event_data":{"Binary":"0000000006003000000000003A000640B10000000000000090040000000000000000000000000000","DeviceName":"\\Device\\HarddiskVolumeShadowCopy708","NTSTATUS":"00000000","SourceFileID":"0x0001","SourceLine":"6377","SourceTag":"177","VolumeName":"D:"},"event_id":"58","keywords":["Classic"],"opcode":"Info","process":{"pid":4,"thread":{"id":7188}},"provider_guid":"{cb017cd2-1f37-4e65-82bc-3e91f6a37559}","provider_name":"Volsnap","record_id":73423,"task":"None"}} | This is a syslog message from a product called volsnap by volsnap. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 58
senderHost: 10.20.30.110
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: volsnap
tags: ['v8', 'eventId:58', 'volsnap', '58']
vendorCode: 73423 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T05:32:55.214Z","agent":{"ephemeral_id":"6ac353d2-5811-4f48-be57-8a2a0c675eca","id":"aac25b4f-0ad8-4d8a-a376-dd5d77ec4ba9","name":"NORDC-SS1-WEBD1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"98","created":"2024-07-27T05:32:56.831Z","kind":"event","provider":"Microsoft-Windows-Ntfs"},"host":{"name":"NORDC-SS1-WEBD1.stark.com"},"log":{"level":"information"},"message":"Volume ?? (\\Device\\HarddiskVolumeShadowCopy1731) is healthy. No action is needed.","organization":"stark","senderHost":"10.20.30.110","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"NORDC-SS1-WEBD1.stark.com","event_data":{"CorruptionActionState":"0","DeviceName":"\\Device\\HarddiskVolumeShadowCopy1731","DriveName":"??"},"event_id":"98","keywords":["VolumeCorruptionActionStateChange"],"opcode":"Info","process":{"pid":4,"thread":{"id":7188}},"provider_guid":"{3ff37a1c-a68d-4d6e-8c9b-f79e8b16c482}","provider_name":"Microsoft-Windows-Ntfs","record_id":73424,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | {
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T05:32:55.214Z\",\"agent\":{\"ephemeral_id\":\"6ac353d2-5811-4f48-be57-8a2a0c675eca\",\"id\":\"aac25b4f-0ad8-4d8a-a376-dd5d77ec4ba9\",\"name\":\"NORDC-SS1-WEBD1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"98\",\"created\":\"2024-07-27T05:32:56.831Z\",\"kind\":\"event\",\"provider\":\"Microsoft-Windows-Ntfs\"},\"host\":{\"name\":\"NORDC-SS1-WEBD1.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"Volume ?? (\\\\Device\\\\HarddiskVolumeShadowCopy1731) is healthy. No action is needed.\",\"organization\":\"stark\",\"senderHost\":\"10.20.30.110\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"NORDC-SS1-WEBD1.stark.com\",\"event_data\":{\"CorruptionActionState\":\"0\",\"DeviceName\":\"\\\\Device\\\\HarddiskVolumeShadowCopy1731\",\"DriveName\":\"??\"},\"event_id\":\"98\",\"keywords\":[\"VolumeCorruptionActionStateChange\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":7188}},\"provider_guid\":\"{3ff37a1c-a68d-4d6e-8c9b-f79e8b16c482}\",\"provider_name\":\"Microsoft-Windows-Ntfs\",\"record_id\":73424,\"task\":\"None\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-18\",\"name\":\"SYSTEM\",\"type\":\"User\"}}}",
"messageType": "98",
"senderHost": "10.20.30.110",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "microsoft-windows-ntfs",
"tags": [
"v8",
"eventId:98",
"microsoft-windows-ntfs",
"98"
],
"vendorCode": "73424"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T05:32:55.214Z","agent":{"ephemeral_id":"6ac353d2-5811-4f48-be57-8a2a0c675eca","id":"aac25b4f-0ad8-4d8a-a376-dd5d77ec4ba9","name":"NORDC-SS1-WEBD1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"98","created":"2024-07-27T05:32:56.831Z","kind":"event","provider":"Microsoft-Windows-Ntfs"},"host":{"name":"NORDC-SS1-WEBD1.stark.com"},"log":{"level":"information"},"message":"Volume ?? (\\Device\\HarddiskVolumeShadowCopy1731) is healthy. No action is needed.","organization":"stark","senderHost":"10.20.30.110","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"NORDC-SS1-WEBD1.stark.com","event_data":{"CorruptionActionState":"0","DeviceName":"\\Device\\HarddiskVolumeShadowCopy1731","DriveName":"??"},"event_id":"98","keywords":["VolumeCorruptionActionStateChange"],"opcode":"Info","process":{"pid":4,"thread":{"id":7188}},"provider_guid":"{3ff37a1c-a68d-4d6e-8c9b-f79e8b16c482}","provider_name":"Microsoft-Windows-Ntfs","record_id":73424,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | Product: microsoft-windows-ntfs
Vendor: microsoft-windows-ntfs | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T05:32:55.214Z","agent":{"ephemeral_id":"6ac353d2-5811-4f48-be57-8a2a0c675eca","id":"aac25b4f-0ad8-4d8a-a376-dd5d77ec4ba9","name":"NORDC-SS1-WEBD1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"98","created":"2024-07-27T05:32:56.831Z","kind":"event","provider":"Microsoft-Windows-Ntfs"},"host":{"name":"NORDC-SS1-WEBD1.stark.com"},"log":{"level":"information"},"message":"Volume ?? (\\Device\\HarddiskVolumeShadowCopy1731) is healthy. No action is needed.","organization":"stark","senderHost":"10.20.30.110","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"NORDC-SS1-WEBD1.stark.com","event_data":{"CorruptionActionState":"0","DeviceName":"\\Device\\HarddiskVolumeShadowCopy1731","DriveName":"??"},"event_id":"98","keywords":["VolumeCorruptionActionStateChange"],"opcode":"Info","process":{"pid":4,"thread":{"id":7188}},"provider_guid":"{3ff37a1c-a68d-4d6e-8c9b-f79e8b16c482}","provider_name":"Microsoft-Windows-Ntfs","record_id":73424,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}} | This is a syslog message from a product called microsoft-windows-ntfs by microsoft-windows-ntfs. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 98
senderHost: 10.20.30.110
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: microsoft-windows-ntfs
tags: ['v8', 'eventId:98', 'microsoft-windows-ntfs', '98']
vendorCode: 73424 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T10:14:40.388Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Process Creation","code":"4688","created":"2024-07-30T10:14:42.297Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com"},"log":{"level":"information"},"message":"A new process has been created.\n\nCreator Subject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNVIPROCPRDWEB01$\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x3E7\n\nTarget Subject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x1C5B86AA\n\nProcess Information:\n\tNew Process ID:\t\t0xadc\n\tNew Process Name:\tC:\\Windows\\System32\\inetsrv\\w3wp.exe\n\tToken Elevation Type:\t%%1936\n\tMandatory Label:\t\tS-1-16-12288\n\tCreator Process ID:\t0xb08\n\tCreator Process Name:\tC:\\Windows\\System32\\svchost.exe\n\tProcess Command Line:\t\n\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\n\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\n\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\n\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.","organization":"umbrella","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com","event_data":{"MandatoryLabel":"S-1-16-12288","NewProcessId":"0xadc","NewProcessName":"C:\\Windows\\System32\\inetsrv\\w3wp.exe","ParentProcessName":"C:\\Windows\\System32\\svchost.exe","ProcessId":"0xb08","SubjectDomainName":"prdnvi","SubjectLogonId":"0x3e7","SubjectUserName":"NVIPROCPRDWEB01$","SubjectUserSid":"S-1-5-18","TargetDomainName":"prdnvi","TargetLogonId":"0x1c5b86aa","TargetUserName":"procprd-appuser","TargetUserSid":"S-1-0-0","TokenElevationType":"%%1936"},"event_id":"4688","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":4872}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6493973,"task":"Process Creation","version":2}} | {
"fieldExtractorName": "symantec_dlp",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-30T10:14:40.388Z\",\"agent\":{\"ephemeral_id\":\"a668c636-ec70-4103-9c98-53517f0df854\",\"id\":\"040c78f0-1741-4108-a30c-aaf00e9af961\",\"name\":\"NVIPROCPRDWEB01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Process Creation\",\"code\":\"4688\",\"created\":\"2024-07-30T10:14:42.297Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NVIPROCPRDWEB01.prdnvi.umbrellaint.com\"},\"log\":{\"level\":\"information\"},\"message\":\"A new process has been created.\\n\\nCreator Subject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNVIPROCPRDWEB01$\\n\\tAccount Domain:\\t\\tprdnvi\\n\\tLogon ID:\\t\\t0x3E7\\n\\nTarget Subject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tprocprd-appuser\\n\\tAccount Domain:\\t\\tprdnvi\\n\\tLogon ID:\\t\\t0x1C5B86AA\\n\\nProcess Information:\\n\\tNew Process ID:\\t\\t0xadc\\n\\tNew Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\w3wp.exe\\n\\tToken Elevation Type:\\t%%1936\\n\\tMandatory Label:\\t\\tS-1-16-12288\\n\\tCreator Process ID:\\t0xb08\\n\\tCreator Process Name:\\tC:\\\\Windows\\\\System32\\\\svchost.exe\\n\\tProcess Command Line:\\t\\n\\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\\n\\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\\n\\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\\n\\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.\",\"organization\":\"umbrella\",\"senderHost\":\"10.160.18.44\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NVIPROCPRDWEB01.prdnvi.umbrellaint.com\",\"event_data\":{\"MandatoryLabel\":\"S-1-16-12288\",\"NewProcessId\":\"0xadc\",\"NewProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\w3wp.exe\",\"ParentProcessName\":\"C:\\\\Windows\\\\System32\\\\svchost.exe\",\"ProcessId\":\"0xb08\",\"SubjectDomainName\":\"prdnvi\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NVIPROCPRDWEB01$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"prdnvi\",\"TargetLogonId\":\"0x1c5b86aa\",\"TargetUserName\":\"procprd-appuser\",\"TargetUserSid\":\"S-1-0-0\",\"TokenElevationType\":\"%%1936\"},\"event_id\":\"4688\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":4872}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6493973,\"task\":\"Process Creation\",\"version\":2}}",
"messageType": "data_loss",
"productIds": [
44
],
"senderHost": "10.160.18.44",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "symantec_dlp",
"tags": [
"symantec_dlp",
"data_loss"
]
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T10:14:40.388Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Process Creation","code":"4688","created":"2024-07-30T10:14:42.297Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com"},"log":{"level":"information"},"message":"A new process has been created.\n\nCreator Subject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNVIPROCPRDWEB01$\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x3E7\n\nTarget Subject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x1C5B86AA\n\nProcess Information:\n\tNew Process ID:\t\t0xadc\n\tNew Process Name:\tC:\\Windows\\System32\\inetsrv\\w3wp.exe\n\tToken Elevation Type:\t%%1936\n\tMandatory Label:\t\tS-1-16-12288\n\tCreator Process ID:\t0xb08\n\tCreator Process Name:\tC:\\Windows\\System32\\svchost.exe\n\tProcess Command Line:\t\n\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\n\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\n\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\n\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.","organization":"umbrella","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com","event_data":{"MandatoryLabel":"S-1-16-12288","NewProcessId":"0xadc","NewProcessName":"C:\\Windows\\System32\\inetsrv\\w3wp.exe","ParentProcessName":"C:\\Windows\\System32\\svchost.exe","ProcessId":"0xb08","SubjectDomainName":"prdnvi","SubjectLogonId":"0x3e7","SubjectUserName":"NVIPROCPRDWEB01$","SubjectUserSid":"S-1-5-18","TargetDomainName":"prdnvi","TargetLogonId":"0x1c5b86aa","TargetUserName":"procprd-appuser","TargetUserSid":"S-1-0-0","TokenElevationType":"%%1936"},"event_id":"4688","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":4872}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6493973,"task":"Process Creation","version":2}} | Product: Symantec Data Loss Prevention
Vendor: Symantec | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T10:14:40.388Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Process Creation","code":"4688","created":"2024-07-30T10:14:42.297Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com"},"log":{"level":"information"},"message":"A new process has been created.\n\nCreator Subject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNVIPROCPRDWEB01$\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x3E7\n\nTarget Subject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x1C5B86AA\n\nProcess Information:\n\tNew Process ID:\t\t0xadc\n\tNew Process Name:\tC:\\Windows\\System32\\inetsrv\\w3wp.exe\n\tToken Elevation Type:\t%%1936\n\tMandatory Label:\t\tS-1-16-12288\n\tCreator Process ID:\t0xb08\n\tCreator Process Name:\tC:\\Windows\\System32\\svchost.exe\n\tProcess Command Line:\t\n\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\n\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\n\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\n\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.","organization":"umbrella","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com","event_data":{"MandatoryLabel":"S-1-16-12288","NewProcessId":"0xadc","NewProcessName":"C:\\Windows\\System32\\inetsrv\\w3wp.exe","ParentProcessName":"C:\\Windows\\System32\\svchost.exe","ProcessId":"0xb08","SubjectDomainName":"prdnvi","SubjectLogonId":"0x3e7","SubjectUserName":"NVIPROCPRDWEB01$","SubjectUserSid":"S-1-5-18","TargetDomainName":"prdnvi","TargetLogonId":"0x1c5b86aa","TargetUserName":"procprd-appuser","TargetUserSid":"S-1-0-0","TokenElevationType":"%%1936"},"event_id":"4688","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":4872}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6493973,"task":"Process Creation","version":2}} | This is a syslog message from a product called Symantec Data Loss Prevention by Symantec. The following fields were extracted from the message:
fieldExtractorName: symantec_dlp
messageType: data_loss
productIds: [44]
senderHost: 10.160.18.44
sensitivity: normal
sourceInfo: unknown
streamName: symantec_dlp
tags: ['symantec_dlp', 'data_loss'] | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T10:14:40.387Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2024-07-30T10:14:42.297Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.wayneint.com"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-21-855572474-1402847513-2951438033-32165\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x1C5B86AA\n\nPrivileges:\t\tSeImpersonatePrivilege","organization":"wayne","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"activity_id":"{72e70134-d9a9-0000-db01-e772a9d9da01}","api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.wayneint.com","event_data":{"PrivilegeList":"SeImpersonatePrivilege","SubjectDomainName":"prdnvi","SubjectLogonId":"0x1c5b86aa","SubjectUserName":"procprd-appuser","SubjectUserSid":"S-1-5-21-855572474-1402847513-2951438033-32165"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":652,"thread":{"id":1116}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6493972,"task":"Special Logon"}} | {
"fieldExtractorName": "symantec_dlp",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-30T10:14:40.387Z\",\"agent\":{\"ephemeral_id\":\"a668c636-ec70-4103-9c98-53517f0df854\",\"id\":\"040c78f0-1741-4108-a30c-aaf00e9af961\",\"name\":\"NVIPROCPRDWEB01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Special Logon\",\"code\":\"4672\",\"created\":\"2024-07-30T10:14:42.297Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NVIPROCPRDWEB01.prdnvi.wayneint.com\"},\"log\":{\"level\":\"information\"},\"message\":\"Special privileges assigned to new logon.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-21-855572474-1402847513-2951438033-32165\\n\\tAccount Name:\\t\\tprocprd-appuser\\n\\tAccount Domain:\\t\\tprdnvi\\n\\tLogon ID:\\t\\t0x1C5B86AA\\n\\nPrivileges:\\t\\tSeImpersonatePrivilege\",\"organization\":\"wayne\",\"senderHost\":\"10.160.18.44\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{72e70134-d9a9-0000-db01-e772a9d9da01}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NVIPROCPRDWEB01.prdnvi.wayneint.com\",\"event_data\":{\"PrivilegeList\":\"SeImpersonatePrivilege\",\"SubjectDomainName\":\"prdnvi\",\"SubjectLogonId\":\"0x1c5b86aa\",\"SubjectUserName\":\"procprd-appuser\",\"SubjectUserSid\":\"S-1-5-21-855572474-1402847513-2951438033-32165\"},\"event_id\":\"4672\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":652,\"thread\":{\"id\":1116}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6493972,\"task\":\"Special Logon\"}}",
"messageType": "data_loss",
"productIds": [
44
],
"senderHost": "10.160.18.44",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "symantec_dlp",
"tags": [
"symantec_dlp",
"data_loss"
]
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T10:14:40.387Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2024-07-30T10:14:42.297Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.wayneint.com"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-21-855572474-1402847513-2951438033-32165\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x1C5B86AA\n\nPrivileges:\t\tSeImpersonatePrivilege","organization":"wayne","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"activity_id":"{72e70134-d9a9-0000-db01-e772a9d9da01}","api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.wayneint.com","event_data":{"PrivilegeList":"SeImpersonatePrivilege","SubjectDomainName":"prdnvi","SubjectLogonId":"0x1c5b86aa","SubjectUserName":"procprd-appuser","SubjectUserSid":"S-1-5-21-855572474-1402847513-2951438033-32165"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":652,"thread":{"id":1116}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6493972,"task":"Special Logon"}} | Product: Symantec Data Loss Prevention
Vendor: Symantec | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T10:14:40.387Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2024-07-30T10:14:42.297Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.wayneint.com"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-21-855572474-1402847513-2951438033-32165\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x1C5B86AA\n\nPrivileges:\t\tSeImpersonatePrivilege","organization":"wayne","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"activity_id":"{72e70134-d9a9-0000-db01-e772a9d9da01}","api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.wayneint.com","event_data":{"PrivilegeList":"SeImpersonatePrivilege","SubjectDomainName":"prdnvi","SubjectLogonId":"0x1c5b86aa","SubjectUserName":"procprd-appuser","SubjectUserSid":"S-1-5-21-855572474-1402847513-2951438033-32165"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":652,"thread":{"id":1116}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6493972,"task":"Special Logon"}} | This is a syslog message from a product called Symantec Data Loss Prevention by Symantec. The following fields were extracted from the message:
fieldExtractorName: symantec_dlp
messageType: data_loss
productIds: [44]
senderHost: 10.160.18.44
sensitivity: normal
sourceInfo: unknown
streamName: symantec_dlp
tags: ['symantec_dlp', 'data_loss'] | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T10:14:40.387Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4648","created":"2024-07-30T10:14:42.297Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com"},"log":{"level":"information"},"message":"A logon was attempted using explicit credentials.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNVIPROCPRDWEB01$\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x3E7\n\tLogon GUID:\t\t{00000000-0000-0000-0000-000000000000}\n\nAccount Whose Credentials Were Used:\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon GUID:\t\t{cbf3a394-d4ce-9622-1544-923035733fe4}\n\nTarget Server:\n\tTarget Server Name:\tlocalhost\n\tAdditional Information:\tlocalhost\n\nProcess Information:\n\tProcess ID:\t\t0xb08\n\tProcess Name:\t\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tNetwork Address:\t-\n\tPort:\t\t\t-\n\nThis event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.","organization":"oscorp","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"activity_id":"{72e70134-d9a9-0000-db01-e772a9d9da01}","api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com","event_data":{"IpAddress":"-","IpPort":"-","LogonGuid":"{00000000-0000-0000-0000-000000000000}","ProcessId":"0xb08","ProcessName":"C:\\Windows\\System32\\svchost.exe","SubjectDomainName":"prdnvi","SubjectLogonId":"0x3e7","SubjectUserName":"NVIPROCPRDWEB01$","SubjectUserSid":"S-1-5-18","TargetDomainName":"prdnvi","TargetInfo":"localhost","TargetLogonGuid":"{cbf3a394-d4ce-9622-1544-923035733fe4}","TargetServerName":"localhost","TargetUserName":"procprd-appuser"},"event_id":"4648","keywords":["Audit Success"],"opcode":"Info","process":{"pid":652,"thread":{"id":1116}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6493970,"task":"Logon"}} | {
"fieldExtractorName": "symantec_dlp",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-30T10:14:40.387Z\",\"agent\":{\"ephemeral_id\":\"a668c636-ec70-4103-9c98-53517f0df854\",\"id\":\"040c78f0-1741-4108-a30c-aaf00e9af961\",\"name\":\"NVIPROCPRDWEB01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4648\",\"created\":\"2024-07-30T10:14:42.297Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NVIPROCPRDWEB01.prdnvi.oscorpint.com\"},\"log\":{\"level\":\"information\"},\"message\":\"A logon was attempted using explicit credentials.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNVIPROCPRDWEB01$\\n\\tAccount Domain:\\t\\tprdnvi\\n\\tLogon ID:\\t\\t0x3E7\\n\\tLogon GUID:\\t\\t{00000000-0000-0000-0000-000000000000}\\n\\nAccount Whose Credentials Were Used:\\n\\tAccount Name:\\t\\tprocprd-appuser\\n\\tAccount Domain:\\t\\tprdnvi\\n\\tLogon GUID:\\t\\t{cbf3a394-d4ce-9622-1544-923035733fe4}\\n\\nTarget Server:\\n\\tTarget Server Name:\\tlocalhost\\n\\tAdditional Information:\\tlocalhost\\n\\nProcess Information:\\n\\tProcess ID:\\t\\t0xb08\\n\\tProcess Name:\\t\\tC:\\\\Windows\\\\System32\\\\svchost.exe\\n\\nNetwork Information:\\n\\tNetwork Address:\\t-\\n\\tPort:\\t\\t\\t-\\n\\nThis event is generated when a process attempts to log on an account by explicitly specifying that account\u2019s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.\",\"organization\":\"oscorp\",\"senderHost\":\"10.160.18.44\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{72e70134-d9a9-0000-db01-e772a9d9da01}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NVIPROCPRDWEB01.prdnvi.oscorpint.com\",\"event_data\":{\"IpAddress\":\"-\",\"IpPort\":\"-\",\"LogonGuid\":\"{00000000-0000-0000-0000-000000000000}\",\"ProcessId\":\"0xb08\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\svchost.exe\",\"SubjectDomainName\":\"prdnvi\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NVIPROCPRDWEB01$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"prdnvi\",\"TargetInfo\":\"localhost\",\"TargetLogonGuid\":\"{cbf3a394-d4ce-9622-1544-923035733fe4}\",\"TargetServerName\":\"localhost\",\"TargetUserName\":\"procprd-appuser\"},\"event_id\":\"4648\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":652,\"thread\":{\"id\":1116}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6493970,\"task\":\"Logon\"}}",
"messageType": "data_loss",
"productIds": [
44
],
"senderHost": "10.160.18.44",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "symantec_dlp",
"tags": [
"symantec_dlp",
"data_loss"
]
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T10:14:40.387Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4648","created":"2024-07-30T10:14:42.297Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com"},"log":{"level":"information"},"message":"A logon was attempted using explicit credentials.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNVIPROCPRDWEB01$\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x3E7\n\tLogon GUID:\t\t{00000000-0000-0000-0000-000000000000}\n\nAccount Whose Credentials Were Used:\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon GUID:\t\t{cbf3a394-d4ce-9622-1544-923035733fe4}\n\nTarget Server:\n\tTarget Server Name:\tlocalhost\n\tAdditional Information:\tlocalhost\n\nProcess Information:\n\tProcess ID:\t\t0xb08\n\tProcess Name:\t\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tNetwork Address:\t-\n\tPort:\t\t\t-\n\nThis event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.","organization":"oscorp","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"activity_id":"{72e70134-d9a9-0000-db01-e772a9d9da01}","api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com","event_data":{"IpAddress":"-","IpPort":"-","LogonGuid":"{00000000-0000-0000-0000-000000000000}","ProcessId":"0xb08","ProcessName":"C:\\Windows\\System32\\svchost.exe","SubjectDomainName":"prdnvi","SubjectLogonId":"0x3e7","SubjectUserName":"NVIPROCPRDWEB01$","SubjectUserSid":"S-1-5-18","TargetDomainName":"prdnvi","TargetInfo":"localhost","TargetLogonGuid":"{cbf3a394-d4ce-9622-1544-923035733fe4}","TargetServerName":"localhost","TargetUserName":"procprd-appuser"},"event_id":"4648","keywords":["Audit Success"],"opcode":"Info","process":{"pid":652,"thread":{"id":1116}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6493970,"task":"Logon"}} | Product: Symantec Data Loss Prevention
Vendor: Symantec | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T10:14:40.387Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4648","created":"2024-07-30T10:14:42.297Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com"},"log":{"level":"information"},"message":"A logon was attempted using explicit credentials.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNVIPROCPRDWEB01$\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x3E7\n\tLogon GUID:\t\t{00000000-0000-0000-0000-000000000000}\n\nAccount Whose Credentials Were Used:\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon GUID:\t\t{cbf3a394-d4ce-9622-1544-923035733fe4}\n\nTarget Server:\n\tTarget Server Name:\tlocalhost\n\tAdditional Information:\tlocalhost\n\nProcess Information:\n\tProcess ID:\t\t0xb08\n\tProcess Name:\t\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tNetwork Address:\t-\n\tPort:\t\t\t-\n\nThis event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.","organization":"oscorp","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"activity_id":"{72e70134-d9a9-0000-db01-e772a9d9da01}","api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com","event_data":{"IpAddress":"-","IpPort":"-","LogonGuid":"{00000000-0000-0000-0000-000000000000}","ProcessId":"0xb08","ProcessName":"C:\\Windows\\System32\\svchost.exe","SubjectDomainName":"prdnvi","SubjectLogonId":"0x3e7","SubjectUserName":"NVIPROCPRDWEB01$","SubjectUserSid":"S-1-5-18","TargetDomainName":"prdnvi","TargetInfo":"localhost","TargetLogonGuid":"{cbf3a394-d4ce-9622-1544-923035733fe4}","TargetServerName":"localhost","TargetUserName":"procprd-appuser"},"event_id":"4648","keywords":["Audit Success"],"opcode":"Info","process":{"pid":652,"thread":{"id":1116}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6493970,"task":"Logon"}} | This is a syslog message from a product called Symantec Data Loss Prevention by Symantec. The following fields were extracted from the message:
fieldExtractorName: symantec_dlp
messageType: data_loss
productIds: [44]
senderHost: 10.160.18.44
sensitivity: normal
sourceInfo: unknown
streamName: symantec_dlp
tags: ['symantec_dlp', 'data_loss'] | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T10:14:40.387Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4624","created":"2024-07-30T10:14:42.297Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com"},"log":{"level":"information"},"message":"An account was successfully logged on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNVIPROCPRDWEB01$\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x3E7\n\nLogon Information:\n\tLogon Type:\t\t4\n\tRestricted Admin Mode:\t-\n\tVirtual Account:\t\tNo\n\tElevated Token:\t\tYes\n\nImpersonation Level:\t\tImpersonation\n\nNew Logon:\n\tSecurity ID:\t\tS-1-5-21-855572474-1402847513-2951438033-32165\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x1C5B86AA\n\tLinked Logon ID:\t\t0x0\n\tNetwork Account Name:\t-\n\tNetwork Account Domain:\t-\n\tLogon GUID:\t\t{cbf3a394-d4ce-9622-1544-923035733fe4}\n\nProcess Information:\n\tProcess ID:\t\t0xb08\n\tProcess Name:\t\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tNVIPROCPRDWEB01\n\tSource Network Address:\t-\n\tSource Port:\t\t-\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon session is created. It is generated on the computer that was accessed.\n\nThe subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).\n\nThe New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.\n\nThe network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe impersonation level field indicates the extent to which a process in the logon session can impersonate.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"activity_id":"{72e70134-d9a9-0000-db01-e772a9d9da01}","api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com","event_data":{"AuthenticationPackageName":"Negotiate","ElevatedToken":"%%1842","ImpersonationLevel":"%%1833","IpAddress":"-","IpPort":"-","KeyLength":"0","LmPackageName":"-","LogonGuid":"{cbf3a394-d4ce-9622-1544-923035733fe4}","LogonProcessName":"Advapi ","LogonType":"4","ProcessId":"0xb08","ProcessName":"C:\\Windows\\System32\\svchost.exe","RestrictedAdminMode":"-","SubjectDomainName":"prdnvi","SubjectLogonId":"0x3e7","SubjectUserName":"NVIPROCPRDWEB01$","SubjectUserSid":"S-1-5-18","TargetDomainName":"prdnvi","TargetLinkedLogonId":"0x0","TargetLogonId":"0x1c5b86aa","TargetOutboundDomainName":"-","TargetOutboundUserName":"-","TargetUserName":"procprd-appuser","TargetUserSid":"S-1-5-21-855572474-1402847513-2951438033-32165","TransmittedServices":"-","VirtualAccount":"%%1843","WorkstationName":"NVIPROCPRDWEB01"},"event_id":"4624","keywords":["Audit Success"],"opcode":"Info","process":{"pid":652,"thread":{"id":1116}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6493971,"task":"Logon","version":2}} | {
"fieldExtractorName": "symantec_dlp",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-30T10:14:40.387Z\",\"agent\":{\"ephemeral_id\":\"a668c636-ec70-4103-9c98-53517f0df854\",\"id\":\"040c78f0-1741-4108-a30c-aaf00e9af961\",\"name\":\"NVIPROCPRDWEB01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4624\",\"created\":\"2024-07-30T10:14:42.297Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NVIPROCPRDWEB01.prdnvi.oscorpint.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account was successfully logged on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNVIPROCPRDWEB01$\\n\\tAccount Domain:\\t\\tprdnvi\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Information:\\n\\tLogon Type:\\t\\t4\\n\\tRestricted Admin Mode:\\t-\\n\\tVirtual Account:\\t\\tNo\\n\\tElevated Token:\\t\\tYes\\n\\nImpersonation Level:\\t\\tImpersonation\\n\\nNew Logon:\\n\\tSecurity ID:\\t\\tS-1-5-21-855572474-1402847513-2951438033-32165\\n\\tAccount Name:\\t\\tprocprd-appuser\\n\\tAccount Domain:\\t\\tprdnvi\\n\\tLogon ID:\\t\\t0x1C5B86AA\\n\\tLinked Logon ID:\\t\\t0x0\\n\\tNetwork Account Name:\\t-\\n\\tNetwork Account Domain:\\t-\\n\\tLogon GUID:\\t\\t{cbf3a394-d4ce-9622-1544-923035733fe4}\\n\\nProcess Information:\\n\\tProcess ID:\\t\\t0xb08\\n\\tProcess Name:\\t\\tC:\\\\Windows\\\\System32\\\\svchost.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNVIPROCPRDWEB01\\n\\tSource Network Address:\\t-\\n\\tSource Port:\\t\\t-\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tNegotiate\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon session is created. It is generated on the computer that was accessed.\\n\\nThe subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).\\n\\nThe New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.\\n\\nThe network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe impersonation level field indicates the extent to which a process in the logon session can impersonate.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.160.18.44\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{72e70134-d9a9-0000-db01-e772a9d9da01}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NVIPROCPRDWEB01.prdnvi.oscorpint.com\",\"event_data\":{\"AuthenticationPackageName\":\"Negotiate\",\"ElevatedToken\":\"%%1842\",\"ImpersonationLevel\":\"%%1833\",\"IpAddress\":\"-\",\"IpPort\":\"-\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonGuid\":\"{cbf3a394-d4ce-9622-1544-923035733fe4}\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"4\",\"ProcessId\":\"0xb08\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\svchost.exe\",\"RestrictedAdminMode\":\"-\",\"SubjectDomainName\":\"prdnvi\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NVIPROCPRDWEB01$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"prdnvi\",\"TargetLinkedLogonId\":\"0x0\",\"TargetLogonId\":\"0x1c5b86aa\",\"TargetOutboundDomainName\":\"-\",\"TargetOutboundUserName\":\"-\",\"TargetUserName\":\"procprd-appuser\",\"TargetUserSid\":\"S-1-5-21-855572474-1402847513-2951438033-32165\",\"TransmittedServices\":\"-\",\"VirtualAccount\":\"%%1843\",\"WorkstationName\":\"NVIPROCPRDWEB01\"},\"event_id\":\"4624\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":652,\"thread\":{\"id\":1116}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6493971,\"task\":\"Logon\",\"version\":2}}",
"messageType": "data_loss",
"productIds": [
44
],
"senderHost": "10.160.18.44",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "symantec_dlp",
"tags": [
"symantec_dlp",
"data_loss"
]
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T10:14:40.387Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4624","created":"2024-07-30T10:14:42.297Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com"},"log":{"level":"information"},"message":"An account was successfully logged on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNVIPROCPRDWEB01$\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x3E7\n\nLogon Information:\n\tLogon Type:\t\t4\n\tRestricted Admin Mode:\t-\n\tVirtual Account:\t\tNo\n\tElevated Token:\t\tYes\n\nImpersonation Level:\t\tImpersonation\n\nNew Logon:\n\tSecurity ID:\t\tS-1-5-21-855572474-1402847513-2951438033-32165\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x1C5B86AA\n\tLinked Logon ID:\t\t0x0\n\tNetwork Account Name:\t-\n\tNetwork Account Domain:\t-\n\tLogon GUID:\t\t{cbf3a394-d4ce-9622-1544-923035733fe4}\n\nProcess Information:\n\tProcess ID:\t\t0xb08\n\tProcess Name:\t\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tNVIPROCPRDWEB01\n\tSource Network Address:\t-\n\tSource Port:\t\t-\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon session is created. It is generated on the computer that was accessed.\n\nThe subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).\n\nThe New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.\n\nThe network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe impersonation level field indicates the extent to which a process in the logon session can impersonate.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"activity_id":"{72e70134-d9a9-0000-db01-e772a9d9da01}","api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com","event_data":{"AuthenticationPackageName":"Negotiate","ElevatedToken":"%%1842","ImpersonationLevel":"%%1833","IpAddress":"-","IpPort":"-","KeyLength":"0","LmPackageName":"-","LogonGuid":"{cbf3a394-d4ce-9622-1544-923035733fe4}","LogonProcessName":"Advapi ","LogonType":"4","ProcessId":"0xb08","ProcessName":"C:\\Windows\\System32\\svchost.exe","RestrictedAdminMode":"-","SubjectDomainName":"prdnvi","SubjectLogonId":"0x3e7","SubjectUserName":"NVIPROCPRDWEB01$","SubjectUserSid":"S-1-5-18","TargetDomainName":"prdnvi","TargetLinkedLogonId":"0x0","TargetLogonId":"0x1c5b86aa","TargetOutboundDomainName":"-","TargetOutboundUserName":"-","TargetUserName":"procprd-appuser","TargetUserSid":"S-1-5-21-855572474-1402847513-2951438033-32165","TransmittedServices":"-","VirtualAccount":"%%1843","WorkstationName":"NVIPROCPRDWEB01"},"event_id":"4624","keywords":["Audit Success"],"opcode":"Info","process":{"pid":652,"thread":{"id":1116}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6493971,"task":"Logon","version":2}} | Product: Symantec Data Loss Prevention
Vendor: Symantec | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T10:14:40.387Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4624","created":"2024-07-30T10:14:42.297Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com"},"log":{"level":"information"},"message":"An account was successfully logged on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNVIPROCPRDWEB01$\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x3E7\n\nLogon Information:\n\tLogon Type:\t\t4\n\tRestricted Admin Mode:\t-\n\tVirtual Account:\t\tNo\n\tElevated Token:\t\tYes\n\nImpersonation Level:\t\tImpersonation\n\nNew Logon:\n\tSecurity ID:\t\tS-1-5-21-855572474-1402847513-2951438033-32165\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x1C5B86AA\n\tLinked Logon ID:\t\t0x0\n\tNetwork Account Name:\t-\n\tNetwork Account Domain:\t-\n\tLogon GUID:\t\t{cbf3a394-d4ce-9622-1544-923035733fe4}\n\nProcess Information:\n\tProcess ID:\t\t0xb08\n\tProcess Name:\t\tC:\\Windows\\System32\\svchost.exe\n\nNetwork Information:\n\tWorkstation Name:\tNVIPROCPRDWEB01\n\tSource Network Address:\t-\n\tSource Port:\t\t-\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tNegotiate\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon session is created. It is generated on the computer that was accessed.\n\nThe subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).\n\nThe New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.\n\nThe network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe impersonation level field indicates the extent to which a process in the logon session can impersonate.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"activity_id":"{72e70134-d9a9-0000-db01-e772a9d9da01}","api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com","event_data":{"AuthenticationPackageName":"Negotiate","ElevatedToken":"%%1842","ImpersonationLevel":"%%1833","IpAddress":"-","IpPort":"-","KeyLength":"0","LmPackageName":"-","LogonGuid":"{cbf3a394-d4ce-9622-1544-923035733fe4}","LogonProcessName":"Advapi ","LogonType":"4","ProcessId":"0xb08","ProcessName":"C:\\Windows\\System32\\svchost.exe","RestrictedAdminMode":"-","SubjectDomainName":"prdnvi","SubjectLogonId":"0x3e7","SubjectUserName":"NVIPROCPRDWEB01$","SubjectUserSid":"S-1-5-18","TargetDomainName":"prdnvi","TargetLinkedLogonId":"0x0","TargetLogonId":"0x1c5b86aa","TargetOutboundDomainName":"-","TargetOutboundUserName":"-","TargetUserName":"procprd-appuser","TargetUserSid":"S-1-5-21-855572474-1402847513-2951438033-32165","TransmittedServices":"-","VirtualAccount":"%%1843","WorkstationName":"NVIPROCPRDWEB01"},"event_id":"4624","keywords":["Audit Success"],"opcode":"Info","process":{"pid":652,"thread":{"id":1116}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6493971,"task":"Logon","version":2}} | This is a syslog message from a product called Symantec Data Loss Prevention by Symantec. The following fields were extracted from the message:
fieldExtractorName: symantec_dlp
messageType: data_loss
productIds: [44]
senderHost: 10.160.18.44
sensitivity: normal
sourceInfo: unknown
streamName: symantec_dlp
tags: ['symantec_dlp', 'data_loss'] | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.