Recoger registros de cortafuegos de Fortinet
En este documento se explica cómo exportar registros de firewall de Fortinet configurando el agente de Bindplane y cómo se asignan los campos de registro a los campos del modelo de datos unificado (UDM) de Google SecOps.
Para obtener más información, consulta el artículo Descripción general de la ingesta de datos en Google SecOps.
Una implementación típica consta de Fortinet Firewall y el agente de BindPlane configurado para enviar registros a Google SecOps. Cada implementación de cliente puede ser diferente y más compleja.
La implementación contiene los siguientes componentes:
- Firewall de Fortinet: la plataforma desde la que recoges los registros. 
- Agente de Bindplane: el agente de Bindplane obtiene registros de Fortinet Firewall y los envía a Google SecOps. 
- Google SecOps: conserva y analiza los registros. 
Una etiqueta de ingestión identifica el analizador que normaliza los datos de registro sin procesar en formato UDM estructurado. La información de este documento se aplica al analizador con la etiqueta FORTINET_FIREWALL.
Instalar y configurar el feed
- Usa FortiOS 7.6.2 o una versión posterior y comprueba que hayas configurado tu FortiGate para el acceso inicial de gestión a la plataforma. Para obtener más información, consulta Configurar Fortigate. 
- Asegúrate de que todos los sistemas de la arquitectura de implementación estén configurados en la zona horaria UTC. 
Configura syslog en la plataforma Fortigate:
Para configurar syslog, sigue estos pasos:
- Inicia sesión en la plataforma FortiGate.
- Selecciona Registro e informe para desplegar el menú.
- Selecciona Configuración de registro.
- Activa el interruptor Enviar registros a Syslog.
- Introduce la dirección IP del recopilador de Syslog.
- Selecciona Aplicar. Para obtener información sobre la configuración, consulta Configure Syslog on FortiGate From the GUI (Configurar Syslog en FortiGate desde la interfaz gráfica de usuario).
Reenviar registros a Google SecOps mediante el agente Bindplane
- Instala y configura una máquina virtual Linux.
- Instala y configura el agente de Bindplane en Linux para reenviar registros a Google SecOps. Para obtener más información sobre cómo instalar y configurar el agente de Bindplane, consulta las instrucciones de instalación y configuración del agente de Bindplane.
Si tienes problemas al crear feeds, ponte en contacto con el equipo de Asistencia de SecOps de Google.
Tabla de asignación de UDM
Referencia de asignación de campos: Fortinet_Firewall - Common Fields
En la siguiente tabla se enumeran los campos habituales del tipo de registro Common Schema Field Mapping y sus campos de UDM correspondientes.
| Log field | UDM mapping | Logic | 
|---|---|---|
|  | metadata.vendor_name | The metadata.vendor_nameUDM field is set toFortinet. | 
|  | metadata.product_name | The metadata.product_nameUDM field is set toFortigate. | 
| filehash | about.file.sha256 | If the filehashlog field value matches the regular expression pattern(?<_hash>^[0-9a-f]+$)then,filehashlog field is mapped to theabout.file.sha256UDM field.Else, filehashlog field is mapped to theabout.file.full_pathUDM field. | 
| nat | about.nat_ip | |
| pdstport | additional.fields[pdstport] | |
| subject | about.process.command_line | |
| process | about.process.product_specific_process_id | |
| policy_id | about.resource.product_object_id | The about.resource.resource_typeUDM field is set toFIREWALL_RULE. | 
| policymode | about.resource.resource_subtype | |
| psrcport | additional.fields[psrcport] | |
| appact | additional.fields[appact] | |
| appcat | additional.fields[appcat] | |
| applist | additional.fields[applist] | |
| apprisk | additional.fields[apprisk] | |
| authproto | additional.fields[authproto] | |
| bandwidth | additional.fields[bandwidth] | |
| bibandwidthavailable | additional.fields[bibandwidthavailable] | |
| bibandwidthused | additional.fields[bibandwidthused] | |
| cfgattr | additional.fields[cfgattr] | |
| cfgpath | additional.fields[cfgpath] | |
| chgheaders | additional.fields[chgheaders] | |
| column | additional.fields[column] | |
| comment | additional.fields[comment] | |
| core | additional.fields[core] | |
| count | additional.fields[count] | |
| countapp | additional.fields[countapp] | |
| countips | additional.fields[countips] | |
| cpu | additional.fields[cpu] | |
| crl | additional.fields[crl] | |
| datarange | additional.fields[datarange] | |
| dint | additional.fields[dint] | |
| disk | additional.fields[disk] | |
| disklograte | additional.fields[disklograte] | |
| dlpextra | additional.fields[dlpextra] | |
| docsource | additional.fields[docsource] | |
| domainfilteridx | additional.fields[domainfilteridx] | |
| domainfilterlist | additional.fields[domainfilterlist] | |
| downbandwidthmeasured | additional.fields[downbandwidthmeasured] | |
| ds | additional.fields[ds] | |
| dst_int | additional.fields[dst_int] | |
| dstdevtype | additional.fields[dstdevtype] | |
| dstfamily | additional.fields[dstfamily] | |
| dstssid | additional.fields[dstssid] | |
| dstunauthusersource | additional.fields[dstunauthusersource] | |
| dtlexp | additional.fields[dtlexp] | |
| eapoltype | additional.fields[eapoltype] | |
| emsconnection | additional.fields[emsconnection] | |
| emstag | additional.fields[emstag] | |
| emstag2 | additional.fields[emstag2] | |
| encrypt | additional.fields[encrypt] | |
| encryption | additional.fields[encryption] | |
| epoch | additional.fields[epoch] | |
| error_num | additional.fields[error_num] | |
| espauth | additional.fields[espauth] | |
| esptransform | additional.fields[esptransform] | |
| eventId | additional.fields[eventId] | |
| expiry | additional.fields[expiry] | |
| extension | additional.fields[extension] | |
| extinvalid | additional.fields[extinvalid] | |
| exttotal | additional.fields[exttotal] | |
| failuredev | additional.fields[failuredev] | |
| fams_pause | additional.fields[fams_pause] | |
| fazlograte | additional.fields[fazlograte] | |
| fctemsname | additional.fields[fctemsname] | |
| fctemssn | additional.fields[fctemssn] | |
| fctuid | additional.fields[fctuid] | |
| field | additional.fields[field] | |
| frametype | additional.fields[frametype] | |
| freediskstorage | additional.fields[freediskstorage] | |
| from_vcluster | additional.fields[from_vcluster] | |
| from6 | additional.fields[from6] | |
| ftlkintf | additional.fields[ftlkintf] | |
| fwdsrv | additional.fields[fwdsrv] | |
| fwserver_name | additional.fields[fwserver_name] | |
| green | additional.fields[green] | |
| handshake | additional.fields[handshake] | |
| headerteid | additional.fields[headerteid] | |
| helthchekck | additional.fields[helthchekck] | |
| hseid | additional.fields[hseid] | |
| iaid | additional.fields[iaid] | |
| icmpcode | additional.fields[icmpcode] | |
| icmpid | additional.fields[icmpid] | |
| icmptype | additional.fields[icmptype] | |
| identifier | additional.fields[identifier] | |
| ietype | additional.fields[ietype] | |
| interface | additional.fields[interface] | |
| intf | additional.fields[intf] | |
| invalidmac | additional.fields[invalidmac] | |
| iptype | additional.fields[iptype] | |
| itype | additional.fields[itype] | |
| jittter | additional.fields[jittter] | |
| keyword | additional.fields[keyword] | |
| latency | additional.fields[latency] | |
| limit | additional.fields[limit] | |
| line | additional.fields[line] | |
| linked-nsapi | additional.fields[linked-nsapi] | |
| localdevcount | additional.fields[localdevcount] | |
| log | additional.fields[log] | |
| logid | additional.fields[logid] | |
| logsrc | additional.fields[logsrc] | |
| mem | additional.fields[mem] | |
| member | additional.fields[member] | |
| meshmode | additional.fields[meshmode] | |
| message | additional.fields[message] | |
| messageid | additional.fields[messageid] | |
| mitm | additional.fields[mitm] | |
| model | additional.fields[model] | |
| modul | additional.fields[modul] | |
| moscodec | additional.fields[moscodec] | |
| mosvalue | additional.fields[mosvalue] | |
| mpsk | additional.fields[mpsk] | |
| msg-type | additional.fields[msg-type] | |
| msgtypename | additional.fields[msgtypename] | |
| mtu | additional.fields[mtu] | |
| nai | additional.fields[nai] | |
| nsapi | additional.fields[nsapi] | |
| probeproto | additional.fields[probeproto] | |
| proto | additional.fields[proto] | |
| protocol | additional.fields[protocol] | |
| proxyapptype | additional.fields[proxyapptype] | |
| rcvdpkt | additional.fields[rcvdpkt] | |
| red_conserve_mode | additional.fields[red_conserve_mode] | |
| sentpkt | additional.fields[sentpkt] | |
| service | additional.fields[service] | |
| shaperdroprcvdbyte | additional.fields[shaperdroprcvdbyte] | |
| shaperdropsentbyte | additional.fields[shaperdropsentbyte] | |
| shaperrcvdname | additional.fields[shaperrcvdname] | |
| shapersentname | additional.fields[shapersentname] | |
| shapingpolicyid | additional.fields[shapingpolicyid] | |
| shapingpolicyname | additional.fields[shapingpolicyname] | |
| srcserver | additional.fields[srcserver] | |
| sysuptime | additional.fields[sysuptime] | |
| trandisp | additional.fields[trandisp] | |
| ui | additional.fields[ui] | |
| vpntype | additional.fields[vpntype] | |
| vwlid | additional.fields[vwlid] | |
| wanin | additional.fields[wanin] | |
| waninfo | additional.fields[waninfo] | |
| adminprof | additional.fields[adminprof] | |
| authserver | extensions.auth.auth_details | If the authserverlog field value is notemptythen,authserverlog field is mapped to theextensions.auth.auth_detailsUDM field.Else, if the domainctrlauthstatelog field value is notemptythen,domainctrlauthstatelog field is mapped to theextensions.auth.auth_detailsUDM field. | 
| domainctrlauthstate | extensions.auth.auth_details | If the authserverlog field value is notemptythen,authserverlog field is mapped to theextensions.auth.auth_detailsUDM field.Else, if the domainctrlauthstatelog field value is notemptythen,domainctrlauthstatelog field is mapped to theextensions.auth.auth_detailsUDM field. | 
|  | extensions.auth.type | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if theactionlog field value contain one of the following values
 or the actionlog field value is equal tonegotiateand thelociplog field value is notemptyor the remiplog field value is notemptythen, theextensions.auth.typeUDM field is set toVPN. Else, if theactionlog field value is equal totunnel-statsand thelociplog field value is notemptyor the remiplog field value is notemptythen, theextensions.auth.typeUDM field is set toVPN. Else, if thetypelog field value is equal toeventand theuilog field value is notemptyor the remiplog field value is notemptythen, theextensions.auth.typeUDM field is set toVPN. Else, if theactionlog field value is equal totunnel-statsthen, theextensions.auth.typeUDM field is set toVPN.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theactionlog field value matches the regular expression pattern.*SSO.*then, theextensions.auth.typeUDM field is set toSSO. Else, theextensions.auth.typeUDM field is set toVPN. | 
| gatewayid | intermediary.asset_id | If the gatewayidlog field value is notemptythen,Fortinet:gatewayidlog field is mapped to theintermediary.asset_idUDM field.Else, if the domainctrlnamelog field value is notemptythen,Fortinet:domainctrlnamelog field is mapped to theintermediary.asset_idUDM field.Else, if the devintfnamelog field value is notemptythen,Fortinet:devintfnamelog field is mapped to theintermediary.asset_idUDM field. | 
| domainctrlname | intermediary.asset_id | If the gatewayidlog field value is notemptythen,Fortinet:gatewayidlog field is mapped to theintermediary.asset_idUDM field.Else, if the domainctrlnamelog field value is notemptythen,Fortinet:domainctrlnamelog field is mapped to theintermediary.asset_idUDM field.Else, if the devintfnamelog field value is notemptythen,Fortinet:devintfnamelog field is mapped to theintermediary.asset_idUDM field. | 
| devintfname | If the gatewayidlog field value is notemptythen,Fortinet:gatewayidlog field is mapped to theintermediary.asset_idUDM field.Else, if the domainctrlnamelog field value is notemptythen,Fortinet:domainctrlnamelog field is mapped to theintermediary.asset_idUDM field.Else, if the devintfnamelog field value is notemptythen,Fortinet:devintfnamelog field is mapped to theintermediary.asset_idUDM field. | |
| monitor-name | intermediary.asset.hostname | |
| old_value | intermediary.domain.name | |
| domainctrldomain | intermediary.hostname | If the dvchostlog field value is notemptythen,dvchostlog field is mapped to theintermediary.hostnameUDM field.Else, if the devnamelog field value is notemptythen,devnamelog field is mapped to theintermediary.hostnameUDM field.Else, if the domainctrldomainlog field value is notemptythen,domainctrldomainlog field is mapped to theintermediary.hostnameUDM field.Else, if the temp_datalog field value is notemptythen, Thetsanddevice_namefields is extracted fromtemp_datalog field using the Grok pattern. if thedevice_namelog field value is notemptythen,device_namelog field is mapped to theintermediary.hostnameUDM field. | 
| dvchost | intermediary.hostname | If the dvchostlog field value is notemptythen,dvchostlog field is mapped to theintermediary.hostnameUDM field.Else, if the devnamelog field value is notemptythen,devnamelog field is mapped to theintermediary.hostnameUDM field.Else, if the domainctrldomainlog field value is notemptythen,domainctrldomainlog field is mapped to theintermediary.hostnameUDM field.Else, if the temp_datalog field value is notemptythen, Thetsanddevice_namefields is extracted fromtemp_datalog field using the Grok pattern. if thedevice_namelog field value is notemptythen,device_namelog field is mapped to theintermediary.hostnameUDM field. | 
| devname | intermediary.hostname | If the dvchostlog field value is notemptythen,dvchostlog field is mapped to theintermediary.hostnameUDM field.Else, if the devnamelog field value is notemptythen,devnamelog field is mapped to theintermediary.hostnameUDM field.Else, if the domainctrldomainlog field value is notemptythen,domainctrldomainlog field is mapped to theintermediary.hostnameUDM field.Else, if the temp_datalog field value is notemptythen, Thetsanddevice_namefields is extracted fromtemp_datalog field using the Grok pattern. if thedevice_namelog field value is notemptythen,device_namelog field is mapped to theintermediary.hostnameUDM field. | 
|  | intermediary.ip | If the fortihostlog field value is notemptythen, Thefortihost_ipfield is extracted fromfortihostlog field using the Grok pattern. if thefortihost_iplog field value is notemptythen,fortihost_ipextracted field is mapped to theintermediary.ipUDM field.If the forwardedforlog field value is notemptythen, Thevalid_forwardedforfield is extracted fromforwardedforlog field using the Grok pattern. if thevalid_forwardedforlog field value is notemptythen,valid_forwardedforextracted field is mapped to theintermediary.ipUDM field.If the gatewaylog field value is notemptythen, Thevalid_gatewayfield is extracted fromgatewaylog field using the Grok pattern. if thevalid_gatewaylog field value is notemptythen,valid_gatewayextracted field is mapped to theintermediary.ipUDM field.If the domainctrliplog field value is notemptythen, Thevalid_domainctrlipfield is extracted fromdomainctrliplog field using the Grok pattern. if thevalid_domainctrliplog field value is notemptythen,valid_domainctrlipextracted field is mapped to theintermediary.ipUDM field. | 
| ha_group | intermediary.asset.attribute.labels[ha_group] | |
| ha_prio | intermediary.asset.attribute.labels[ha_prio] | |
| ha_role | intermediary.asset.attribute.labels[ha_role] | |
| monitor-type | intermediary.asset.attribute.labels[monitor-type] | |
|  | metadata.event_type | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafthen, themetadata.event_typeUDM field is set toNETWORK_CONNECTION. if thesubtypelog field value is equal towebfilterand if theservicelog field value contain one of the following values
 metadata.event_typeUDM field is set toNETWORK_HTTP. Else, if thesubtypelog field value is equal tovpnand if theactionlog field value is equal totunnel-statsand thelociplog field value is notemptyor the remiplog field value is notemptythen, themetadata.event_typeUDM field is set toNETWORK_UNCATEGORIZED. Else, if thetypelog field value is equal toeventthen, themetadata.event_typeUDM field is set toSTATUS_UPDATE. Else, if theactionlog field value is equal totunnel-statsthen, themetadata.event_typeUDM field is set toNETWORK_UNCATEGORIZED. Else, if thesubtypelog field value contain one of the following values
 utmeventlog field value is equal toappfirewalland thesubtypelog field value is not equal tosystemthen, themetadata.event_typeUDM field is set toNETWORK_UNCATEGORIZED.Else, if the typelog field value is equal todnsor the typelog field value is equal toutmand thesubtypelog field value is equal todnsthen, themetadata.event_typeUDM field is set toNETWORK_DNS.Else, if the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen, themetadata.event_typeUDM field is set toNETWORK_DHCP.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theactionlog field value matches the regular expression pattern.logoff.or the actionlog field value is equal toauthenticationand thestatuslog field value is equal tologoutor the actionlog field value is equal toauth-logoutand thestatuslog field value is equal tologoutthen, themetadata.event_typeUDM field is set toUSER_LOGOUT. if theactionlog field value matches the regular expression pattern.logon.or the actionlog field value is equal toauth-logonand thestatuslog field value is equal tologonthen, themetadata.event_typeUDM field is set toUSER_LOGIN.Else, if the actionlog field value is equal tologinthen, themetadata.event_typeUDM field is set toUSER_LOGIN.Else, if the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if theuser_idlog field value is notemptyand theuser_emaillog field value is notemptythen, themetadata.event_typeUDM field is set toUSER_CREATION. Else, themetadata.event_typeUDM field is set toUSER_UNCATEGORIZED.If the event_namelog field value contain one of the following values
 or the subtypelog field value contain one of the following values
 metadata.event_typeUDM field is set toSCAN_UNCATEGORIZED.If the userlog field value does not contain one of the following values
 metadata.event_typelog field value is equal toGENERIC_EVENTthen, if thesubtypelog field value is equal tovpnand thetypelog field value is equal toeventthen, themetadata.event_typeUDM field is set toSTATUS_UPDATE. Else, themetadata.event_typeUDM field is set toUSER_UNCATEGORIZED.If the File_namelog field value is notemptyor the Objectlog field value is notemptyor the Objektlog field value is notemptyor the Infected_Resourcelog field value is notemptythen, themetadata.event_typeUDM field is set toPROCESS_UNCATEGORIZED.If the metadata.event_typelog field value matches the regular expression patternGENERIC_EVENTand if thesrciplog field value is notemptyand thedstiplog field value is notemptythen, themetadata.event_typeUDM field is set toNETWORK_UNCATEGORIZED. Else, if thesrciplog field value is notemptythen, themetadata.event_typeUDM field is set toSTATUS_UNCATEGORIZED. Else, if theactionlog field value is equal toDeletethen, themetadata.event_typeUDM field is set toUSER_DELETION. if theactionlog field value is equal toEditthen, themetadata.event_typeUDM field is set toDEVICE_CONFIG_UPDATE. | 
| logdesc | metadata.description | Message Descriptionwith related tologidlog field is mapped tometadata.description.For more information, see the Fortinet Log Messages Reference. | 
| type | metadata.description | Message Descriptionwith related tologidlog field is mapped tometadata.description.For more information, see the Fortinet Log Messages Reference. | 
| subtype | metadata.description | Message Descriptionwith related tologidlog field is mapped tometadata.description.For more information, see the Fortinet Log Messages Reference. | 
| msg | metadata.description | Message Descriptionwith related tologidlog field is mapped tometadata.description.For more information, see the Fortinet Log Messages Reference. | 
| eventtime | metadata.event_timestamp | If the eventtimelog field value is notemptythen, Theeventtime1field is extracted fromeventtimelog field using the Grok pattern. if theeventtime1log field value is notemptythen,eventtime1extracted field is mapped to themetadata.event_timestampUDM field. Else,eventtimelog field is mapped to themetadata.event_timestampUDM field.Else, if the timestamplog field value is notemptythen,timestamplog field is mapped to themetadata.event_timestampUDM field.Else, if the syslogtimelog field value is notemptythen,Thesyslogtimefield is extracted from raw log using the Grok pattern and it is mapped to themetadata.event_timestampUDM field.Else, if the datelog field value is notemptyand thetimelog field value is notemptyand thetzlog field value is notemptythen,%{date} %{time} %{tz}log field is mapped to themetadata.event_timestampUDM field.Else, if the datelog field value is notemptyand thetimelog field value is notemptythen,%{date} %{time}log field is mapped to themetadata.event_timestampUDM field. | 
| timestamp | metadata.event_timestamp | If the eventtimelog field value is notemptythen, Theeventtime1field is extracted fromeventtimelog field using the Grok pattern. if theeventtime1log field value is notemptythen,eventtime1extracted field is mapped to themetadata.event_timestampUDM field. Else,eventtimelog field is mapped to themetadata.event_timestampUDM field.Else, if the timestamplog field value is notemptythen,timestamplog field is mapped to themetadata.event_timestampUDM field.Else, if the syslogtimelog field value is notemptythen,Thesyslogtimefield is extracted from raw log using the Grok pattern and it is mapped to themetadata.event_timestampUDM field.Else, if the datelog field value is notemptyand thetimelog field value is notemptyand thetzlog field value is notemptythen,%{date} %{time} %{tz}log field is mapped to themetadata.event_timestampUDM field.Else, if the datelog field value is notemptyand thetimelog field value is notemptythen,%{date} %{time}log field is mapped to themetadata.event_timestampUDM field. | 
| date | metadata.event_timestamp | If the eventtimelog field value is notemptythen, Theeventtime1field is extracted fromeventtimelog field using the Grok pattern. if theeventtime1log field value is notemptythen,eventtime1extracted field is mapped to themetadata.event_timestampUDM field. Else,eventtimelog field is mapped to themetadata.event_timestampUDM field.Else, if the timestamplog field value is notemptythen,timestamplog field is mapped to themetadata.event_timestampUDM field.Else, if the syslogtimelog field value is notemptythen,Thesyslogtimefield is extracted from raw log using the Grok pattern and it is mapped to themetadata.event_timestampUDM field.Else, if the datelog field value is notemptyand thetimelog field value is notemptyand thetzlog field value is notemptythen,%{date} %{time} %{tz}log field is mapped to themetadata.event_timestampUDM field.Else, if the datelog field value is notemptyand thetimelog field value is notemptythen,%{date} %{time}log field is mapped to themetadata.event_timestampUDM field. | 
| time | metadata.event_timestamp | If the eventtimelog field value is notemptythen, Theeventtime1field is extracted fromeventtimelog field using the Grok pattern. if theeventtime1log field value is notemptythen,eventtime1extracted field is mapped to themetadata.event_timestampUDM field. Else,eventtimelog field is mapped to themetadata.event_timestampUDM field.Else, if the timestamplog field value is notemptythen,timestamplog field is mapped to themetadata.event_timestampUDM field.Else, if the syslogtimelog field value is notemptythen,Thesyslogtimefield is extracted from raw log using the Grok pattern and it is mapped to themetadata.event_timestampUDM field.Else, if the datelog field value is notemptyand thetimelog field value is notemptyand thetzlog field value is notemptythen,%{date} %{time} %{tz}log field is mapped to themetadata.event_timestampUDM field.Else, if the datelog field value is notemptyand thetimelog field value is notemptythen,%{date} %{time}log field is mapped to themetadata.event_timestampUDM field. | 
| logtime | metadata.event_timestamp | If the eventtimelog field value is notemptythen, Theeventtime1field is extracted fromeventtimelog field using the Grok pattern. if theeventtime1log field value is notemptythen,eventtime1extracted field is mapped to themetadata.event_timestampUDM field. Else,eventtimelog field is mapped to themetadata.event_timestampUDM field.Else, if the timestamplog field value is notemptythen,timestamplog field is mapped to themetadata.event_timestampUDM field.Else, if the syslogtimelog field value is notemptythen,Thesyslogtimefield is extracted from raw log using the Grok pattern and it is mapped to themetadata.event_timestampUDM field.Else, if the datelog field value is notemptyand thetimelog field value is notemptyand thetzlog field value is notemptythen,%{date} %{time} %{tz}log field is mapped to themetadata.event_timestampUDM field.Else, if the datelog field value is notemptyand thetimelog field value is notemptythen,%{date} %{time}log field is mapped to themetadata.event_timestampUDM field. | 
| syslogtime | metadata.event_timestamp | If the eventtimelog field value is notemptythen, Theeventtime1field is extracted fromeventtimelog field using the Grok pattern. if theeventtime1log field value is notemptythen,eventtime1extracted field is mapped to themetadata.event_timestampUDM field. Else,eventtimelog field is mapped to themetadata.event_timestampUDM field.Else, if the timestamplog field value is notemptythen,timestamplog field is mapped to themetadata.event_timestampUDM field.Else, if the syslogtimelog field value is notemptythen,Thesyslogtimefield is extracted from raw log using the Grok pattern and it is mapped to themetadata.event_timestampUDM field.Else, if the datelog field value is notemptyand thetimelog field value is notemptyand thetzlog field value is notemptythen,%{date} %{time} %{tz}log field is mapped to themetadata.event_timestampUDM field.Else, if the datelog field value is notemptyand thetimelog field value is notemptythen,%{date} %{time}log field is mapped to themetadata.event_timestampUDM field. | 
| tz | metadata.event_timestamp | If the eventtimelog field value is notemptythen, Theeventtime1field is extracted fromeventtimelog field using the Grok pattern. if theeventtime1log field value is notemptythen,eventtime1extracted field is mapped to themetadata.event_timestampUDM field. Else,eventtimelog field is mapped to themetadata.event_timestampUDM field.Else, if the timestamplog field value is notemptythen,timestamplog field is mapped to themetadata.event_timestampUDM field.Else, if the syslogtimelog field value is notemptythen,Thesyslogtimefield is extracted from raw log using the Grok pattern and it is mapped to themetadata.event_timestampUDM field.Else, if the datelog field value is notemptyand thetimelog field value is notemptyand thetzlog field value is notemptythen,%{date} %{time} %{tz}log field is mapped to themetadata.event_timestampUDM field.Else, if the datelog field value is notemptyand thetimelog field value is notemptythen,%{date} %{time}log field is mapped to themetadata.event_timestampUDM field. | 
| time | metadata.ingested_timestamp | If the datelog field value is notemptyand thetimelog field value is notemptyand thetzlog field value is notemptythen,%{date} %{time} %{tz}log field is mapped to themetadata.ingested_timestampUDM field. | 
| date | metadata.ingested_timestamp | If the datelog field value is notemptyand thetimelog field value is notemptyand thetzlog field value is notemptythen,%{date} %{time} %{tz}log field is mapped to themetadata.ingested_timestampUDM field. | 
| tz | metadata.ingested_timestamp | If the datelog field value is notemptyand thetimelog field value is notemptyand thetzlog field value is notemptythen,%{date} %{time} %{tz}log field is mapped to themetadata.ingested_timestampUDM field. | 
| type | metadata.product_event_type | If logidlog field value is notemptyand is available in the documentation, then values ofTypeandCategoryare mapped tometadata.product_event_type.Else, if the logidis not documented, it is mapped according to the following logic:If the connection_typelog field value is notemptythen,%{type} - %{subtype} - %{connection_type}log field is mapped to themetadata.product_event_typeUDM field.Else, %{type} - %{subtype}log field is mapped to themetadata.product_event_typeUDM field.If the eventsubtypelog field value is notemptythen,eventsubtypelog field is mapped to themetadata.product_event_typeUDM field. | 
| subtype | metadata.product_event_type | If logidlog field value is notemptyand is available in the documentation, then values ofTypeandCategoryare mapped tometadata.product_event_type.Else, if the logidis not documented, it is mapped according to the following logic:If the connection_typelog field value is notemptythen,%{type} - %{subtype} - %{connection_type}log field is mapped to themetadata.product_event_typeUDM field.Else, %{type} - %{subtype}log field is mapped to themetadata.product_event_typeUDM field.If the eventsubtypelog field value is notemptythen,eventsubtypelog field is mapped to themetadata.product_event_typeUDM field. | 
| connection_type | metadata.product_event_type | If logidlog field value is notemptyand is available in the documentation, then values ofTypeandCategoryare mapped tometadata.product_event_type.Else, if the logidis not documented, it is mapped according to the following logic:If the connection_typelog field value is notemptythen,%{type} - %{subtype} - %{connection_type}log field is mapped to themetadata.product_event_typeUDM field.Else, %{type} - %{subtype}log field is mapped to themetadata.product_event_typeUDM field.If the eventsubtypelog field value is notemptythen,eventsubtypelog field is mapped to themetadata.product_event_typeUDM field. | 
| eventsubtype | metadata.product_event_type | If logidlog field value is notemptyand is available in the documentation, then values ofTypeandCategoryare mapped tometadata.product_event_type.Else, if the logidis not documented, it is mapped according to the following logic:If the connection_typelog field value is notemptythen,%{type} - %{subtype} - %{connection_type}log field is mapped to themetadata.product_event_typeUDM field.Else, %{type} - %{subtype}log field is mapped to themetadata.product_event_typeUDM field.If the eventsubtypelog field value is notemptythen,eventsubtypelog field is mapped to themetadata.product_event_typeUDM field. | 
| logid | metadata.product_log_id | If the logidlog field value is notemptythen,logidlog field is mapped to themetadata.product_log_idUDM field.Else, if the event_idlog field value is notemptythen,event_idlog field is mapped to themetadata.product_log_idUDM field. | 
| event_id | metadata.product_log_id | If the logidlog field value is notemptythen,logidlog field is mapped to themetadata.product_log_idUDM field.Else, if the event_idlog field value is notemptythen,event_idlog field is mapped to themetadata.product_log_idUDM field. | 
| version | metadata.product_version | If the device_versionlog field value is notemptythen,device_versionextracted field is mapped to themetadata.product_versionUDM field.Else, versionlog field is mapped to themetadata.product_versionUDM field. | 
| device_version | metadata.product_version | If the device_versionlog field value is notemptythen,device_versionextracted field is mapped to themetadata.product_versionUDM field.Else, versionlog field is mapped to themetadata.product_versionUDM field. | 
|  | metadata.log_type | The metadata.log_typeUDM field is set toFORTINET_FIREWALL. | 
| ref | metadata.url_back_to_product | |
| authproto | network.application_protocol | |
| service | network.application_protocol | |
| protocol | network.application_protocol | |
| proxyapptype | network.application_protocol | |
| c-ggsn | network.carrier_name | |
| attachment | network.dhcp.file | |
| lease | network.dhcp.lease_time_seconds | |
|  | network.dhcp.type | If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen, thenetwork.dhcp.typeUDM field is set toACKand thenetwork.application_protocolUDM field is set toDHCP. | 
| ip | network.dhcp.yiaddr | If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,iplog field is mapped to thenetwork.dhcp.yiaddrUDM field. | 
| assigned | network.dhcp.yiaddr | If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,iplog field is mapped to thenetwork.dhcp.yiaddrUDM field. | 
| dir | network.direction | If the directionlog field value contain one of the following values
 network.directionUDM field is set toINBOUND.Else, if the directionlog field value contain one of the following values
 network.directionUDM field is set toOUTBOUND. | 
| ddnsserver | network.dns.additional.name | |
| ipaddr | network.dns.answers.data | If the ipaddrlog field value is notemptythen,Iterate through log field ipaddr, thenipaddrlog field is mapped to thenetwork.dns.answers.dataUDM field.If the addrlog field value is notemptythen,Iterate through log field addr, thenaddrlog field is mapped to thenetwork.dns.answers.dataUDM field.If the addrgrplog field value is notemptythen,addrgrplog field is mapped to thenetwork.dns.answers.dataUDM field. | 
| addr | network.dns.answers.data | If the ipaddrlog field value is notemptythen,Iterate through log field ipaddr, thenipaddrlog field is mapped to thenetwork.dns.answers.dataUDM field.If the addrlog field value is notemptythen,Iterate through log field addr, thenaddrlog field is mapped to thenetwork.dns.answers.dataUDM field.If the addrgrplog field value is notemptythen,addrgrplog field is mapped to thenetwork.dns.answers.dataUDM field. | 
| addrgrp | network.dns.answers.data | If the ipaddrlog field value is notemptythen,Iterate through log field ipaddr, thenipaddrlog field is mapped to thenetwork.dns.answers.dataUDM field.If the addrlog field value is notemptythen,Iterate through log field addr, thenaddrlog field is mapped to thenetwork.dns.answers.dataUDM field.If the addrgrplog field value is notemptythen,addrgrplog field is mapped to thenetwork.dns.answers.dataUDM field. | 
| addr_type | network.dns.answers.type | |
| qclass | network.dns.questions.class | If the typelog field value is equal todnsand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal todnsand if theqclasslog field value is equal toINthen, thenetwork.dns.questions.classUDM field is set to1. | 
| qname | network.dns.questions.name | |
| fqdn | network.dns.questions.name | |
| qtypeval | network.dns.questions.type | |
| from | network.email.from | If the fromlog field value matches the regular expression pattern(^.+@.+$)then,tolog field is mapped to thenetwork.email.fromUDM field.Else, if the senderlog field value matches the regular expression pattern(^.+@.+$)then,senderlog field is mapped to thenetwork.email.fromUDM field. | 
| sender | network.email.from | If the fromlog field value matches the regular expression pattern(^.+@.+$)then,tolog field is mapped to thenetwork.email.fromUDM field.Else, if the senderlog field value matches the regular expression pattern(^.+@.+$)then,senderlog field is mapped to thenetwork.email.fromUDM field. | 
| to | network.email.to | If the tolog field value matches the regular expression pattern(^.+@.+$)then,tolog field is mapped to thenetwork.email.toUDM field.Else, if the recipientlog field value matches the regular expression pattern(^.+@.+$)then,recipientlog field is mapped to thenetwork.email.toUDM field. | 
| recipient | network.email.to | If the tolog field value matches the regular expression pattern(^.+@.+$)then,tolog field is mapped to thenetwork.email.toUDM field.Else, if the recipientlog field value matches the regular expression pattern(^.+@.+$)then,recipientlog field is mapped to thenetwork.email.toUDM field. | 
| httpmethod | network.http.method | If the httpmethodlog field value is notemptythen,httpmethodlog field is mapped to thenetwork.http.methodUDM field.Else, if the message_typelog field value is notemptythen,message_typelog field is mapped to thenetwork.http.methodUDM field. | 
| message_type | network.http.method | If the httpmethodlog field value is notemptythen,httpmethodlog field is mapped to thenetwork.http.methodUDM field.Else, if the message_typelog field value is notemptythen,message_typelog field is mapped to thenetwork.http.methodUDM field. | 
| agent | network.http.parsed_user_agent | |
| referralurl | network.http.referral_url | |
| httpcode | network.http.response_code | |
| agent | network.http.user_agent | If the agentlog field value is notemptythen,agentlog field is mapped to thenetwork.http.user_agentUDM field.Else, if the chgheaderslog field value is notemptythen,chgheaderslog field is mapped to thenetwork.http.user_agentUDM field.Else, if the methodlog field value is notemptythen,methodlog field is mapped to thenetwork.http.user_agentUDM field. | 
| chgheaders | network.http.user_agent | If the agentlog field value is notemptythen,agentlog field is mapped to thenetwork.http.user_agentUDM field.Else, if the chgheaderslog field value is notemptythen,chgheaderslog field is mapped to thenetwork.http.user_agentUDM field.Else, if the methodlog field value is notemptythen,methodlog field is mapped to thenetwork.http.user_agentUDM field. | 
| method | network.http.user_agent | If the agentlog field value is notemptythen,agentlog field is mapped to thenetwork.http.user_agentUDM field.Else, if the chgheaderslog field value is notemptythen,chgheaderslog field is mapped to thenetwork.http.user_agentUDM field.Else, if the methodlog field value is notemptythen,methodlog field is mapped to thenetwork.http.user_agentUDM field. | 
| service | network.ip_protocol | |
| proto | network.ip_protocol | |
| protocol | network.ip_protocol | |
| probeproto | network.ip_protocol | |
| domainctrlprotocoltype | network.ip_protocol | |
| ip_protocol | network.ip_protocol | |
| poolname | network.ip_subnet_range | If the portbeginlog field value is notemptyand theportendlog field value is notemptythen,%{portbegin}/%{portend}log field is mapped to thenetwork.ip_subnet_rangeUDM field.Else, poolnamelog field is mapped to thenetwork.ip_subnet_rangeUDM field. | 
| portbegin | network.ip_subnet_range | If the portbeginlog field value is notemptyand theportendlog field value is notemptythen,%{portbegin}/%{portend}log field is mapped to thenetwork.ip_subnet_rangeUDM field.Else, poolnamelog field is mapped to thenetwork.ip_subnet_rangeUDM field. | 
| portend | network.ip_subnet_range | If the portbeginlog field value is notemptyand theportendlog field value is notemptythen,%{portbegin}/%{portend}log field is mapped to thenetwork.ip_subnet_rangeUDM field.Else, poolnamelog field is mapped to thenetwork.ip_subnet_rangeUDM field. | 
| rcvdbyte | network.received_bytes | If the rcvdbytelog field value is notemptythen,rcvdbytelog field is mapped to thenetwork.received_bytesUDM field.Else, if the rcvddeltalog field value is notemptythen,rcvddeltalog field is mapped to thenetwork.received_bytesUDM field.Else, if the laninlog field value is notemptythen,laninlog field is mapped to thenetwork.received_bytesUDM field. | 
| rcvddelta | network.received_bytes | If the rcvdbytelog field value is notemptythen,rcvdbytelog field is mapped to thenetwork.received_bytesUDM field.Else, if the rcvddeltalog field value is notemptythen,rcvddeltalog field is mapped to thenetwork.received_bytesUDM field.Else, if the laninlog field value is notemptythen,laninlog field is mapped to thenetwork.received_bytesUDM field. | 
| lanin | network.received_bytes | If the rcvdbytelog field value is notemptythen,rcvdbytelog field is mapped to thenetwork.received_bytesUDM field.Else, if the rcvddeltalog field value is notemptythen,rcvddeltalog field is mapped to thenetwork.received_bytesUDM field.Else, if the laninlog field value is notemptythen,laninlog field is mapped to thenetwork.received_bytesUDM field. | 
| rcvdpkt | network.received_packets | If the rcvdpktlog field value is notemptythen,rcvdpktlog field is mapped to thenetwork.received_packetsUDM field.Else, if the rcvdpktdeltalog field value is notemptythen,rcvdpktdeltalog field is mapped to thenetwork.received_packetsUDM field. | 
| rcvdpktdelta | network.received_packets | If the rcvdpktlog field value is notemptythen,rcvdpktlog field is mapped to thenetwork.received_packetsUDM field.Else, if the rcvdpktdeltalog field value is notemptythen,rcvdpktdeltalog field is mapped to thenetwork.received_packetsUDM field. | 
| c-bytes | network.sent_bytes | If the sentbytelog field value is notemptythen,sentbytelog field is mapped to thenetwork.sent_bytesUDM field.Else, if the c-byteslog field value is notemptythen,c-byteslog field is mapped to thenetwork.sent_bytesUDM field.Else, lanoutlog field is mapped to thenetwork.sent_bytesUDM field. | 
| sentbyte | network.sent_bytes | If the sentbytelog field value is notemptythen,sentbytelog field is mapped to thenetwork.sent_bytesUDM field.Else, if the c-byteslog field value is notemptythen,c-byteslog field is mapped to thenetwork.sent_bytesUDM field.Else, lanoutlog field is mapped to thenetwork.sent_bytesUDM field. | 
| lanout | network.sent_bytes | If the sentbytelog field value is notemptythen,sentbytelog field is mapped to thenetwork.sent_bytesUDM field.Else, if the c-byteslog field value is notemptythen,c-byteslog field is mapped to thenetwork.sent_bytesUDM field.Else, lanoutlog field is mapped to thenetwork.sent_bytesUDM field. | 
| sentpkt | network.sent_packets | If the sentpktlog field value is notemptythen,sentpktlog field is mapped to thenetwork.sent_packetsUDM field.Else, eapolcntlog field is mapped to thenetwork.sent_packetsUDM field. | 
| eapolcnt | network.sent_packets | If the sentpktlog field value is notemptythen,sentpktlog field is mapped to thenetwork.sent_packetsUDM field.Else, eapolcntlog field is mapped to thenetwork.sent_packetsUDM field. | 
| durationdelta | network.session_duration | If the durationlog field value does not contain one of the following values
 durationlog field is mapped to thenetwork.session_durationUDM field.Else, if the durationdeltalog field value is notemptythen,durationdeltalog field is mapped to thenetwork.session_durationUDM field.Else, if the livelog field value is notemptythen,livelog field is mapped to thenetwork.session_durationUDM field.Else, if the totalsessionlog field value is notemptythen,totalsessionlog field is mapped to thenetwork.session_durationUDM field. | 
| live | network.session_duration | If the durationlog field value does not contain one of the following values
 durationlog field is mapped to thenetwork.session_durationUDM field.Else, if the durationdeltalog field value is notemptythen,durationdeltalog field is mapped to thenetwork.session_durationUDM field.Else, if the livelog field value is notemptythen,livelog field is mapped to thenetwork.session_durationUDM field.Else, if the totalsessionlog field value is notemptythen,totalsessionlog field is mapped to thenetwork.session_durationUDM field. | 
| duration | network.session_duration | If the durationlog field value does not contain one of the following values
 durationlog field is mapped to thenetwork.session_durationUDM field.Else, if the durationdeltalog field value is notemptythen,durationdeltalog field is mapped to thenetwork.session_durationUDM field.Else, if the livelog field value is notemptythen,livelog field is mapped to thenetwork.session_durationUDM field.Else, if the totalsessionlog field value is notemptythen,totalsessionlog field is mapped to thenetwork.session_durationUDM field. | 
| totalsession | network.session_duration | If the durationlog field value does not contain one of the following values
 durationlog field is mapped to thenetwork.session_durationUDM field.Else, if the durationdeltalog field value is notemptythen,durationdeltalog field is mapped to thenetwork.session_durationUDM field.Else, if the livelog field value is notemptythen,livelog field is mapped to thenetwork.session_durationUDM field.Else, if the totalsessionlog field value is notemptythen,totalsessionlog field is mapped to thenetwork.session_durationUDM field. | 
| sessionid | network.session_id | If the sessionidlog field value is notemptythen,sessionidlog field is mapped to thenetwork.session_idUDM field.Else, if the session_idlog field value is notemptythen,session_idlog field is mapped to thenetwork.session_idUDM field.Else, if the netidlog field value is notemptythen,netidlog field is mapped to thenetwork.session_idUDM field. | 
| session_id | network.session_id | If the sessionidlog field value is notemptythen,sessionidlog field is mapped to thenetwork.session_idUDM field.Else, if the session_idlog field value is notemptythen,session_idlog field is mapped to thenetwork.session_idUDM field.Else, if the netidlog field value is notemptythen,netidlog field is mapped to thenetwork.session_idUDM field. | 
| netid | network.session_id | If the sessionidlog field value is notemptythen,sessionidlog field is mapped to thenetwork.session_idUDM field.Else, if the session_idlog field value is notemptythen,session_idlog field is mapped to thenetwork.session_idUDM field.Else, if the netidlog field value is notemptythen,netidlog field is mapped to thenetwork.session_idUDM field. | 
| cipher | network.tls.cipher | |
| scertissuer | network.tls.client.certificate.issuer | If the scertissuerlog field value is notemptythen,scertissuerlog field is mapped to thenetwork.tls.client.certificate.issuerUDM field.Else, if the issuerlog field value is notemptythen,issuerlog field is mapped to thenetwork.tls.client.certificate.issuerUDM field. | 
| issuer | network.tls.client.certificate.issuer | If the scertissuerlog field value is notemptythen,scertissuerlog field is mapped to thenetwork.tls.client.certificate.issuerUDM field.Else, if the issuerlog field value is notemptythen,issuerlog field is mapped to thenetwork.tls.client.certificate.issuerUDM field. | 
| incidentserialno | network.tls.client.certificate.serial | If the incidentserialnolog field value is notemptythen,incidentserialnolog field is mapped to thenetwork.tls.client.certificate.serialUDM field.Else, if the certlog field value is notemptythen,certlog field is mapped to thenetwork.tls.client.certificate.serialUDM field. | 
| cert | network.tls.client.certificate.serial | If the incidentserialnolog field value is notemptythen,incidentserialnolog field is mapped to thenetwork.tls.client.certificate.serialUDM field.Else, if the certlog field value is notemptythen,certlog field is mapped to thenetwork.tls.client.certificate.serialUDM field. | 
| certhash | network.tls.client.certificate.sha256 | |
| scertcname | network.tls.client.certificate.subject | If the scertcnamelog field value is notemptythen,scertcnamelog field is mapped to thenetwork.tls.client.certificate.subjectUDM field.Else, if the certdesclog field value is notemptythen,certdesclog field is mapped to thenetwork.tls.client.certificate.subjectUDM field. | 
| certdesc | network.tls.client.certificate.subject | If the scertcnamelog field value is notemptythen,scertcnamelog field is mapped to thenetwork.tls.client.certificate.subjectUDM field.Else, if the certdesclog field value is notemptythen,certdesclog field is mapped to thenetwork.tls.client.certificate.subjectUDM field. | 
| cert-type | network.tls.client.certificate.version | |
| vd | principal.administrative_domain | If the adminlog field value is notemptythen,adminlog field is mapped to theprincipal.administrative_domainUDM field.Else, if the vdlog field value is notemptythen,vdlog field is mapped to theprincipal.administrative_domainUDM field. | 
| admin | principal.administrative_domain | If the adminlog field value is notemptythen,adminlog field is mapped to theprincipal.administrative_domainUDM field.Else, if the vdlog field value is notemptythen,vdlog field is mapped to theprincipal.administrative_domainUDM field. | 
| clientcert | principal.artifact.last_https_certificate | |
| chassisid | principal.asset_id | If the clientdeviceidlog field value is notemptythen,Fortinet:%{clientdeviceid}log field is mapped to theprincipal.asset_idUDM field.Else, if the chassisidlog field value is notemptythen,Fortinet:%{chassisid}log field is mapped to theprincipal.asset_idUDM field.Else, if the deviceExternalIdlog field value is notemptythen,Fortinet:%{deviceExternalId}log field is mapped to theprincipal.asset_idUDM field. | 
| clientdeviceid | principal.asset_id | If the clientdeviceidlog field value is notemptythen,Fortinet:%{clientdeviceid}log field is mapped to theprincipal.asset_idUDM field.Else, if the chassisidlog field value is notemptythen,Fortinet:%{chassisid}log field is mapped to theprincipal.asset_idUDM field.Else, if the deviceExternalIdlog field value is notemptythen,Fortinet:%{deviceExternalId}log field is mapped to theprincipal.asset_idUDM field. | 
| deviceExternalId | principal.asset_id | If the clientdeviceidlog field value is notemptythen,Fortinet:%{clientdeviceid}log field is mapped to theprincipal.asset_idUDM field.Else, if the chassisidlog field value is notemptythen,Fortinet:%{chassisid}log field is mapped to theprincipal.asset_idUDM field.Else, if the deviceExternalIdlog field value is notemptythen,Fortinet:%{deviceExternalId}log field is mapped to theprincipal.asset_idUDM field. | 
| chassisid | principal.asset.asset_id | If the clientdeviceidlog field value is notemptythen,Fortinet:%{clientdeviceid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the chassisidlog field value is notemptythen,Fortinet:%{chassisid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the deviceExternalIdlog field value is notemptythen,Fortinet:%{deviceExternalId}log field is mapped to theprincipal.asset.asset_idUDM field. | 
| clientdeviceid | principal.asset.asset_id | If the clientdeviceidlog field value is notemptythen,Fortinet:%{clientdeviceid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the chassisidlog field value is notemptythen,Fortinet:%{chassisid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the deviceExternalIdlog field value is notemptythen,Fortinet:%{deviceExternalId}log field is mapped to theprincipal.asset.asset_idUDM field. | 
| deviceExternalId | principal.asset.asset_id | If the clientdeviceidlog field value is notemptythen,Fortinet:%{clientdeviceid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the chassisidlog field value is notemptythen,Fortinet:%{chassisid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the deviceExternalIdlog field value is notemptythen,Fortinet:%{deviceExternalId}log field is mapped to theprincipal.asset.asset_idUDM field. | 
| clientdeviceems | principal.asset.attribute.labels[clientdeviceems] | |
| clientdevicemanageable | principal.asset.attribute.labels[clientdevicemanageable] | |
| clientdeviceowner | principal.asset.attribute.labels[clientdeviceowner] | |
| clientdevicetags | principal.asset.attribute.labels[clientdevicetags] | |
| manuf | principal.asset.attribute.labels[manuf] | |
| srcintf | principal.asset.attribute.labels[srcintf] | |
| srcintfrole | principal.asset.attribute.labels[srcintfrole] | |
| srcmacvendor | principal.asset.attribute.labels[srcmacvendor] | |
| srcssid | principal.asset.attribute.labels[srcssid] | |
| ssid | principal.asset.attribute.labels[ssid] | |
| versionmax | principal.asset.attribute.labels[versionmax] | |
| versionmin | principal.asset.attribute.labels[versionmin] | |
| srchwvendor | principal.asset.hardware.manufacturer | If the srchwvendorlog field value is notemptythen,srchwvendorlog field is mapped to theprincipal.asset.hardware.manufacturerUDM field.Else, if the srcmacvendorlog field value is notemptythen,srcmacvendorlog field is mapped to theprincipal.asset.hardware.manufacturerUDM field. | 
| srcmacvendor | principal.asset.hardware.manufacturer | If the srchwvendorlog field value is notemptythen,srchwvendorlog field is mapped to theprincipal.asset.hardware.manufacturerUDM field.Else, if the srcmacvendorlog field value is notemptythen,srcmacvendorlog field is mapped to theprincipal.asset.hardware.manufacturerUDM field. | 
| peer | principal.asset.hardware.model | |
| srchwversion | principal.asset.hardware.model | If the srchwversionlog field value is notemptythen,srchwversionlog field is mapped to theprincipal.asset.hardware.modelUDM field. | 
| devid | intermediary.asset.hardware.serial_number | If the devidlog field value is notemptyand if thetypelog field value is equal toeventand thesubtypelog field value is equal tosystemthen,devidlog field is mapped to theprincipal.asset.hardware.serial_numberUDM field. Else,devidlog field is mapped to theintermediary.asset.hardware.serial_numberUDM field. | 
| hostname | principal.asset.hostname | If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,hostnamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if theutmeventlog field value is not equal toappfirewalland thesubtypelog field value is equal tosystemand thesrcnamelog field value is notemptythen,srcnamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if thedevnamelog field value is notemptythen,devnamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the namelog field value is notemptyand thenamelog field value is not equal toN/Aand if thelogdesclog field value does not match the regular expression pattern(?i)userthen,namelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the authserverlog field value does not contain one of the following values
 authserverlog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the client_addrlog field value is notemptythen,client_addrlog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the shostlog field value is notemptythen,shostlog field is mapped to theprincipal.asset.hostnameUDM field. | 
| srcname | principal.asset.hostname | If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,hostnamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if theutmeventlog field value is not equal toappfirewalland thesubtypelog field value is equal tosystemand thesrcnamelog field value is notemptythen,srcnamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if thedevnamelog field value is notemptythen,devnamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the namelog field value is notemptyand thenamelog field value is not equal toN/Aand if thelogdesclog field value does not match the regular expression pattern(?i)userthen,namelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the authserverlog field value does not contain one of the following values
 authserverlog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the client_addrlog field value is notemptythen,client_addrlog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the shostlog field value is notemptythen,shostlog field is mapped to theprincipal.asset.hostnameUDM field. | 
| authserver | principal.asset.hostname | If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,hostnamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if theutmeventlog field value is not equal toappfirewalland thesubtypelog field value is equal tosystemand thesrcnamelog field value is notemptythen,srcnamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if thedevnamelog field value is notemptythen,devnamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the namelog field value is notemptyand thenamelog field value is not equal toN/Aand if thelogdesclog field value does not match the regular expression pattern(?i)userthen,namelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the authserverlog field value does not contain one of the following values
 authserverlog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the client_addrlog field value is notemptythen,client_addrlog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the shostlog field value is notemptythen,shostlog field is mapped to theprincipal.asset.hostnameUDM field. | 
| name | principal.asset.hostname | If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,hostnamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if theutmeventlog field value is not equal toappfirewalland thesubtypelog field value is equal tosystemand thesrcnamelog field value is notemptythen,srcnamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if thedevnamelog field value is notemptythen,devnamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the namelog field value is notemptyand thenamelog field value is not equal toN/Aand if thelogdesclog field value does not match the regular expression pattern(?i)userthen,namelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the authserverlog field value does not contain one of the following values
 authserverlog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the client_addrlog field value is notemptythen,client_addrlog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the shostlog field value is notemptythen,shostlog field is mapped to theprincipal.asset.hostnameUDM field. | 
| client_addr | principal.asset.hostname | If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,hostnamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if theutmeventlog field value is not equal toappfirewalland thesubtypelog field value is equal tosystemand thesrcnamelog field value is notemptythen,srcnamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if thedevnamelog field value is notemptythen,devnamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the namelog field value is notemptyand thenamelog field value is not equal toN/Aand if thelogdesclog field value does not match the regular expression pattern(?i)userthen,namelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the authserverlog field value does not contain one of the following values
 authserverlog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the client_addrlog field value is notemptythen,client_addrlog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the shostlog field value is notemptythen,shostlog field is mapped to theprincipal.asset.hostnameUDM field. | 
| banned_src | principal.asset.ip | If the saddrlog field value is notemptythen, Thesaddr_ipfield is extracted fromsaddrlog field using the Grok pattern. if thesaddr_iplog field value is notemptythen,saddr_iplog field is mapped to theprincipal.asset.ipUDM field.Else, if the srcremotelog field value is notemptythen, Thesrcremote_ipfield is extracted fromsrcremotelog field using the Grok pattern. if thesrcremote_iplog field value is notemptythen,srcremote_iplog field is mapped to theprincipal.asset.ipUDM field.Else, if the shostlog field value is notemptythen, Thevalid_shostfield is extracted fromshostlog field using the Grok pattern. if thevalid_shostlog field value is notemptythen,valid_shostlog field is mapped to theprincipal.asset.ipUDM field.Else, if the uilog field value is notemptythen, Theprin_ipfield is extracted fromuilog field using the Grok pattern. Theprin_ipanddesc1fields is extracted fromuilog field using the Grok pattern. if theprin_iplog field value is notemptyand theiplog field value is not equal tothe then,prin_ipextracted field is mapped to theprincipal.asset.ipUDM field.If the userlog field value does not contain one of the following values
 user_ipfield is extracted fromuserlog field using the Grok pattern. if theuser_iplog field value is notemptythen,user_ipextracted field is mapped to theprincipal.asset.ipUDM field.If the subtypelog field value contain one of the following values
 iplog field value is notemptyand theiplog field value is not equal toN/Athen, Thevalid_ipfield is extracted fromiplog field using the Grok pattern.valid_ipextracted field is mapped to theprincipal.asset.ipUDM field.If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen, Thevalid_ipfield is extracted fromiplog field using the Grok pattern.valid_ipextracted field is mapped to theprincipal.asset.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand thelociplog field value is notemptythen, Thevalid_locipfield is extracted fromlociplog field using the Grok pattern.valid_locipextracted field is mapped to theprincipal.asset.ipUDM field.If the srciplog field value is notemptythen, Thesrc_ipfield is extracted fromsrciplog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.asset.ipUDM field.Else, if the srclog field value is notemptythen, Thesrc_ipfield is extracted fromsrclog field using the Grok pattern.src_ipextracted field is mapped to theprincipal.asset.ipUDM field.If the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if themsglog field value is notemptythen, Theuser_emailfield is extracted frommsglog field using the Grok pattern. Thesrc_ipanduser_idfields is extracted frommsglog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.asset.ipUDM field.If the banned_srclog field value is notemptythen,banned_srclog field is mapped to theprincipal.asset.ipUDM field.If the remotelog field value is notemptythen,remotelog field is mapped to theprincipal.asset.ipUDM field.user_emailextracted fields are mapped to theprincipal.asset.ipUDM field. | 
| remote | principal.asset.ip | If the saddrlog field value is notemptythen, Thesaddr_ipfield is extracted fromsaddrlog field using the Grok pattern. if thesaddr_iplog field value is notemptythen,saddr_iplog field is mapped to theprincipal.asset.ipUDM field.Else, if the srcremotelog field value is notemptythen, Thesrcremote_ipfield is extracted fromsrcremotelog field using the Grok pattern. if thesrcremote_iplog field value is notemptythen,srcremote_iplog field is mapped to theprincipal.asset.ipUDM field.Else, if the shostlog field value is notemptythen, Thevalid_shostfield is extracted fromshostlog field using the Grok pattern. if thevalid_shostlog field value is notemptythen,valid_shostlog field is mapped to theprincipal.asset.ipUDM field.Else, if the uilog field value is notemptythen, Theprin_ipfield is extracted fromuilog field using the Grok pattern. Theprin_ipanddesc1fields is extracted fromuilog field using the Grok pattern. if theprin_iplog field value is notemptyand theiplog field value is not equal tothe then,prin_ipextracted field is mapped to theprincipal.asset.ipUDM field.If the userlog field value does not contain one of the following values
 user_ipfield is extracted fromuserlog field using the Grok pattern. if theuser_iplog field value is notemptythen,user_ipextracted field is mapped to theprincipal.asset.ipUDM field.If the subtypelog field value contain one of the following values
 iplog field value is notemptyand theiplog field value is not equal toN/Athen, Thevalid_ipfield is extracted fromiplog field using the Grok pattern.valid_ipextracted field is mapped to theprincipal.asset.ipUDM field.If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen, Thevalid_ipfield is extracted fromiplog field using the Grok pattern.valid_ipextracted field is mapped to theprincipal.asset.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand thelociplog field value is notemptythen, Thevalid_locipfield is extracted fromlociplog field using the Grok pattern.valid_locipextracted field is mapped to theprincipal.asset.ipUDM field.If the srciplog field value is notemptythen, Thesrc_ipfield is extracted fromsrciplog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.asset.ipUDM field.Else, if the srclog field value is notemptythen, Thesrc_ipfield is extracted fromsrclog field using the Grok pattern.src_ipextracted field is mapped to theprincipal.asset.ipUDM field.If the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if themsglog field value is notemptythen, Theuser_emailfield is extracted frommsglog field using the Grok pattern. Thesrc_ipanduser_idfields is extracted frommsglog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.asset.ipUDM field.If the banned_srclog field value is notemptythen,banned_srclog field is mapped to theprincipal.asset.ipUDM field.If the remotelog field value is notemptythen,remotelog field is mapped to theprincipal.asset.ipUDM field.user_emailextracted fields are mapped to theprincipal.asset.ipUDM field. | 
| srcregion | principal.asset.location.country_or_region | |
| tamac | principal.asset.mac | |
| saasname | principal.asset.software.description | |
| saasapp | principal.asset.software.name | |
| devtype | principal.asset.category | |
| new_value | principal.domain.name | |
| sender | principal.email | |
| file | principal.file.full_path | |
| checksum | principal.file.sha256 | |
| filesize | principal.file.size | |
| filetype | principal.file.mime_type | |
| adgroup | principal.group.group_display_name | |
| groupid | principal.group.product_object_id | |
| hostname | principal.hostname | If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,hostnamelog field is mapped to theprincipal.hostnameUDM field.Else, if the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if theutmeventlog field value is not equal toappfirewalland thesubtypelog field value is equal tosystemand thesrcnamelog field value is notemptythen,srcnamelog field is mapped to theprincipal.hostnameUDM field.Else, if the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if thedevnamelog field value is notemptythen,devnamelog field is mapped to theprincipal.hostnameUDM field.Else, if the namelog field value is notemptyand thenamelog field value is not equal toN/Aand if thelogdesclog field value does not match the regular expression pattern(?i)userthen,namelog field is mapped to theprincipal.hostnameUDM field.Else, if the authserverlog field value does not contain one of the following values
 authserverlog field is mapped to theprincipal.hostnameUDM field.Else, if the client_addrlog field value is notemptythen,client_addrlog field is mapped to theprincipal.hostnameUDM field.Else, if the shostlog field value is notemptythen,shostlog field is mapped to theprincipal.hostnameUDM field. | 
| srcname | principal.hostname | If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,hostnamelog field is mapped to theprincipal.hostnameUDM field.Else, if the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if theutmeventlog field value is not equal toappfirewalland thesubtypelog field value is equal tosystemand thesrcnamelog field value is notemptythen,srcnamelog field is mapped to theprincipal.hostnameUDM field.Else, if the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if thedevnamelog field value is notemptythen,devnamelog field is mapped to theprincipal.hostnameUDM field.Else, if the namelog field value is notemptyand thenamelog field value is not equal toN/Aand if thelogdesclog field value does not match the regular expression pattern(?i)userthen,namelog field is mapped to theprincipal.hostnameUDM field.Else, if the authserverlog field value does not contain one of the following values
 authserverlog field is mapped to theprincipal.hostnameUDM field.Else, if the client_addrlog field value is notemptythen,client_addrlog field is mapped to theprincipal.hostnameUDM field.Else, if the shostlog field value is notemptythen,shostlog field is mapped to theprincipal.hostnameUDM field. | 
| authserver | principal.hostname | If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,hostnamelog field is mapped to theprincipal.hostnameUDM field.Else, if the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if theutmeventlog field value is not equal toappfirewalland thesubtypelog field value is equal tosystemand thesrcnamelog field value is notemptythen,srcnamelog field is mapped to theprincipal.hostnameUDM field.Else, if the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if thedevnamelog field value is notemptythen,devnamelog field is mapped to theprincipal.hostnameUDM field.Else, if the namelog field value is notemptyand thenamelog field value is not equal toN/Aand if thelogdesclog field value does not match the regular expression pattern(?i)userthen,namelog field is mapped to theprincipal.hostnameUDM field.Else, if the authserverlog field value does not contain one of the following values
 authserverlog field is mapped to theprincipal.hostnameUDM field.Else, if the client_addrlog field value is notemptythen,client_addrlog field is mapped to theprincipal.hostnameUDM field.Else, if the shostlog field value is notemptythen,shostlog field is mapped to theprincipal.hostnameUDM field. | 
| name | principal.hostname | If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,hostnamelog field is mapped to theprincipal.hostnameUDM field.Else, if the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if theutmeventlog field value is not equal toappfirewalland thesubtypelog field value is equal tosystemand thesrcnamelog field value is notemptythen,srcnamelog field is mapped to theprincipal.hostnameUDM field.Else, if the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if thedevnamelog field value is notemptythen,devnamelog field is mapped to theprincipal.hostnameUDM field.Else, if the namelog field value is notemptyand thenamelog field value is not equal toN/Aand if thelogdesclog field value does not match the regular expression pattern(?i)userthen,namelog field is mapped to theprincipal.hostnameUDM field.Else, if the authserverlog field value does not contain one of the following values
 authserverlog field is mapped to theprincipal.hostnameUDM field.Else, if the client_addrlog field value is notemptythen,client_addrlog field is mapped to theprincipal.hostnameUDM field.Else, if the shostlog field value is notemptythen,shostlog field is mapped to theprincipal.hostnameUDM field. | 
| client_addr | principal.hostname | If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,hostnamelog field is mapped to theprincipal.hostnameUDM field.Else, if the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if theutmeventlog field value is not equal toappfirewalland thesubtypelog field value is equal tosystemand thesrcnamelog field value is notemptythen,srcnamelog field is mapped to theprincipal.hostnameUDM field.Else, if the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if thedevnamelog field value is notemptythen,devnamelog field is mapped to theprincipal.hostnameUDM field.Else, if the namelog field value is notemptyand thenamelog field value is not equal toN/Aand if thelogdesclog field value does not match the regular expression pattern(?i)userthen,namelog field is mapped to theprincipal.hostnameUDM field.Else, if the authserverlog field value does not contain one of the following values
 authserverlog field is mapped to theprincipal.hostnameUDM field.Else, if the client_addrlog field value is notemptythen,client_addrlog field is mapped to theprincipal.hostnameUDM field.Else, if the shostlog field value is notemptythen,shostlog field is mapped to theprincipal.hostnameUDM field. | 
| ip | principal.ip | If the saddrlog field value is notemptythen, Thesaddr_ipfield is extracted fromsaddrlog field using the Grok pattern. if thesaddr_iplog field value is notemptythen,saddr_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srcremotelog field value is notemptythen, Thevalid_srcremotefield is extracted fromsrcremotelog field using the Grok pattern. if thevalid_srcremotelog field value is notemptythen,valid_srcremoteextracted field is mapped to theprincipal.ipUDM field.Else, if the shostlog field value is notemptythen, Thevalid_shostfield is extracted fromshostlog field using the Grok pattern. if thevalid_shostlog field value is notemptythen,valid_shostextracted field is mapped to theprincipal.ipUDM field.Else, if the userlog field value does not contain one of the following values
 user_ipfield is extracted fromuserlog field using the Grok pattern. if theuser_iplog field value is notemptythen,user_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the uilog field value is notemptythen, Theprin_ipfield is extracted fromuilog field using the Grok pattern. if theprin_iplog field value is notemptythen,prin_ipextracted field is mapped to theprincipal.ipUDM field.If the subtypelog field value contain one of the following values
 iplog field value is notemptyand theiplog field value is not equal toN/Athen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand thelociplog field value is notemptythen,lociplog field is mapped to theprincipal.ipUDM field.If the srciplog field value is notemptythen, Thesrc_ipfield is extracted fromsrciplog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srclog field value is notemptythen, Thesrc_ipfield is extracted fromsrclog field using the Grok pattern.src_ipextracted field is mapped to theprincipal.ipUDM field.If the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if themsglog field value is notemptythen, Theuser_emailfield is extracted frommsglog field using the Grok pattern. Thesrc_ipanduser_idfields is extracted frommsglog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.If the banned_srclog field value is notemptythen,banned_srclog field is mapped to theprincipal.ipUDM field.If the userfromlog field value is notemptythen, Thevalid_ipfield is extracted fromuserfromlog field using the Grok pattern.valid_ipextracted field is mapped to theprincipal.ipUDM field.user_emailextracted fields are mapped to theprincipal.ipUDM field. | 
| locip | principal.ip | If the saddrlog field value is notemptythen, Thesaddr_ipfield is extracted fromsaddrlog field using the Grok pattern. if thesaddr_iplog field value is notemptythen,saddr_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srcremotelog field value is notemptythen, Thevalid_srcremotefield is extracted fromsrcremotelog field using the Grok pattern. if thevalid_srcremotelog field value is notemptythen,valid_srcremoteextracted field is mapped to theprincipal.ipUDM field.Else, if the shostlog field value is notemptythen, Thevalid_shostfield is extracted fromshostlog field using the Grok pattern. if thevalid_shostlog field value is notemptythen,valid_shostextracted field is mapped to theprincipal.ipUDM field.Else, if the userlog field value does not contain one of the following values
 user_ipfield is extracted fromuserlog field using the Grok pattern. if theuser_iplog field value is notemptythen,user_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the uilog field value is notemptythen, Theprin_ipfield is extracted fromuilog field using the Grok pattern. if theprin_iplog field value is notemptythen,prin_ipextracted field is mapped to theprincipal.ipUDM field.If the subtypelog field value contain one of the following values
 iplog field value is notemptyand theiplog field value is not equal toN/Athen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand thelociplog field value is notemptythen,lociplog field is mapped to theprincipal.ipUDM field.If the srciplog field value is notemptythen, Thesrc_ipfield is extracted fromsrciplog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srclog field value is notemptythen, Thesrc_ipfield is extracted fromsrclog field using the Grok pattern.src_ipextracted field is mapped to theprincipal.ipUDM field.If the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if themsglog field value is notemptythen, Theuser_emailfield is extracted frommsglog field using the Grok pattern. Thesrc_ipanduser_idfields is extracted frommsglog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.If the banned_srclog field value is notemptythen,banned_srclog field is mapped to theprincipal.ipUDM field.If the userfromlog field value is notemptythen, Thevalid_ipfield is extracted fromuserfromlog field using the Grok pattern.valid_ipextracted field is mapped to theprincipal.ipUDM field.user_emailextracted fields are mapped to theprincipal.ipUDM field. | 
| banned_src | principal.ip | If the saddrlog field value is notemptythen, Thesaddr_ipfield is extracted fromsaddrlog field using the Grok pattern. if thesaddr_iplog field value is notemptythen,saddr_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srcremotelog field value is notemptythen, Thevalid_srcremotefield is extracted fromsrcremotelog field using the Grok pattern. if thevalid_srcremotelog field value is notemptythen,valid_srcremoteextracted field is mapped to theprincipal.ipUDM field.Else, if the shostlog field value is notemptythen, Thevalid_shostfield is extracted fromshostlog field using the Grok pattern. if thevalid_shostlog field value is notemptythen,valid_shostextracted field is mapped to theprincipal.ipUDM field.Else, if the userlog field value does not contain one of the following values
 user_ipfield is extracted fromuserlog field using the Grok pattern. if theuser_iplog field value is notemptythen,user_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the uilog field value is notemptythen, Theprin_ipfield is extracted fromuilog field using the Grok pattern. if theprin_iplog field value is notemptythen,prin_ipextracted field is mapped to theprincipal.ipUDM field.If the subtypelog field value contain one of the following values
 iplog field value is notemptyand theiplog field value is not equal toN/Athen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand thelociplog field value is notemptythen,lociplog field is mapped to theprincipal.ipUDM field.If the srciplog field value is notemptythen, Thesrc_ipfield is extracted fromsrciplog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srclog field value is notemptythen, Thesrc_ipfield is extracted fromsrclog field using the Grok pattern.src_ipextracted field is mapped to theprincipal.ipUDM field.If the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if themsglog field value is notemptythen, Theuser_emailfield is extracted frommsglog field using the Grok pattern. Thesrc_ipanduser_idfields is extracted frommsglog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.If the banned_srclog field value is notemptythen,banned_srclog field is mapped to theprincipal.ipUDM field.If the userfromlog field value is notemptythen, Thevalid_ipfield is extracted fromuserfromlog field using the Grok pattern.valid_ipextracted field is mapped to theprincipal.ipUDM field.user_emailextracted fields are mapped to theprincipal.ipUDM field. | 
| srccity | principal.ip_location.city | |
| srccountry | principal.location.country_or_region | If the srccountrylog field value is notemptyand thesrccountrylog field value is not equal toReservedthen,srccountrylog field is mapped to theprincipal.location.country_or_regionUDM field. | 
| uli | principal.location.name | |
| mac | principal.mac | If the srcmaclog field value is notemptythen,srcmaclog field is mapped to theprincipal.macUDM field andsrcmaclog field is mapped to theprincipal.asset.macUDM field.Else, if the maclog field value is notemptythen,maclog field is mapped to theprincipal.macUDM field andmaclog field is mapped to theprincipal.asset.macUDM field. | 
| srcmac | principal.mac | If the srcmaclog field value is notemptythen,srcmaclog field is mapped to theprincipal.macUDM field andsrcmaclog field is mapped to theprincipal.asset.macUDM field.Else, if the maclog field value is notemptythen,maclog field is mapped to theprincipal.macUDM field andmaclog field is mapped to theprincipal.asset.macUDM field. | 
| transip | principal.nat_ip | |
| transport | principal.nat_port | |
|  | principal.platform | If the osnamelog field value matches the regular expression pattern(?i)WINDOWSthen, theprincipal.platformUDM field is set toWINDOWS.Else, if the osnamelog field value matches the regular expression pattern(?i)ANDROIDthen, theprincipal.platformUDM field is set toANDROID.Else, if the osnamelog field value matches the regular expression pattern(?i)LINUXthen, theprincipal.platformUDM field is set toLINUX.Else, if the osnamelog field value matches the regular expression pattern(?i)MACthen, theprincipal.platformUDM field is set toMAC. | 
| srcswversion | principal.platform_version | If the osnamelog field value matches the regular expression pattern(?i)WINDOWSand if theosversionlog field value is notemptythen,osversionlog field is mapped to theprincipal.platform_versionUDM field.If the srcswversionlog field value is notemptythen,srcswversionlog field is mapped to theprincipal.platform_versionUDM field.If the oslog field value matches the regular expression pattern.Windows.then, Theos_versionfield is extracted fromoslog field using the Grok pattern.os_versionlog field is mapped to theprincipal.platform_versionUDM field. | 
| osversion | principal.platform_version | If the osnamelog field value matches the regular expression pattern(?i)WINDOWSand if theosversionlog field value is notemptythen,osversionlog field is mapped to theprincipal.platform_versionUDM field.If the srcswversionlog field value is notemptythen,srcswversionlog field is mapped to theprincipal.platform_versionUDM field.If the oslog field value matches the regular expression pattern.Windows.then, Theos_versionfield is extracted fromoslog field using the Grok pattern.os_versionlog field is mapped to theprincipal.platform_versionUDM field. | 
| src_port | principal.port | If the src_portlog field value is notemptythen,src_portlog field is mapped to theprincipal.portUDM field.Else, if the remportlog field value is notemptythen,remportlog field is mapped to theprincipal.portUDM field.Else, if the srcportlog field value is notemptythen,srcportlog field is mapped to theprincipal.portUDM field.Else, if the portlog field value is notemptythen,portlog field is mapped to theprincipal.portUDM field. | 
| remport | principal.port | If the src_portlog field value is notemptythen,src_portlog field is mapped to theprincipal.portUDM field.Else, if the remportlog field value is notemptythen,remportlog field is mapped to theprincipal.portUDM field.Else, if the srcportlog field value is notemptythen,srcportlog field is mapped to theprincipal.portUDM field.Else, if the portlog field value is notemptythen,portlog field is mapped to theprincipal.portUDM field. | 
| port | principal.port | If the src_portlog field value is notemptythen,src_portlog field is mapped to theprincipal.portUDM field.Else, if the remportlog field value is notemptythen,remportlog field is mapped to theprincipal.portUDM field.Else, if the srcportlog field value is notemptythen,srcportlog field is mapped to theprincipal.portUDM field.Else, if the portlog field value is notemptythen,portlog field is mapped to theprincipal.portUDM field. | 
| srcport | principal.port | If the src_portlog field value is notemptythen,src_portlog field is mapped to theprincipal.portUDM field.Else, if the remportlog field value is notemptythen,remportlog field is mapped to theprincipal.portUDM field.Else, if the srcportlog field value is notemptythen,srcportlog field is mapped to theprincipal.portUDM field.Else, if the portlog field value is notemptythen,portlog field is mapped to theprincipal.portUDM field. | 
| srcname | principal.process.command_line | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if theutmeventlog field value is equal toappfirewalland thesubtypelog field value is not equal tosystemthen,srcnamelog field is mapped to theprincipal.process.command_lineUDM field. | 
| pid | principal.process.pid | |
| advpnsc | principal.resource.attribute.labels[advpnsc] | |
| assignip | principal.resource.attribute.labels[assignip] | |
| cloudaction | principal.resource.attribute.labels[cloudaction] | |
| cookies | principal.resource.attribute.labels[cookies] | |
| init | principal.resource.attribute.labels[init] | |
| initiator | principal.resource.attribute.labels[initiator] | |
| login | principal.resource.attribute.labels[login] | |
| nextstat | principal.resource.attribute.labels[nextstat] | |
| outintf | principal.resource.attribute.labels[outintf] | |
| ratemethod | principal.resource.attribute.labels[ratemethod] | |
| rcvdbyte | principal.resource.attribute.labels[rcvdbyte] | |
| reqtype | principal.resource.attribute.labels[reqtype] | |
| role | principal.resource.attribute.labels[role] | |
| servername | principal.resource.attribute.labels[servername] | |
| serverresponsetime | principal.resource.attribute.labels[serverresponsetime] | |
| serviceid | principal.resource.attribute.labels[serviceid] | |
| src_int | principal.resource.attribute.labels[src_int] | |
| srcdomain | principal.resource.attribute.labels[srcdomain] | |
| srcfamily | principal.resource.attribute.labels[srcfamily] | |
| srcreputation | principal.resource.attribute.labels[srcreputation] | |
| srcthreatfeed | principal.resource.attribute.labels[srcthreatfeed] | |
| stage | principal.resource.attribute.labels[stage] | |
| tunnelid | principal.resource.attribute.labels[tunnelid] | |
| tunneltype | principal.resource.attribute.labels[tunneltype] | |
| unauthuser | principal.resource.attribute.labels[unauthuser] | |
| useralt | principal.resource.attribute.labels[useralt] | |
| vd | principal.resource.attribute.labels[vd] | |
| vpntunnel | principal.resource.attribute.labels[vpntunnel] | |
| xauthgroup | principal.resource.attribute.labels[xauthgroup] | |
| xauthuser | principal.resource.attribute.labels[xauthuser] | |
| clouddevice | principal.resource.name | If the clouddevicelog field value is notemptythen,clouddevicelog field is mapped to theprincipal.resource.nameUDM field.Else, if the servernamelog field value is notemptythen,servernamelog field is mapped to theprincipal.resource.nameUDM field.Else, if the src_intlog field value is notemptythen,src_intlog field is mapped to theprincipal.resource.nameUDM field.Else, if the srcdomainlog field value is notemptythen,srcdomainlog field is mapped to theprincipal.resource.nameUDM field. | 
| servername | principal.resource.name | If the clouddevicelog field value is notemptythen,clouddevicelog field is mapped to theprincipal.resource.nameUDM field.Else, if the servernamelog field value is notemptythen,servernamelog field is mapped to theprincipal.resource.nameUDM field.Else, if the src_intlog field value is notemptythen,src_intlog field is mapped to theprincipal.resource.nameUDM field.Else, if the srcdomainlog field value is notemptythen,srcdomainlog field is mapped to theprincipal.resource.nameUDM field. | 
| src_int | principal.resource.name | If the clouddevicelog field value is notemptythen,clouddevicelog field is mapped to theprincipal.resource.nameUDM field.Else, if the servernamelog field value is notemptythen,servernamelog field is mapped to theprincipal.resource.nameUDM field.Else, if the src_intlog field value is notemptythen,src_intlog field is mapped to theprincipal.resource.nameUDM field.Else, if the srcdomainlog field value is notemptythen,srcdomainlog field is mapped to theprincipal.resource.nameUDM field. | 
| srcdomain | principal.resource.name | If the clouddevicelog field value is notemptythen,clouddevicelog field is mapped to theprincipal.resource.nameUDM field.Else, if the servernamelog field value is notemptythen,servernamelog field is mapped to theprincipal.resource.nameUDM field.Else, if the src_intlog field value is notemptythen,src_intlog field is mapped to theprincipal.resource.nameUDM field.Else, if the srcdomainlog field value is notemptythen,srcdomainlog field is mapped to theprincipal.resource.nameUDM field. | 
| cldobjid | principal.resource.product_object_id | If the srcuuidlog field value is notemptythen,srcuuidlog field is mapped to theprincipal.resource.product_object_idUDM field.Else, if the serveraddrlog field value is notemptythen,serveraddrlog field is mapped to theprincipal.resource.product_object_idUDM field.Else, if the cldobjidlog field value is notemptythen,cldobjidlog field is mapped to theprincipal.resource.product_object_idUDM field.If the cldobjidlog field value is notemptyor the serveraddrlog field value is notemptyor the srcuuidlog field value is notemptythen, theprincipal.resource.resource_typeUDM field is set toCLOUD_PROJECT. | 
| serveraddr | principal.resource.product_object_id | If the srcuuidlog field value is notemptythen,srcuuidlog field is mapped to theprincipal.resource.product_object_idUDM field.Else, if the serveraddrlog field value is notemptythen,serveraddrlog field is mapped to theprincipal.resource.product_object_idUDM field.Else, if the cldobjidlog field value is notemptythen,cldobjidlog field is mapped to theprincipal.resource.product_object_idUDM field.If the cldobjidlog field value is notemptyor the serveraddrlog field value is notemptyor the srcuuidlog field value is notemptythen, theprincipal.resource.resource_typeUDM field is set toCLOUD_PROJECT. | 
| srcuuid | principal.resource.product_object_id | If the srcuuidlog field value is notemptythen,srcuuidlog field is mapped to theprincipal.resource.product_object_idUDM field.Else, if the serveraddrlog field value is notemptythen,serveraddrlog field is mapped to theprincipal.resource.product_object_idUDM field.Else, if the cldobjidlog field value is notemptythen,cldobjidlog field is mapped to theprincipal.resource.product_object_idUDM field.If the cldobjidlog field value is notemptyor the serveraddrlog field value is notemptyor the srcuuidlog field value is notemptythen, theprincipal.resource.resource_typeUDM field is set toCLOUD_PROJECT. | 
| new_status | principal.user.attribute.labels[new_status] | |
| old_status | principal.user.attribute.labels[old_status] | |
| passwd | principal.user.attribute.labels[passwd] | |
| peer_notif | principal.user.attribute.labels[peer_notif] | |
| profiletype | principal.user.attribute.labels[profiletype] | |
| ulimcc | principal.user.attribute.labels[ulimcc] | |
| ulimnc | principal.user.attribute.labels[ulimnc] | |
| user_data | principal.user.attribute.labels[user_data] | |
| useractivity | principal.user.attribute.labels[useractivity] | |
| group | principal.user.group_identifiers | If the grouplog field value is notemptyand thegrouplog field value is not equal toN/Athen,grouplog field is mapped to theprincipal.user.group_identifiersUDM field.Else, if the communitylog field value is notemptythen,communitylog field is mapped to theprincipal.user.group_identifiersUDM field. | 
| community | principal.user.group_identifiers | If the grouplog field value is notemptyand thegrouplog field value is not equal toN/Athen,grouplog field is mapped to theprincipal.user.group_identifiersUDM field.Else, if the communitylog field value is notemptythen,communitylog field is mapped to theprincipal.user.group_identifiersUDM field. | 
| msisdn | principal.user.phone_numbers | If the msisdnlog field value is notemptythen,msisdnlog field is mapped to theprincipal.user.phone_numbersUDM field.Else, if the phonelog field value is notemptythen,phonelog field is mapped to theprincipal.user.phone_numbersUDM field. | 
| phone | principal.user.phone_numbers | If the msisdnlog field value is notemptythen,msisdnlog field is mapped to theprincipal.user.phone_numbersUDM field.Else, if the phonelog field value is notemptythen,phonelog field is mapped to theprincipal.user.phone_numbersUDM field. | 
| user | principal.user.user_display_name | If the userlog field value does not contain one of the following values
 userlog field is mapped to theprincipal.user.user_display_nameUDM field.Else, if the cnlog field value is notemptythen,cnlog field is mapped to theprincipal.user.user_display_nameUDM field.If the suserlog field value is notemptyand thesuserlog field value does not match the regular expression pattern^{then,suserlog field is mapped to theprincipal.user.user_display_nameUDM field. | 
| cn | principal.user.user_display_name | If the userlog field value does not contain one of the following values
 userlog field is mapped to theprincipal.user.user_display_nameUDM field.Else, if the cnlog field value is notemptythen,cnlog field is mapped to theprincipal.user.user_display_nameUDM field.If the suserlog field value is notemptyand thesuserlog field value does not match the regular expression pattern^{then,suserlog field is mapped to theprincipal.user.user_display_nameUDM field. | 
| suser | principal.user.user_display_name | If the userlog field value does not contain one of the following values
 userlog field is mapped to theprincipal.user.user_display_nameUDM field.Else, if the cnlog field value is notemptythen,cnlog field is mapped to theprincipal.user.user_display_nameUDM field.If the suserlog field value is notemptyand thesuserlog field value does not match the regular expression pattern^{then,suserlog field is mapped to theprincipal.user.user_display_nameUDM field. | 
| user | principal.user.userid | If the userlog field value is notemptyand theuserlog field value is not equal toN/Athen,userlog field is mapped to theprincipal.user.useridUDM field.Else, if the initiatorlog field value is notemptythen,initiatorlog field is mapped to theprincipal.user.useridUDM field.Else, if the loginlog field value is notemptythen,loginlog field is mapped to theprincipal.user.useridUDM field.Else, if the unauthuserlog field value is notemptythen,unauthuserlog field is mapped to theprincipal.user.useridUDM field.Else, if the logdesclog field value matches the regular expression patternGUI_ENTRY_DELETIONthen,vdlog field is mapped to theprincipal.user.useridUDM field. | 
| vd | principal.user.userid | If the userlog field value is notemptyand theuserlog field value is not equal toN/Athen,userlog field is mapped to theprincipal.user.useridUDM field.Else, if the initiatorlog field value is notemptythen,initiatorlog field is mapped to theprincipal.user.useridUDM field.Else, if the loginlog field value is notemptythen,loginlog field is mapped to theprincipal.user.useridUDM field.Else, if the unauthuserlog field value is notemptythen,unauthuserlog field is mapped to theprincipal.user.useridUDM field.Else, if the logdesclog field value matches the regular expression patternGUI_ENTRY_DELETIONthen,vdlog field is mapped to theprincipal.user.useridUDM field. | 
| clouduser | principal.user.userid | If the userlog field value is notemptyand theuserlog field value is not equal toN/Athen,userlog field is mapped to theprincipal.user.useridUDM field.Else, if the initiatorlog field value is notemptythen,initiatorlog field is mapped to theprincipal.user.useridUDM field.Else, if the loginlog field value is notemptythen,loginlog field is mapped to theprincipal.user.useridUDM field.Else, if the unauthuserlog field value is notemptythen,unauthuserlog field is mapped to theprincipal.user.useridUDM field.Else, if the logdesclog field value matches the regular expression patternGUI_ENTRY_DELETIONthen,vdlog field is mapped to theprincipal.user.useridUDM field. | 
| initiator | principal.user.userid | If the userlog field value is notemptyand theuserlog field value is not equal toN/Athen,userlog field is mapped to theprincipal.user.useridUDM field.Else, if the initiatorlog field value is notemptythen,initiatorlog field is mapped to theprincipal.user.useridUDM field.Else, if the loginlog field value is notemptythen,loginlog field is mapped to theprincipal.user.useridUDM field.Else, if the unauthuserlog field value is notemptythen,unauthuserlog field is mapped to theprincipal.user.useridUDM field.Else, if the logdesclog field value matches the regular expression patternGUI_ENTRY_DELETIONthen,vdlog field is mapped to theprincipal.user.useridUDM field. | 
| login | principal.user.userid | If the userlog field value is notemptyand theuserlog field value is not equal toN/Athen,userlog field is mapped to theprincipal.user.useridUDM field.Else, if the initiatorlog field value is notemptythen,initiatorlog field is mapped to theprincipal.user.useridUDM field.Else, if the loginlog field value is notemptythen,loginlog field is mapped to theprincipal.user.useridUDM field.Else, if the unauthuserlog field value is notemptythen,unauthuserlog field is mapped to theprincipal.user.useridUDM field.Else, if the logdesclog field value matches the regular expression patternGUI_ENTRY_DELETIONthen,vdlog field is mapped to theprincipal.user.useridUDM field. | 
| unauthuser | principal.user.userid | If the userlog field value is notemptyand theuserlog field value is not equal toN/Athen,userlog field is mapped to theprincipal.user.useridUDM field.Else, if the initiatorlog field value is notemptythen,initiatorlog field is mapped to theprincipal.user.useridUDM field.Else, if the loginlog field value is notemptythen,loginlog field is mapped to theprincipal.user.useridUDM field.Else, if the unauthuserlog field value is notemptythen,unauthuserlog field is mapped to theprincipal.user.useridUDM field.Else, if the logdesclog field value matches the regular expression patternGUI_ENTRY_DELETIONthen,vdlog field is mapped to theprincipal.user.useridUDM field. | 
| botnetdomain | security_result.about.hostname | |
| botnetip | security_result.about.ip | |
|  | security_result.action | If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor theactionlog field value matches the regular expression pattern(?i)closethen, thesecurity_result.actionUDM field is set toBLOCK.Else, If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor the actionlog field value matches the regular expression pattern(?i)closethen, thesecurity_result.actionUDM field is set toBLOCK.Else, If the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tosuccessor the outcomelog field value is equal toREDIRECTED_USER_MAY_PROCEEDor the categoryOutcomelog field value matches the regular expression pattern(/Success|Success)or the cs2log field value matches the regular expression patternAllowthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tofailureor the statuslog field value is equal tofailedor the outcomelog field value is equal toBLOCKEDor the categoryOutcomelog field value matches the regular expression pattern(/Failure|Failed)or the cs2log field value matches the regular expression patternDeniedthen, thesecurity_result.actionUDM field is set toBLOCK.Else, if the outcomelog field value matches the regular expression patternFailurethen, thesecurity_result.actionUDM field is set toFAIL.If the operationlog field value is notemptyand if theoperationlog field value contain one of the following values
 security_result.actionUDM field is set toALLOW. Else, if theoperationlog field value contain one of the following values
 security_result.actionUDM field is set toBLOCK. Else, if theoperationlog field value is equal totimeoutthen, thesecurity_result.actionUDM field is set toFAIL.Else, if the icbactionlog field value is notemptythen, if theicbactionlog field value matches the regular expression patternallowthen, thesecurity_result.actionUDM field is set toALLOW. Else, if theicbactionlog field value matches the regular expression patternblockthen, thesecurity_result.actionUDM field is set toBLOCK. Else, if theicbactionlog field value matches the regular expression patternfailthen, thesecurity_result.actionUDM field is set toBLOCK. | 
| operation | security_result.action_details | If the utmactionlog field value matches the regular expression pattern(?i)blockand theactionlog field value matches the regular expression pattern(?i)acceptor(?i)closethen,utmactionlog field is mapped to thesecurity_result.action_detailsUDM field.If the actionlog field value is notemptythen,actionlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the utmactionlog field value is notemptythen,utmactionlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the operationlog field value is notemptythen,operationlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the icbactionlog field value is notemptythen,icbactionlog field is mapped to thesecurity_result.action_detailsUDM field. | 
| icbaction | security_result.action_details | If the utmactionlog field value matches the regular expression pattern(?i)blockand theactionlog field value matches the regular expression pattern(?i)acceptor(?i)closethen,utmactionlog field is mapped to thesecurity_result.action_detailsUDM field.If the actionlog field value is notemptythen,actionlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the utmactionlog field value is notemptythen,utmactionlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the operationlog field value is notemptythen,operationlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the icbactionlog field value is notemptythen,icbactionlog field is mapped to thesecurity_result.action_detailsUDM field. | 
| action | security_result.action_details | If the utmactionlog field value matches the regular expression pattern(?i)blockand theactionlog field value matches the regular expression pattern(?i)acceptor(?i)closethen,utmactionlog field is mapped to thesecurity_result.action_detailsUDM field.If the actionlog field value is notemptythen,actionlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the utmactionlog field value is notemptythen,utmactionlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the operationlog field value is notemptythen,operationlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the icbactionlog field value is notemptythen,icbactionlog field is mapped to thesecurity_result.action_detailsUDM field. | 
| utmaction | security_result.action_details | If the utmactionlog field value matches the regular expression pattern(?i)blockand theactionlog field value matches the regular expression pattern(?i)acceptor(?i)closethen,utmactionlog field is mapped to thesecurity_result.action_detailsUDM field.If the actionlog field value is notemptythen,actionlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the utmactionlog field value is notemptythen,utmactionlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the operationlog field value is notemptythen,operationlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the icbactionlog field value is notemptythen,icbactionlog field is mapped to thesecurity_result.action_detailsUDM field. | 
| attackid | security_result.attack_details.tactics.id | |
| attack | security_result.attack_details.tactics.name | |
| attackcontextid | security_result.attack_details.techniques.id | |
| attackcontext | security_result.attack_details.techniques.name | |
| craction | security_result.about.labels[craction] | |
| incidentserialno | security_result.about.labels[incidentserialno] | |
| accessctrl | security_result.detection_fields[accessctrl] | |
| accessproxy | security_result.detection_fields[accessproxy] | |
| acct_stat | security_result.detection_fields[acct_stat] | |
| acktime | security_result.detection_fields[acktime] | |
| activity | security_result.detection_fields[activity] | |
| activitycategory | security_result.detection_fields[activitycategory] | |
| age | security_result.detection_fields[age] | |
| alarmid | security_result.detection_fields[alarmid] | |
| antiphishdc | security_result.detection_fields[antiphishdc] | |
| antiphishrule | security_result.detection_fields[antiphishrule] | |
| ap | security_result.detection_fields[ap] | |
| apn | security_result.detection_fields[apn] | |
| app-type | security_result.detection_fields[app-type] | |
| apperror | security_result.detection_fields[apperror] | |
| appid | security_result.detection_fields[appid] | |
| apscan | security_result.detection_fields[apscan] | |
| apsn | security_result.detection_fields[apsn] | |
| apstatus | security_result.detection_fields[apstatus] | |
| aptype | security_result.detection_fields[aptype] | |
| attack | security_result.detection_fields[attack] | |
| attackid | security_result.detection_fields[attackid] | |
| auditid | security_result.detection_fields[auditid] | |
| auditreporttype | security_result.detection_fields[auditreporttype] | |
| audittime | security_result.detection_fields[audittime] | |
| authalgo | security_result.detection_fields[authalgo] | |
| authgrp | security_result.detection_fields[authgrp] | |
| authid | security_result.detection_fields[authid] | |
| authserver | security_result.detection_fields[authserver] | |
| banword | security_result.detection_fields[banword] | |
| bssid | security_result.detection_fields[bssid] | |
| c-bytes | security_result.detection_fields[c-bytes] | |
| c-ggsn-teid | security_result.detection_fields[c-ggsn-teid] | |
| c-gsn | security_result.detection_fields[c-gsn] | |
| c-pkts | security_result.detection_fields[c-pkts] | |
| c-sgsn-teid | security_result.detection_fields[c-sgsn-teid] | |
| c-sgsn | security_result.detection_fields[c-sgsn] | |
| call_id | security_result.detection_fields[call_id] | |
| carrier_ep | security_result.detection_fields[carrier_ep] | |
| cat | security_result.detection_fields[cat] | |
| catdesc | security_result.detection_fields[catdesc] | |
| cc | security_result.detection_fields[cc] | |
| ccertissuer | security_result.detection_fields[ccertissuer] | |
| cdrcontent | security_result.detection_fields[cdrcontent] | |
| centralnatid | security_result.detection_fields[centralnatid] | |
| cfgtid | security_result.detection_fields[cfgtid] | |
| cfgtxpower | security_result.detection_fields[cfgtxpower] | |
| cfseid | security_result.detection_fields[cfseid] | |
| cfseidaddr | security_result.detection_fields[cfseidaddr] | |
| cggsn6 | security_result.detection_fields[cggsn6] | |
| cgsn6 | security_result.detection_fields[cgsn6] | |
| channel | security_result.detection_fields[channel] | |
| channeltype | security_result.detection_fields[channeltype] | |
| clashtunnelidx | security_result.detection_fields[clashtunnelidx] | |
| client_addr | security_result.detection_fields[client_addr] | |
| command | security_result.detection_fields[command] | |
| configcountry | security_result.detection_fields[configcountry] | |
| connector | security_result.detection_fields[connector] | |
| conserve | security_result.detection_fields[conserve] | |
| constraint | security_result.detection_fields[constraint] | |
| contentdisarmed | security_result.detection_fields[contentdisarmed] | |
| contentencoding | security_result.detection_fields[contentencoding] | |
| contenttype | security_result.detection_fields[contenttype] | |
| countav | security_result.detection_fields[countav] | |
| countcasb | security_result.detection_fields[countcasb] | |
| countcifs | security_result.detection_fields[countcifs] | |
| countdlp | security_result.detection_fields[countdlp] | |
| countdns | security_result.detection_fields[countdns] | |
| countemail | security_result.detection_fields[countemail] | |
| countff | security_result.detection_fields[countff] | |
| counticap | security_result.detection_fields[counticap] | |
| countsctpf | security_result.detection_fields[countsctpf] | |
| countssh | security_result.detection_fields[countssh] | |
| countssl | security_result.detection_fields[countssl] | |
| countvpatch | security_result.detection_fields[countvpatch] | |
| countwaf | security_result.detection_fields[countwaf] | |
| countweb | security_result.detection_fields[countweb] | |
| criticalcount | security_result.detection_fields[criticalcount] | |
| crlevel | security_result.detection_fields[crlevel] | |
| csgsn6 | security_result.detection_fields[csgsn6] | |
| cveid | security_result.detection_fields[cveid] | |
| daemon | security_result.detection_fields[daemon] | |
| desc | security_result.detection_fields[desc] | |
| deviceSeverity | security_result.detection_fields[deviceSeverity] | |
| direction | security_result.detection_fields[direction] | |
| domainctrlauthtype | security_result.detection_fields[domainctrlauthtype] | |
| dstcountry | security_result.detection_fields[dstcountry] | |
| dstinetsvc | security_result.detection_fields[dstinetsvc] | |
| eventtype | security_result.detection_fields[eventtype] | |
| filehashsrc | security_result.detection_fields[filehashsrc] | |
| filtertype | security_result.detection_fields[filtertype] | |
| fsaverdict | security_result.detection_fields[fsaverdict] | |
| highcount | security_result.detection_fields[highcount] | |
| icbaction | security_result.detection_fields[icbaction] | |
| imei-sv | security_result.detection_fields[imei-sv] | |
| imsi | security_result.detection_fields[imsi] | |
| in_spi | security_result.detection_fields[in_spi] | |
| inbandwidthavailable | security_result.detection_fields[inbandwidthavailable] | |
| inbandwidthused | security_result.detection_fields[inbandwidthused] | |
| infectedfilelevel | security_result.detection_fields[infectedfilelevel] | |
| informationsource | security_result.detection_fields[informationsource] | |
| keyalgo | security_result.detection_fields[keyalgo] | |
| keysize | security_result.detection_fields[keysize] | |
| kind | security_result.detection_fields[kind] | |
| kxcurve | security_result.detection_fields[kxcurve] | |
| kxproto | security_result.detection_fields[kxproto] | |
| lanin | security_result.detection_fields[lanin] | |
| lanout | security_result.detection_fields[lanout] | |
| level | security_result.detection_fields[level] | |
| live | security_result.detection_fields[live] | |
| lowcount | security_result.detection_fields[lowcount] | |
| malforn_data | security_result.detection_fields[malforn_data] | |
| mediumcount | security_result.detection_fields[mediumcount] | |
| mgmtcnt | security_result.detection_fields[mgmtcnt] | |
| mode | security_result.detection_fields[mode] | |
| msg | security_result.detection_fields[msg] | |
| neighbor | security_result.detection_fields[neighbor] | |
| networktransfertime | security_result.detection_fields[networktransfertime] | |
| newchannel | security_result.detection_fields[newchannel] | |
| newchassisid | security_result.detection_fields[newchassisid] | |
| newslot | security_result.detection_fields[newslot] | |
| newvalue | security_result.detection_fields[newvalue] | |
| noise | security_result.detection_fields[noise] | |
| notafter | security_result.detection_fields[notafter] | |
| notbefore | security_result.detection_fields[notbefore] | |
| numpassmember | security_result.detection_fields[numpassmember] | |
| oldchannel | security_result.detection_fields[oldchannel] | |
| oldchassisid | security_result.detection_fields[oldchassisid] | |
| oldslot | security_result.detection_fields[oldslot] | |
| oldvalue | security_result.detection_fields[oldvalue] | |
| oldwprof | security_result.detection_fields[oldwprof] | |
| onwire | security_result.detection_fields[onwire] | |
| operation | security_result.detection_fields[operation] | |
| operdrmamode | security_result.detection_fields[operdrmamode] | |
| opertxpower | security_result.detection_fields[opertxpower] | |
| out_spi | security_result.detection_fields[out_spi] | |
| outbandwidthavailable | security_result.detection_fields[outbandwidthavailable] | |
| outbandwidthused | security_result.detection_fields[outbandwidthused] | |
| packetloss | security_result.detection_fields[packetloss] | |
| parameters | security_result.detection_fields[parameters] | |
| passedcount | security_result.detection_fields[passedcount] | |
| pathname | security_result.detection_fields[pathname] | |
| phase2_name | security_result.detection_fields[phase2_name] | |
| policyid | security_result.detection_fields[policyid] | |
| poluuid | security_result.detection_fields[poluuid] | |
| processtime | security_result.detection_fields[processtime] | |
| qclass | security_result.detection_fields[qclass] | |
| qtype | security_result.detection_fields[qtype] | |
| qtypeval | security_result.detection_fields[qtypeval] | |
| quarskip | security_result.detection_fields[quarskip] | |
| quotaexceeded | security_result.detection_fields[quotaexceeded] | |
| quotamax | security_result.detection_fields[quotamax] | |
| quotatype | security_result.detection_fields[quotatype] | |
| quotaused | security_result.detection_fields[quotaused] | |
| radioband | security_result.detection_fields[radioband] | |
| radioid | security_result.detection_fields[radioid] | |
| radioidclosest | security_result.detection_fields[radioidclosest] | |
| radioiddetected | security_result.detection_fields[radioiddetected] | |
| rai | security_result.detection_fields[rai] | |
| rat-type | security_result.detection_fields[rat-type] | |
| rate | security_result.detection_fields[rate] | |
| rawdata | security_result.detection_fields[rawdata] | |
| rawdataid | security_result.detection_fields[rawdataid] | |
| rcode | security_result.detection_fields[rcode] | |
| rcvddelta | security_result.detection_fields[rcvddelta] | |
| rcvdpktdelta | security_result.detection_fields[rcvdpktdelta] | |
| reason | security_result.detection_fields[reason] | |
| remotetunnelid | security_result.detection_fields[remotetunnelid] | |
| remotewtptime | security_result.detection_fields[remotewtptime] | |
| replydstintf | security_result.detection_fields[replydstintf] | |
| replysrcintf | security_result.detection_fields[replysrcintf] | |
| reporttype | security_result.detection_fields[reporttype] | |
| reqlength | security_result.detection_fields[reqlength] | |
| reqtime | security_result.detection_fields[reqtime] | |
| respfinishtime | security_result.detection_fields[respfinishtime] | |
| san | security_result.detection_fields[san] | |
| scantime | security_result.detection_fields[scantime] | |
| scheme | security_result.detection_fields[scheme] | |
| scope | security_result.detection_fields[scope] | |
| security | security_result.detection_fields[security] | |
| icbconfidence | security_result.detection_fields[icbconfidence] | |
| selection | security_result.detection_fields[selection] | |
| sensitivity | security_result.detection_fields[sensitivity] | |
| sentdelta | security_result.detection_fields[sentdelta] | |
| sentpktdelta | security_result.detection_fields[sentpktdelta] | |
| seq | security_result.detection_fields[seq] | |
| seqnum | security_result.detection_fields[seqnum] | |
| serial | security_result.detection_fields[serial] | |
| serialno | security_result.detection_fields[serialno] | |
| setuprate | security_result.detection_fields[setuprate] | |
| shaperperipdropbyte | security_result.detection_fields[shaperperipdropbyte] | |
| shaperperipname | security_result.detection_fields[shaperperipname] | |
| sharename | security_result.detection_fields[sharename] | |
| signal | security_result.detection_fields[signal] | |
| size | security_result.detection_fields[size] | |
| ski | security_result.detection_fields[ski] | |
| slamap | security_result.detection_fields[slamap] | |
| slatargetid | security_result.detection_fields[slatargetid] | |
| slctdrmamode | security_result.detection_fields[slctdrmamode] | |
| slot | security_result.detection_fields[slot] | |
| sn | security_result.detection_fields[sn] | |
| snclosest | security_result.detection_fields[snclosest] | |
| sndetected | security_result.detection_fields[sndetected] | |
| snetwork | security_result.detection_fields[snetwork] | |
| sni | security_result.detection_fields[sni] | |
| snmeshparent | security_result.detection_fields[snmeshparent] | |
| snprev | security_result.detection_fields[snprev] | |
| snr | security_result.detection_fields[snr] | |
| source_mac | security_result.detection_fields[source_mac] | |
| speedtestserver | security_result.detection_fields[speedtestserver] | |
| spi | security_result.detection_fields[spi] | |
| srccountry | security_result.detection_fields[srccountry] | |
| srcinetsvc | security_result.detection_fields[srcinetsvc] | |
| srcname | security_result.detection_fields[srcname] | |
| sscname | security_result.detection_fields[sscname] | |
| sslaction | security_result.detection_fields[sslaction] | |
| stacount | security_result.detection_fields[stacount] | |
| stamac | security_result.detection_fields[stamac] | |
| state | security_result.detection_fields[state] | |
| status | security_result.detection_fields[status] | |
| statuscode | security_result.detection_fields[statuscode] | |
| stitch | security_result.detection_fields[stitch] | |
| stitchaction | security_result.detection_fields[stitchaction] | |
| subaction | security_result.detection_fields[subaction] | |
| submodule | security_result.detection_fields[submodule] | |
| subservice | security_result.detection_fields[subservice] | |
| switchaclid | security_result.detection_fields[switchaclid] | |
| switchautoip | security_result.detection_fields[switchautoip] | |
| switchid | security_result.detection_fields[switchid] | |
| switchinterface | security_result.detection_fields[switchinterface] | |
| switchl2capacity | security_result.detection_fields[switchl2capacity] | |
| switchl2count | security_result.detection_fields[switchl2count] | |
| switchmirrorsession | security_result.detection_fields[switchmirrorsession] | |
| switchphysicalport | security_result.detection_fields[switchphysicalport] | |
| switchproto | security_result.detection_fields[switchproto] | |
| switchsysteminterface | security_result.detection_fields[switchsysteminterface] | |
| switchtrunk | security_result.detection_fields[switchtrunk] | |
| switchtrunkinterface | security_result.detection_fields[switchtrunkinterface] | |
| sync_status | additional.fields[sync_status] | |
| sync_type | additional.fields[sync_type] | |
| tcpnrt | security_result.detection_fields[tcpnrt] | |
| tcporgrtrs | security_result.detection_fields[tcporgrtrs] | |
| tcprplrtrs | security_result.detection_fields[tcprplrtrs] | |
| tcprst | security_result.detection_fields[tcprst] | |
| tcpsrt | security_result.detection_fields[tcpsrt] | |
| tcpsynackrtrs | security_result.detection_fields[tcpsynackrtrs] | |
| tcpsynrtrs | security_result.detection_fields[tcpsynrtrs] | |
| tenantmatch | security_result.detection_fields[tenantmatch] | |
| threattype | security_result.detection_fields[threattype] | |
| ticket | security_result.detection_fields[ticket] | |
| timeoutdelete | security_result.detection_fields[timeoutdelete] | |
| tlsver | security_result.detection_fields[tlsver] | |
| to6 | security_result.detection_fields[to6] | |
| total | security_result.detection_fields[total] | |
| trace_id | security_result.detection_fields[trace_id] | |
| transid | security_result.detection_fields[transid] | |
| translationid | security_result.detection_fields[translationid] | |
| trigger | security_result.detection_fields[trigger] | |
| trueclntip | security_result.detection_fields[trueclntip] | |
| u-bytes | security_result.detection_fields[u-bytes] | |
| u-ggsn-teid | security_result.detection_fields[u-ggsn-teid] | |
| u-ggsn | security_result.detection_fields[u-ggsn] | |
| u-gsn | security_result.detection_fields[u-gsn] | |
| u-pkts | security_result.detection_fields[u-pkts] | |
| u-sgsn-teid | security_result.detection_fields[u-sgsn-teid] | |
| u-sgsn | security_result.detection_fields[u-sgsn] | |
| ufseid | security_result.detection_fields[ufseid] | |
| ufseidaddr | security_result.detection_fields[ufseidaddr] | |
| uggsn6 | security_result.detection_fields[uggsn6] | |
| ugsn6 | security_result.detection_fields[ugsn6] | |
| unauthusersource | security_result.detection_fields[unauthusersource] | |
| upbandwidthmeasured | security_result.detection_fields[upbandwidthmeasured] | |
| upgradedevice | security_result.detection_fields[upgradedevice] | |
| upteid | security_result.detection_fields[upteid] | |
| urlfilteridx | security_result.detection_fields[urlfilteridx] | |
| urlfilterlist | security_result.detection_fields[urlfilterlist] | |
| urlrisk | security_result.detection_fields[urlrisk] | |
| urlsource | security_result.detection_fields[urlsource] | |
| urltype | security_result.detection_fields[urltype] | |
| used | security_result.detection_fields[used] | |
| usgsn6 | security_result.detection_fields[usgsn6] | |
| utmaction | security_result.detection_fields[utmaction] | |
| vap | security_result.detection_fields[vap] | |
| vapmode | security_result.detection_fields[vapmode] | |
| vcluster_member | security_result.detection_fields[vcluster_member] | |
| vcluster_state | security_result.detection_fields[vcluster_state] | |
| vcluster | security_result.detection_fields[vcluster] | |
| vdname | security_result.detection_fields[vdname] | |
| vendor | security_result.detection_fields[vendor] | |
| vendorurl | security_result.detection_fields[vendorurl] | |
| videocategoryid | security_result.detection_fields[videocategoryid] | |
| videocategoryname | security_result.detection_fields[videocategoryname] | |
| videochannelid | security_result.detection_fields[videochannelid] | |
| videodesc | security_result.detection_fields[videodesc] | |
| videoid | security_result.detection_fields[videoid] | |
| videoinfosource | security_result.detection_fields[videoinfosource] | |
| videotitle | security_result.detection_fields[videotitle] | |
| violations | security_result.detection_fields[violations] | |
| vip | security_result.detection_fields[vip] | |
| virus | security_result.detection_fields[virus] | |
| viruscat | security_result.detection_fields[viruscat] | |
| vlan | security_result.detection_fields[vlan] | |
| voip_proto | security_result.detection_fields[voip_proto] | |
| vrf | security_result.detection_fields[vrf] | |
| vulncat | security_result.detection_fields[vulncat] | |
| vulncnt | security_result.detection_fields[vulncnt] | |
| vulnid | security_result.detection_fields[vulnid] | |
| vulnname | security_result.detection_fields[vulnname] | |
| vulnresult | security_result.detection_fields[vulnresult] | |
| vwlname | security_result.detection_fields[vwlname] | |
| vwlquality | security_result.detection_fields[vwlquality] | |
| vwlservice | security_result.detection_fields[vwlservice] | |
| vwpvlanid | security_result.detection_fields[vwpvlanid] | |
| wanoptapptype | security_result.detection_fields[wanoptapptype] | |
| wanout | security_result.detection_fields[wanout] | |
| weakwepiv | security_result.detection_fields[weakwepiv] | |
| webmailprovider | security_result.detection_fields[webmailprovider] | |
| wscode | security_result.detection_fields[wscode] | |
| xid | security_result.detection_fields[xid] | |
| dtype | security_result.category_details | If the catdesclog field value is notemptythen,catdesclog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the categorylog field value is notemptythen,categorylog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the filtercatlog field value is notemptythen,filtercatlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the dtypelog field value is notemptythen,dtypelog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the icbverdictlog field value is notemptythen,icbverdictlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the infectionlog field value is notemptythen,infectionlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the catlog field value is notemptythen,catlog field is mapped to thesecurity_result.category_detailsUDM field. | 
| category | security_result.category_details | If the catdesclog field value is notemptythen,catdesclog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the categorylog field value is notemptythen,categorylog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the filtercatlog field value is notemptythen,filtercatlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the dtypelog field value is notemptythen,dtypelog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the icbverdictlog field value is notemptythen,icbverdictlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the infectionlog field value is notemptythen,infectionlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the catlog field value is notemptythen,catlog field is mapped to thesecurity_result.category_detailsUDM field. | 
| cat | security_result.category_details | If the catdesclog field value is notemptythen,catdesclog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the categorylog field value is notemptythen,categorylog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the filtercatlog field value is notemptythen,filtercatlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the dtypelog field value is notemptythen,dtypelog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the icbverdictlog field value is notemptythen,icbverdictlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the infectionlog field value is notemptythen,infectionlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the catlog field value is notemptythen,catlog field is mapped to thesecurity_result.category_detailsUDM field. | 
| attack | security_result.category_details | If the catdesclog field value is notemptythen,catdesclog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the categorylog field value is notemptythen,categorylog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the filtercatlog field value is notemptythen,filtercatlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the dtypelog field value is notemptythen,dtypelog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the icbverdictlog field value is notemptythen,icbverdictlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the infectionlog field value is notemptythen,infectionlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the catlog field value is notemptythen,catlog field is mapped to thesecurity_result.category_detailsUDM field. | 
| catdesc | security_result.category_details | If the catdesclog field value is notemptythen,catdesclog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the categorylog field value is notemptythen,categorylog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the filtercatlog field value is notemptythen,filtercatlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the dtypelog field value is notemptythen,dtypelog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the icbverdictlog field value is notemptythen,icbverdictlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the infectionlog field value is notemptythen,infectionlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the catlog field value is notemptythen,catlog field is mapped to thesecurity_result.category_detailsUDM field. | 
| filtercat | security_result.category_details | If the catdesclog field value is notemptythen,catdesclog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the categorylog field value is notemptythen,categorylog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the filtercatlog field value is notemptythen,filtercatlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the dtypelog field value is notemptythen,dtypelog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the icbverdictlog field value is notemptythen,icbverdictlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the infectionlog field value is notemptythen,infectionlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the catlog field value is notemptythen,catlog field is mapped to thesecurity_result.category_detailsUDM field. | 
| icbverdict | security_result.category_details | If the catdesclog field value is notemptythen,catdesclog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the categorylog field value is notemptythen,categorylog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the filtercatlog field value is notemptythen,filtercatlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the dtypelog field value is notemptythen,dtypelog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the icbverdictlog field value is notemptythen,icbverdictlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the infectionlog field value is notemptythen,infectionlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the catlog field value is notemptythen,catlog field is mapped to thesecurity_result.category_detailsUDM field. | 
| infection | security_result.category_details | If the catdesclog field value is notemptythen,catdesclog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the categorylog field value is notemptythen,categorylog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the filtercatlog field value is notemptythen,filtercatlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the dtypelog field value is notemptythen,dtypelog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the icbverdictlog field value is notemptythen,icbverdictlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the infectionlog field value is notemptythen,infectionlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the catlog field value is notemptythen,catlog field is mapped to thesecurity_result.category_detailsUDM field. | 
| auditscore | security_result.confidence | If the auditscorelog field value is notemptyand if theauditscorelog field value <=33then, thesecurity_result.confidenceUDM field is set toLOW_CONFIDENCE. Else, if theauditscorelog field value <67then, thesecurity_result.confidenceUDM field is set toMEDIUM_CONFIDENCE. Else, if theauditscorelog field value >=67then, thesecurity_result.confidenceUDM field is set toHIGH_CONFIDENCE. | 
| path | security_result.description | If the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor theactionlog field value matches the regular expression pattern(?i)closethen,UTMAction: %{utmaction}log field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thereasonlog field value is not equal toN/Aand thereasonlog field value is notemptythen,reasonlog field is mapped to thesecurity_result.descriptionUDM field. if thesubtypelog field value is equal towebfilterand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the typelog field value is equal todnsand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal todnsand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the fortiguardresplog field value is notemptythen,fortiguardresplog field is mapped to thesecurity_result.descriptionUDM field.Else, if the malform_desclog field value is notemptythen,malform_desclog field is mapped to thesecurity_result.descriptionUDM field.Else, if the resultlog field value does not contain one of the following values
 resultlog field is mapped to thesecurity_result.descriptionUDM field.Else, if the pathlog field value is notemptythen,pathlog field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tosuccessor the outcomelog field value is equal toREDIRECTED_USER_MAY_PROCEEDor the categoryOutcomelog field value matches the regular expression pattern(/Success|Success)or the cs2log field value matches the regular expression patternAllowthen, thesecurity_result.descriptionUDM field is set toAction: ALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tofailureor the statuslog field value is equal tofailedor the outcomelog field value is equal toBLOCKEDor the categoryOutcomelog field value matches the regular expression pattern(/Failure|Failed)or the cs2log field value matches the regular expression patternDeniedthen, thesecurity_result.descriptionUDM field is set toAction: BLOCK.Else, if the outcomelog field value matches the regular expression patternFailurethen, thesecurity_result.descriptionUDM field is set toAction: FAIL. | 
| result | security_result.description | If the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor theactionlog field value matches the regular expression pattern(?i)closethen,UTMAction: %{utmaction}log field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thereasonlog field value is not equal toN/Aand thereasonlog field value is notemptythen,reasonlog field is mapped to thesecurity_result.descriptionUDM field. if thesubtypelog field value is equal towebfilterand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the typelog field value is equal todnsand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal todnsand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the fortiguardresplog field value is notemptythen,fortiguardresplog field is mapped to thesecurity_result.descriptionUDM field.Else, if the malform_desclog field value is notemptythen,malform_desclog field is mapped to thesecurity_result.descriptionUDM field.Else, if the resultlog field value does not contain one of the following values
 resultlog field is mapped to thesecurity_result.descriptionUDM field.Else, if the pathlog field value is notemptythen,pathlog field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tosuccessor the outcomelog field value is equal toREDIRECTED_USER_MAY_PROCEEDor the categoryOutcomelog field value matches the regular expression pattern(/Success|Success)or the cs2log field value matches the regular expression patternAllowthen, thesecurity_result.descriptionUDM field is set toAction: ALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tofailureor the statuslog field value is equal tofailedor the outcomelog field value is equal toBLOCKEDor the categoryOutcomelog field value matches the regular expression pattern(/Failure|Failed)or the cs2log field value matches the regular expression patternDeniedthen, thesecurity_result.descriptionUDM field is set toAction: BLOCK.Else, if the outcomelog field value matches the regular expression patternFailurethen, thesecurity_result.descriptionUDM field is set toAction: FAIL. | 
| reason | security_result.description | If the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor theactionlog field value matches the regular expression pattern(?i)closethen,UTMAction: %{utmaction}log field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thereasonlog field value is not equal toN/Aand thereasonlog field value is notemptythen,reasonlog field is mapped to thesecurity_result.descriptionUDM field. if thesubtypelog field value is equal towebfilterand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the typelog field value is equal todnsand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal todnsand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the fortiguardresplog field value is notemptythen,fortiguardresplog field is mapped to thesecurity_result.descriptionUDM field.Else, if the malform_desclog field value is notemptythen,malform_desclog field is mapped to thesecurity_result.descriptionUDM field.Else, if the resultlog field value does not contain one of the following values
 resultlog field is mapped to thesecurity_result.descriptionUDM field.Else, if the pathlog field value is notemptythen,pathlog field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tosuccessor the outcomelog field value is equal toREDIRECTED_USER_MAY_PROCEEDor the categoryOutcomelog field value matches the regular expression pattern(/Success|Success)or the cs2log field value matches the regular expression patternAllowthen, thesecurity_result.descriptionUDM field is set toAction: ALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tofailureor the statuslog field value is equal tofailedor the outcomelog field value is equal toBLOCKEDor the categoryOutcomelog field value matches the regular expression pattern(/Failure|Failed)or the cs2log field value matches the regular expression patternDeniedthen, thesecurity_result.descriptionUDM field is set toAction: BLOCK.Else, if the outcomelog field value matches the regular expression patternFailurethen, thesecurity_result.descriptionUDM field is set toAction: FAIL. | 
| fortiguardresp | security_result.description | If the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor theactionlog field value matches the regular expression pattern(?i)closethen,UTMAction: %{utmaction}log field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thereasonlog field value is not equal toN/Aand thereasonlog field value is notemptythen,reasonlog field is mapped to thesecurity_result.descriptionUDM field. if thesubtypelog field value is equal towebfilterand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the typelog field value is equal todnsand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal todnsand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the fortiguardresplog field value is notemptythen,fortiguardresplog field is mapped to thesecurity_result.descriptionUDM field.Else, if the malform_desclog field value is notemptythen,malform_desclog field is mapped to thesecurity_result.descriptionUDM field.Else, if the resultlog field value does not contain one of the following values
 resultlog field is mapped to thesecurity_result.descriptionUDM field.Else, if the pathlog field value is notemptythen,pathlog field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tosuccessor the outcomelog field value is equal toREDIRECTED_USER_MAY_PROCEEDor the categoryOutcomelog field value matches the regular expression pattern(/Success|Success)or the cs2log field value matches the regular expression patternAllowthen, thesecurity_result.descriptionUDM field is set toAction: ALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tofailureor the statuslog field value is equal tofailedor the outcomelog field value is equal toBLOCKEDor the categoryOutcomelog field value matches the regular expression pattern(/Failure|Failed)or the cs2log field value matches the regular expression patternDeniedthen, thesecurity_result.descriptionUDM field is set toAction: BLOCK.Else, if the outcomelog field value matches the regular expression patternFailurethen, thesecurity_result.descriptionUDM field is set toAction: FAIL. | 
| malform_desc | security_result.description | If the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor theactionlog field value matches the regular expression pattern(?i)closethen,UTMAction: %{utmaction}log field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thereasonlog field value is not equal toN/Aand thereasonlog field value is notemptythen,reasonlog field is mapped to thesecurity_result.descriptionUDM field. if thesubtypelog field value is equal towebfilterand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the typelog field value is equal todnsand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal todnsand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the fortiguardresplog field value is notemptythen,fortiguardresplog field is mapped to thesecurity_result.descriptionUDM field.Else, if the malform_desclog field value is notemptythen,malform_desclog field is mapped to thesecurity_result.descriptionUDM field.Else, if the resultlog field value does not contain one of the following values
 resultlog field is mapped to thesecurity_result.descriptionUDM field.Else, if the pathlog field value is notemptythen,pathlog field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tosuccessor the outcomelog field value is equal toREDIRECTED_USER_MAY_PROCEEDor the categoryOutcomelog field value matches the regular expression pattern(/Success|Success)or the cs2log field value matches the regular expression patternAllowthen, thesecurity_result.descriptionUDM field is set toAction: ALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tofailureor the statuslog field value is equal tofailedor the outcomelog field value is equal toBLOCKEDor the categoryOutcomelog field value matches the regular expression pattern(/Failure|Failed)or the cs2log field value matches the regular expression patternDeniedthen, thesecurity_result.descriptionUDM field is set toAction: BLOCK.Else, if the outcomelog field value matches the regular expression patternFailurethen, thesecurity_result.descriptionUDM field is set toAction: FAIL. | 
| msg | security_result.description | If the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor theactionlog field value matches the regular expression pattern(?i)closethen,UTMAction: %{utmaction}log field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thereasonlog field value is not equal toN/Aand thereasonlog field value is notemptythen,reasonlog field is mapped to thesecurity_result.descriptionUDM field. if thesubtypelog field value is equal towebfilterand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the typelog field value is equal todnsand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal todnsand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the fortiguardresplog field value is notemptythen,fortiguardresplog field is mapped to thesecurity_result.descriptionUDM field.Else, if the malform_desclog field value is notemptythen,malform_desclog field is mapped to thesecurity_result.descriptionUDM field.Else, if the resultlog field value does not contain one of the following values
 resultlog field is mapped to thesecurity_result.descriptionUDM field.Else, if the pathlog field value is notemptythen,pathlog field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tosuccessor the outcomelog field value is equal toREDIRECTED_USER_MAY_PROCEEDor the categoryOutcomelog field value matches the regular expression pattern(/Success|Success)or the cs2log field value matches the regular expression patternAllowthen, thesecurity_result.descriptionUDM field is set toAction: ALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tofailureor the statuslog field value is equal tofailedor the outcomelog field value is equal toBLOCKEDor the categoryOutcomelog field value matches the regular expression pattern(/Failure|Failed)or the cs2log field value matches the regular expression patternDeniedthen, thesecurity_result.descriptionUDM field is set toAction: BLOCK.Else, if the outcomelog field value matches the regular expression patternFailurethen, thesecurity_result.descriptionUDM field is set toAction: FAIL. | 
| catdesc | security_result.description | If the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor theactionlog field value matches the regular expression pattern(?i)closethen,UTMAction: %{utmaction}log field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thereasonlog field value is not equal toN/Aand thereasonlog field value is notemptythen,reasonlog field is mapped to thesecurity_result.descriptionUDM field. if thesubtypelog field value is equal towebfilterand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the typelog field value is equal todnsand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal todnsand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the fortiguardresplog field value is notemptythen,fortiguardresplog field is mapped to thesecurity_result.descriptionUDM field.Else, if the malform_desclog field value is notemptythen,malform_desclog field is mapped to thesecurity_result.descriptionUDM field.Else, if the resultlog field value does not contain one of the following values
 resultlog field is mapped to thesecurity_result.descriptionUDM field.Else, if the pathlog field value is notemptythen,pathlog field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tosuccessor the outcomelog field value is equal toREDIRECTED_USER_MAY_PROCEEDor the categoryOutcomelog field value matches the regular expression pattern(/Success|Success)or the cs2log field value matches the regular expression patternAllowthen, thesecurity_result.descriptionUDM field is set toAction: ALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tofailureor the statuslog field value is equal tofailedor the outcomelog field value is equal toBLOCKEDor the categoryOutcomelog field value matches the regular expression pattern(/Failure|Failed)or the cs2log field value matches the regular expression patternDeniedthen, thesecurity_result.descriptionUDM field is set toAction: BLOCK.Else, if the outcomelog field value matches the regular expression patternFailurethen, thesecurity_result.descriptionUDM field is set toAction: FAIL. | 
| dstreputation | security_result.risk_score | |
| attackid | security_result.rule_id | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thepolicyidlog field value is notemptythen,policyidlog field is mapped to thesecurity_result.rule_idUDM field. if theattackidlog field value is notemptythen,attackidlog field is mapped to thesecurity_result.rule_idUDM field. if thesubtypelog field value is equal towebfilterand thecatlog field value is notemptythen,catlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the ruleidlog field value is notemptythen,ruleidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the appidlog field value is notemptythen,appidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the policyidlog field value is notemptythen,policyidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the poluuidlog field value is notemptythen,poluuidlog field is mapped to thesecurity_result.rule_idUDM field. | 
| cat | security_result.rule_id | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thepolicyidlog field value is notemptythen,policyidlog field is mapped to thesecurity_result.rule_idUDM field. if theattackidlog field value is notemptythen,attackidlog field is mapped to thesecurity_result.rule_idUDM field. if thesubtypelog field value is equal towebfilterand thecatlog field value is notemptythen,catlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the ruleidlog field value is notemptythen,ruleidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the appidlog field value is notemptythen,appidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the policyidlog field value is notemptythen,policyidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the poluuidlog field value is notemptythen,poluuidlog field is mapped to thesecurity_result.rule_idUDM field. | 
| ruleid | security_result.rule_id | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thepolicyidlog field value is notemptythen,policyidlog field is mapped to thesecurity_result.rule_idUDM field. if theattackidlog field value is notemptythen,attackidlog field is mapped to thesecurity_result.rule_idUDM field. if thesubtypelog field value is equal towebfilterand thecatlog field value is notemptythen,catlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the ruleidlog field value is notemptythen,ruleidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the appidlog field value is notemptythen,appidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the policyidlog field value is notemptythen,policyidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the poluuidlog field value is notemptythen,poluuidlog field is mapped to thesecurity_result.rule_idUDM field. | 
| appid | security_result.rule_id | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thepolicyidlog field value is notemptythen,policyidlog field is mapped to thesecurity_result.rule_idUDM field. if theattackidlog field value is notemptythen,attackidlog field is mapped to thesecurity_result.rule_idUDM field. if thesubtypelog field value is equal towebfilterand thecatlog field value is notemptythen,catlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the ruleidlog field value is notemptythen,ruleidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the appidlog field value is notemptythen,appidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the policyidlog field value is notemptythen,policyidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the poluuidlog field value is notemptythen,poluuidlog field is mapped to thesecurity_result.rule_idUDM field. | 
| policyid | security_result.rule_id | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thepolicyidlog field value is notemptythen,policyidlog field is mapped to thesecurity_result.rule_idUDM field. if theattackidlog field value is notemptythen,attackidlog field is mapped to thesecurity_result.rule_idUDM field. if thesubtypelog field value is equal towebfilterand thecatlog field value is notemptythen,catlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the ruleidlog field value is notemptythen,ruleidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the appidlog field value is notemptythen,appidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the policyidlog field value is notemptythen,policyidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the poluuidlog field value is notemptythen,poluuidlog field is mapped to thesecurity_result.rule_idUDM field. | 
| poluuid | security_result.rule_id | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thepolicyidlog field value is notemptythen,policyidlog field is mapped to thesecurity_result.rule_idUDM field. if theattackidlog field value is notemptythen,attackidlog field is mapped to thesecurity_result.rule_idUDM field. if thesubtypelog field value is equal towebfilterand thecatlog field value is notemptythen,catlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the ruleidlog field value is notemptythen,ruleidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the appidlog field value is notemptythen,appidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the policyidlog field value is notemptythen,policyidlog field is mapped to thesecurity_result.rule_idUDM field.Else, if the poluuidlog field value is notemptythen,poluuidlog field is mapped to thesecurity_result.rule_idUDM field. | 
| policytype | security_result.rule_type | If the policytypelog field value is notemptythen,policytypelog field is mapped to thesecurity_result.rule_typeUDM field.Else, if the eventtypelog field value is notemptythen,eventtypelog field is mapped to thesecurity_result.rule_typeUDM field.Else, if the filtertypelog field value is notemptythen,filtertypelog field is mapped to thesecurity_result.rule_typeUDM field. | 
| eventtype | security_result.rule_type | If the policytypelog field value is notemptythen,policytypelog field is mapped to thesecurity_result.rule_typeUDM field.Else, if the eventtypelog field value is notemptythen,eventtypelog field is mapped to thesecurity_result.rule_typeUDM field.Else, if the filtertypelog field value is notemptythen,filtertypelog field is mapped to thesecurity_result.rule_typeUDM field. | 
| filtertype | security_result.rule_type | If the policytypelog field value is notemptythen,policytypelog field is mapped to thesecurity_result.rule_typeUDM field.Else, if the eventtypelog field value is notemptythen,eventtypelog field is mapped to thesecurity_result.rule_typeUDM field.Else, if the filtertypelog field value is notemptythen,filtertypelog field is mapped to thesecurity_result.rule_typeUDM field. | 
| crlevel | security_result.severity | If the logidlog field value is notemptyand is available in the documentation, then based on the value ofSeverity, thesecurity_result.severityfield will be mapped as per the following logic:If the Severitylog field value is equal toNoticethen, thesecurity_result.severityUDM field is set toLOW.Else, if the Severitylog field value is equal toWarningthen, thesecurity_result.severityUDM field is set toHIGH.Else, if the Severitylog field value is equal toErrorthen, thesecurity_result.severityUDM field is set toError.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL.If the logidis not present in the documentation, it will be mapped as per the following logic:If the severitylog field value is notemptyand if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toLOW. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toMEDIUM. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toHIGH. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the crlevellog field value is notemptyand if thecrlevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if thecrlevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thecrlevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thecrlevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL.Else, if the levellog field value is notemptyand if thelevellog field value matches the regular expression pattern(?i)(warning)then, thesecurity_result.severityUDM field is set toHIGH. Else, if thelevellog field value matches the regular expression pattern(?i)noticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thelevellog field value matches the regular expression pattern(?i)(information|info)then, thesecurity_result.severityUDM field is set toINFORMATIONAL.Else, if the deviceSeveritylog field value is notemptyand if thedeviceSeveritylog field value is equal towarningthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thedeviceSeveritylog field value is equal tonoticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thedeviceSeveritylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL. if thedeviceSeveritylog field value is equal toerrorthen, thesecurity_result.severityUDM field is set toERROR.Else, if the fsaverdictlog field value is notemptyand if thefsaverdictlog field value matches the regular expression patternlow riskthen, thesecurity_result.severityUDM field is set toLOW. Else, if thefsaverdictlog field value matches the regular expression patternmed riskthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thefsaverdictlog field value matches the regular expression patternhigh riskthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thefsaverdictlog field value matches the regular expression patternclearthen, thesecurity_result.severityUDM field is set toNONE.Else, if the infectedfilelevellog field value is notemptyand if theinfectedfilelevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL. | 
| level | security_result.severity | If the logidlog field value is notemptyand is available in the documentation, then based on the value ofSeverity, thesecurity_result.severityfield will be mapped as per the following logic:If the Severitylog field value is equal toNoticethen, thesecurity_result.severityUDM field is set toLOW.Else, if the Severitylog field value is equal toWarningthen, thesecurity_result.severityUDM field is set toHIGH.Else, if the Severitylog field value is equal toErrorthen, thesecurity_result.severityUDM field is set toError.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL.If the logidis not present in the documentation, it will be mapped as per the following logic:If the severitylog field value is notemptyand if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toLOW. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toMEDIUM. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toHIGH. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the crlevellog field value is notemptyand if thecrlevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if thecrlevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thecrlevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thecrlevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL.Else, if the levellog field value is notemptyand if thelevellog field value matches the regular expression pattern(?i)(warning)then, thesecurity_result.severityUDM field is set toHIGH. Else, if thelevellog field value matches the regular expression pattern(?i)noticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thelevellog field value matches the regular expression pattern(?i)(information|info)then, thesecurity_result.severityUDM field is set toINFORMATIONAL.Else, if the deviceSeveritylog field value is notemptyand if thedeviceSeveritylog field value is equal towarningthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thedeviceSeveritylog field value is equal tonoticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thedeviceSeveritylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL. if thedeviceSeveritylog field value is equal toerrorthen, thesecurity_result.severityUDM field is set toERROR.Else, if the fsaverdictlog field value is notemptyand if thefsaverdictlog field value matches the regular expression patternlow riskthen, thesecurity_result.severityUDM field is set toLOW. Else, if thefsaverdictlog field value matches the regular expression patternmed riskthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thefsaverdictlog field value matches the regular expression patternhigh riskthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thefsaverdictlog field value matches the regular expression patternclearthen, thesecurity_result.severityUDM field is set toNONE.Else, if the infectedfilelevellog field value is notemptyand if theinfectedfilelevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL. | 
| deviceSeverity | security_result.severity | If the logidlog field value is notemptyand is available in the documentation, then based on the value ofSeverity, thesecurity_result.severityfield will be mapped as per the following logic:If the Severitylog field value is equal toNoticethen, thesecurity_result.severityUDM field is set toLOW.Else, if the Severitylog field value is equal toWarningthen, thesecurity_result.severityUDM field is set toHIGH.Else, if the Severitylog field value is equal toErrorthen, thesecurity_result.severityUDM field is set toError.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL.If the logidis not present in the documentation, it will be mapped as per the following logic:If the severitylog field value is notemptyand if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toLOW. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toMEDIUM. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toHIGH. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the crlevellog field value is notemptyand if thecrlevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if thecrlevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thecrlevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thecrlevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL.Else, if the levellog field value is notemptyand if thelevellog field value matches the regular expression pattern(?i)(warning)then, thesecurity_result.severityUDM field is set toHIGH. Else, if thelevellog field value matches the regular expression pattern(?i)noticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thelevellog field value matches the regular expression pattern(?i)(information|info)then, thesecurity_result.severityUDM field is set toINFORMATIONAL.Else, if the deviceSeveritylog field value is notemptyand if thedeviceSeveritylog field value is equal towarningthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thedeviceSeveritylog field value is equal tonoticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thedeviceSeveritylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL. if thedeviceSeveritylog field value is equal toerrorthen, thesecurity_result.severityUDM field is set toERROR.Else, if the fsaverdictlog field value is notemptyand if thefsaverdictlog field value matches the regular expression patternlow riskthen, thesecurity_result.severityUDM field is set toLOW. Else, if thefsaverdictlog field value matches the regular expression patternmed riskthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thefsaverdictlog field value matches the regular expression patternhigh riskthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thefsaverdictlog field value matches the regular expression patternclearthen, thesecurity_result.severityUDM field is set toNONE.Else, if the infectedfilelevellog field value is notemptyand if theinfectedfilelevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL. | 
| fsaverdict | security_result.severity | If the logidlog field value is notemptyand is available in the documentation, then based on the value ofSeverity, thesecurity_result.severityfield will be mapped as per the following logic:If the Severitylog field value is equal toNoticethen, thesecurity_result.severityUDM field is set toLOW.Else, if the Severitylog field value is equal toWarningthen, thesecurity_result.severityUDM field is set toHIGH.Else, if the Severitylog field value is equal toErrorthen, thesecurity_result.severityUDM field is set toError.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL.If the logidis not present in the documentation, it will be mapped as per the following logic:If the severitylog field value is notemptyand if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toLOW. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toMEDIUM. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toHIGH. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the crlevellog field value is notemptyand if thecrlevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if thecrlevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thecrlevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thecrlevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL.Else, if the levellog field value is notemptyand if thelevellog field value matches the regular expression pattern(?i)(warning)then, thesecurity_result.severityUDM field is set toHIGH. Else, if thelevellog field value matches the regular expression pattern(?i)noticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thelevellog field value matches the regular expression pattern(?i)(information|info)then, thesecurity_result.severityUDM field is set toINFORMATIONAL.Else, if the deviceSeveritylog field value is notemptyand if thedeviceSeveritylog field value is equal towarningthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thedeviceSeveritylog field value is equal tonoticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thedeviceSeveritylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL. if thedeviceSeveritylog field value is equal toerrorthen, thesecurity_result.severityUDM field is set toERROR.Else, if the fsaverdictlog field value is notemptyand if thefsaverdictlog field value matches the regular expression patternlow riskthen, thesecurity_result.severityUDM field is set toLOW. Else, if thefsaverdictlog field value matches the regular expression patternmed riskthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thefsaverdictlog field value matches the regular expression patternhigh riskthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thefsaverdictlog field value matches the regular expression patternclearthen, thesecurity_result.severityUDM field is set toNONE.Else, if the infectedfilelevellog field value is notemptyand if theinfectedfilelevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL. | 
| infectedfilelevel | security_result.severity | If the logidlog field value is notemptyand is available in the documentation, then based on the value ofSeverity, thesecurity_result.severityfield will be mapped as per the following logic:If the Severitylog field value is equal toNoticethen, thesecurity_result.severityUDM field is set toLOW.Else, if the Severitylog field value is equal toWarningthen, thesecurity_result.severityUDM field is set toHIGH.Else, if the Severitylog field value is equal toErrorthen, thesecurity_result.severityUDM field is set toError.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL.If the logidis not present in the documentation, it will be mapped as per the following logic:If the severitylog field value is notemptyand if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toLOW. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toMEDIUM. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toHIGH. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the crlevellog field value is notemptyand if thecrlevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if thecrlevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thecrlevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thecrlevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL.Else, if the levellog field value is notemptyand if thelevellog field value matches the regular expression pattern(?i)(warning)then, thesecurity_result.severityUDM field is set toHIGH. Else, if thelevellog field value matches the regular expression pattern(?i)noticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thelevellog field value matches the regular expression pattern(?i)(information|info)then, thesecurity_result.severityUDM field is set toINFORMATIONAL.Else, if the deviceSeveritylog field value is notemptyand if thedeviceSeveritylog field value is equal towarningthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thedeviceSeveritylog field value is equal tonoticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thedeviceSeveritylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL. if thedeviceSeveritylog field value is equal toerrorthen, thesecurity_result.severityUDM field is set toERROR.Else, if the fsaverdictlog field value is notemptyand if thefsaverdictlog field value matches the regular expression patternlow riskthen, thesecurity_result.severityUDM field is set toLOW. Else, if thefsaverdictlog field value matches the regular expression patternmed riskthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thefsaverdictlog field value matches the regular expression patternhigh riskthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thefsaverdictlog field value matches the regular expression patternclearthen, thesecurity_result.severityUDM field is set toNONE.Else, if the infectedfilelevellog field value is notemptyand if theinfectedfilelevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL. | 
| crscore | security_result.severity_details | If the levellog field value is notemptythen,levellog field is mapped to thesecurity_result.severity_detailsUDM field.If the crscorelog field value is notemptythen,crscorelog field is mapped to thesecurity_result.severity_detailsUDM field.If the deviceSeveritylog field value is notemptythen,deviceSeveritylog field is mapped to thesecurity_result.severity_detailsUDM field.If the levellog field value is notemptyand if thelevellog field value is equal toerrorand theerrorlog field value is notemptythen,errorlog field is mapped to thesecurity_result.severity_detailsUDM field. Else,level: %{level}log field is mapped to thesecurity_result.severity_detailsUDM field.If the icbseveritylog field value is notemptythen,icbseveritylog field is mapped to thesecurity_result.severity_detailsUDM field. | 
| level | security_result.severity_details | If the levellog field value is notemptythen,levellog field is mapped to thesecurity_result.severity_detailsUDM field.If the crscorelog field value is notemptythen,crscorelog field is mapped to thesecurity_result.severity_detailsUDM field.If the deviceSeveritylog field value is notemptythen,deviceSeveritylog field is mapped to thesecurity_result.severity_detailsUDM field.If the levellog field value is notemptyand if thelevellog field value is equal toerrorand theerrorlog field value is notemptythen,errorlog field is mapped to thesecurity_result.severity_detailsUDM field. Else,level: %{level}log field is mapped to thesecurity_result.severity_detailsUDM field.If the icbseveritylog field value is notemptythen,icbseveritylog field is mapped to thesecurity_result.severity_detailsUDM field. | 
| error | security_result.severity_details | If the levellog field value is notemptythen,levellog field is mapped to thesecurity_result.severity_detailsUDM field.If the crscorelog field value is notemptythen,crscorelog field is mapped to thesecurity_result.severity_detailsUDM field.If the deviceSeveritylog field value is notemptythen,deviceSeveritylog field is mapped to thesecurity_result.severity_detailsUDM field.If the levellog field value is notemptyand if thelevellog field value is equal toerrorand theerrorlog field value is notemptythen,errorlog field is mapped to thesecurity_result.severity_detailsUDM field. Else,level: %{level}log field is mapped to thesecurity_result.severity_detailsUDM field.If the icbseveritylog field value is notemptythen,icbseveritylog field is mapped to thesecurity_result.severity_detailsUDM field. | 
| deviceSeverity | security_result.severity_details | If the levellog field value is notemptythen,levellog field is mapped to thesecurity_result.severity_detailsUDM field.If the crscorelog field value is notemptythen,crscorelog field is mapped to thesecurity_result.severity_detailsUDM field.If the deviceSeveritylog field value is notemptythen,deviceSeveritylog field is mapped to thesecurity_result.severity_detailsUDM field.If the levellog field value is notemptyand if thelevellog field value is equal toerrorand theerrorlog field value is notemptythen,errorlog field is mapped to thesecurity_result.severity_detailsUDM field. Else,level: %{level}log field is mapped to thesecurity_result.severity_detailsUDM field.If the icbseveritylog field value is notemptythen,icbseveritylog field is mapped to thesecurity_result.severity_detailsUDM field. | 
| icbseverity | security_result.severity_details | If the levellog field value is notemptythen,levellog field is mapped to thesecurity_result.severity_detailsUDM field.If the crscorelog field value is notemptythen,crscorelog field is mapped to thesecurity_result.severity_detailsUDM field.If the deviceSeveritylog field value is notemptythen,deviceSeveritylog field is mapped to thesecurity_result.severity_detailsUDM field.If the levellog field value is notemptyand if thelevellog field value is equal toerrorand theerrorlog field value is notemptythen,errorlog field is mapped to thesecurity_result.severity_detailsUDM field. Else,level: %{level}log field is mapped to thesecurity_result.severity_detailsUDM field.If the icbseveritylog field value is notemptythen,icbseveritylog field is mapped to thesecurity_result.severity_detailsUDM field. | 
| msg | security_result.summary | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal towebfilterand if theeventtypelog field value is equal toftgd_blkthen, thesecurity_result.summaryUDM field is set toBlocked URL.msglog field is mapped to thesecurity_result.summaryUDM field. Else, if thesubtypelog field value is equal tovirusand if themsglog field value is equal toFile is infected.then,%{msg}- %{virus}log field is mapped to thesecurity_result.summaryUDM field. Else, if thesubtypelog field value is equal toipsor the subtypelog field value is equal toanomalythen,attacklog field is mapped to thesecurity_result.summaryUDM field.Else, if the logdesclog field value matches the regular expression patternGUI_ENTRY_DELETIONthen,msglog field is mapped to thesecurity_result.summaryUDM field.Else, if the modelog field value is notemptythen,modelog field is mapped to thesecurity_result.summaryUDM field.Else, if the changeslog field value is notemptythen, if themodelog field value is notemptythen,modelog field is mapped to thesecurity_result.summaryUDM field.Else, if the msg_datalog field value is notemptythen, if thereasonlog field value is not empty then,reasonlog field is mapped to thesecurity_result.summaryUDM field.Else, if the msglog field value is notemptythen,msglog field is mapped to thesecurity_result.summaryUDM field. | 
| attack | security_result.summary | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal towebfilterand if theeventtypelog field value is equal toftgd_blkthen, thesecurity_result.summaryUDM field is set toBlocked URL.msglog field is mapped to thesecurity_result.summaryUDM field. Else, if thesubtypelog field value is equal tovirusand if themsglog field value is equal toFile is infected.then,%{msg}- %{virus}log field is mapped to thesecurity_result.summaryUDM field. Else, if thesubtypelog field value is equal toipsor the subtypelog field value is equal toanomalythen,attacklog field is mapped to thesecurity_result.summaryUDM field.Else, if the logdesclog field value matches the regular expression patternGUI_ENTRY_DELETIONthen,msglog field is mapped to thesecurity_result.summaryUDM field.Else, if the modelog field value is notemptythen,modelog field is mapped to thesecurity_result.summaryUDM field.Else, if the changeslog field value is notemptythen, if themodelog field value is notemptythen,modelog field is mapped to thesecurity_result.summaryUDM field.Else, if the msg_datalog field value is notemptythen, if thereasonlog field value is not empty then,reasonlog field is mapped to thesecurity_result.summaryUDM field.Else, if the msglog field value is notemptythen,msglog field is mapped to thesecurity_result.summaryUDM field. | 
| mode | security_result.summary | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal towebfilterand if theeventtypelog field value is equal toftgd_blkthen, thesecurity_result.summaryUDM field is set toBlocked URL.msglog field is mapped to thesecurity_result.summaryUDM field. Else, if thesubtypelog field value is equal tovirusand if themsglog field value is equal toFile is infected.then,%{msg}- %{virus}log field is mapped to thesecurity_result.summaryUDM field. Else, if thesubtypelog field value is equal toipsor the subtypelog field value is equal toanomalythen,attacklog field is mapped to thesecurity_result.summaryUDM field.Else, if the logdesclog field value matches the regular expression patternGUI_ENTRY_DELETIONthen,msglog field is mapped to thesecurity_result.summaryUDM field.Else, if the modelog field value is notemptythen,modelog field is mapped to thesecurity_result.summaryUDM field.Else, if the changeslog field value is notemptythen, if themodelog field value is notemptythen,modelog field is mapped to thesecurity_result.summaryUDM field.Else, if the msg_datalog field value is notemptythen, if thereasonlog field value is not empty then,reasonlog field is mapped to thesecurity_result.summaryUDM field.Else, if the msglog field value is notemptythen,msglog field is mapped to thesecurity_result.summaryUDM field. | 
| reason | security_result.summary | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal towebfilterand if theeventtypelog field value is equal toftgd_blkthen, thesecurity_result.summaryUDM field is set toBlocked URL.msglog field is mapped to thesecurity_result.summaryUDM field. Else, if thesubtypelog field value is equal tovirusand if themsglog field value is equal toFile is infected.then,%{msg}- %{virus}log field is mapped to thesecurity_result.summaryUDM field. Else, if thesubtypelog field value is equal toipsor the subtypelog field value is equal toanomalythen,attacklog field is mapped to thesecurity_result.summaryUDM field.Else, if the logdesclog field value matches the regular expression patternGUI_ENTRY_DELETIONthen,msglog field is mapped to thesecurity_result.summaryUDM field.Else, if the modelog field value is notemptythen,modelog field is mapped to thesecurity_result.summaryUDM field.Else, if the changeslog field value is notemptythen, if themodelog field value is notemptythen,modelog field is mapped to thesecurity_result.summaryUDM field.Else, if the msg_datalog field value is notemptythen, if thereasonlog field value is not empty then,reasonlog field is mapped to thesecurity_result.summaryUDM field.Else, if the msglog field value is notemptythen,msglog field is mapped to thesecurity_result.summaryUDM field. | 
| virus | security_result.summary | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal towebfilterand if theeventtypelog field value is equal toftgd_blkthen, thesecurity_result.summaryUDM field is set toBlocked URL.msglog field is mapped to thesecurity_result.summaryUDM field. Else, if thesubtypelog field value is equal tovirusand if themsglog field value is equal toFile is infected.then,%{msg}- %{virus}log field is mapped to thesecurity_result.summaryUDM field. Else, if thesubtypelog field value is equal toipsor the subtypelog field value is equal toanomalythen,attacklog field is mapped to thesecurity_result.summaryUDM field.Else, if the logdesclog field value matches the regular expression patternGUI_ENTRY_DELETIONthen,msglog field is mapped to thesecurity_result.summaryUDM field.Else, if the modelog field value is notemptythen,modelog field is mapped to thesecurity_result.summaryUDM field.Else, if the changeslog field value is notemptythen, if themodelog field value is notemptythen,modelog field is mapped to thesecurity_result.summaryUDM field.Else, if the msg_datalog field value is notemptythen, if thereasonlog field value is not empty then,reasonlog field is mapped to thesecurity_result.summaryUDM field.Else, if the msglog field value is notemptythen,msglog field is mapped to thesecurity_result.summaryUDM field. | 
| catdesc | security_result.summary | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal towebfilterand if theeventtypelog field value is equal toftgd_blkthen, thesecurity_result.summaryUDM field is set toBlocked URL.msglog field is mapped to thesecurity_result.summaryUDM field. Else, if thesubtypelog field value is equal tovirusand if themsglog field value is equal toFile is infected.then,%{msg}- %{virus}log field is mapped to thesecurity_result.summaryUDM field. Else, if thesubtypelog field value is equal toipsor the subtypelog field value is equal toanomalythen,attacklog field is mapped to thesecurity_result.summaryUDM field.Else, if the logdesclog field value matches the regular expression patternGUI_ENTRY_DELETIONthen,msglog field is mapped to thesecurity_result.summaryUDM field.Else, if the modelog field value is notemptythen,modelog field is mapped to thesecurity_result.summaryUDM field.Else, if the changeslog field value is notemptythen, if themodelog field value is notemptythen,modelog field is mapped to thesecurity_result.summaryUDM field.Else, if the msg_datalog field value is notemptythen, if thereasonlog field value is not empty then,reasonlog field is mapped to thesecurity_result.summaryUDM field.Else, if the msglog field value is notemptythen,msglog field is mapped to thesecurity_result.summaryUDM field. | 
| msg | security_result.rule_name | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal toapp-ctrlthen,msglog field is mapped to thesecurity_result.rule_nameUDM field.If the policynamelog field value is notemptythen,policynamelog field is mapped to thesecurity_result.rule_nameUDM field. | 
| policyname | security_result.rule_name | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal toapp-ctrlthen,msglog field is mapped to thesecurity_result.rule_nameUDM field.If the policynamelog field value is notemptythen,policynamelog field is mapped to thesecurity_result.rule_nameUDM field. | 
| dstthreatfeed | security_result.threat_feed_name | |
| attackid | security_result.threat_id | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thevirusidlog field value is notemptythen,virusidlog field is mapped to thesecurity_result.threat_idUDM field. if thesubtypelog field value is equal toipsor the subtypelog field value is equal toanomalythen,attackidlog field is mapped to thesecurity_result.threat_idUDM field. | 
| virusid | security_result.threat_id | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thevirusidlog field value is notemptythen,virusidlog field is mapped to thesecurity_result.threat_idUDM field. if thesubtypelog field value is equal toipsor the subtypelog field value is equal toanomalythen,attackidlog field is mapped to thesecurity_result.threat_idUDM field. | 
| attack | security_result.threat_name | If the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.threat_nameUDM field.Else, if the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovirusthen,viruslog field is mapped to thesecurity_result.threat_nameUDM field. | 
| virus | security_result.threat_name | If the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.threat_nameUDM field.Else, if the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovirusthen,viruslog field is mapped to thesecurity_result.threat_nameUDM field. | 
| cpdlisrteid | target.asset.attribute.labels[cpdlisrteid] | |
| cpdlteid | target.asset.attribute.labels[cpdlteid] | |
| cpteid | target.asset.attribute.labels[cpteid] | |
| dhost | target.asset.attribute.labels[dhost] | |
| dst_host | target.asset.attribute.labels[dst_host] | |
| dstauthserver | target.asset.attribute.labels[dstauthserver] | |
| dstintf | target.asset.attribute.labels[dstintf] | |
| dstintfrole | target.asset.attribute.labels[dstintfrole] | |
| dstserver | target.asset.attribute.labels[dstserver] | |
| hostname | target.asset.attribute.labels[hostname] | |
| server | target.asset.attribute.labels[server] | |
| cpulteid | target.asset.type | If the cpulteidlog field value is notemptythen, thetarget.asset.typeUDM field is set toSERVER. | 
| dsthwversion | target.asset.hardware.model | |
| oldsn | target.asset.hardware.serial_number | |
| dstserver | target.asset.hostname | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnthen,devnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstserverlog field value does not contain one of the following values
 dstserverlog field is mapped to thetarget.asset.hostnameUDM field.If the dst_hostlog field value does not contain one of the following values
 dst_hostlog field is mapped to thetarget.asset.hostnameUDM field.If the dhostlog field value is notemptythen,dhostlog field is mapped to thetarget.asset.hostnameUDM field.If the hostnamelog field value is notemptythen,hostnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstauthserverlog field value is notemptythen,dstauthserverlog field is mapped to thetarget.asset.hostnameUDM field.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theserverlog field value is notemptythen,serverlog field is mapped to thetarget.asset.hostnameUDM field. Else,devnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstnamelog field value is notemptythen,dstnamelog field is mapped to thetarget.asset.hostnameUDM field.If the hostlog field value is notemptythen,hostlog field is mapped to thetarget.asset.hostnameUDM field.If the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.asset.hostnameUDM field. | 
| dst_host | target.asset.hostname | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnthen,devnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstserverlog field value does not contain one of the following values
 dstserverlog field is mapped to thetarget.asset.hostnameUDM field.If the dst_hostlog field value does not contain one of the following values
 dst_hostlog field is mapped to thetarget.asset.hostnameUDM field.If the dhostlog field value is notemptythen,dhostlog field is mapped to thetarget.asset.hostnameUDM field.If the hostnamelog field value is notemptythen,hostnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstauthserverlog field value is notemptythen,dstauthserverlog field is mapped to thetarget.asset.hostnameUDM field.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theserverlog field value is notemptythen,serverlog field is mapped to thetarget.asset.hostnameUDM field. Else,devnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstnamelog field value is notemptythen,dstnamelog field is mapped to thetarget.asset.hostnameUDM field.If the hostlog field value is notemptythen,hostlog field is mapped to thetarget.asset.hostnameUDM field.If the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.asset.hostnameUDM field. | 
| dhost | target.asset.hostname | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnthen,devnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstserverlog field value does not contain one of the following values
 dstserverlog field is mapped to thetarget.asset.hostnameUDM field.If the dst_hostlog field value does not contain one of the following values
 dst_hostlog field is mapped to thetarget.asset.hostnameUDM field.If the dhostlog field value is notemptythen,dhostlog field is mapped to thetarget.asset.hostnameUDM field.If the hostnamelog field value is notemptythen,hostnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstauthserverlog field value is notemptythen,dstauthserverlog field is mapped to thetarget.asset.hostnameUDM field.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theserverlog field value is notemptythen,serverlog field is mapped to thetarget.asset.hostnameUDM field. Else,devnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstnamelog field value is notemptythen,dstnamelog field is mapped to thetarget.asset.hostnameUDM field.If the hostlog field value is notemptythen,hostlog field is mapped to thetarget.asset.hostnameUDM field.If the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.asset.hostnameUDM field. | 
| hostname | target.asset.hostname | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnthen,devnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstserverlog field value does not contain one of the following values
 dstserverlog field is mapped to thetarget.asset.hostnameUDM field.If the dst_hostlog field value does not contain one of the following values
 dst_hostlog field is mapped to thetarget.asset.hostnameUDM field.If the dhostlog field value is notemptythen,dhostlog field is mapped to thetarget.asset.hostnameUDM field.If the hostnamelog field value is notemptythen,hostnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstauthserverlog field value is notemptythen,dstauthserverlog field is mapped to thetarget.asset.hostnameUDM field.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theserverlog field value is notemptythen,serverlog field is mapped to thetarget.asset.hostnameUDM field. Else,devnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstnamelog field value is notemptythen,dstnamelog field is mapped to thetarget.asset.hostnameUDM field.If the hostlog field value is notemptythen,hostlog field is mapped to thetarget.asset.hostnameUDM field.If the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.asset.hostnameUDM field. | 
| dstauthserver | target.asset.hostname | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnthen,devnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstserverlog field value does not contain one of the following values
 dstserverlog field is mapped to thetarget.asset.hostnameUDM field.If the dst_hostlog field value does not contain one of the following values
 dst_hostlog field is mapped to thetarget.asset.hostnameUDM field.If the dhostlog field value is notemptythen,dhostlog field is mapped to thetarget.asset.hostnameUDM field.If the hostnamelog field value is notemptythen,hostnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstauthserverlog field value is notemptythen,dstauthserverlog field is mapped to thetarget.asset.hostnameUDM field.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theserverlog field value is notemptythen,serverlog field is mapped to thetarget.asset.hostnameUDM field. Else,devnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstnamelog field value is notemptythen,dstnamelog field is mapped to thetarget.asset.hostnameUDM field.If the hostlog field value is notemptythen,hostlog field is mapped to thetarget.asset.hostnameUDM field.If the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.asset.hostnameUDM field. | 
| server | target.asset.hostname | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnthen,devnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstserverlog field value does not contain one of the following values
 dstserverlog field is mapped to thetarget.asset.hostnameUDM field.If the dst_hostlog field value does not contain one of the following values
 dst_hostlog field is mapped to thetarget.asset.hostnameUDM field.If the dhostlog field value is notemptythen,dhostlog field is mapped to thetarget.asset.hostnameUDM field.If the hostnamelog field value is notemptythen,hostnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstauthserverlog field value is notemptythen,dstauthserverlog field is mapped to thetarget.asset.hostnameUDM field.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theserverlog field value is notemptythen,serverlog field is mapped to thetarget.asset.hostnameUDM field. Else,devnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstnamelog field value is notemptythen,dstnamelog field is mapped to thetarget.asset.hostnameUDM field.If the hostlog field value is notemptythen,hostlog field is mapped to thetarget.asset.hostnameUDM field.If the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.asset.hostnameUDM field. | 
| devname | target.asset.hostname | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnthen,devnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstserverlog field value does not contain one of the following values
 dstserverlog field is mapped to thetarget.asset.hostnameUDM field.If the dst_hostlog field value does not contain one of the following values
 dst_hostlog field is mapped to thetarget.asset.hostnameUDM field.If the dhostlog field value is notemptythen,dhostlog field is mapped to thetarget.asset.hostnameUDM field.If the hostnamelog field value is notemptythen,hostnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstauthserverlog field value is notemptythen,dstauthserverlog field is mapped to thetarget.asset.hostnameUDM field.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theserverlog field value is notemptythen,serverlog field is mapped to thetarget.asset.hostnameUDM field. Else,devnamelog field is mapped to thetarget.asset.hostnameUDM field.If the dstnamelog field value is notemptythen,dstnamelog field is mapped to thetarget.asset.hostnameUDM field.If the hostlog field value is notemptythen,hostlog field is mapped to thetarget.asset.hostnameUDM field.If the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.asset.hostnameUDM field. | 
| remip | target.asset.ip | If the dstiplog field value is notemptyor the dstiplog field value is not equal toN/Athen, Thedst_ipfield is extracted fromdstiplog field using the Grok pattern. if thedst_iplog field value is notemptythen,dst_ipextracted field is mapped to thetarget.asset.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if thetunneliplog field value does not contain one of the following values
 tunneliplog field is mapped to thetarget.asset.ipUDM field. | 
| tunnelip | target.asset.ip | If the dstiplog field value is notemptyor the dstiplog field value is not equal toN/Athen, Thedst_ipfield is extracted fromdstiplog field using the Grok pattern. if thedst_iplog field value is notemptythen,dst_ipextracted field is mapped to thetarget.asset.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if thetunneliplog field value does not contain one of the following values
 tunneliplog field is mapped to thetarget.asset.ipUDM field. if theremiplog field value is notemptythen,remiplog field is mapped to thetarget.asset.ipUDM field. | 
| cpaddr | target.asset.ip | If the dstiplog field value is notemptyor the dstiplog field value is not equal toN/Athen, Thedst_ipfield is extracted fromdstiplog field using the Grok pattern. if thedst_iplog field value is notemptythen,dst_ipextracted field is mapped to thetarget.asset.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if thetunneliplog field value does not contain one of the following values
 tunneliplog field is mapped to thetarget.asset.ipUDM field. if theremiplog field value is notemptythen,remiplog field is mapped to thetarget.asset.ipUDM field. | 
| cpaddr6 | target.asset.ip | If the dstiplog field value is notemptyor the dstiplog field value is not equal toN/Athen, Thedst_ipfield is extracted fromdstiplog field using the Grok pattern. if thedst_iplog field value is notemptythen,dst_ipextracted field is mapped to thetarget.asset.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if thetunneliplog field value does not contain one of the following values
 tunneliplog field is mapped to thetarget.asset.ipUDM field. if theremiplog field value is notemptythen,remiplog field is mapped to thetarget.asset.ipUDM field. | 
| cpuladdr | target.asset.ip | If the dstiplog field value is notemptyor the dstiplog field value is not equal toN/Athen, Thedst_ipfield is extracted fromdstiplog field using the Grok pattern. if thedst_iplog field value is notemptythen,dst_ipextracted field is mapped to thetarget.asset.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if thetunneliplog field value does not contain one of the following values
 tunneliplog field is mapped to thetarget.asset.ipUDM field. if theremiplog field value is notemptythen,remiplog field is mapped to thetarget.asset.ipUDM field. | 
| cpuladdr6 | target.asset.ip | If the dstiplog field value is notemptyor the dstiplog field value is not equal toN/Athen, Thedst_ipfield is extracted fromdstiplog field using the Grok pattern. if thedst_iplog field value is notemptythen,dst_ipextracted field is mapped to thetarget.asset.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if thetunneliplog field value does not contain one of the following values
 tunneliplog field is mapped to thetarget.asset.ipUDM field. if theremiplog field value is notemptythen,remiplog field is mapped to thetarget.asset.ipUDM field. | 
| cpdladdr | target.asset.ip | If the dstiplog field value is notemptyor the dstiplog field value is not equal toN/Athen, Thedst_ipfield is extracted fromdstiplog field using the Grok pattern. if thedst_iplog field value is notemptythen,dst_ipextracted field is mapped to thetarget.asset.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if thetunneliplog field value does not contain one of the following values
 tunneliplog field is mapped to thetarget.asset.ipUDM field. if theremiplog field value is notemptythen,remiplog field is mapped to thetarget.asset.ipUDM field. | 
| cpdladdr6 | target.asset.ip | If the dstiplog field value is notemptyor the dstiplog field value is not equal toN/Athen, Thedst_ipfield is extracted fromdstiplog field using the Grok pattern. if thedst_iplog field value is notemptythen,dst_ipextracted field is mapped to thetarget.asset.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if thetunneliplog field value does not contain one of the following values
 tunneliplog field is mapped to thetarget.asset.ipUDM field. if theremiplog field value is notemptythen,remiplog field is mapped to thetarget.asset.ipUDM field. | 
| cpdlisraddr | target.asset.ip | If the dstiplog field value is notemptyor the dstiplog field value is not equal toN/Athen, Thedst_ipfield is extracted fromdstiplog field using the Grok pattern. if thedst_iplog field value is notemptythen,dst_ipextracted field is mapped to thetarget.asset.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if thetunneliplog field value does not contain one of the following values
 tunneliplog field is mapped to thetarget.asset.ipUDM field. if theremiplog field value is notemptythen,remiplog field is mapped to thetarget.asset.ipUDM field. | 
| cpdlisraddr6 | target.asset.ip | If the dstiplog field value is notemptyor the dstiplog field value is not equal toN/Athen, Thedst_ipfield is extracted fromdstiplog field using the Grok pattern. if thedst_iplog field value is notemptythen,dst_ipextracted field is mapped to thetarget.asset.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if thetunneliplog field value does not contain one of the following values
 tunneliplog field is mapped to thetarget.asset.ipUDM field. if theremiplog field value is notemptythen,remiplog field is mapped to thetarget.asset.ipUDM field. | 
| filename | target.file.full_path | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thefilenamelog field value is notemptythen,filenamelog field is mapped to thetarget.file.full_pathUDM field. | 
| matchfiletype | target.file.mime_type | If the matchfiletypelog field value is notemptythen,matchfiletypelog field is mapped to thetarget.file.mime_typeUDM field.Else, if the icbfiletypelog field value is notemptythen,icbfiletypelog field is mapped to thetarget.file.mime_typeUDM field.Else, if the infectedfiletypelog field value is notemptythen,infectedfiletypelog field is mapped to thetarget.file.mime_typeUDM field. | 
| icbfiletype | target.file.mime_type | If the matchfiletypelog field value is notemptythen,matchfiletypelog field is mapped to thetarget.file.mime_typeUDM field.Else, if the icbfiletypelog field value is notemptythen,icbfiletypelog field is mapped to thetarget.file.mime_typeUDM field.Else, if the infectedfiletypelog field value is notemptythen,infectedfiletypelog field is mapped to thetarget.file.mime_typeUDM field. | 
| infectedfiletype | target.file.mime_type | If the matchfiletypelog field value is notemptythen,matchfiletypelog field is mapped to thetarget.file.mime_typeUDM field.Else, if the icbfiletypelog field value is notemptythen,icbfiletypelog field is mapped to thetarget.file.mime_typeUDM field.Else, if the infectedfiletypelog field value is notemptythen,infectedfiletypelog field is mapped to thetarget.file.mime_typeUDM field. | 
| infectedfilename | target.file.names | If the infectedfilenamelog field value is notemptythen,infectedfilenamelog field is mapped to thetarget.file.namesUDM field.If the matchfilenamelog field value is notemptythen,matchfilenamelog field is mapped to thetarget.file.namesUDM field.If the icbfileidlog field value is notemptythen,icbfileidlog field is mapped to thetarget.file.namesUDM field. | 
| matchfilename | target.file.names | If the infectedfilenamelog field value is notemptythen,infectedfilenamelog field is mapped to thetarget.file.namesUDM field.If the matchfilenamelog field value is notemptythen,matchfilenamelog field is mapped to thetarget.file.namesUDM field.If the icbfileidlog field value is notemptythen,icbfileidlog field is mapped to thetarget.file.namesUDM field. | 
| icbfileid | target.file.names | If the infectedfilenamelog field value is notemptythen,infectedfilenamelog field is mapped to thetarget.file.namesUDM field.If the matchfilenamelog field value is notemptythen,matchfilenamelog field is mapped to thetarget.file.namesUDM field.If the icbfileidlog field value is notemptythen,icbfileidlog field is mapped to thetarget.file.namesUDM field. | 
| hash | target.file.sha256 | If the hashlog field value is notemptythen,hashlog field is mapped to thetarget.file.sha256UDM field.Else, if the analyticscksumlog field value is notemptythen,analyticscksumlog field is mapped to thetarget.file.sha256UDM field. | 
| analyticscksum | target.file.sha256 | If the hashlog field value is notemptythen,hashlog field is mapped to thetarget.file.sha256UDM field.Else, if the analyticscksumlog field value is notemptythen,analyticscksumlog field is mapped to thetarget.file.sha256UDM field. | 
| infectedfilesize | target.file.size | |
| analyticssubmit | target.file.tags | |
| dstserver | target.hostname | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnthen,devnamelog field is mapped to thetarget.hostnameUDM field.Else, if the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.hostnameUDM field.If the dstserverlog field value does not contain one of the following values
 dstserverlog field is mapped to thetarget.hostnameUDM field.If the dst_hostlog field value does not contain one of the following values
 dst_hostlog field is mapped to thetarget.hostnameUDM field.If the dhostlog field value is notemptythen,dhostlog field is mapped to thetarget.hostnameUDM field.If the hostnamelog field value is notemptythen,hostnamelog field is mapped to thetarget.hostnameUDM field.If the dstauthserverlog field value is notemptythen,dstauthserverlog field is mapped to thetarget.hostnameUDM field.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theserverlog field value is notemptythen,serverlog field is mapped to thetarget.hostnameUDM field. Else,devnamelog field is mapped to thetarget.hostnameUDM field.If the dstnamelog field value is notemptythen,dstnamelog field is mapped to thetarget.hostnameUDM field.If the hostlog field value is notemptythen,hostlog field is mapped to thetarget.hostnameUDM field.If the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.hostnameUDM field. | 
| dst_host | target.hostname | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnthen,devnamelog field is mapped to thetarget.hostnameUDM field.Else, if the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.hostnameUDM field.If the dstserverlog field value does not contain one of the following values
 dstserverlog field is mapped to thetarget.hostnameUDM field.If the dst_hostlog field value does not contain one of the following values
 dst_hostlog field is mapped to thetarget.hostnameUDM field.If the dhostlog field value is notemptythen,dhostlog field is mapped to thetarget.hostnameUDM field.If the hostnamelog field value is notemptythen,hostnamelog field is mapped to thetarget.hostnameUDM field.If the dstauthserverlog field value is notemptythen,dstauthserverlog field is mapped to thetarget.hostnameUDM field.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theserverlog field value is notemptythen,serverlog field is mapped to thetarget.hostnameUDM field. Else,devnamelog field is mapped to thetarget.hostnameUDM field.If the dstnamelog field value is notemptythen,dstnamelog field is mapped to thetarget.hostnameUDM field.If the hostlog field value is notemptythen,hostlog field is mapped to thetarget.hostnameUDM field.If the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.hostnameUDM field. | 
| dhost | target.hostname | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnthen,devnamelog field is mapped to thetarget.hostnameUDM field.Else, if the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.hostnameUDM field.If the dstserverlog field value does not contain one of the following values
 dstserverlog field is mapped to thetarget.hostnameUDM field.If the dst_hostlog field value does not contain one of the following values
 dst_hostlog field is mapped to thetarget.hostnameUDM field.If the dhostlog field value is notemptythen,dhostlog field is mapped to thetarget.hostnameUDM field.If the hostnamelog field value is notemptythen,hostnamelog field is mapped to thetarget.hostnameUDM field.If the dstauthserverlog field value is notemptythen,dstauthserverlog field is mapped to thetarget.hostnameUDM field.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theserverlog field value is notemptythen,serverlog field is mapped to thetarget.hostnameUDM field. Else,devnamelog field is mapped to thetarget.hostnameUDM field.If the dstnamelog field value is notemptythen,dstnamelog field is mapped to thetarget.hostnameUDM field.If the hostlog field value is notemptythen,hostlog field is mapped to thetarget.hostnameUDM field.If the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.hostnameUDM field. | 
| hostname | target.hostname | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnthen,devnamelog field is mapped to thetarget.hostnameUDM field.Else, if the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.hostnameUDM field.If the dstserverlog field value does not contain one of the following values
 dstserverlog field is mapped to thetarget.hostnameUDM field.If the dst_hostlog field value does not contain one of the following values
 dst_hostlog field is mapped to thetarget.hostnameUDM field.If the dhostlog field value is notemptythen,dhostlog field is mapped to thetarget.hostnameUDM field.If the hostnamelog field value is notemptythen,hostnamelog field is mapped to thetarget.hostnameUDM field.If the dstauthserverlog field value is notemptythen,dstauthserverlog field is mapped to thetarget.hostnameUDM field.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theserverlog field value is notemptythen,serverlog field is mapped to thetarget.hostnameUDM field. Else,devnamelog field is mapped to thetarget.hostnameUDM field.If the dstnamelog field value is notemptythen,dstnamelog field is mapped to thetarget.hostnameUDM field.If the hostlog field value is notemptythen,hostlog field is mapped to thetarget.hostnameUDM field.If the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.hostnameUDM field. | 
| dstauthserver | target.hostname | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnthen,devnamelog field is mapped to thetarget.hostnameUDM field.Else, if the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.hostnameUDM field.If the dstserverlog field value does not contain one of the following values
 dstserverlog field is mapped to thetarget.hostnameUDM field.If the dst_hostlog field value does not contain one of the following values
 dst_hostlog field is mapped to thetarget.hostnameUDM field.If the dhostlog field value is notemptythen,dhostlog field is mapped to thetarget.hostnameUDM field.If the hostnamelog field value is notemptythen,hostnamelog field is mapped to thetarget.hostnameUDM field.If the dstauthserverlog field value is notemptythen,dstauthserverlog field is mapped to thetarget.hostnameUDM field.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theserverlog field value is notemptythen,serverlog field is mapped to thetarget.hostnameUDM field. Else,devnamelog field is mapped to thetarget.hostnameUDM field.If the dstnamelog field value is notemptythen,dstnamelog field is mapped to thetarget.hostnameUDM field.If the hostlog field value is notemptythen,hostlog field is mapped to thetarget.hostnameUDM field.If the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.hostnameUDM field. | 
| server | target.hostname | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnthen,devnamelog field is mapped to thetarget.hostnameUDM field.Else, if the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.hostnameUDM field.If the dstserverlog field value does not contain one of the following values
 dstserverlog field is mapped to thetarget.hostnameUDM field.If the dst_hostlog field value does not contain one of the following values
 dst_hostlog field is mapped to thetarget.hostnameUDM field.If the dhostlog field value is notemptythen,dhostlog field is mapped to thetarget.hostnameUDM field.If the hostnamelog field value is notemptythen,hostnamelog field is mapped to thetarget.hostnameUDM field.If the dstauthserverlog field value is notemptythen,dstauthserverlog field is mapped to thetarget.hostnameUDM field.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theserverlog field value is notemptythen,serverlog field is mapped to thetarget.hostnameUDM field. Else,devnamelog field is mapped to thetarget.hostnameUDM field.If the dstnamelog field value is notemptythen,dstnamelog field is mapped to thetarget.hostnameUDM field.If the hostlog field value is notemptythen,hostlog field is mapped to thetarget.hostnameUDM field.If the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.hostnameUDM field. | 
| dstname | target.hostname | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnthen,devnamelog field is mapped to thetarget.hostnameUDM field.Else, if the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.hostnameUDM field.If the dstserverlog field value does not contain one of the following values
 dstserverlog field is mapped to thetarget.hostnameUDM field.If the dst_hostlog field value does not contain one of the following values
 dst_hostlog field is mapped to thetarget.hostnameUDM field.If the dhostlog field value is notemptythen,dhostlog field is mapped to thetarget.hostnameUDM field.If the hostnamelog field value is notemptythen,hostnamelog field is mapped to thetarget.hostnameUDM field.If the dstauthserverlog field value is notemptythen,dstauthserverlog field is mapped to thetarget.hostnameUDM field.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theserverlog field value is notemptythen,serverlog field is mapped to thetarget.hostnameUDM field. Else,devnamelog field is mapped to thetarget.hostnameUDM field.If the dstnamelog field value is notemptythen,dstnamelog field is mapped to thetarget.hostnameUDM field.If the hostlog field value is notemptythen,hostlog field is mapped to thetarget.hostnameUDM field.If the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.hostnameUDM field. | 
| host | target.hostname | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnthen,devnamelog field is mapped to thetarget.hostnameUDM field.Else, if the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.hostnameUDM field.If the dstserverlog field value does not contain one of the following values
 dstserverlog field is mapped to thetarget.hostnameUDM field.If the dst_hostlog field value does not contain one of the following values
 dst_hostlog field is mapped to thetarget.hostnameUDM field.If the dhostlog field value is notemptythen,dhostlog field is mapped to thetarget.hostnameUDM field.If the hostnamelog field value is notemptythen,hostnamelog field is mapped to thetarget.hostnameUDM field.If the dstauthserverlog field value is notemptythen,dstauthserverlog field is mapped to thetarget.hostnameUDM field.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theserverlog field value is notemptythen,serverlog field is mapped to thetarget.hostnameUDM field. Else,devnamelog field is mapped to thetarget.hostnameUDM field.If the dstnamelog field value is notemptythen,dstnamelog field is mapped to thetarget.hostnameUDM field.If the hostlog field value is notemptythen,hostlog field is mapped to thetarget.hostnameUDM field.If the actionlog field value is equal tologinand if thedevnamelog field value is notemptythen,devnamelog field is mapped to thetarget.hostnameUDM field. | 
| remip | src.ip | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if theremiplog field value is notemptythen,remiplog field is mapped to thesrc.ipUDM field. | 
| remip | src.asset.ip | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if theremiplog field value is notemptythen,remiplog field is mapped to thesrc.asset.ipUDM field. | 
| tunnelip | target.ip | If the dstiplog field value is notemptyor the dstiplog field value is not equal toN/Athen, Thedst_ipfield is extracted fromdstiplog field using the Grok pattern. if thedst_iplog field value is notemptythen,dst_ipextracted field is mapped to thetarget.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if thetunneliplog field value does not contain one of the following values
 tunneliplog field is mapped to thetarget.ipUDM field. if theremiplog field value is notemptythen,remiplog field is mapped to thetarget.ipUDM field. | 
| daddr | target.ip | If the dstiplog field value is notemptyor the dstiplog field value is not equal toN/Athen, Thedst_ipfield is extracted fromdstiplog field using the Grok pattern. if thedst_iplog field value is notemptythen,dst_ipextracted field is mapped to thetarget.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if thetunneliplog field value does not contain one of the following values
 tunneliplog field is mapped to thetarget.ipUDM field. if theremiplog field value is notemptythen,remiplog field is mapped to thetarget.ipUDM field. | 
| end-usr-address | target.ip | If the dstiplog field value is notemptyor the dstiplog field value is not equal toN/Athen, Thedst_ipfield is extracted fromdstiplog field using the Grok pattern. if thedst_iplog field value is notemptythen,dst_ipextracted field is mapped to thetarget.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if thetunneliplog field value does not contain one of the following values
 tunneliplog field is mapped to thetarget.ipUDM field. if theremiplog field value is notemptythen,remiplog field is mapped to thetarget.ipUDM field. | 
| endusraddress6 | target.ip | If the dstiplog field value is notemptyor the dstiplog field value is not equal toN/Athen, Thedst_ipfield is extracted fromdstiplog field using the Grok pattern. if thedst_iplog field value is notemptythen,dst_ipextracted field is mapped to thetarget.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand if thetunneliplog field value does not contain one of the following values
 tunneliplog field is mapped to thetarget.ipUDM field. if theremiplog field value is notemptythen,remiplog field is mapped to thetarget.ipUDM field. | 
| opercountry | target.ip_location.country_or_region | |
| dstcity | target.location.city | |
| dstcountry | target.location.country_or_region | If the dstcountrylog field value is notemptyand thedstcountrylog field value is not equal toReservedthen,dstcountrylog field is mapped to thetarget.location.country_or_regionUDM field.Else, if the dstregionlog field value is notemptythen,dstregionlog field is mapped to thetarget.location.country_or_regionUDM field. | 
| dstregion | target.location.country_or_region | If the dstcountrylog field value is notemptyand thedstcountrylog field value is not equal toReservedthen,dstcountrylog field is mapped to thetarget.location.country_or_regionUDM field.Else, if the dstregionlog field value is notemptythen,dstregionlog field is mapped to thetarget.location.country_or_regionUDM field. | 
| dstmacAddress | target.mac | If the dstmaclog field value is notemptythen, ThedstmacAddressfield is extracted fromdstmaclog field using the Grok pattern. if thedstmacAddresslog field value is notemptythen,dstmacAddressextracted field is mapped to thetarget.macUDM field anddstmacAddressextracted field is mapped to thetarget.asset.macUDM field. | 
| tranip | target.nat_ip | |
| dsthwvendor | target.resource.attribute.labels[dsthwvendor] | |
| request_name | target.resource.attribute.labels[request_name] | |
| requesttype | target.resource.attribute.labels[requesttype] | |
| resplength | target.resource.attribute.labels[resplength] | |
| resptime | target.resource.attribute.labels[resptime] | |
| resptype | target.resource.attribute.labels[resptype] | |
| rssi | target.resource.attribute.labels[rssi] | |
| rsso_key | target.resource.attribute.labels[rsso_key] | |
| to_vcluster | target.resource.attribute.labels[to_vcluster] | |
| tranport | target.nat_port | |
|  | target.platform | If the dstosnamelog field value is equal toWINDOWSthen, thetarget.platformUDM field is set toWINDOWS.If the dstosnamelog field value contain one of the following values
 target.platformUDM field is set toLINUX. | 
| dstswversion | target.platform_version | |
| dst_port | target.port | If the dst_portlog field value does not contain one of the following values
 dst_portlog field is mapped to thetarget.portUDM field.Else, if the locportlog field value is notemptythen,locportlog field is mapped to thetarget.portUDM field.Else, if the dstportlog field value is notemptythen,dstportlog field is mapped to thetarget.portUDM field. | 
| locport | target.port | If the dst_portlog field value does not contain one of the following values
 dst_portlog field is mapped to thetarget.portUDM field.Else, if the locportlog field value is notemptythen,locportlog field is mapped to thetarget.portUDM field.Else, if the dstportlog field value is notemptythen,dstportlog field is mapped to thetarget.portUDM field. | 
| dstport | target.port | If the dst_portlog field value does not contain one of the following values
 dst_portlog field is mapped to thetarget.portUDM field.Else, if the locportlog field value is notemptythen,locportlog field is mapped to thetarget.portUDM field.Else, if the dstportlog field value is notemptythen,dstportlog field is mapped to thetarget.portUDM field. | 
| to_vcluster | target.resource.resource_type | If the to_vclusterlog field value does not contain one of the following values
 target.resource.resource_typeUDM field is set toCLUSTER. | 
| duid | target.user.attribute.labels[duid] | |
| dstuser | target.user.attribute.labels[dstuser] | |
| name | target.user.attribute.labels[name] | |
| cfgobj | target.user.attribute.labels[cfgobj] | |
| profile | target.resource.name | If the profilelog field value is notemptythen,profilelog field is mapped to thetarget.resource.nameUDM field and thetarget.resource.resource_typeUDM field is set toACCESS_POLICY. | 
| dstuuid | target.resource.product_object_id | If the dstuuidlog field value is notemptythen,dstuuidlog field is mapped to thetarget.resource.product_object_idUDM field.Else, if the realserveridlog field value is notemptythen,realserveridlog field is mapped to thetarget.resource.product_object_idUDM field. | 
| realserverid | target.resource.product_object_id | If the dstuuidlog field value is notemptythen,dstuuidlog field is mapped to thetarget.resource.product_object_idUDM field.Else, if the realserveridlog field value is notemptythen,realserveridlog field is mapped to thetarget.resource.product_object_idUDM field. | 
| url | target.url | If the urllog field value is notemptyand theurllog field value is not equal toN/Athen,urllog field is mapped to thetarget.urlUDM field. | 
| dstunauthuser | target.user.user_display_name | If the dstunauthuserlog field value is notemptythen,dstunauthuserlog field is mapped to thetarget.user.user_display_nameUDM field.Else, duserlog field is mapped to thetarget.user.user_display_nameUDM field. | 
| duser | target.user.user_display_name | If the dstunauthuserlog field value is notemptythen,dstunauthuserlog field is mapped to thetarget.user.user_display_nameUDM field.Else, duserlog field is mapped to thetarget.user.user_display_nameUDM field. | 
| dstuser | target.user.userid | If the duidlog field value is notemptythen, Thetemp_duidfield is extracted fromduidlog field using the Grok pattern. if thetemp_duidlog field value is notemptythen,temp_duidextracted field is mapped to thetarget.user.useridUDM field.Else, if the dstuserlog field value is notemptythen,dstuserlog field is mapped to thetarget.user.useridUDM field.Else, if the requestlog field value is notemptyand therequestlog field value matches the regular expression patternduidthen, Thed_uidfield is extracted fromrequestlog field using the Grok pattern. if thed_uidlog field value is notemptythen,d_uidextracted field is mapped to thetarget.user.useridUDM field.Else, if the namelog field value is notemptyand thenamelog field value is not equal toN/Aand if thelogdesclog field value matches the regular expression pattern(?i)userthen,namelog field is mapped to thetarget.user.useridUDM field.Else, if the cfgpathlog field value is equal tosystem.adminthen,cfgobjlog field is mapped to thetarget.user.useridUDM field.Else, if the actionlog field value is equal toauth-logonand thestatuslog field value is equal tologonand if theuserlog field value is notemptyand theuserlog field value is not equal toN/Athen,userlog field is mapped to thetarget.user.useridUDM field.Else, if the actionlog field value matches the regular expression pattern.logon.and if theuserlog field value is notemptyand theuserlog field value is not equal toN/Athen,userlog field is mapped to thetarget.user.useridUDM field. | 
| cfgobj | target.user.userid | If the duidlog field value is notemptythen, Thetemp_duidfield is extracted fromduidlog field using the Grok pattern. if thetemp_duidlog field value is notemptythen,temp_duidextracted field is mapped to thetarget.user.useridUDM field.Else, if the dstuserlog field value is notemptythen,dstuserlog field is mapped to thetarget.user.useridUDM field.Else, if the requestlog field value is notemptyand therequestlog field value matches the regular expression patternduidthen, Thed_uidfield is extracted fromrequestlog field using the Grok pattern. if thed_uidlog field value is notemptythen,d_uidextracted field is mapped to thetarget.user.useridUDM field.Else, if the namelog field value is notemptyand thenamelog field value is not equal toN/Aand if thelogdesclog field value matches the regular expression pattern(?i)userthen,namelog field is mapped to thetarget.user.useridUDM field.Else, if the cfgpathlog field value is equal tosystem.adminthen,cfgobjlog field is mapped to thetarget.user.useridUDM field.Else, if the actionlog field value is equal toauth-logonand thestatuslog field value is equal tologonand if theuserlog field value is notemptyand theuserlog field value is not equal toN/Athen,userlog field is mapped to thetarget.user.useridUDM field.Else, if the actionlog field value matches the regular expression pattern.logon.and if theuserlog field value is notemptyand theuserlog field value is not equal toN/Athen,userlog field is mapped to thetarget.user.useridUDM field. | 
| duid | target.user.userid | If the duidlog field value is notemptythen, Thetemp_duidfield is extracted fromduidlog field using the Grok pattern. if thetemp_duidlog field value is notemptythen,temp_duidextracted field is mapped to thetarget.user.useridUDM field.Else, if the dstuserlog field value is notemptythen,dstuserlog field is mapped to thetarget.user.useridUDM field.Else, if the requestlog field value is notemptyand therequestlog field value matches the regular expression patternduidthen, Thed_uidfield is extracted fromrequestlog field using the Grok pattern. if thed_uidlog field value is notemptythen,d_uidextracted field is mapped to thetarget.user.useridUDM field.Else, if the namelog field value is notemptyand thenamelog field value is not equal toN/Aand if thelogdesclog field value matches the regular expression pattern(?i)userthen,namelog field is mapped to thetarget.user.useridUDM field.Else, if the cfgpathlog field value is equal tosystem.adminthen,cfgobjlog field is mapped to thetarget.user.useridUDM field.Else, if the actionlog field value is equal toauth-logonand thestatuslog field value is equal tologonand if theuserlog field value is notemptyand theuserlog field value is not equal toN/Athen,userlog field is mapped to thetarget.user.useridUDM field.Else, if the actionlog field value matches the regular expression pattern.logon.and if theuserlog field value is notemptyand theuserlog field value is not equal toN/Athen,userlog field is mapped to thetarget.user.useridUDM field. | 
| name | target.user.userid | If the duidlog field value is notemptythen, Thetemp_duidfield is extracted fromduidlog field using the Grok pattern. if thetemp_duidlog field value is notemptythen,temp_duidextracted field is mapped to thetarget.user.useridUDM field.Else, if the dstuserlog field value is notemptythen,dstuserlog field is mapped to thetarget.user.useridUDM field.Else, if the requestlog field value is notemptyand therequestlog field value matches the regular expression patternduidthen, Thed_uidfield is extracted fromrequestlog field using the Grok pattern. if thed_uidlog field value is notemptythen,d_uidextracted field is mapped to thetarget.user.useridUDM field.Else, if the namelog field value is notemptyand thenamelog field value is not equal toN/Aand if thelogdesclog field value matches the regular expression pattern(?i)userthen,namelog field is mapped to thetarget.user.useridUDM field.Else, if the cfgpathlog field value is equal tosystem.adminthen,cfgobjlog field is mapped to thetarget.user.useridUDM field.Else, if the actionlog field value is equal toauth-logonand thestatuslog field value is equal tologonand if theuserlog field value is notemptyand theuserlog field value is not equal toN/Athen,userlog field is mapped to thetarget.user.useridUDM field.Else, if the actionlog field value matches the regular expression pattern.logon.and if theuserlog field value is notemptyand theuserlog field value is not equal toN/Athen,userlog field is mapped to thetarget.user.useridUDM field. | 
| deviceExternalId | about.asset.asset_id | If the deviceExternalIdlog field value is notemptythen,%{device_vendor}.%{device_product}:%{deviceExternalId}log field is mapped to theabout.asset.asset_idUDM field. | 
Delta de asignación de UDM
Referencia de delta de asignación de UDM: Fortinet_Firewall
En la siguiente tabla se muestra la diferencia entre el analizador predeterminado de FORTINET FIREWALL y la versión premium de FORTINET FIREWALL.
| Default UDM Mapping | Log Field | Premium Mapping Delta | 
|---|---|---|
| about.file.full_path | filehash | If the filehashlog field value matches the regular expression pattern(?<_hash>^[0-9a-f]+$)then,filehashlog field is mapped to theabout.file.sha256UDM field.Else, filehashlog field is mapped to theabout.file.full_pathUDM field. | 
| about.file.sha256 | filehash | If the filehashlog field value matches the regular expression pattern(?<_hash>^[0-9a-f]+$)then,filehashlog field is mapped to theabout.file.sha256UDM field.Else, filehashlog field is mapped to theabout.file.full_pathUDM field. | 
| principal.resource.attribute.labels | init | Updated one condition to remove the unnecessary value like "N/A". | 
| principal.resource.attribute.labels | vpntunnel | Updated one condition to remove the unnecessary value like "N/A". | 
| principal.resource.attribute.labels | rcvdbyte | Updated one condition to remove the unnecessary value like "N/A". | 
| security_result.description | utmaction | Updated the mapping from security_result.descriptiontosecurity_result.actionUDM field. | 
| security_result.detection_fields | dstinetsvc | Updated one condition to remove the unnecessary value like "N/A". | 
| security_result.detection_fields | dstintf | Updated the mapping from security_result.detection_fieldstotarget.asset.attribute.labelsUDM field. | 
| security_result.detection_fields | dstintfrole | Updated the mapping from security_result.detection_fieldstotarget.asset.attribute.labelsUDM field. | 
| security_result.detection_fields | srcintf | Updated the mapping from security_result.detection_fieldstoprincipal.asset.attribute.labelsUDM field. | 
| security_result.detection_fields | srcintfrole | Updated the mapping from security_result.detection_fieldstoprincipal.asset.attribute.labelsUDM field. | 
| security_result.detection_fields | xid | Updated one condition to remove the unnecessary value like "N/A". | 
| additional.fields | policyid | Updated the mapping from additional.fieldstosecurity_result.detection_fieldsUDM field. | 
| additional.fields | poluuid | Updated the mapping from additional.fieldstosecurity_result.detection_fieldsUDM field. | 
| principal.ip | shost | If the saddrlog field value is notemptythen, Thesaddr_ipfield is extracted fromsaddrlog field using the Grok pattern. if thesaddr_iplog field value is notemptythen,saddr_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srcremotelog field value is notemptythen, Thevalid_srcremotefield is extracted fromsrcremotelog field using the Grok pattern. if thevalid_srcremotelog field value is notemptythen,valid_srcremoteextracted field is mapped to theprincipal.ipUDM field.Else, if the shostlog field value is notemptythen, Thevalid_shostfield is extracted fromshostlog field using the Grok pattern. if thevalid_shostlog field value is notemptythen,valid_shostextracted field is mapped to theprincipal.ipUDM field.Else, if the userlog field value does not contain one of the following values
 user_ipfield is extracted fromuserlog field using the Grok pattern. if theuser_iplog field value is notemptythen,user_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the uilog field value is notemptythen, Theprin_ipfield is extracted fromuilog field using the Grok pattern. if theprin_iplog field value is notemptythen,prin_ipextracted field is mapped to theprincipal.ipUDM field.If the subtypelog field value contain one of the following values
 iplog field value is notemptyand theiplog field value is not equal toN/Athen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand thelociplog field value is notemptythen,lociplog field is mapped to theprincipal.ipUDM field.If the srciplog field value is notemptythen, Thesrc_ipfield is extracted fromsrciplog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srclog field value is notemptythen, Thesrc_ipfield is extracted fromsrclog field using the Grok pattern.src_ipextracted field is mapped to theprincipal.ipUDM field.If the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if themsglog field value is notemptythen, Theuser_emailfield is extracted frommsglog field using the Grok pattern. Thesrc_ipanduser_idfields is extracted frommsglog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.If the banned_srclog field value is notemptythen,banned_srclog field is mapped to theprincipal.ipUDM field.If the userfromlog field value is notemptythen, Thevalid_ipfield is extracted fromuserfromlog field using the Grok pattern.valid_ipextracted field is mapped to theprincipal.ipUDM field.user_emailextracted fields are mapped to theprincipal.ipUDM field. | 
| principal.ip | srcip | If the saddrlog field value is notemptythen, Thesaddr_ipfield is extracted fromsaddrlog field using the Grok pattern. if thesaddr_iplog field value is notemptythen,saddr_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srcremotelog field value is notemptythen, Thevalid_srcremotefield is extracted fromsrcremotelog field using the Grok pattern. if thevalid_srcremotelog field value is notemptythen,valid_srcremoteextracted field is mapped to theprincipal.ipUDM field.Else, if the shostlog field value is notemptythen, Thevalid_shostfield is extracted fromshostlog field using the Grok pattern. if thevalid_shostlog field value is notemptythen,valid_shostextracted field is mapped to theprincipal.ipUDM field.Else, if the userlog field value does not contain one of the following values
 user_ipfield is extracted fromuserlog field using the Grok pattern. if theuser_iplog field value is notemptythen,user_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the uilog field value is notemptythen, Theprin_ipfield is extracted fromuilog field using the Grok pattern. if theprin_iplog field value is notemptythen,prin_ipextracted field is mapped to theprincipal.ipUDM field.If the subtypelog field value contain one of the following values
 iplog field value is notemptyand theiplog field value is not equal toN/Athen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand thelociplog field value is notemptythen,lociplog field is mapped to theprincipal.ipUDM field.If the srciplog field value is notemptythen, Thesrc_ipfield is extracted fromsrciplog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srclog field value is notemptythen, Thesrc_ipfield is extracted fromsrclog field using the Grok pattern.src_ipextracted field is mapped to theprincipal.ipUDM field.If the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if themsglog field value is notemptythen, Theuser_emailfield is extracted frommsglog field using the Grok pattern. Thesrc_ipanduser_idfields is extracted frommsglog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.If the banned_srclog field value is notemptythen,banned_srclog field is mapped to theprincipal.ipUDM field.If the userfromlog field value is notemptythen, Thevalid_ipfield is extracted fromuserfromlog field using the Grok pattern.valid_ipextracted field is mapped to theprincipal.ipUDM field.user_emailextracted fields are mapped to theprincipal.ipUDM field. | 
| principal.ip | src_ip | If the saddrlog field value is notemptythen, Thesaddr_ipfield is extracted fromsaddrlog field using the Grok pattern. if thesaddr_iplog field value is notemptythen,saddr_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srcremotelog field value is notemptythen, Thevalid_srcremotefield is extracted fromsrcremotelog field using the Grok pattern. if thevalid_srcremotelog field value is notemptythen,valid_srcremoteextracted field is mapped to theprincipal.ipUDM field.Else, if the shostlog field value is notemptythen, Thevalid_shostfield is extracted fromshostlog field using the Grok pattern. if thevalid_shostlog field value is notemptythen,valid_shostextracted field is mapped to theprincipal.ipUDM field.Else, if the userlog field value does not contain one of the following values
 user_ipfield is extracted fromuserlog field using the Grok pattern. if theuser_iplog field value is notemptythen,user_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the uilog field value is notemptythen, Theprin_ipfield is extracted fromuilog field using the Grok pattern. if theprin_iplog field value is notemptythen,prin_ipextracted field is mapped to theprincipal.ipUDM field.If the subtypelog field value contain one of the following values
 iplog field value is notemptyand theiplog field value is not equal toN/Athen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand thelociplog field value is notemptythen,lociplog field is mapped to theprincipal.ipUDM field.If the srciplog field value is notemptythen, Thesrc_ipfield is extracted fromsrciplog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srclog field value is notemptythen, Thesrc_ipfield is extracted fromsrclog field using the Grok pattern.src_ipextracted field is mapped to theprincipal.ipUDM field.If the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if themsglog field value is notemptythen, Theuser_emailfield is extracted frommsglog field using the Grok pattern. Thesrc_ipanduser_idfields is extracted frommsglog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.If the banned_srclog field value is notemptythen,banned_srclog field is mapped to theprincipal.ipUDM field.If the userfromlog field value is notemptythen, Thevalid_ipfield is extracted fromuserfromlog field using the Grok pattern.valid_ipextracted field is mapped to theprincipal.ipUDM field.user_emailextracted fields are mapped to theprincipal.ipUDM field. | 
| principal.ip | ip | If the saddrlog field value is notemptythen, Thesaddr_ipfield is extracted fromsaddrlog field using the Grok pattern. if thesaddr_iplog field value is notemptythen,saddr_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srcremotelog field value is notemptythen, Thevalid_srcremotefield is extracted fromsrcremotelog field using the Grok pattern. if thevalid_srcremotelog field value is notemptythen,valid_srcremoteextracted field is mapped to theprincipal.ipUDM field.Else, if the shostlog field value is notemptythen, Thevalid_shostfield is extracted fromshostlog field using the Grok pattern. if thevalid_shostlog field value is notemptythen,valid_shostextracted field is mapped to theprincipal.ipUDM field.Else, if the userlog field value does not contain one of the following values
 user_ipfield is extracted fromuserlog field using the Grok pattern. if theuser_iplog field value is notemptythen,user_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the uilog field value is notemptythen, Theprin_ipfield is extracted fromuilog field using the Grok pattern. if theprin_iplog field value is notemptythen,prin_ipextracted field is mapped to theprincipal.ipUDM field.If the subtypelog field value contain one of the following values
 iplog field value is notemptyand theiplog field value is not equal toN/Athen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand thelociplog field value is notemptythen,lociplog field is mapped to theprincipal.ipUDM field.If the srciplog field value is notemptythen, Thesrc_ipfield is extracted fromsrciplog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srclog field value is notemptythen, Thesrc_ipfield is extracted fromsrclog field using the Grok pattern.src_ipextracted field is mapped to theprincipal.ipUDM field.If the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if themsglog field value is notemptythen, Theuser_emailfield is extracted frommsglog field using the Grok pattern. Thesrc_ipanduser_idfields is extracted frommsglog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.If the banned_srclog field value is notemptythen,banned_srclog field is mapped to theprincipal.ipUDM field.If the userfromlog field value is notemptythen, Thevalid_ipfield is extracted fromuserfromlog field using the Grok pattern.valid_ipextracted field is mapped to theprincipal.ipUDM field.user_emailextracted fields are mapped to theprincipal.ipUDM field. | 
| principal.asset.ip | srcip | If the saddrlog field value is notemptythen, Thesaddr_ipfield is extracted fromsaddrlog field using the Grok pattern. if thesaddr_iplog field value is notemptythen,saddr_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srcremotelog field value is notemptythen, Thevalid_srcremotefield is extracted fromsrcremotelog field using the Grok pattern. if thevalid_srcremotelog field value is notemptythen,valid_srcremoteextracted field is mapped to theprincipal.ipUDM field.Else, if the shostlog field value is notemptythen, Thevalid_shostfield is extracted fromshostlog field using the Grok pattern. if thevalid_shostlog field value is notemptythen,valid_shostextracted field is mapped to theprincipal.ipUDM field.Else, if the userlog field value does not contain one of the following values
 user_ipfield is extracted fromuserlog field using the Grok pattern. if theuser_iplog field value is notemptythen,user_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the uilog field value is notemptythen, Theprin_ipfield is extracted fromuilog field using the Grok pattern. if theprin_iplog field value is notemptythen,prin_ipextracted field is mapped to theprincipal.ipUDM field.If the subtypelog field value contain one of the following values
 iplog field value is notemptyand theiplog field value is not equal toN/Athen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand thelociplog field value is notemptythen,lociplog field is mapped to theprincipal.ipUDM field.If the srciplog field value is notemptythen, Thesrc_ipfield is extracted fromsrciplog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srclog field value is notemptythen, Thesrc_ipfield is extracted fromsrclog field using the Grok pattern.src_ipextracted field is mapped to theprincipal.ipUDM field.If the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if themsglog field value is notemptythen, Theuser_emailfield is extracted frommsglog field using the Grok pattern. Thesrc_ipanduser_idfields is extracted frommsglog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.If the banned_srclog field value is notemptythen,banned_srclog field is mapped to theprincipal.ipUDM field.If the userfromlog field value is notemptythen, Thevalid_ipfield is extracted fromuserfromlog field using the Grok pattern.valid_ipextracted field is mapped to theprincipal.ipUDM field.user_emailextracted fields are mapped to theprincipal.ipUDM field. | 
| principal.asset.ip | src_ip | If the saddrlog field value is notemptythen, Thesaddr_ipfield is extracted fromsaddrlog field using the Grok pattern. if thesaddr_iplog field value is notemptythen,saddr_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srcremotelog field value is notemptythen, Thevalid_srcremotefield is extracted fromsrcremotelog field using the Grok pattern. if thevalid_srcremotelog field value is notemptythen,valid_srcremoteextracted field is mapped to theprincipal.ipUDM field.Else, if the shostlog field value is notemptythen, Thevalid_shostfield is extracted fromshostlog field using the Grok pattern. if thevalid_shostlog field value is notemptythen,valid_shostextracted field is mapped to theprincipal.ipUDM field.Else, if the userlog field value does not contain one of the following values
 user_ipfield is extracted fromuserlog field using the Grok pattern. if theuser_iplog field value is notemptythen,user_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the uilog field value is notemptythen, Theprin_ipfield is extracted fromuilog field using the Grok pattern. if theprin_iplog field value is notemptythen,prin_ipextracted field is mapped to theprincipal.ipUDM field.If the subtypelog field value contain one of the following values
 iplog field value is notemptyand theiplog field value is not equal toN/Athen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand thelociplog field value is notemptythen,lociplog field is mapped to theprincipal.ipUDM field.If the srciplog field value is notemptythen, Thesrc_ipfield is extracted fromsrciplog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srclog field value is notemptythen, Thesrc_ipfield is extracted fromsrclog field using the Grok pattern.src_ipextracted field is mapped to theprincipal.ipUDM field.If the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if themsglog field value is notemptythen, Theuser_emailfield is extracted frommsglog field using the Grok pattern. Thesrc_ipanduser_idfields is extracted frommsglog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.If the banned_srclog field value is notemptythen,banned_srclog field is mapped to theprincipal.ipUDM field.If the userfromlog field value is notemptythen, Thevalid_ipfield is extracted fromuserfromlog field using the Grok pattern.valid_ipextracted field is mapped to theprincipal.ipUDM field.user_emailextracted fields are mapped to theprincipal.ipUDM field. | 
| principal.asset.ip | ip | If the saddrlog field value is notemptythen, Thesaddr_ipfield is extracted fromsaddrlog field using the Grok pattern. if thesaddr_iplog field value is notemptythen,saddr_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srcremotelog field value is notemptythen, Thevalid_srcremotefield is extracted fromsrcremotelog field using the Grok pattern. if thevalid_srcremotelog field value is notemptythen,valid_srcremoteextracted field is mapped to theprincipal.ipUDM field.Else, if the shostlog field value is notemptythen, Thevalid_shostfield is extracted fromshostlog field using the Grok pattern. if thevalid_shostlog field value is notemptythen,valid_shostextracted field is mapped to theprincipal.ipUDM field.Else, if the userlog field value does not contain one of the following values
 user_ipfield is extracted fromuserlog field using the Grok pattern. if theuser_iplog field value is notemptythen,user_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the uilog field value is notemptythen, Theprin_ipfield is extracted fromuilog field using the Grok pattern. if theprin_iplog field value is notemptythen,prin_ipextracted field is mapped to theprincipal.ipUDM field.If the subtypelog field value contain one of the following values
 iplog field value is notemptyand theiplog field value is not equal toN/Athen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen,iplog field is mapped to theprincipal.ipUDM field.If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thesubtypelog field value is equal tovpnand thelociplog field value is notemptythen,lociplog field is mapped to theprincipal.ipUDM field.If the srciplog field value is notemptythen, Thesrc_ipfield is extracted fromsrciplog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.Else, if the srclog field value is notemptythen, Thesrc_ipfield is extracted fromsrclog field using the Grok pattern.src_ipextracted field is mapped to theprincipal.ipUDM field.If the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if themsglog field value is notemptythen, Theuser_emailfield is extracted frommsglog field using the Grok pattern. Thesrc_ipanduser_idfields is extracted frommsglog field using the Grok pattern. if thesrc_iplog field value is notemptythen,src_ipextracted field is mapped to theprincipal.ipUDM field.If the banned_srclog field value is notemptythen,banned_srclog field is mapped to theprincipal.ipUDM field.If the userfromlog field value is notemptythen, Thevalid_ipfield is extracted fromuserfromlog field using the Grok pattern.valid_ipextracted field is mapped to theprincipal.ipUDM field.user_emailextracted fields are mapped to theprincipal.ipUDM field. | 
| security_result.rule_version | srchwversion | Updated the mapping from security_result.rule_versiontoprincipal.asset.hardware.modelUDM field. | 
| security_result.rule_version | dsthwversion | Updated the mapping from security_result.rule_versiontotarget.asset.hardware.modelUDM field. | 
| metadata.description | desc | Updated the mapping from metadata.descriptiontosecurity_result.detection_fieldsUDM field. | 
| principal.resource.attribute.labels | srchwvendor | Updated the mapping from principal.resource.attribute.labelstoprincipal.asset.hardware.manufacturerUDM field. | 
| security_result.action_details | operation | If the utmactionlog field value matches the regular expression pattern(?i)blockand theactionlog field value matches the regular expression pattern(?i)acceptor(?i)closethen,utmactionlog field is mapped to thesecurity_result.action_detailsUDM field.If the actionlog field value is notemptythen,actionlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the utmactionlog field value is notemptythen,utmactionlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the operationlog field value is notemptythen,operationlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the icbactionlog field value is notemptythen,icbactionlog field is mapped to thesecurity_result.action_detailsUDM field. | 
| security_result.action_details | icbaction | If the utmactionlog field value matches the regular expression pattern(?i)blockand theactionlog field value matches the regular expression pattern(?i)acceptor(?i)closethen,utmactionlog field is mapped to thesecurity_result.action_detailsUDM field.If the actionlog field value is notemptythen,actionlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the utmactionlog field value is notemptythen,utmactionlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the operationlog field value is notemptythen,operationlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the icbactionlog field value is notemptythen,icbactionlog field is mapped to thesecurity_result.action_detailsUDM field. | 
| security_result.action_details | action | If the utmactionlog field value matches the regular expression pattern(?i)blockand theactionlog field value matches the regular expression pattern(?i)acceptor(?i)closethen,utmactionlog field is mapped to thesecurity_result.action_detailsUDM field.If the actionlog field value is notemptythen,actionlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the utmactionlog field value is notemptythen,utmactionlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the operationlog field value is notemptythen,operationlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the icbactionlog field value is notemptythen,icbactionlog field is mapped to thesecurity_result.action_detailsUDM field. | 
| security_result.action_details | utmaction | If the utmactionlog field value matches the regular expression pattern(?i)blockand theactionlog field value matches the regular expression pattern(?i)acceptor(?i)closethen,utmactionlog field is mapped to thesecurity_result.action_detailsUDM field.If the actionlog field value is notemptythen,actionlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the utmactionlog field value is notemptythen,utmactionlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the operationlog field value is notemptythen,operationlog field is mapped to thesecurity_result.action_detailsUDM field.Else, if the icbactionlog field value is notemptythen,icbactionlog field is mapped to thesecurity_result.action_detailsUDM field. | 
| security_result.action |  | If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor theactionlog field value matches the regular expression pattern(?i)closethen, thesecurity_result.actionUDM field is set toBLOCK.Else, If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor the actionlog field value matches the regular expression pattern(?i)closethen, thesecurity_result.actionUDM field is set toBLOCK.Else, If the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tosuccessor the outcomelog field value is equal toREDIRECTED_USER_MAY_PROCEEDor the categoryOutcomelog field value matches the regular expression pattern(/Success|Success)or the cs2log field value matches the regular expression patternAllowthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tofailureor the statuslog field value is equal tofailedor the outcomelog field value is equal toBLOCKEDor the categoryOutcomelog field value matches the regular expression pattern(/Failure|Failed)or the cs2log field value matches the regular expression patternDeniedthen, thesecurity_result.actionUDM field is set toBLOCK.Else, if the outcomelog field value matches the regular expression patternFailurethen, thesecurity_result.actionUDM field is set toFAIL.If the operationlog field value is notemptyand if theoperationlog field value contain one of the following values
 security_result.actionUDM field is set toALLOW. Else, if theoperationlog field value contain one of the following values
 security_result.actionUDM field is set toBLOCK. Else, if theoperationlog field value is equal totimeoutthen, thesecurity_result.actionUDM field is set toFAIL.Else, if the icbactionlog field value is notemptythen, if theicbactionlog field value matches the regular expression patternallowthen, thesecurity_result.actionUDM field is set toALLOW. Else, if theicbactionlog field value matches the regular expression patternblockthen, thesecurity_result.actionUDM field is set toBLOCK. Else, if theicbactionlog field value matches the regular expression patternfailthen, thesecurity_result.actionUDM field is set toBLOCK. | 
| security_result.severity_details | crscore | If the levellog field value is notemptythen,levellog field is mapped to thesecurity_result.severity_detailsUDM field.If the crscorelog field value is notemptythen,crscorelog field is mapped to thesecurity_result.severity_detailsUDM field.If the deviceSeveritylog field value is notemptythen,deviceSeveritylog field is mapped to thesecurity_result.severity_detailsUDM field.If the levellog field value is notemptyand if thelevellog field value is equal toerrorand theerrorlog field value is notemptythen,errorlog field is mapped to thesecurity_result.severity_detailsUDM field. Else,level: %{level}log field is mapped to thesecurity_result.severity_detailsUDM field.If the icbseveritylog field value is notemptythen,icbseveritylog field is mapped to thesecurity_result.severity_detailsUDM field. | 
| security_result.severity_details | level | If the levellog field value is notemptythen,levellog field is mapped to thesecurity_result.severity_detailsUDM field.If the crscorelog field value is notemptythen,crscorelog field is mapped to thesecurity_result.severity_detailsUDM field.If the deviceSeveritylog field value is notemptythen,deviceSeveritylog field is mapped to thesecurity_result.severity_detailsUDM field.If the levellog field value is notemptyand if thelevellog field value is equal toerrorand theerrorlog field value is notemptythen,errorlog field is mapped to thesecurity_result.severity_detailsUDM field. Else,level: %{level}log field is mapped to thesecurity_result.severity_detailsUDM field.If the icbseveritylog field value is notemptythen,icbseveritylog field is mapped to thesecurity_result.severity_detailsUDM field. | 
| security_result.severity_details | error | If the levellog field value is notemptythen,levellog field is mapped to thesecurity_result.severity_detailsUDM field.If the crscorelog field value is notemptythen,crscorelog field is mapped to thesecurity_result.severity_detailsUDM field.If the deviceSeveritylog field value is notemptythen,deviceSeveritylog field is mapped to thesecurity_result.severity_detailsUDM field.If the levellog field value is notemptyand if thelevellog field value is equal toerrorand theerrorlog field value is notemptythen,errorlog field is mapped to thesecurity_result.severity_detailsUDM field. Else,level: %{level}log field is mapped to thesecurity_result.severity_detailsUDM field.If the icbseveritylog field value is notemptythen,icbseveritylog field is mapped to thesecurity_result.severity_detailsUDM field. | 
| security_result.severity_details | deviceSeverity | If the levellog field value is notemptythen,levellog field is mapped to thesecurity_result.severity_detailsUDM field.If the crscorelog field value is notemptythen,crscorelog field is mapped to thesecurity_result.severity_detailsUDM field.If the deviceSeveritylog field value is notemptythen,deviceSeveritylog field is mapped to thesecurity_result.severity_detailsUDM field.If the levellog field value is notemptyand if thelevellog field value is equal toerrorand theerrorlog field value is notemptythen,errorlog field is mapped to thesecurity_result.severity_detailsUDM field. Else,level: %{level}log field is mapped to thesecurity_result.severity_detailsUDM field.If the icbseveritylog field value is notemptythen,icbseveritylog field is mapped to thesecurity_result.severity_detailsUDM field. | 
| security_result.severity_details | icbseverity | If the levellog field value is notemptythen,levellog field is mapped to thesecurity_result.severity_detailsUDM field.If the crscorelog field value is notemptythen,crscorelog field is mapped to thesecurity_result.severity_detailsUDM field.If the deviceSeveritylog field value is notemptythen,deviceSeveritylog field is mapped to thesecurity_result.severity_detailsUDM field.If the levellog field value is notemptyand if thelevellog field value is equal toerrorand theerrorlog field value is notemptythen,errorlog field is mapped to thesecurity_result.severity_detailsUDM field. Else,level: %{level}log field is mapped to thesecurity_result.severity_detailsUDM field.If the icbseveritylog field value is notemptythen,icbseveritylog field is mapped to thesecurity_result.severity_detailsUDM field. | 
| security_result.category_details | dtype | If the catdesclog field value is notemptythen,catdesclog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the categorylog field value is notemptythen,categorylog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the filtercatlog field value is notemptythen,filtercatlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the dtypelog field value is notemptythen,dtypelog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the icbverdictlog field value is notemptythen,icbverdictlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the infectionlog field value is notemptythen,infectionlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the catlog field value is notemptythen,catlog field is mapped to thesecurity_result.category_detailsUDM field. | 
| security_result.category_details | category | If the catdesclog field value is notemptythen,catdesclog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the categorylog field value is notemptythen,categorylog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the filtercatlog field value is notemptythen,filtercatlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the dtypelog field value is notemptythen,dtypelog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the icbverdictlog field value is notemptythen,icbverdictlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the infectionlog field value is notemptythen,infectionlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the catlog field value is notemptythen,catlog field is mapped to thesecurity_result.category_detailsUDM field. | 
| security_result.category_details | cat | If the catdesclog field value is notemptythen,catdesclog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the categorylog field value is notemptythen,categorylog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the filtercatlog field value is notemptythen,filtercatlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the dtypelog field value is notemptythen,dtypelog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the icbverdictlog field value is notemptythen,icbverdictlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the infectionlog field value is notemptythen,infectionlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the catlog field value is notemptythen,catlog field is mapped to thesecurity_result.category_detailsUDM field. | 
| security_result.category_details | attack | If the catdesclog field value is notemptythen,catdesclog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the categorylog field value is notemptythen,categorylog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the filtercatlog field value is notemptythen,filtercatlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the dtypelog field value is notemptythen,dtypelog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the icbverdictlog field value is notemptythen,icbverdictlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the infectionlog field value is notemptythen,infectionlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the catlog field value is notemptythen,catlog field is mapped to thesecurity_result.category_detailsUDM field. | 
| security_result.category_details | catdesc | If the catdesclog field value is notemptythen,catdesclog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the categorylog field value is notemptythen,categorylog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the filtercatlog field value is notemptythen,filtercatlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the dtypelog field value is notemptythen,dtypelog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the icbverdictlog field value is notemptythen,icbverdictlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the infectionlog field value is notemptythen,infectionlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the catlog field value is notemptythen,catlog field is mapped to thesecurity_result.category_detailsUDM field. | 
| security_result.category_details | filtercat | If the catdesclog field value is notemptythen,catdesclog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the categorylog field value is notemptythen,categorylog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the filtercatlog field value is notemptythen,filtercatlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the dtypelog field value is notemptythen,dtypelog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the icbverdictlog field value is notemptythen,icbverdictlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the infectionlog field value is notemptythen,infectionlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the catlog field value is notemptythen,catlog field is mapped to thesecurity_result.category_detailsUDM field. | 
| security_result.category_details | icbverdict | If the catdesclog field value is notemptythen,catdesclog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the categorylog field value is notemptythen,categorylog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the filtercatlog field value is notemptythen,filtercatlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the dtypelog field value is notemptythen,dtypelog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the icbverdictlog field value is notemptythen,icbverdictlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the infectionlog field value is notemptythen,infectionlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the catlog field value is notemptythen,catlog field is mapped to thesecurity_result.category_detailsUDM field. | 
| security_result.category_details | infection | If the catdesclog field value is notemptythen,catdesclog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the categorylog field value is notemptythen,categorylog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the filtercatlog field value is notemptythen,filtercatlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the dtypelog field value is notemptythen,dtypelog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the attacklog field value is notemptythen,attacklog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the icbverdictlog field value is notemptythen,icbverdictlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the infectionlog field value is notemptythen,infectionlog field is mapped to thesecurity_result.category_detailsUDM field.Else, if the catlog field value is notemptythen,catlog field is mapped to thesecurity_result.category_detailsUDM field. | 
| metadata.product_event_type | type | If logidlog field value is notemptyand is available in the documentation, then values ofTypeandCategoryare mapped tometadata.product_event_type.Else, if the logidis not documented, it is mapped according to the following logic:If the connection_typelog field value is notemptythen,%{type} - %{subtype} - %{connection_type}log field is mapped to themetadata.product_event_typeUDM field.Else, %{type} - %{subtype}log field is mapped to themetadata.product_event_typeUDM field.If the eventsubtypelog field value is notemptythen,eventsubtypelog field is mapped to themetadata.product_event_typeUDM field. | 
| metadata.product_event_type | subtype | If logidlog field value is notemptyand is available in the documentation, then values ofTypeandCategoryare mapped tometadata.product_event_type.Else, if the logidis not documented, it is mapped according to the following logic:If the connection_typelog field value is notemptythen,%{type} - %{subtype} - %{connection_type}log field is mapped to themetadata.product_event_typeUDM field.Else, %{type} - %{subtype}log field is mapped to themetadata.product_event_typeUDM field.If the eventsubtypelog field value is notemptythen,eventsubtypelog field is mapped to themetadata.product_event_typeUDM field. | 
| metadata.product_event_type | connection_type | If logidlog field value is notemptyand is available in the documentation, then values ofTypeandCategoryare mapped tometadata.product_event_type.Else, if the logidis not documented, it is mapped according to the following logic:If the connection_typelog field value is notemptythen,%{type} - %{subtype} - %{connection_type}log field is mapped to themetadata.product_event_typeUDM field.Else, %{type} - %{subtype}log field is mapped to themetadata.product_event_typeUDM field.If the eventsubtypelog field value is notemptythen,eventsubtypelog field is mapped to themetadata.product_event_typeUDM field. | 
| metadata.product_event_type | eventsubtype | If logidlog field value is notemptyand is available in the documentation, then values ofTypeandCategoryare mapped tometadata.product_event_type.Else, if the logidis not documented, it is mapped according to the following logic:If the connection_typelog field value is notemptythen,%{type} - %{subtype} - %{connection_type}log field is mapped to themetadata.product_event_typeUDM field.Else, %{type} - %{subtype}log field is mapped to themetadata.product_event_typeUDM field.If the eventsubtypelog field value is notemptythen,eventsubtypelog field is mapped to themetadata.product_event_typeUDM field. | 
| metadata.event_type |  | If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafthen, themetadata.event_typeUDM field is set toNETWORK_CONNECTION. if thesubtypelog field value is equal towebfilterand if theservicelog field value contain one of the following values
 metadata.event_typeUDM field is set toNETWORK_HTTP. Else, if thesubtypelog field value is equal tovpnand if theactionlog field value is equal totunnel-statsand thelociplog field value is notemptyor the remiplog field value is notemptythen, themetadata.event_typeUDM field is set toNETWORK_UNCATEGORIZED. Else, if thetypelog field value is equal toeventthen, themetadata.event_typeUDM field is set toSTATUS_UPDATE. Else, if theactionlog field value is equal totunnel-statsthen, themetadata.event_typeUDM field is set toNETWORK_UNCATEGORIZED. Else, if thesubtypelog field value contain one of the following values
 utmeventlog field value is equal toappfirewalland thesubtypelog field value is not equal tosystemthen, themetadata.event_typeUDM field is set toNETWORK_UNCATEGORIZED.Else, if the typelog field value is equal todnsor the typelog field value is equal toutmand thesubtypelog field value is equal todnsthen, themetadata.event_typeUDM field is set toNETWORK_DNS.Else, if the typelog field value is equal toeventand thedhcp_msglog field value is notemptyand if thedhcp_msglog field value is equal toAckthen, themetadata.event_typeUDM field is set toNETWORK_DHCP.Else, if the typelog field value is equal toeventand thesubtypelog field value is equal touserand if theactionlog field value matches the regular expression pattern.logoff.or the actionlog field value is equal toauthenticationand thestatuslog field value is equal tologoutor the actionlog field value is equal toauth-logoutand thestatuslog field value is equal tologoutthen, themetadata.event_typeUDM field is set toUSER_LOGOUT. if theactionlog field value matches the regular expression pattern.logon.or the actionlog field value is equal toauth-logonand thestatuslog field value is equal tologonthen, themetadata.event_typeUDM field is set toUSER_LOGIN.Else, if the actionlog field value is equal tologinthen, themetadata.event_typeUDM field is set toUSER_LOGIN.Else, if the actionlog field value is equal toAddand thesubtypelog field value is equal toAdminand if theuser_idlog field value is notemptyand theuser_emaillog field value is notemptythen, themetadata.event_typeUDM field is set toUSER_CREATION. Else, themetadata.event_typeUDM field is set toUSER_UNCATEGORIZED.If the event_namelog field value contain one of the following values
 or the subtypelog field value contain one of the following values
 metadata.event_typeUDM field is set toSCAN_UNCATEGORIZED.If the userlog field value does not contain one of the following values
 metadata.event_typelog field value is equal toGENERIC_EVENTthen, if thesubtypelog field value is equal tovpnand thetypelog field value is equal toeventthen, themetadata.event_typeUDM field is set toSTATUS_UPDATE. Else, themetadata.event_typeUDM field is set toUSER_UNCATEGORIZED.If the File_namelog field value is notemptyor the Objectlog field value is notemptyor the Objektlog field value is notemptyor the Infected_Resourcelog field value is notemptythen, themetadata.event_typeUDM field is set toPROCESS_UNCATEGORIZED.If the metadata.event_typelog field value matches the regular expression patternGENERIC_EVENTand if thesrciplog field value is notemptyand thedstiplog field value is notemptythen, themetadata.event_typeUDM field is set toNETWORK_UNCATEGORIZED. Else, if thesrciplog field value is notemptythen, themetadata.event_typeUDM field is set toSTATUS_UNCATEGORIZED. Else, if theactionlog field value is equal toDeletethen, themetadata.event_typeUDM field is set toUSER_DELETION. if theactionlog field value is equal toEditthen, themetadata.event_typeUDM field is set toDEVICE_CONFIG_UPDATE. | 
| security_result.description | path | If the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor theactionlog field value matches the regular expression pattern(?i)closethen,UTMAction: %{utmaction}log field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thereasonlog field value is not equal toN/Aand thereasonlog field value is notemptythen,reasonlog field is mapped to thesecurity_result.descriptionUDM field. if thesubtypelog field value is equal towebfilterand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the typelog field value is equal todnsand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal todnsand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the fortiguardresplog field value is notemptythen,fortiguardresplog field is mapped to thesecurity_result.descriptionUDM field.Else, if the malform_desclog field value is notemptythen,malform_desclog field is mapped to thesecurity_result.descriptionUDM field.Else, if the resultlog field value does not contain one of the following values
 resultlog field is mapped to thesecurity_result.descriptionUDM field.Else, if the pathlog field value is notemptythen,pathlog field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tosuccessor the outcomelog field value is equal toREDIRECTED_USER_MAY_PROCEEDor the categoryOutcomelog field value matches the regular expression pattern(/Success|Success)or the cs2log field value matches the regular expression patternAllowthen, thesecurity_result.descriptionUDM field is set toAction: ALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tofailureor the statuslog field value is equal tofailedor the outcomelog field value is equal toBLOCKEDor the categoryOutcomelog field value matches the regular expression pattern(/Failure|Failed)or the cs2log field value matches the regular expression patternDeniedthen, thesecurity_result.descriptionUDM field is set toAction: BLOCK.Else, if the outcomelog field value matches the regular expression patternFailurethen, thesecurity_result.descriptionUDM field is set toAction: FAIL. | 
| security_result.description | result | If the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor theactionlog field value matches the regular expression pattern(?i)closethen,UTMAction: %{utmaction}log field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thereasonlog field value is not equal toN/Aand thereasonlog field value is notemptythen,reasonlog field is mapped to thesecurity_result.descriptionUDM field. if thesubtypelog field value is equal towebfilterand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the typelog field value is equal todnsand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal todnsand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the fortiguardresplog field value is notemptythen,fortiguardresplog field is mapped to thesecurity_result.descriptionUDM field.Else, if the malform_desclog field value is notemptythen,malform_desclog field is mapped to thesecurity_result.descriptionUDM field.Else, if the resultlog field value does not contain one of the following values
 resultlog field is mapped to thesecurity_result.descriptionUDM field.Else, if the pathlog field value is notemptythen,pathlog field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tosuccessor the outcomelog field value is equal toREDIRECTED_USER_MAY_PROCEEDor the categoryOutcomelog field value matches the regular expression pattern(/Success|Success)or the cs2log field value matches the regular expression patternAllowthen, thesecurity_result.descriptionUDM field is set toAction: ALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tofailureor the statuslog field value is equal tofailedor the outcomelog field value is equal toBLOCKEDor the categoryOutcomelog field value matches the regular expression pattern(/Failure|Failed)or the cs2log field value matches the regular expression patternDeniedthen, thesecurity_result.descriptionUDM field is set toAction: BLOCK.Else, if the outcomelog field value matches the regular expression patternFailurethen, thesecurity_result.descriptionUDM field is set toAction: FAIL. | 
| security_result.description | reason | If the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor theactionlog field value matches the regular expression pattern(?i)closethen,UTMAction: %{utmaction}log field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thereasonlog field value is not equal toN/Aand thereasonlog field value is notemptythen,reasonlog field is mapped to thesecurity_result.descriptionUDM field. if thesubtypelog field value is equal towebfilterand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the typelog field value is equal todnsand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal todnsand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the fortiguardresplog field value is notemptythen,fortiguardresplog field is mapped to thesecurity_result.descriptionUDM field.Else, if the malform_desclog field value is notemptythen,malform_desclog field is mapped to thesecurity_result.descriptionUDM field.Else, if the resultlog field value does not contain one of the following values
 resultlog field is mapped to thesecurity_result.descriptionUDM field.Else, if the pathlog field value is notemptythen,pathlog field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tosuccessor the outcomelog field value is equal toREDIRECTED_USER_MAY_PROCEEDor the categoryOutcomelog field value matches the regular expression pattern(/Success|Success)or the cs2log field value matches the regular expression patternAllowthen, thesecurity_result.descriptionUDM field is set toAction: ALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tofailureor the statuslog field value is equal tofailedor the outcomelog field value is equal toBLOCKEDor the categoryOutcomelog field value matches the regular expression pattern(/Failure|Failed)or the cs2log field value matches the regular expression patternDeniedthen, thesecurity_result.descriptionUDM field is set toAction: BLOCK.Else, if the outcomelog field value matches the regular expression patternFailurethen, thesecurity_result.descriptionUDM field is set toAction: FAIL. | 
| security_result.description | fortiguardresp | If the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor theactionlog field value matches the regular expression pattern(?i)closethen,UTMAction: %{utmaction}log field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thereasonlog field value is not equal toN/Aand thereasonlog field value is notemptythen,reasonlog field is mapped to thesecurity_result.descriptionUDM field. if thesubtypelog field value is equal towebfilterand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the typelog field value is equal todnsand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal todnsand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the fortiguardresplog field value is notemptythen,fortiguardresplog field is mapped to thesecurity_result.descriptionUDM field.Else, if the malform_desclog field value is notemptythen,malform_desclog field is mapped to thesecurity_result.descriptionUDM field.Else, if the resultlog field value does not contain one of the following values
 resultlog field is mapped to thesecurity_result.descriptionUDM field.Else, if the pathlog field value is notemptythen,pathlog field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tosuccessor the outcomelog field value is equal toREDIRECTED_USER_MAY_PROCEEDor the categoryOutcomelog field value matches the regular expression pattern(/Success|Success)or the cs2log field value matches the regular expression patternAllowthen, thesecurity_result.descriptionUDM field is set toAction: ALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tofailureor the statuslog field value is equal tofailedor the outcomelog field value is equal toBLOCKEDor the categoryOutcomelog field value matches the regular expression pattern(/Failure|Failed)or the cs2log field value matches the regular expression patternDeniedthen, thesecurity_result.descriptionUDM field is set toAction: BLOCK.Else, if the outcomelog field value matches the regular expression patternFailurethen, thesecurity_result.descriptionUDM field is set toAction: FAIL. | 
| security_result.description | malform_desc | If the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor theactionlog field value matches the regular expression pattern(?i)closethen,UTMAction: %{utmaction}log field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thereasonlog field value is not equal toN/Aand thereasonlog field value is notemptythen,reasonlog field is mapped to thesecurity_result.descriptionUDM field. if thesubtypelog field value is equal towebfilterand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the typelog field value is equal todnsand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal todnsand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the fortiguardresplog field value is notemptythen,fortiguardresplog field is mapped to thesecurity_result.descriptionUDM field.Else, if the malform_desclog field value is notemptythen,malform_desclog field is mapped to thesecurity_result.descriptionUDM field.Else, if the resultlog field value does not contain one of the following values
 resultlog field is mapped to thesecurity_result.descriptionUDM field.Else, if the pathlog field value is notemptythen,pathlog field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tosuccessor the outcomelog field value is equal toREDIRECTED_USER_MAY_PROCEEDor the categoryOutcomelog field value matches the regular expression pattern(/Success|Success)or the cs2log field value matches the regular expression patternAllowthen, thesecurity_result.descriptionUDM field is set toAction: ALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tofailureor the statuslog field value is equal tofailedor the outcomelog field value is equal toBLOCKEDor the categoryOutcomelog field value matches the regular expression pattern(/Failure|Failed)or the cs2log field value matches the regular expression patternDeniedthen, thesecurity_result.descriptionUDM field is set toAction: BLOCK.Else, if the outcomelog field value matches the regular expression patternFailurethen, thesecurity_result.descriptionUDM field is set toAction: FAIL. | 
| security_result.description | msg | If the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor theactionlog field value matches the regular expression pattern(?i)closethen,UTMAction: %{utmaction}log field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thereasonlog field value is not equal toN/Aand thereasonlog field value is notemptythen,reasonlog field is mapped to thesecurity_result.descriptionUDM field. if thesubtypelog field value is equal towebfilterand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the typelog field value is equal todnsand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal todnsand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the fortiguardresplog field value is notemptythen,fortiguardresplog field is mapped to thesecurity_result.descriptionUDM field.Else, if the malform_desclog field value is notemptythen,malform_desclog field is mapped to thesecurity_result.descriptionUDM field.Else, if the resultlog field value does not contain one of the following values
 resultlog field is mapped to thesecurity_result.descriptionUDM field.Else, if the pathlog field value is notemptythen,pathlog field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tosuccessor the outcomelog field value is equal toREDIRECTED_USER_MAY_PROCEEDor the categoryOutcomelog field value matches the regular expression pattern(/Success|Success)or the cs2log field value matches the regular expression patternAllowthen, thesecurity_result.descriptionUDM field is set toAction: ALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tofailureor the statuslog field value is equal tofailedor the outcomelog field value is equal toBLOCKEDor the categoryOutcomelog field value matches the regular expression pattern(/Failure|Failed)or the cs2log field value matches the regular expression patternDeniedthen, thesecurity_result.descriptionUDM field is set toAction: BLOCK.Else, if the outcomelog field value matches the regular expression patternFailurethen, thesecurity_result.descriptionUDM field is set toAction: FAIL. | 
| security_result.description | catdesc | If the utmactionlog field value matches the regular expression pattern(?i)blockand if theactionlog field value matches the regular expression pattern(?i)acceptor theactionlog field value matches the regular expression pattern(?i)closethen,UTMAction: %{utmaction}log field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal towebfilteror the typelog field value is equal toutmand thesubtypelog field value is equal toapp-ctrlor the typelog field value is equal toeventand thesubtypelog field value is equal tovpnor the typelog field value is equal toutmand thesubtypelog field value is equal tovirusor the typelog field value is equal toutmand thesubtypelog field value is equal tosslor the typelog field value is equal toutmand thesubtypelog field value is equal tovoipor the typelog field value is equal toutmand thesubtypelog field value is equal toipsor the typelog field value is equal toeventand thesubtypelog field value is equal towador the typelog field value is equal toanomalyand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal toanomalyor the typelog field value is equal toutmand thesubtypelog field value is equal towafand if thereasonlog field value is not equal toN/Aand thereasonlog field value is notemptythen,reasonlog field is mapped to thesecurity_result.descriptionUDM field. if thesubtypelog field value is equal towebfilterand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the typelog field value is equal todnsand thesubtypelog field value contain one of the following values
 or the typelog field value is equal toutmand thesubtypelog field value is equal todnsand if thecatdesclog field value is notemptythen,%{msg} - URL Category: %{catdesc}log field is mapped to thesecurity_result.descriptionUDM field.Else, if the fortiguardresplog field value is notemptythen,fortiguardresplog field is mapped to thesecurity_result.descriptionUDM field.Else, if the malform_desclog field value is notemptythen,malform_desclog field is mapped to thesecurity_result.descriptionUDM field.Else, if the resultlog field value does not contain one of the following values
 resultlog field is mapped to thesecurity_result.descriptionUDM field.Else, if the pathlog field value is notemptythen,pathlog field is mapped to thesecurity_result.descriptionUDM field.Else, If the typelog field value is equal totrafficand thesubtypelog field value is equal toforwardand if theactionlog field value matches the regular expression pattern(?i)timeoutthen, thesecurity_result.actionUDM field is set toALLOW.Else, if the typelog field value is equal totrafficand thesubtypelog field value is equal tolocaland if theactionlog field value matches the regular expression patterntimeoutandrcvdpkt> 0 then, thesecurity_result.actionUDM field is set toALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tosuccessor the outcomelog field value is equal toREDIRECTED_USER_MAY_PROCEEDor the categoryOutcomelog field value matches the regular expression pattern(/Success|Success)or the cs2log field value matches the regular expression patternAllowthen, thesecurity_result.descriptionUDM field is set toAction: ALLOW.Else, if the actionlog field value contain one of the following values
 or the utmactionlog field value contain one of the following values
 or the statuslog field value is equal tofailureor the statuslog field value is equal tofailedor the outcomelog field value is equal toBLOCKEDor the categoryOutcomelog field value matches the regular expression pattern(/Failure|Failed)or the cs2log field value matches the regular expression patternDeniedthen, thesecurity_result.descriptionUDM field is set toAction: BLOCK.Else, if the outcomelog field value matches the regular expression patternFailurethen, thesecurity_result.descriptionUDM field is set toAction: FAIL. | 
| additional.fields | ssid | Updated the mapping from additional.fieldstoprincipal.asset.attribute.labelsUDM field. | 
| additional.fields[audittime] | audittime | Updated the mapping from additional.fieldstosecurity_result.detection_fieldsUDM field. | 
| security_result.severity | crlevel | If the logidlog field value is notemptyand is available in the documentation, then based on the value ofSeverity, thesecurity_result.severityfield will be mapped as per the following logic:If the Severitylog field value is equal toNoticethen, thesecurity_result.severityUDM field is set toLOW.Else, if the Severitylog field value is equal toWarningthen, thesecurity_result.severityUDM field is set toHIGH.Else, if the Severitylog field value is equal toErrorthen, thesecurity_result.severityUDM field is set toError.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL.If the logidis not present in the documentation, it will be mapped as per the following logic:If the severitylog field value is notemptyand if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toLOW. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toMEDIUM. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toHIGH. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the crlevellog field value is notemptyand if thecrlevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if thecrlevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thecrlevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thecrlevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL.Else, if the levellog field value is notemptyand if thelevellog field value matches the regular expression pattern(?i)(warning)then, thesecurity_result.severityUDM field is set toHIGH. Else, if thelevellog field value matches the regular expression pattern(?i)noticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thelevellog field value matches the regular expression pattern(?i)(information|info)then, thesecurity_result.severityUDM field is set toINFORMATIONAL.Else, if the deviceSeveritylog field value is notemptyand if thedeviceSeveritylog field value is equal towarningthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thedeviceSeveritylog field value is equal tonoticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thedeviceSeveritylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL. if thedeviceSeveritylog field value is equal toerrorthen, thesecurity_result.severityUDM field is set toERROR.Else, if the fsaverdictlog field value is notemptyand if thefsaverdictlog field value matches the regular expression patternlow riskthen, thesecurity_result.severityUDM field is set toLOW. Else, if thefsaverdictlog field value matches the regular expression patternmed riskthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thefsaverdictlog field value matches the regular expression patternhigh riskthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thefsaverdictlog field value matches the regular expression patternclearthen, thesecurity_result.severityUDM field is set toNONE.Else, if the infectedfilelevellog field value is notemptyand if theinfectedfilelevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL. | 
| security_result.severity | level | If the logidlog field value is notemptyand is available in the documentation, then based on the value ofSeverity, thesecurity_result.severityfield will be mapped as per the following logic:If the Severitylog field value is equal toNoticethen, thesecurity_result.severityUDM field is set toLOW.Else, if the Severitylog field value is equal toWarningthen, thesecurity_result.severityUDM field is set toHIGH.Else, if the Severitylog field value is equal toErrorthen, thesecurity_result.severityUDM field is set toError.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL.If the logidis not present in the documentation, it will be mapped as per the following logic:If the severitylog field value is notemptyand if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toLOW. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toMEDIUM. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toHIGH. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the crlevellog field value is notemptyand if thecrlevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if thecrlevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thecrlevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thecrlevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL.Else, if the levellog field value is notemptyand if thelevellog field value matches the regular expression pattern(?i)(warning)then, thesecurity_result.severityUDM field is set toHIGH. Else, if thelevellog field value matches the regular expression pattern(?i)noticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thelevellog field value matches the regular expression pattern(?i)(information|info)then, thesecurity_result.severityUDM field is set toINFORMATIONAL.Else, if the deviceSeveritylog field value is notemptyand if thedeviceSeveritylog field value is equal towarningthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thedeviceSeveritylog field value is equal tonoticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thedeviceSeveritylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL. if thedeviceSeveritylog field value is equal toerrorthen, thesecurity_result.severityUDM field is set toERROR.Else, if the fsaverdictlog field value is notemptyand if thefsaverdictlog field value matches the regular expression patternlow riskthen, thesecurity_result.severityUDM field is set toLOW. Else, if thefsaverdictlog field value matches the regular expression patternmed riskthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thefsaverdictlog field value matches the regular expression patternhigh riskthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thefsaverdictlog field value matches the regular expression patternclearthen, thesecurity_result.severityUDM field is set toNONE.Else, if the infectedfilelevellog field value is notemptyand if theinfectedfilelevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL. | 
| security_result.severity | deviceSeverity | If the logidlog field value is notemptyand is available in the documentation, then based on the value ofSeverity, thesecurity_result.severityfield will be mapped as per the following logic:If the Severitylog field value is equal toNoticethen, thesecurity_result.severityUDM field is set toLOW.Else, if the Severitylog field value is equal toWarningthen, thesecurity_result.severityUDM field is set toHIGH.Else, if the Severitylog field value is equal toErrorthen, thesecurity_result.severityUDM field is set toError.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL.If the logidis not present in the documentation, it will be mapped as per the following logic:If the severitylog field value is notemptyand if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toLOW. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toMEDIUM. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toHIGH. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the crlevellog field value is notemptyand if thecrlevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if thecrlevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thecrlevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thecrlevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL.Else, if the levellog field value is notemptyand if thelevellog field value matches the regular expression pattern(?i)(warning)then, thesecurity_result.severityUDM field is set toHIGH. Else, if thelevellog field value matches the regular expression pattern(?i)noticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thelevellog field value matches the regular expression pattern(?i)(information|info)then, thesecurity_result.severityUDM field is set toINFORMATIONAL.Else, if the deviceSeveritylog field value is notemptyand if thedeviceSeveritylog field value is equal towarningthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thedeviceSeveritylog field value is equal tonoticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thedeviceSeveritylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL. if thedeviceSeveritylog field value is equal toerrorthen, thesecurity_result.severityUDM field is set toERROR.Else, if the fsaverdictlog field value is notemptyand if thefsaverdictlog field value matches the regular expression patternlow riskthen, thesecurity_result.severityUDM field is set toLOW. Else, if thefsaverdictlog field value matches the regular expression patternmed riskthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thefsaverdictlog field value matches the regular expression patternhigh riskthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thefsaverdictlog field value matches the regular expression patternclearthen, thesecurity_result.severityUDM field is set toNONE.Else, if the infectedfilelevellog field value is notemptyand if theinfectedfilelevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL. | 
| security_result.severity | fsaverdict | If the logidlog field value is notemptyand is available in the documentation, then based on the value ofSeverity, thesecurity_result.severityfield will be mapped as per the following logic:If the Severitylog field value is equal toNoticethen, thesecurity_result.severityUDM field is set toLOW.Else, if the Severitylog field value is equal toWarningthen, thesecurity_result.severityUDM field is set toHIGH.Else, if the Severitylog field value is equal toErrorthen, thesecurity_result.severityUDM field is set toError.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL.If the logidis not present in the documentation, it will be mapped as per the following logic:If the severitylog field value is notemptyand if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toLOW. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toMEDIUM. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toHIGH. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the crlevellog field value is notemptyand if thecrlevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if thecrlevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thecrlevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thecrlevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL.Else, if the levellog field value is notemptyand if thelevellog field value matches the regular expression pattern(?i)(warning)then, thesecurity_result.severityUDM field is set toHIGH. Else, if thelevellog field value matches the regular expression pattern(?i)noticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thelevellog field value matches the regular expression pattern(?i)(information|info)then, thesecurity_result.severityUDM field is set toINFORMATIONAL.Else, if the deviceSeveritylog field value is notemptyand if thedeviceSeveritylog field value is equal towarningthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thedeviceSeveritylog field value is equal tonoticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thedeviceSeveritylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL. if thedeviceSeveritylog field value is equal toerrorthen, thesecurity_result.severityUDM field is set toERROR.Else, if the fsaverdictlog field value is notemptyand if thefsaverdictlog field value matches the regular expression patternlow riskthen, thesecurity_result.severityUDM field is set toLOW. Else, if thefsaverdictlog field value matches the regular expression patternmed riskthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thefsaverdictlog field value matches the regular expression patternhigh riskthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thefsaverdictlog field value matches the regular expression patternclearthen, thesecurity_result.severityUDM field is set toNONE.Else, if the infectedfilelevellog field value is notemptyand if theinfectedfilelevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL. | 
| security_result.severity | infectedfilelevel | If the logidlog field value is notemptyand is available in the documentation, then based on the value ofSeverity, thesecurity_result.severityfield will be mapped as per the following logic:If the Severitylog field value is equal toNoticethen, thesecurity_result.severityUDM field is set toLOW.Else, if the Severitylog field value is equal toWarningthen, thesecurity_result.severityUDM field is set toHIGH.Else, if the Severitylog field value is equal toErrorthen, thesecurity_result.severityUDM field is set toError.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the Severitylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL.If the logidis not present in the documentation, it will be mapped as per the following logic:If the severitylog field value is notemptyand if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toLOW. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toMEDIUM. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toHIGH. Else, if theseveritylog field value contain one of the following values
 security_result.severityUDM field is set toCRITICAL.Else, if the crlevellog field value is notemptyand if thecrlevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if thecrlevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thecrlevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thecrlevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL.Else, if the levellog field value is notemptyand if thelevellog field value matches the regular expression pattern(?i)(warning)then, thesecurity_result.severityUDM field is set toHIGH. Else, if thelevellog field value matches the regular expression pattern(?i)noticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thelevellog field value matches the regular expression pattern(?i)(information|info)then, thesecurity_result.severityUDM field is set toINFORMATIONAL.Else, if the deviceSeveritylog field value is notemptyand if thedeviceSeveritylog field value is equal towarningthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thedeviceSeveritylog field value is equal tonoticethen, thesecurity_result.severityUDM field is set toLOW. Else, if thedeviceSeveritylog field value contain one of the following values
 security_result.severityUDM field is set toINFORMATIONAL. if thedeviceSeveritylog field value is equal toerrorthen, thesecurity_result.severityUDM field is set toERROR.Else, if the fsaverdictlog field value is notemptyand if thefsaverdictlog field value matches the regular expression patternlow riskthen, thesecurity_result.severityUDM field is set toLOW. Else, if thefsaverdictlog field value matches the regular expression patternmed riskthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if thefsaverdictlog field value matches the regular expression patternhigh riskthen, thesecurity_result.severityUDM field is set toHIGH. Else, if thefsaverdictlog field value matches the regular expression patternclearthen, thesecurity_result.severityUDM field is set toNONE.Else, if the infectedfilelevellog field value is notemptyand if theinfectedfilelevellog field value matches the regular expression pattern(?i)Lowthen, thesecurity_result.severityUDM field is set toLOW. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Mediumthen, thesecurity_result.severityUDM field is set toMEDIUM. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Highthen, thesecurity_result.severityUDM field is set toHIGH. Else, if theinfectedfilelevellog field value matches the regular expression pattern(?i)Criticalthen, thesecurity_result.severityUDM field is set toCRITICAL. | 
¿Necesitas más ayuda? Recibe respuestas de los miembros de la comunidad y de los profesionales de Google SecOps.