SentinelOne のアラートログを収集する
このドキュメントでは、Google Security Operations フィードを設定して SentinelOne アラートログを収集する方法と、ログフィールドが Google SecOps 統合データモデル(UDM)フィールドにマッピングされる方法について説明します。
詳細については、Google Security Operations へのデータの取り込みの概要をご覧ください。
一般的なデプロイは、SentinelOne Alert と、Google SecOps にログを送信するように構成された Google SecOps フィードで構成されます。デプロイの内容はお客様によってさまざまであり、より複雑になる場合もあります。
デプロイには次のコンポーネントが含まれます。
- SentinelOne: ログの収集元となるプロダクト。 
- Google SecOps フィード: SentinelOne からログを取得して Google SecOps に書き込む Google SecOps フィード。 
- Google SecOps: Google SecOps は、SentinelOne のログを保持して分析します。 
取り込みラベルによって、未加工のログデータを構造化 UDM 形式に正規化するパーサーが識別されます。このドキュメントの情報は、取り込みラベル SENTINELONE_ALERT が付加されたパーサーに適用されます。
始める前に
次の前提条件を満たしていることを確認してください。
- SentinelOne の有効な Singularity Complete サブスクリプション。詳細については、プラットフォーム パッケージを参照してください。
- GET Alerts API と GET Threats API の v2.1
- グローバル レベルまたはアカウント レベルの管理者ロール。管理者のロールを取得するには、管理者ユーザーにお問い合わせください。
- SentinelOne エージェントをインストールするための管理者権限。管理者権限を取得するには、管理者ユーザーにお問い合わせください。
SentinelOne を設定する方法:
API トークンを生成する手順は次のとおりです。 1. SentinelOne 管理コンソールで [Settings] に移動し、[Users] をクリックします。1. API トークンを生成する管理者ユーザーをクリックします。1. [Actions] > [API token operations] > [Generate API token] をクリックします。この API トークンは、Google SecOps プラットフォームの [Authentication HTTP headers] に入力するために必要です。
フィードを設定する
Google SecOps プラットフォームでフィードを設定するには、次の 2 つのエントリ ポイントがあります。
- [SIEM 設定] > [フィード] > [新しいフィードを追加]
- Content Hub > Content Packs > Get Started
SentinelOne アラート フィードを設定する方法
- [SentinelOne] パックをクリックします。
- [SentinelOne Alerts] ログタイプを見つけます。
- 次のフィールドに値を指定します。
- ソースタイプ: サードパーティ API(推奨)
- Authentication HTTP headers: SentinelOne プラットフォームで生成した API トークンを入力します。
- API ホスト名: SentinelOne プラットフォームのホスト名
- 最初の開始時間: アラートの取得を開始する時間
- Is alert API subscribed(アラート API が登録されているかどうか): アラート AOI がお客様によって登録されているかどうか
 詳細オプション 
- フィード名: フィードを識別する事前入力された値。
- アセットの名前空間: フィードに関連付けられた名前空間。
- Ingestion Labels: このフィードのすべてのイベントに適用されるラベル。
- [フィードを作成] をクリックします。
このプロダクト ファミリー内の異なるログタイプに対して複数のフィードを構成する方法については、プロダクト別にフィードを構成するをご覧ください。
サポートされている SentinelOne のアラートログ タイプ
SentinelOne アラート パーサーは、アラートと脅威のログタイプをサポートしています。
サポートされている SentinelOne のアラートログ形式
SentinelOne アラート パーサーは、JSON 形式と CEF 形式の両方のログをサポートしています。
サポートされている SentinelOne アラートのサンプルログ
- JSON - { "accountId": "1235512064263015539", "accountName": "dummy", "agentComputerName": "dummy", "agentDomain": "WORKGROUP", "agentId": "1245680559492378683", "agentInfected": false, "agentIp": "198.51.100.0", "agentIsActive": false, "agentIsDecommissioned": true, "agentMachineType": "server", "agentNetworkStatus": "disconnecting", "agentOsType": "windows", "agentVersion": "21.6.2.272", "annotation": "Automatically resolved by SentinelOne Console", "automaticallyResolved": true, "browserType": null, "certId": "", "classification": "Malware", "classificationSource": "Static", "classifierName": "MANUAL", "cloudVerdict": null, "collectionId": "1251555311751427932", "commandId": "1251555264615838432", "createdAt": "2022-09-03T19:36:59.540349Z", "createdDate": "2021-09-23T19:36:57.867000Z", "description": "malware detected - not mitigated yet (cmd.exe (interactive session))", "engines": [ "manual" ], "external_ticket_id": null, "fileContentHash": "c3d10d8d9fce936e5ca32f930f20c8e703619f71", "fileCreatedDate": null, "fileDisplayName": "Unknown file", "fileExtensionType": "None", "fileIsDotNet": null, "fileIsExecutable": false, "fileIsSystem": false, "fileMaliciousContent": null, "fileObjectId": "3EFA3EFA3EFA3EFA", "filePath": "/home/gitlab-runner/webshell_hits/old.hits-go-here/fedcd896ef45bf145d7e880edd4e5390.dll", "fileSha256": null, "fileVerificationType": "NotSigned", "fromCloud": false, "fromScan": false, "id": "1251555311717873499", "indicators": [ { "categoryName": "test Hiding/Stealthiness", "description": "This binary may have Anti-sandboxing capabilities to evade detection in sandbox tools", "id": 126 }, { "categoryName": "Hiding/Stealthiness", "description": "sample desc There are signs of a backdoor in the PE header", "id": 127 }, { "categoryName": "Test category name Hiding/Stealthiness", "description": "This binary might try to schedule a task or modify a scheduled task", "id": 129 } ], "initiatedBy": "dvCommand", "initiatedByDescription": "Deep Visibility Command", "initiatingUserId": "1245152494739966182", "isCertValid": false, "isInteractiveSession": true, "isPartialStory": false, "maliciousGroupId": "DEA2CA314B3AB7E4", "maliciousProcessArguments": "", "markedAsBenign": true, "mitigationMode": "protect", "mitigationReport": { "kill": { "status": "success" }, "network_quarantine": { "status": null }, "quarantine": { "status": "success" }, "remediate": { "status": null }, "rollback": { "status": null }, "unquarantine": { "status": null } }, "mitigationStatus": "mitigated", "publisher": "", "rank": null, "resolved": true, "siteId": "1235512064330124404", "siteName": "Default site", "threatAgentVersion": "21.6.2.272", "threatName": "cmd.exe (interactive session)", "updatedAt": "2021-10-23T20:34:15.668440Z", "username": "dummy\\\\Administrator", "whiteningOptions": [] }
- CEF - <86>Nov 5 11:53:06 abcdefg sshd[1475549]: reprocess config line 158: Deprecated option RhostsRSAAuthentication
フィールド マッピング リファレンス
このセクションでは、Google SecOps パーサーが SentinelOne アラート フィールドを Google SecOps Unified Data Model(UDM)フィールドにマッピングする方法について説明します。
フィールド マッピング リファレンス: イベント識別子からイベントタイプへ
次の表に、SENTINELONE_ALERT ログタイプと対応する UDM のイベントの種類を示します。
| Event Identifier | Event Type | Security Category | 
|---|---|---|
| BEHAVIORALINDICATORS | SCAN_UNCATEGORIZED | SOFTWARE_MALICIOUS | 
| DNS | NETWORK_DNS |  | 
| DUPLICATEPROCESS | PROCESS_UNCATEGORIZED |  | 
| FILECREATION | FILE_CREATION |  | 
| FILEDELETION | FILE_DELETION |  | 
| FILEMODIFICATION | FILE_MODIFICATION |  | 
| FILERENAME | FILE_MODIFICATION |  | 
| FILESCAN | SCAN_FILE |  | 
| HTTP | NETWORK_HTTP |  | 
| MALICIOUSFILE | SCAN_FILE | SOFTWARE_MALICIOUS | 
| OPENPROCESS | PROCESS_OPEN |  | 
| PROCESSCREATION | PROCESS_LAUNCH |  | 
| REGKEYCREATE | REGISTRY_CREATION |  | 
| REGKEYDELETE | REGISTRY_DELETION |  | 
| REGVALUECREATE | REGISTRY_CREATION |  | 
| REGVALUEDELETE | REGISTRY_DELETION |  | 
| REGVALUEMODIFIED | REGISTRY_MODIFICATION |  | 
| SCHEDTASKSTART | SERVICE_START |  | 
| SCHEDTASKTRIGGER | SERVICE_START |  | 
| SCHEDTASKUPDATE | SERVICE_MODIFICATION |  | 
| SCRIPTS | FILE_UNCATEGORIZED |  | 
| TCPV4 | NETWORK_UNCATEGORIZED |  | 
| TCPV4LISTEN | NETWORK_UNCATEGORIZED |  | 
| WINLOGONATTEMPT | USER_LOGIN |  | 
| If the threatInfo.filePathlog field is not empty or thethreatInfo.fileSizelog field value is not empty, then themetadata.event_typeUDM field is set toFILE_UNCATEGORIZED. | FILE_UNCATEGORIZED |  | 
フィールド マッピング リファレンス: SENTINELONE_ALERT
次の表に、SENTINELONE_ALERT ログタイプのログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
|  | metadata.vendor_name | |
|  | metadata.product_name | |
|  | metadata.url_back_to_product | If the threatInfo.threatIdlog field value is not empty and thesource_hostnamelog field value is not empty, then thehttps://source_hostname/incidents/threats/threatInfo.threatId/overviewlog field is mapped to themetadata.url_back_to_productUDM field.Else, if the source_hostnamelog field value is not empty, then thehttps://source_hostnamelog field is mapped to themetadata.url_back_to_productUDM field. | 
| agentDetectionInfo.machineType | principal.asset.type | If the agentDetectionInfo.machineTypelog field value matches the regular expression patternlaptop, then theprincipal.asset.typeUDM field is set toLAPTOP.Else, if the agentDetectionInfo.machineTypelog field value matches the regular expression patterndesktop, then theprincipal.asset.typeUDM field is set toWORKSTATION.Else, if the agentDetectionInfo.machineTypelog field value matches the regular expression patternserver, then theprincipal.asset.typeUDM field is set toSERVER.Else, the agentDetectionInfo.machineTypelog field is mapped to theprincipal.asset.attribute.labels.agent_detection_info_machine_typeUDM field. | 
| agentRealtimeInfo.agentMachineType | principal.asset.type | If the agentDetectionInfo.machineTypelog field value is empty and theagentRealtimeInfo.agentMachineTypelog field value is not empty , then:
 | 
| agentRealtimeInfo.machineType | principal.asset.type | If the agentDetectionInfo.machineTypelog field value is empty and theagentRealtimeInfo.agentMachineTypelog field value is empty and theagentRealtimeInfo.machineTypelog field value is not empty , then:
 | 
| agentDetectionInfo.name | principal.hostname | If the agentDetectionInfo.namelog field value is not empty, then theagentDetectionInfo.namelog field is mapped to theprincipal.hostnameUDM field.Else, if the agentRealtimeInfo.agentComputerNamelog field value is not empty, then theagentRealtimeInfo.agentComputerNamelog field is mapped to theprincipal.hostnameUDM field.Else, if the agentRealtimeInfo.namelog field value is not empty, then theagentRealtimeInfo.namelog field is mapped to theprincipal.hostnameUDM field. | 
| agentRealtimeInfo.agentComputerName | principal.hostname | If the agentDetectionInfo.namelog field value is not empty, then theagentDetectionInfo.namelog field is mapped to theprincipal.hostnameUDM field.Else, if the agentRealtimeInfo.agentComputerNamelog field value is not empty, then theagentRealtimeInfo.agentComputerNamelog field is mapped to theprincipal.hostnameUDM field.Else, if the agentRealtimeInfo.namelog field value is not empty, then theagentRealtimeInfo.namelog field is mapped to theprincipal.hostnameUDM field. | 
| agentRealtimeInfo.name | principal.hostname | If the agentDetectionInfo.namelog field value is not empty, then theagentDetectionInfo.namelog field is mapped to theprincipal.hostnameUDM field.Else, if the agentRealtimeInfo.agentComputerNamelog field value is not empty, then theagentRealtimeInfo.agentComputerNamelog field is mapped to theprincipal.hostnameUDM field.Else, if the agentRealtimeInfo.namelog field value is not empty, then theagentRealtimeInfo.namelog field is mapped to theprincipal.hostnameUDM field. | 
| agentDetectionInfo.name | principal.asset.hostname | If the agentDetectionInfo.namelog field value is not empty, then theagentDetectionInfo.namelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the agentRealtimeInfo.agentComputerNamelog field value is not empty, then theagentRealtimeInfo.agentComputerNamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the agentRealtimeInfo.namelog field value is not empty, then theagentRealtimeInfo.namelog field is mapped to theprincipal.asset.hostnameUDM field. | 
| agentRealtimeInfo.agentComputerName | principal.asset.hostname | If the agentDetectionInfo.namelog field value is not empty, then theagentDetectionInfo.namelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the agentRealtimeInfo.agentComputerNamelog field value is not empty, then theagentRealtimeInfo.agentComputerNamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the agentRealtimeInfo.namelog field value is not empty, then theagentRealtimeInfo.namelog field is mapped to theprincipal.asset.hostnameUDM field. | 
| agentRealtimeInfo.name | principal.asset.hostname | If the agentDetectionInfo.namelog field value is not empty, then theagentDetectionInfo.namelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the agentRealtimeInfo.agentComputerNamelog field value is not empty, then theagentRealtimeInfo.agentComputerNamelog field is mapped to theprincipal.asset.hostnameUDM field.Else, if the agentRealtimeInfo.namelog field value is not empty, then theagentRealtimeInfo.namelog field is mapped to theprincipal.asset.hostnameUDM field. | 
| agentDetectionInfo.osFamily | principal.asset.platform_software.platform | If the agentDetectionInfo.osFamilylog field value matches the regular expression pattern(?i)win, then theprincipal.asset.platform_software.platformUDM field is set toWINDOWS.Else, if the agentDetectionInfo.osFamilylog field value matches the regular expression pattern(?i)lin, then theprincipal.asset.platform_software.platformUDM field is set toLINUX.Else, the agentDetectionInfo.osFamilylog field is mapped to theprincipal.asset.attribute.labels.agent_detection_info_os_familyUDM field. | 
| agentRealtimeInfo.os | principal.asset.platform_software.platform | If the agentDetectionInfo.osFamilylog field value is empty and theagentRealtimeInfo.oslog field value is not empty , then:
 | 
| agentDetectionInfo.osFamily | principal.platform | If the agentDetectionInfo.osFamilylog field value matches the regular expression pattern(?i)win, then theprincipal.platformUDM field is set toWINDOWS.Else, if the agentDetectionInfo.osFamilylog field value matches the regular expression pattern(?i)lin, then theprincipal.platformUDM field is set toLINUX | 
| agentRealtimeInfo.os | principal.platform | If the agentDetectionInfo.osFamilylog field value is empty and theagentRealtimeInfo.oslog field value is not empty , then:
 | 
| agentDetectionInfo.osName | principal.asset.platform_software.platform_version | If the agentDetectionInfo.osNamelog field value is not empty, then theagentDetectionInfo.osNamelog field is mapped to theprincipal.asset.platform_software.platform_versionUDM field.Else, if the agentDetectionInfo.agentOsNamelog field value is not empty, then theagentDetectionInfo.agentOsNamelog field is mapped to theprincipal.asset.platform_software.platform_versionUDM field.Else, if the agentRealtimeInfo.agentOsNamelog field value is not empty, then theagentRealtimeInfo.agentOsNamelog field is mapped to theprincipal.asset.platform_software.platform_versionUDM field. | 
| agentDetectionInfo.agentOsName | principal.asset.platform_software.platform_version | If the agentDetectionInfo.osNamelog field value is not empty, then theagentDetectionInfo.osNamelog field is mapped to theprincipal.asset.platform_software.platform_versionUDM field.Else, if the agentDetectionInfo.agentOsNamelog field value is not empty, then theagentDetectionInfo.agentOsNamelog field is mapped to theprincipal.asset.platform_software.platform_versionUDM field.Else, if the agentRealtimeInfo.agentOsNamelog field value is not empty, then theagentRealtimeInfo.agentOsNamelog field is mapped to theprincipal.asset.platform_software.platform_versionUDM field. | 
| agentRealtimeInfo.agentOsName | principal.asset.platform_software.platform_version | If the agentDetectionInfo.osNamelog field value is not empty, then theagentDetectionInfo.osNamelog field is mapped to theprincipal.asset.platform_software.platform_versionUDM field.Else, if the agentDetectionInfo.agentOsNamelog field value is not empty, then theagentDetectionInfo.agentOsNamelog field is mapped to theprincipal.asset.platform_software.platform_versionUDM field.Else, if the agentRealtimeInfo.agentOsNamelog field value is not empty, then theagentRealtimeInfo.agentOsNamelog field is mapped to theprincipal.asset.platform_software.platform_versionUDM field. | 
| agentDetectionInfo.osRevision | principal.asset.platform_software.platform_patch_level | If the agentDetectionInfo.osRevisionlog field value is not empty, then theagentDetectionInfo.osRevisionlog field is mapped to theprincipal.asset.platform_software.platform_patch_levelUDM field.Else, if the agentDetectionInfo.agentOsRevisionlog field value is not empty, then theagentDetectionInfo.agentOsRevisionlog field is mapped to theprincipal.asset.platform_software.platform_patch_levelUDM field.Else, if the agentRealtimeInfo.agentOsRevisionlog field value is not empty, then theagentRealtimeInfo.agentOsRevisionlog field is mapped to theprincipal.asset.platform_software.platform_patch_levelUDM field. | 
| agentDetectionInfo.agentOsRevision | principal.asset.platform_software.platform_patch_level | If the agentDetectionInfo.osRevisionlog field value is not empty, then theagentDetectionInfo.osRevisionlog field is mapped to theprincipal.asset.platform_software.platform_patch_levelUDM field.Else, if the agentDetectionInfo.agentOsRevisionlog field value is not empty, then theagentDetectionInfo.agentOsRevisionlog field is mapped to theprincipal.asset.platform_software.platform_patch_levelUDM field.Else, if the agentRealtimeInfo.agentOsRevisionlog field value is not empty, then theagentRealtimeInfo.agentOsRevisionlog field is mapped to theprincipal.asset.platform_software.platform_patch_levelUDM field. | 
| agentRealtimeInfo.agentOsRevision | principal.asset.platform_software.platform_patch_level | If the agentDetectionInfo.osRevisionlog field value is not empty, then theagentDetectionInfo.osRevisionlog field is mapped to theprincipal.asset.platform_software.platform_patch_levelUDM field.Else, if the agentDetectionInfo.agentOsRevisionlog field value is not empty, then theagentDetectionInfo.agentOsRevisionlog field is mapped to theprincipal.asset.platform_software.platform_patch_levelUDM field.Else, if the agentRealtimeInfo.agentOsRevisionlog field value is not empty, then theagentRealtimeInfo.agentOsRevisionlog field is mapped to theprincipal.asset.platform_software.platform_patch_levelUDM field. | 
| agentDetectionInfo.siteId | principal.labels[agent_detection_info_siteId](deprecated) | |
| agentDetectionInfo.siteId | additional.fields[agent_detection_info_siteId] | |
| agentDetectionInfo.uuid | principal.asset_id | If the agentDetectionInfo.uuidlog field value is not empty, then theSentinelOne:%{agentDetectionInfo.uuid}log field is mapped to theprincipal.asset_idUDM field.Else, if the agentDetectionInfo.agentUuidlog field value is not empty, then theSentinelOne:%{agentDetectionInfo.agentUuid}log field is mapped to theprincipal.asset_idUDM field.Else, if the agentRealtimeInfo.uuidlog field value is not empty, then theSentinelOne:%{agentRealtimeInfo.uuid}log field is mapped to theprincipal.asset_idUDM field.Else, if the agentRealtimeInfo.agentUuidlog field value is not empty, then theSentinelOne:%{agentRealtimeInfo.agentUuid}log field is mapped to theprincipal.asset_idUDM field. | 
| agentDetectionInfo.agentUuid | principal.asset_id | If the agentDetectionInfo.uuidlog field value is not empty, then theSentinelOne:%{agentDetectionInfo.uuid}log field is mapped to theprincipal.asset_idUDM field.Else, if the agentDetectionInfo.agentUuidlog field value is not empty, then theSentinelOne:%{agentDetectionInfo.agentUuid}log field is mapped to theprincipal.asset_idUDM field.Else, if the agentRealtimeInfo.uuidlog field value is not empty, then theSentinelOne:%{agentRealtimeInfo.uuid}log field is mapped to theprincipal.asset_idUDM field.Else, if the agentRealtimeInfo.agentUuidlog field value is not empty, then theSentinelOne:%{agentRealtimeInfo.agentUuid}log field is mapped to theprincipal.asset_idUDM field. | 
| agentRealtimeInfo.uuid | principal.asset_id | If the agentDetectionInfo.uuidlog field value is not empty, then theSentinelOne:%{agentDetectionInfo.uuid}log field is mapped to theprincipal.asset_idUDM field.Else, if the agentDetectionInfo.agentUuidlog field value is not empty, then theSentinelOne:%{agentDetectionInfo.agentUuid}log field is mapped to theprincipal.asset_idUDM field.Else, if the agentRealtimeInfo.uuidlog field value is not empty, then theSentinelOne:%{agentRealtimeInfo.uuid}log field is mapped to theprincipal.asset_idUDM field.Else, if the agentRealtimeInfo.agentUuidlog field value is not empty, then theSentinelOne:%{agentRealtimeInfo.agentUuid}log field is mapped to theprincipal.asset_idUDM field. | 
| agentRealtimeInfo.agentUuid | principal.asset_id | If the agentDetectionInfo.uuidlog field value is not empty, then theSentinelOne:%{agentDetectionInfo.uuid}log field is mapped to theprincipal.asset_idUDM field.Else, if the agentDetectionInfo.agentUuidlog field value is not empty, then theSentinelOne:%{agentDetectionInfo.agentUuid}log field is mapped to theprincipal.asset_idUDM field.Else, if the agentRealtimeInfo.uuidlog field value is not empty, then theSentinelOne:%{agentRealtimeInfo.uuid}log field is mapped to theprincipal.asset_idUDM field.Else, if the agentRealtimeInfo.agentUuidlog field value is not empty, then theSentinelOne:%{agentRealtimeInfo.agentUuid}log field is mapped to theprincipal.asset_idUDM field. | 
| agentDetectionInfo.uuid | principal.asset.asset_id | If the agentDetectionInfo.uuidlog field value is not empty, then theSentinelOne:%{agentDetectionInfo.uuid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the agentDetectionInfo.agentUuidlog field value is not empty, then theSentinelOne:%{agentDetectionInfo.agentUuid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the agentRealtimeInfo.uuidlog field value is not empty, then theSentinelOne:%{agentRealtimeInfo.uuid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the agentRealtimeInfo.agentUuidlog field value is not empty, then theSentinelOne:%{agentRealtimeInfo.agentUuid}log field is mapped to theprincipal.asset.asset_idUDM field. | 
| agentDetectionInfo.agentUuid | principal.asset.asset_id | If the agentDetectionInfo.uuidlog field value is not empty, then theSentinelOne:%{agentDetectionInfo.uuid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the agentDetectionInfo.agentUuidlog field value is not empty, then theSentinelOne:%{agentDetectionInfo.agentUuid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the agentRealtimeInfo.uuidlog field value is not empty, then theSentinelOne:%{agentRealtimeInfo.uuid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the agentRealtimeInfo.agentUuidlog field value is not empty, then theSentinelOne:%{agentRealtimeInfo.agentUuid}log field is mapped to theprincipal.asset.asset_idUDM field. | 
| agentRealtimeInfo.uuid | principal.asset.asset_id | If the agentDetectionInfo.uuidlog field value is not empty, then theSentinelOne:%{agentDetectionInfo.uuid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the agentDetectionInfo.agentUuidlog field value is not empty, then theSentinelOne:%{agentDetectionInfo.agentUuid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the agentRealtimeInfo.uuidlog field value is not empty, then theSentinelOne:%{agentRealtimeInfo.uuid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the agentRealtimeInfo.agentUuidlog field value is not empty, then theSentinelOne:%{agentRealtimeInfo.agentUuid}log field is mapped to theprincipal.asset.asset_idUDM field. | 
| agentRealtimeInfo.agentUuid | principal.asset.asset_id | If the agentDetectionInfo.uuidlog field value is not empty, then theSentinelOne:%{agentDetectionInfo.uuid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the agentDetectionInfo.agentUuidlog field value is not empty, then theSentinelOne:%{agentDetectionInfo.agentUuid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the agentRealtimeInfo.uuidlog field value is not empty, then theSentinelOne:%{agentRealtimeInfo.uuid}log field is mapped to theprincipal.asset.asset_idUDM field.Else, if the agentRealtimeInfo.agentUuidlog field value is not empty, then theSentinelOne:%{agentRealtimeInfo.agentUuid}log field is mapped to theprincipal.asset.asset_idUDM field. | 
| agentDetectionInfo.version | principal.asset.attribute.labels[agent_version] | |
| agentDetectionInfo.agentVersion | principal.asset.attribute.labels[agent_detection_info_agent_version] | |
| agentRealtimeInfo.agentVersion | principal.asset.attribute.labels[agent_realtime_info_agent_version] | |
| agentRealtimeInfo.id | principal.asset.attribute.labels[agent_realtime_info_id] | |
| agentRealtimeInfo.infected | principal.asset.attribute.labels[agent_realtime_info_infected] | |
| agentRealtimeInfo.agentInfected | principal.asset.attribute.labels[agent_realtime_info_infected] | |
| agentRealtimeInfo.isActive | principal.asset.attribute.labels[agent_realtime_info_is_active] | |
| agentRealtimeInfo.agentIsActive | principal.asset.attribute.labels[agent_realtime_info_is_active] | |
| agentRealtimeInfo.isDecommissioned | principal.asset.attribute.labels[agent_realtime_info_is_decommissioned] | |
| agentRealtimeInfo.agentIsDecommissioned | principal.asset.attribute.labels[agent_realtime_info_is_decommissioned] | |
| alertInfo.alertId | metadata.product_log_id | |
| id | metadata.product_log_id | |
| metadata.product_event_type | If the log matches the regular expression pattern alertInfo, then themetadata.product_event_typeUDM field is set toAlerts.Else, if the log matches the regular expression pattern threatInfo, then themetadata.product_event_typeUDM field is set toThreats. | |
| alertInfo.analystVerdict | security_result.detection_fields[alert_info_analyst_verdict] | |
| alertInfo.createdAt | metadata.event_timestamp | If the alertInfo.createdAtlog field value is not empty, then thealertInfo.createdAtlog field is mapped to themetadata.event_timestampUDM field.Else, if the threatInfo.identifiedAtlog field value is not empty, then thethreatInfo.identifiedAtlog field is mapped to themetadata.event_timestampUDM field. | 
| threatInfo.identifiedAt | metadata.event_timestamp | If the alertInfo.createdAtlog field value is not empty, then thealertInfo.createdAtlog field is mapped to themetadata.event_timestampUDM field.Else, if the threatInfo.identifiedAtlog field value is not empty, then thethreatInfo.identifiedAtlog field is mapped to themetadata.event_timestampUDM field. | 
|  | network.application_protocol | If the alertInfo.dnsRequestlog field value is not empty, then thenetwork.application_protocolUDM field is set toDNS. | 
| alertInfo.dnsRequest | network.dns.questions.name | |
| alertInfo.dnsResponse | network.dns.answers.name | |
| alertInfo.dstIp | target.ip | |
| alertInfo.dstPort | target.port | |
| alertInfo.dvEventId | security_result.detection_fields[alert_info_dv_event_id] | |
| alertInfo.eventType | security_result.detection_fields[alert_info_event_type] | |
| alertInfo.hitType | security_result.detection_fields[alert_info_hit_type] | |
| alertInfo.incidentStatus | security_result.detection_fields[alert_info_incident_status] | |
| alertInfo.indicatorCategory | security_result.detection_fields[alert_info_indicator_category] | |
| alertInfo.indicatorDescription | security_result.detection_fields[alert_info_indicator_description] | |
| alertInfo.indicatorName | security_result.detection_fields[alert_info_indicator_name] | |
| alertInfo.isEdr | security_result.detection_fields[alert_info_is_edr] | |
| alertInfo.loginAccountDomain | security_result.detection_fields[alert_info_login_account_domain] | |
| alertInfo.loginAccountSid | security_result.detection_fields[alert_info_login_account_sid] | |
| alertInfo.loginIsAdministratorEquivalent | security_result.detection_fields[alert_info_login_is_administrator_equivalent] | |
|  | security_result.action | If the alertInfo.loginIsSuccessfullog field value is equal totrue, then thesecurity_result.actionUDM field is set toALLOW. else thealertInfo.loginIsSuccessfullog field value is equal tofalse, then thesecurity_result.actionUDM field is set toBLOCK.If the threatInfo.mitigationStatuslog field value contain one of the following values, then thesecurity_result.actionUDM field is set toBLOCK.
 threatInfo.mitigationStatuslog field value contain one of the following values, then thesecurity_result.actionUDM field is set toALLOW.
 | 
|  | extensions.auth.mechanism | If the alertInfo.loginTypelog field value is equal toNETWORK, then theextensions.auth.mechanismUDM field is set toNETWORK.Else, if the alertInfo.loginTypelog field value is equal toSYSTEM, then theextensions.auth.mechanismUDM field is set toLOCAL.Else, if the alertInfo.loginTypelog field value is equal toINTERACTIVE, then theextensions.auth.mechanismUDM field is set toINTERACTIVE.Else, if the alertInfo.loginTypelog field value is equal toBATCH, then theextensions.auth.mechanismUDM field is set toBATCH.Else, if the alertInfo.loginTypelog field value is equal toSERVICE, then theextensions.auth.mechanismUDM field is set toSERVICE.Else, if the alertInfo.loginTypelog field value is equal toUNLOCK, then theextensions.auth.mechanismUDM field is set toUNLOCK.Else, if the alertInfo.loginTypelog field value is equal toNETWORK_CLEAR_TEXT, then theextensions.auth.mechanismUDM field is set toNETWORK_CLEAR_TEXT.Else, if the alertInfo.loginTypelog field value is equal toNEW_CREDENTIALS, then theextensions.auth.mechanismUDM field is set toNEW_CREDENTIALS.Else, if the alertInfo.loginTypelog field value is equal toREMOTE_INTERACTIVE, then theextensions.auth.mechanismUDM field is set toREMOTE_INTERACTIVE.Else, if the alertInfo.loginTypelog field value is equal toCACHED_INTERACTIVE, then theextensions.auth.mechanismUDM field is set toCACHED_INTERACTIVE.Else, if the alertInfo.loginTypelog field value is equal toCACHED_REMOTE_INTERACTIVE, then theextensions.auth.mechanismUDM field is set toCACHED_REMOTE_INTERACTIVE.Else, if the alertInfo.loginTypelog field value is equal toCACHED_UNLOCK, then theextensions.auth.mechanismUDM field is set toCACHED_UNLOCK. | 
| alertInfo.loginsUserName | target.user.user_display_name | |
| alertInfo.modulePath | security_result.detection_fields[alert_info_module_path] | |
| alertInfo.moduleSha1 | security_result.detection_fields[alert_info_module_sha1] | |
| alertInfo.netEventDirection | network.direction | If the alertInfo.netEventDirectionlog field value matches the regular expression patternOUTGOING, then thenetwork.directionUDM field is set toOUTBOUND.Else, if the alertInfo.netEventDirectionlog field value matches the regular expression patternINCOMING, then thenetwork.directionUDM field is set toINBOUND. | 
| alertInfo.registryKeyPath | target.registry.registry_key | |
| alertInfo.registryOldValue | src.registry.registry_value_data | |
| alertInfo.registryOldValueType | src.registry.registry_value_name | |
| alertInfo.registryPath | src.registry.registry_key | |
| alertInfo.registryValue | target.registry.registry_value_data | |
| alertInfo.reportedAt | security_result.first_discovered_time | |
| alertInfo.source | security_result.category_details | |
| alertInfo.srcPort | principal.port | |
| alertInfo.tiIndicatorComparisonMethod | security_result.detection_fields[alert_info_tiIndicator_comparison_method] | |
| alertInfo.tiIndicatorSource | security_result.detection_fields[alert_info_tiIndicator_source] | |
| alertInfo.tiIndicatorType | security_result.detection_fields[alert_info_tiIndicator_type] | |
| alertInfo.tiIndicatorValue | security_result.detection_fields[alert_info_tiIndicator_value] | |
| alertInfo.updatedAt | security_result.detection_fields[alert_info_updated_at] | |
| containerInfo.id | target.resource.product_object_id | |
| containerInfo.image | target.resource.attribute.labels[container_image] | |
| containerInfo.labels | target.resource.attribute.labels[container_labels] | If the containerInfo.labelslog field value is not empty, then thecontainerInfo.labelslog field is mapped to thetarget.resource.attribute.labels.container_labelsUDM field. | 
| containerInfo.name | target.resource.name | |
|  | target.resource.resource_type | If the containerInfo.namelog field value is not empty, then thetarget.resource.resource_typeUDM field is set toCONTAINER. | 
| kubernetesInfo.cluster | target.resource_ancestors.name | |
| kubernetesInfo.controllerName | target.resource_ancestors.name | |
| kubernetesInfo.node | target.resource_ancestors.name | |
| kubernetesInfo.pod | target.resource_ancestors.name | |
|  | target.resource_ancestors.resource_type | If the kubernetesInfo.podlog field value is not empty, then thetarget.resource_ancestors.resource_typeUDM field is set toPOD.If the kubernetesInfo.clusterlog field value is not empty, then thetarget.resource_ancestors.resource_typeUDM field is set toCLUSTER.If the kubernetesInfo.isContainerQuarantinelog field value is not empty, then thetarget.resource_ancestors.resource_typeUDM field is set toCLUSTER.If the kubernetesInfo.controllerNamelog field value is not empty, then thetarget.resource_ancestors.resource_typeUDM field is set toCLUSTER.If the kubernetesInfo.nodelog field value is not empty, then thetarget.resource_ancestors.resource_typeUDM field is set toCLUSTER. | 
| kubernetesInfo.controllerKind | target.resource_ancestors.attribute.labels[kubernetes_controller_kind] | |
| kubernetesInfo.controllerLabels | target.resource_ancestors.attribute.labels[kubernetes_controller_labels] | If the kubernetesInfo.controllerLabelslog field value is not empty, then thekubernetesInfo.controllerLabelslog field is mapped to thetarget.resource_ancestors.attribute.labels.kubernetes_controller_labelsUDM field. | 
| kubernetesInfo.namespace | target.resource_ancestors.attribute.labels[kubernetes_namespace] | |
| kubernetesInfo.namespaceLabels | target.resource_ancestors.attribute.labels[kubernetes_namespace_labels] | |
| kubernetesInfo.podLabels | target.resource_ancestors.attribute.labels[kubernetes_pod_labels] | If the kubernetesInfo.podLabelslog field value is not empty, then thekubernetesInfo.podLabelslog field is mapped to thetarget.resource_ancestors.attribute.labels.kubernetes_pod_labelsUDM field. | 
| ruleInfo.description | security_result.rule_set_display_name | |
| ruleInfo.id | security_result.rule_id | |
| ruleInfo.name | security_result.rule_name | |
| ruleInfo.queryLang | security_result.rule_labels[query_lang] | |
| ruleInfo.queryType | security_result.rule_labels[query_type] | |
| ruleInfo.s1ql | security_result.rule_labels[s1ql] | |
| ruleInfo.scopeLevel | security_result.rule_labels[scope_level] | |
|  | security_result.severity | If the ruleInfo.severitylog field value matches the regular expression pattern(?i)low, then thesecurity_result.severityUDM field is set toLOW.Else, if the ruleInfo.severitylog field value matches the regular expression pattern(?i)medium, then thesecurity_result.severityUDM field is set toMEDIUM.Else, if the ruleInfo.severitylog field value matches the regular expression pattern(?i)critical, then thesecurity_result.severityUDM field is set toCRITICAL.Else, if the ruleInfo.severitylog field value matches the regular expression pattern(?i)high, then thesecurity_result.severityUDM field is set toHIGH. | 
| ruleInfo.severity | security_result.severity_details | |
| ruleInfo.treatAsThreat | security_result.rule_type | |
| sourceParentProcessInfo.commandline | principal.process.parent_process.command_line | |
| sourceParentProcessInfo.fileHashMd5 | principal.process.parent_process.file.md5 | If the sourceParentProcessInfo.fileHashMd5log field value matches the regular expression pattern^[a-f0-9]{32}$, then thesourceParentProcessInfo.fileHashMd5log field is mapped to theprincipal.process.parent_process.file.md5UDM field. | 
| sourceParentProcessInfo.fileHashSha1 | principal.process.parent_process.file.sha1 | If the sourceParentProcessInfo.fileHashSha1log field value matches the regular expression pattern^[a-f0-9]{40}$, then thesourceParentProcessInfo.fileHashSha1log field is mapped to theprincipal.process.parent_process.file.sha1UDM field. | 
| sourceParentProcessInfo.fileHashSha256 | principal.process.parent_process.file.sha256 | If the sourceParentProcessInfo.fileHashSha256log field value matches the regular expression pattern^[a-f0-9]{64}$, then thesourceParentProcessInfo.fileHashSha256log field is mapped to theprincipal.process.parent_process.file.sha256UDM field. | 
| sourceParentProcessInfo.filePath | principal.process.parent_process.file.full_path | |
| sourceParentProcessInfo.fileSignerIdentity | principal.process.parent_process.file.signature_info.sigcheck.signers.name | |
| sourceParentProcessInfo.integrityLevel | principal.labels[source_parent_process_integrity_level](deprecated) | |
| sourceParentProcessInfo.integrityLevel | additional.fields[source_parent_process_integrity_level] | |
| sourceParentProcessInfo.name | principal.labels[source_parent_process_name](deprecated) | |
| sourceParentProcessInfo.name | additional.fields[source_parent_process_name] | |
| sourceParentProcessInfo.pid | principal.process.parent_process.pid | |
| sourceParentProcessInfo.pidStarttime | principal.labels[source_parent_process_pid_start_time](deprecated) | |
| sourceParentProcessInfo.pidStarttime | additional.fields[source_parent_process_pid_start_time] | |
| sourceParentProcessInfo.storyline | principal.labels[source_parent_process_storyline](deprecated) | |
| sourceParentProcessInfo.storyline | additional.fields[source_parent_process_storyline] | |
| sourceParentProcessInfo.subsystem | principal.labels[source_parent_process_subsystem](deprecated) | |
| sourceParentProcessInfo.subsystem | additional.fields[source_parent_process_subsystem] | |
|  | principal.process.parent_process.product_specific_process_id | If the sourceParentProcessInfo.uniqueIdlog field value is not empty, then theSO:%{agentDetectionInfo.siteId}:%{agentDetectionInfo.accountId}:%{agentDetectionInfo.uuid}:%{sourceParentProcessInfo.uniqueId}log field is mapped to theprincipal.process.parent_process.product_specific_process_idUDM field. | 
| sourceParentProcessInfo.user | principal.labels[source_parent_process_user](deprecated) | |
| sourceParentProcessInfo.user | additional.fields[source_parent_process_user] | |
| sourceProcessInfo.commandline | principal.process.command_line | |
| sourceProcessInfo.fileHashMd5 | principal.process.file.md5 | If the sourceProcessInfo.fileHashMd5log field value matches the regular expression pattern^[a-f0-9]{32}$, then thesourceProcessInfo.fileHashMd5log field is mapped to theprincipal.process.file.md5UDM field. | 
| sourceProcessInfo.fileHashSha1 | principal.process.file.sha1 | If the sourceProcessInfo.fileHashSha1log field value matches the regular expression pattern^[a-f0-9]{40}$, then thesourceProcessInfo.fileHashSha1log field is mapped to theprincipal.process.file.sha1UDM field. | 
| sourceProcessInfo.fileHashSha256 | principal.process.file.sha256 | If the sourceProcessInfo.fileHashSha256log field value matches the regular expression pattern^[a-f0-9]{64}$, then thesourceProcessInfo.fileHashSha256log field is mapped to theprincipal.process.file.sha256UDM field. | 
| sourceProcessInfo.filePath | principal.process.file.full_path | |
| sourceProcessInfo.fileSignerIdentity | principal.process.file.signature_info.sigcheck.signers.name | |
| sourceProcessInfo.integrityLevel | principal.labels[source_process_integrity_level](deprecated) | |
| sourceProcessInfo.integrityLevel | additional.fields[source_process_integrity_level] | |
| sourceProcessInfo.name | principal.labels[source_process_name](deprecated) | |
| sourceProcessInfo.name | additional.fields[source_process_name] | |
| sourceProcessInfo.pid | principal.process.pid | |
| sourceProcessInfo.pidStarttime | principal.labels[source_process_pid_start_time](deprecated) | |
| sourceProcessInfo.pidStarttime | additional.fields[source_process_pid_start_time] | |
| sourceProcessInfo.storyline | principal.labels[source_process_storyline](deprecated) | |
| sourceProcessInfo.storyline | additional.fields[source_process_storyline] | |
| sourceProcessInfo.subsystem | principal.labels[source_process_subsystem](deprecated) | |
| sourceProcessInfo.subsystem | additional.fields[source_process_subsystem] | |
|  | principal.process.product_specific_process_id | If the sourceProcessInfo.uniqueIdlog field value is not empty, then theSO:%{agentDetectionInfo.siteId}:%{agentDetectionInfo.accountId}:%{agentDetectionInfo.uuid}:%{sourceProcessInfo.uniqueId}log field is mapped to theprincipal.process.product_specific_process_idUDM field. | 
| sourceProcessInfo.user | principal.user.user_display_name | |
| threatInfo.initiatingUsername | principal.user.user_display_name | |
| targetProcessInfo.tgtFileCreatedAt | target.process.file.first_seen_time | |
| targetProcessInfo.tgtFileHashSha1 | target.process.file.sha1 | If the targetProcessInfo.tgtFileHashSha1log field value matches the regular expression pattern^[a-f0-9]{40}$, then thetargetProcessInfo.tgtFileHashSha1log field is mapped to thetarget.process.file.sha1UDM field. | 
| targetProcessInfo.tgtFileHashSha256 | target.process.file.sha256 | If the targetProcessInfo.tgtFileHashSha256log field value matches the regular expression pattern^[a-f0-9]{64}$, then thetargetProcessInfo.tgtFileHashSha256log field is mapped to thetarget.process.file.sha256UDM field. | 
| targetProcessInfo.tgtFileId | target.labels[target_file_id](deprecated) | |
| targetProcessInfo.tgtFileId | additional.fields[target_file_id] | |
| targetProcessInfo.tgtFileIsSigned | target.process.file.signature_info.sigcheck.verification_message | |
| targetProcessInfo.tgtFileModifiedAt | target.process.file.last_modification_time | |
| targetProcessInfo.tgtFileOldPath | target.labels[target_file_old_path](deprecated) | |
| targetProcessInfo.tgtFileOldPath | additional.fields[target_file_old_path] | |
| targetProcessInfo.tgtFilePath | target.process.file.full_path | |
| targetProcessInfo.tgtProcCmdLine | target.process.command_line | |
| targetProcessInfo.tgtProcImagePath | target.labels[target_process_image_path](deprecated) | |
| targetProcessInfo.tgtProcImagePath | additional.fields[target_process_image_path] | |
| targetProcessInfo.tgtProcIntegrityLevel | target.labels[target_process_integrity_level](deprecated) | |
| targetProcessInfo.tgtProcIntegrityLevel | additional.fields[target_process_integrity_level] | |
| targetProcessInfo.tgtProcName | target.labels[target_process_name](deprecated) | |
| targetProcessInfo.tgtProcName | additional.fields[target_process_name] | |
| targetProcessInfo.tgtProcPid | target.process.pid | |
| targetProcessInfo.tgtProcSignedStatus | target.labels[target_process_signed_status](deprecated) | |
| targetProcessInfo.tgtProcSignedStatus | additional.fields[target_process_signed_status] | |
| targetProcessInfo.tgtProcStorylineId | target.labels[target_process_storyline_id](deprecated) | |
| targetProcessInfo.tgtProcStorylineId | additional.fields[target_process_storyline_id] | |
|  | target.process.product_specific_process_id | If the targetProcessInfo.tgtProcUidlog field value is not empty, then theSO:%{agentDetectionInfo.siteId}:%{agentDetectionInfo.accountId}:%{agentDetectionInfo.uuid}:%{targetProcessInfo.tgtProcUid}log field is mapped to thetarget.process.product_specific_process_idUDM field. | 
| targetProcessInfo.tgtProcessStartTime | target.labels[target_process_start_time](deprecated) | |
| targetProcessInfo.tgtProcessStartTime | additional.fields[target_process_start_time] | |
| source_hostname | intermediary.hostname | |
| agentDetectionInfo.accountId | metadata.product_deployment_id | |
| agentDetectionInfo.accountName | principal.labels[agent_detection_info_account_name](deprecated) | |
| agentDetectionInfo.accountName | additional.fields[agent_detection_info_account_name] | |
| agentDetectionInfo.agentDetectionState | principal.asset.attribute.labels[agent_detection_info_detection_state] | |
| agentDetectionInfo.agentDomain | principal.administrative_domain | |
| agentDetectionInfo.agentIpV4 | principal.ip | |
| agentDetectionInfo.agentIpV6 | principal.ip | |
| alertInfo.srcIp | principal.ip | |
| alertInfo.srcMachineIp | principal.ip | |
| agentDetectionInfo.agentIpV4 | principal.asset.ip | |
| agentDetectionInfo.agentIpV6 | principal.asset.ip | |
| alertInfo.srcIp | principal.asset.ip | |
| alertInfo.srcMachineIp | principal.asset.ip | |
| agentDetectionInfo.agentLastLoggedInUpn | principal.labels[agent_detection_info_last_logged_in_upn](deprecated) | |
| agentDetectionInfo.agentLastLoggedInUpn | additional.fields[agent_detection_info_last_logged_in_upn] | |
| agentDetectionInfo.agentLastLoggedInUserMail | principal.user.email_addresses | |
| agentDetectionInfo.agentLastLoggedInUserName | principal.user.attribute.labels[agent_last_loggedIn_user_name] | |
| agentDetectionInfo.agentMitigationMode | principal.asset.attribute.labels[agent_detection_info_mitigation_mode] | |
| agentDetectionInfo.agentRegisteredAt | principal.asset.first_discover_time | |
| agentDetectionInfo.externalIp | principal.nat_ip | |
| agentDetectionInfo.groupId | principal.group.attribute.labels[agent_detection_info_group_id] | |
| agentRealtimeInfo.groupId | principal.group.attribute.labels[agent_realtime_info_group_id] | |
| agentDetectionInfo.groupName | principal.group.group_display_name | If the agentDetectionInfo.groupNamelog field value is not empty, then theagentDetectionInfo.groupNamelog field is mapped to theprincipal.group.group_display_nameUDM field.If the agentDetectionInfo.groupNamelog field value is empty and theagentRealtimeInfo.groupNamelog field value is not empty, then theagentRealtimeInfo.groupNamelog field is mapped to theprincipal.group.group_display_nameUDM field.Else, the agentRealtimeInfo.groupNamelog field is mapped to theprincipal.group.attribute.labels.agent_realtime_info_group_nameUDM field. | 
| agentRealtimeInfo.groupName | principal.group.group_display_name | If the agentDetectionInfo.groupNamelog field value is not empty, then theagentDetectionInfo.groupNamelog field is mapped to theprincipal.group.group_display_nameUDM field.If the agentDetectionInfo.groupNamelog field value is empty and theagentRealtimeInfo.groupNamelog field value is not empty, then theagentRealtimeInfo.groupNamelog field is mapped to theprincipal.group.group_display_nameUDM field.Else, the agentRealtimeInfo.groupNamelog field is mapped to theprincipal.group.attribute.labels.agent_realtime_info_group_nameUDM field. | 
| agentDetectionInfo.siteName | principal.labels[agent_detection_info_site_name](deprecated) | |
| agentDetectionInfo.siteName | additional.fields[agent_detection_info_site_name] | |
| agentRealtimeInfo.siteName | principal.labels[agent_realtime_info_site_name](deprecated) | |
| agentRealtimeInfo.siteName | additional.fields[agent_realtime_info_site_name] | |
| agentRealtimeInfo.accountId | principal.labels[agent_realtime_info_account_id](deprecated) | |
| agentRealtimeInfo.accountId | additional.fields[agent_realtime_info_account_id] | |
| agentRealtimeInfo.accountName | principal.labels[agent_realtime_info_account_name](deprecated) | |
| agentRealtimeInfo.accountName | additional.fields[agent_realtime_info_account_name] | |
| agentRealtimeInfo.activeThreats | security_result.detection_fields[agent_realtime_info_active_threats] | |
| agentRealtimeInfo.agentDecommissionedAt | principal.asset.attribute.labels[agent_realtime_info_agent_decommissioned_at] | |
| agentRealtimeInfo.agentDomain | principal.labels[agent_realtime_info_domain](deprecated) | |
| agentRealtimeInfo.agentDomain | additional.fields[agent_realtime_info_domain] | |
| agentRealtimeInfo.agentId | principal.asset.attribute.labels[agent_realtime_info_agent_id] | |
| agentRealtimeInfo.agentMitigationMode | principal.asset.attribute.labels[agent_realtime_info_mitigation_mode] | |
| agentRealtimeInfo.agentNetworkStatus | principal.labels[agent_realtime_info_network_status](deprecated) | |
| agentRealtimeInfo.agentNetworkStatus | additional.fields[agent_realtime_info_network_status] | |
| agentRealtimeInfo.agentOsType | principal.labels[agent_realtime_info_os_type](deprecated) | |
| agentRealtimeInfo.agentOsType | additional.fields[agent_realtime_info_os_type] | |
| agentRealtimeInfo.networkInterfaces.id | principal.labels[network_interface_id] | |
| agentRealtimeInfo.networkInterfaces.name | principal.labels[network_interface_name] | |
| agentRealtimeInfo.networkInterfaces.physical | principal.labels[network_interface_physical] | |
| agentRealtimeInfo.operationalState | principal.asset.attribute.labels[agent_realtime_info_operational_State] | |
| agentRealtimeInfo.rebootRequired | principal.labels[agent_realtime_info_reboot_required](deprecated) | |
| agentRealtimeInfo.rebootRequired | additional.fields[agent_realtime_info_reboot_required] | |
| agentRealtimeInfo.scanAbortedAt | security_result.detection_fields[agent_realtime_info_scan_aborted_at] | |
| agentRealtimeInfo.scanFinishedAt | security_result.detection_fields[agent_realtime_info_scan_finished_at] | |
| agentRealtimeInfo.scanStartedAt | security_result.detection_fields[agent_realtime_info_scan_started_at] | |
| agentRealtimeInfo.scanStatus | security_result.detection_fields[agent_realtime_info_scan_status] | |
| agentRealtimeInfo.siteId | principal.labels[agent_realtime_info_site_id](deprecated) | |
| agentRealtimeInfo.siteId | additional.fields[agent_realtime_info_site_id] | |
| agentRealtimeInfo.storageName | principal.resource.name | |
|  | principal.resource.resource_type | If the agentRealtimeInfo.storageNamelog field value is not empty, then theprincipal.resource.resource_typeUDM field is set toSTORAGE_OBJECT. | 
| agentRealtimeInfo.storageType | principal.resource.resource_subtype | |
| agentRealtimeInfo.userActionsNeeded | security_result.detection_fields[agent_realtime_info_user_actions_needed] | If the agentRealtimeInfo.userActionsNeededlog field value is not empty, then theagentRealtimeInfo.userActionsNeededlog field is mapped to thesecurity_result.detection_fields.agent_realtime_info_user_actions_neededUDM field. | 
| containerInfo.isContainerQuarantine | target.resource.attribute.labels[container_is_container_quarantine] | |
| indicators.category | security_result.category_details | |
| indicators.categoryId | security_result.detection_fields[indicators_category_id] | |
| indicators.description | security_result.description | |
| indicators.ids | security_result.detection_fields[indicators_ids] | |
|  | security_result.attack_details.tactics.id | |
| indicators.tactics.name | security_result.attack_details.tactics.name | If the indicators.tactics.namelog field value is not empty, then theindicators.tactics.namelog field is mapped to thesecurity_result.attack_details.tactics.nameUDM field. | 
| indicators.tactics.source | security_result.detection_fields[indicators_tactics_source] | |
| indicators.tactics.techniques.link | security_result.detection_fields[indicators_tactics_techniques_link] | |
| indicators.tactics.techniques.name | security_result.attack_details.techniques.id | If the indicators.tactics.techniques.namelog field value is not empty, then theindicators.tactics.techniques.namelog field is mapped to thesecurity_result.attack_details.techniques.idUDM field. | 
|  | security_result.attack_details.techniques.name | |
|  | security_result.attack_details.techniques.subtechnique_id | |
|  | security_result.attack_details.techniques.subtechnique_name | |
| kubernetesInfo.isContainerQuarantine | target.resource_ancestors.attribute.labels[kubernetes_is_container_quarantine] | |
| kubernetesInfo.nodeLabels | target.resource_ancestors.attribute.labels[kubernetes_node_labels] | |
| mitigationStatus.action | security_result.detection_fields[mitigation_status_action] | |
| mitigationStatus.actionsCounters.failed | security_result.detection_fields[mitigation_status_actions_counters_failed] | |
| mitigationStatus.actionsCounters.notFound | security_result.detection_fields[mitigation_status_actions_counters_not_Found] | |
| mitigationStatus.actionsCounters.pendingReboot | security_result.detection_fields[mitigation_status_actions_counters_pending_reboot] | |
| mitigationStatus.actionsCounters.success | security_result.detection_fields[mitigation_status_actions_counters_success] | |
| mitigationStatus.actionsCounters.total | security_result.detection_fields[mitigation_status_actions_counters_total] | |
| mitigationStatus.agentSupportsReport | security_result.detection_fields[mitigation_status_agent_supports_report] | |
| mitigationStatus.groupNotFound | security_result.detection_fields[mitigation_status_group_not_found] | |
| mitigationStatus.lastUpdate | security_result.detection_fields[mitigation_status_last_update] | |
| mitigationStatus.latestReport | security_result.detection_fields[mitigation_status_last_report] | |
| mitigationStatus.mitigationEndedAt | security_result.detection_fields[mitigation_status_mitigation_ended_at] | |
| mitigationStatus.mitigationStartedAt | security_result.detection_fields[mitigation_status_mitigation_started_at] | |
| mitigationStatus.status | security_result.detection_fields[mitigation_status] | |
| threatInfo.analystVerdict | security_result.detection_fields[analystVerdict] | |
| threatInfo.analystVerdictDescription | security_result.detection_fields[analyst_verdict_description] | |
| threatInfo.automaticallyResolved | security_result.detection_fields[automatically_resolved] | |
| threatInfo.browserType | security_result.detection_fields[browser_type] | |
| threatInfo.certificateId | security_result.detection_fields[certificate_id] | |
| threatInfo.classification | security_result.category_details | |
|  | security_result.category | If the threatInfo.classificationlog field value contain one of the following values, then thesecurity_result.categoryUDM field is set toSOFTWARE_MALICIOUS.
 Else, if the threatInfo.classificationlog field value contain one of the following values, then thesecurity_result.categoryUDM field is set toSOFTWARE_SUSPICIOUS.
 Else, if the threatInfo.classificationlog field value contain one of the following values, then thesecurity_result.categoryUDM field is set toNETWORK_SUSPICIOUS.
 Else, if the threatInfo.classificationlog field value is equal toExploit, then thesecurity_result.categoryUDM field is set toEXPLOIT.Else, if the threatInfo.classificationlog field value is equal toApplication Control, then thesecurity_result.categoryUDM field is set toUNKNOWN_CATEGORY.If the alertInfo.eventTypelog field value contain one of the following values, then thesecurity_result.categoryUDM field is set toSOFTWARE_MALICIOUS.
 | 
| threatInfo.classificationSource | security_result.detection_fields[classification_source] | |
| threatInfo.cloudFilesHashVerdict | security_result.detection_fields[cloud_Files_hash_verdict] | |
| threatInfo.collectionId | security_result.detection_fields[collection_id] | |
| threatInfo.confidenceLevel | security_result.confidence_details | |
|  | security_result.confidence | If the threatInfo.confidenceLevellog field value is equal tomalicious, then thesecurity_result.confidenceUDM field is set toHIGH_CONFIDENCE.Else, if the threatInfo.confidenceLevellog field value is equal tosuspicious, then thesecurity_result.confidenceUDM field is set toMEDIUM_CONFIDENCE. | 
| threatInfo.createdAt | metadata.collected_timestamp | |
| threatInfo.detectionEngines | security_result.detection_fields[detection_engines] | If the threatInfo.detectionEngineslog field value is not empty, then thethreatInfo.detectionEngineslog field is mapped to thesecurity_result.detection_fields.detection_enginesUDM field. | 
| threatInfo.detectionEngines.key | security_result.detection_fields[detection_engines_key] | If the threatInfo.detectionEngines.keylog field value is not empty, then thethreatInfo.detectionEngines.keylog field is mapped to thesecurity_result.detection_fields.detection_engines_keyUDM field. | 
| threatInfo.detectionEngines.title | security_result.detection_fields[detection_engines_title] | If the threatInfo.detectionEngines.titlelog field value is not empty, then thethreatInfo.detectionEngines.titlelog field is mapped to thesecurity_result.detection_fields.detection_engines_titleUDM field. | 
| threatInfo.detectionType | security_result.detection_fields[detection_type] | |
| threatInfo.engines | security_result.detection_fields[engines] | If the threatInfo.engineslog field value is not empty, then thethreatInfo.engineslog field is mapped to thesecurity_result.detection_fields.enginesUDM field. | 
| threatInfo.externalTicketExists | security_result.detection_fields[external_ticket_exists] | |
| threatInfo.externalTicketExists.description | security_result.detection_fields[external_ticket_exists_description] | |
| threatInfo.externalTicketExists.readOnly | security_result.detection_fields[external_ticket_exists_readOnly] | |
| threatInfo.externalTicketId | security_result.detection_fields[external_ticket_id] | |
| threatInfo.failedActions | security_result.detection_fields[failed_actions] | |
| threatInfo.fileExtension | target.file.mime_type | |
| threatInfo.fileExtensionType | security_result.detection_fields[file_extension_type] | |
| threatInfo.filePath | target.file.full_path | |
| threatInfo.filePath.description | security_result.detection_fields[file_path_description] | |
| threatInfo.filePath.readOnly | security_result.detection_fields[file_path_readOnly] | |
| threatInfo.fileSize | target.file.size | |
| threatInfo.fileVerificationType | security_result.detection_fields[file_verification_type] | |
| threatInfo.incidentStatus | security_result.detection_fields[incident_status] | |
| threatInfo.incidentStatusDescription | security_result.detection_fields[incident_status_description] | |
| threatInfo.incidentStatusDescription.description | security_result.detection_fields[incident_status_description] | |
| threatInfo.incidentStatusDescription.readOnly | security_result.detection_fields[incident_status_description_readOnly] | |
| threatInfo.initiatedBy | security_result.detection_fields[initiatedBy] | |
| threatInfo.initiatedByDescription | security_result.detection_fields[initiatedBy_description] | |
| threatInfo.initiatedByDescription.description | security_result.detection_fields[initiatedBy_description] | |
| threatInfo.initiatedByDescription.readOnly | security_result.detection_fields[initiatedBy_description_readOnly] | |
| threatInfo.initiatingUserId | principal.user.attribute.labels[initiating_user_id] | |
| threatInfo.isFileless | security_result.detection_fields[is_fileless] | |
| threatInfo.isFileless.description | security_result.detection_fields[is_fileless_description] | |
| threatInfo.isFileless.readOnly | security_result.detection_fields[is_fileless_readOnly] | |
| threatInfo.isValidCertificate | security_result.detection_fields[is_valid_certificate] | |
| threatInfo.maliciousProcessArguments | security_result.detection_fields[malicious_process_arguments] | |
| threatInfo.md5 | target.file.md5 | If the threatInfo.md5log field value matches the regular expression pattern^[a-f0-9]{32}$, then thethreatInfo.md5log field is mapped to thetarget.file.md5UDM field. | 
| threatInfo.mitigatedPreemptively | security_result.detection_fields[mitigated_preemptively] | |
| threatInfo.mitigationStatus | security_result.action_details | |
|  | security_result.threat_status | If the threatInfo.mitigationStatuslog field value contain one of the following values, then thesecurity_result.threat_statusUDM field is set toCLEARED.
 threatInfo.mitigationStatuslog field value contain one of the following values, then thesecurity_result.threat_statusUDM field is set toACTIVE.
 | 
| threatInfo.mitigationStatusDescription | security_result.detection_fields[mitigation_status_description] | |
| threatInfo.mitigationStatusDescription.description | security_result.detection_fields[mitigation_status_description] | |
| threatInfo.mitigationStatusDescription.readOnly | security_result.detection_fields[mitigation_status_description_readOnly] | |
| threatInfo.originatorProcess | principal.process.parent_process.file.names | |
| threatInfo.pendingActions | security_result.detection_fields[pending_actions] | |
| threatInfo.processUser | principal.user.userid | |
| threatInfo.publisherName | security_result.threat_feed_name | |
| threatInfo.reachedEventsLimit | security_result.detection_fields[reached_events_limit] | |
| threatInfo.rebootRequired | security_result.detection_fields[reboot_required] | |
| threatInfo.sha1 | target.file.sha1 | If the threatInfo.sha1log field value matches the regular expression pattern^[a-f0-9]{40}$", then thethreatInfo.sha1log field is mapped to thetarget.file.sha1UDM field. | 
| threatInfo.sha256 | target.file.sha256 | If the threatInfo.sha256log field value matches the regular expression pattern^[a-f0-9]{64}$", then thethreatInfo.sha256log field is mapped to thetarget.file.sha256UDM field. | 
| threatInfo.storyline | security_result.detection_fields[storyline] | |
| threatInfo.threatId | security_result.threat_id | |
| threatInfo.threatName | security_result.threat_name | |
| threatInfo.threatName | target.file.names | |
| threatInfo.updatedAt | security_result.detection_fields[updatedAt] | |
| whiteningOptions | about.labels[whitening_options] | If the whiteningOptionslog field value is not empty, then thewhiteningOptionslog field is mapped to theabout.labels.whitening_optionsUDM field. | 
| agentDetectionInfo.cloudProviders.AWS.awsRole | principal.resource.attribute.roles.name | |
| agentDetectionInfo.cloudProviders.AWS.awsSecurityGroups | principal.resource.attribute.labels[cloud_providers_AWS_security_groups] | If the agentDetectionInfo.cloudProviders.AWS.awsSecurityGroupslog field value is not empty, then theagentDetectionInfo.cloudProviders.AWS.awsSecurityGroupslog field is mapped to theprincipal.resource.attribute.labels.cloud_providers_AWS_security_groupsUDM field. | 
| agentDetectionInfo.cloudProviders.AWS.awsSubnetIds | principal.resource.attribute.labels[cloud_providers_AWS_subnet_ids] | If the agentDetectionInfo.cloudProviders.AWS.awsSubnetIdslog field value is not empty, then theagentDetectionInfo.cloudProviders.AWS.awsSubnetIdslog field is mapped to theprincipal.resource.attribute.labels.cloud_providers_AWS_subnet_idsUDM field. | 
| agentDetectionInfo.cloudProviders.AWS.cloudAccount | principal.resource.attribute.labels[cloud_providers_AWS_cloud_account] | |
| agentDetectionInfo.cloudProviders.AWS.cloudImage | principal.resource.attribute.labels[cloud_providers_AWS_cloud_image] | |
| agentDetectionInfo.cloudProviders.AWS.cloudInstanceId | principal.resource.attribute.labels[cloud_providers_AWS_cloud_instance_id] | |
| agentDetectionInfo.cloudProviders.AWS.cloudInstanceSize | principal.resource.attribute.labels[cloud_providers_AWS_cloud_instance_size] | |
| agentDetectionInfo.cloudProviders.AWS.cloudLocation | principal.resource.attribute.cloud.availability_zone | |
| agentDetectionInfo.cloudProviders.AWS.cloudNetwork | principal.resource.attribute.labels[cloud_providers_AWS_cloud_network] | |
| agentDetectionInfo.cloudProviders.AWS.cloudTags | principal.resource.attribute.labels[cloud_providers_AWS_cloud_tags] | If the agentDetectionInfo.cloudProviders.AWS.cloudTagslog field value is not empty, then theagentDetectionInfo.cloudProviders.AWS.cloudTagslog field is mapped to theprincipal.resource.attribute.labels.cloud_providers_AWS_cloud_tagsUDM field. | 
| modular_input_consumption_time | about.labels[modular_input_consumption_time](deprecated) | |
| modular_input_consumption_time | additional.fields[modular_input_consumption_time] | |
| timestamp | about.labels[timestamp](deprecated) | |
| timestamp | additional.fields[timestamp] | |
| updatedAt | about.labels[updatedAt](deprecated) | |
| updatedAt | additional.fields[updatedAt] | 
次のステップ
さらにサポートが必要な場合 コミュニティ メンバーや Google SecOps のプロフェッショナルから回答を得ることができます。