Recoger registros de SentinelOne Cloud Funnel
En este documento se describe cómo puede exportar los registros de Cloud Funnel de SentinelOne configurando un feed de Google Security Operations y cómo se asignan los campos de registro a los campos del modelo de datos unificado (UDM) de Google Security Operations.
Para obtener más información, consulta el artículo Información general sobre la ingestión de datos en Google Security Operations.
Una implementación típica consta de SentinelOne Cloud Funnel y el feed de Google Security Operations configurado para enviar registros a Google Security Operations. Cada implementación de cliente puede ser diferente y más compleja.
La implementación contiene los siguientes componentes:
- SentinelOne la plataforma de la que recoges los registros. 
- Feed de Google Security Operations: el feed de Google Security Operations que obtiene registros de SentinelOne y escribe registros en Google Security Operations. 
- Google Security Operations: conserva y analiza los registros. 
Una etiqueta de ingestión identifica el analizador que normaliza los datos de registro sin procesar en formato UDM estructurado. La información de este documento se aplica al analizador con la etiqueta de ingestión SENTINELONE_CF.
Antes de empezar
Asegúrate de que cumples los siguientes requisitos previos:
- Una suscripción activa a Singularity Complete de SentinelOne. Consulta Paquetes de la plataforma para obtener más información.
- Una licencia activa para el módulo de streaming de data lake Cloud Funnel.
- SentinelOne Cloud Funnel v2.0
- Un rol de administrador a nivel global o de cuenta. Para obtener el rol de administrador, ponte en contacto con tu usuario administrador.
- Derechos de administrador para instalar el agente de SentinelOne. Para obtener derechos de administrador, ponte en contacto con tu usuario administrador.
- Un segmento de almacenamiento configurado. Google Cloud Para obtener más información, consulta Configurar tu Google Cloud segmento de almacenamiento.
- Sustituye YOUR_CONSOLE_DOMAINen la URL por el dominio de tu consola.
 
- Sustituye 
Configurar SentinelOne Cloud Funnel
- Inicia sesión en la consola de administración de SentinelOne.
- En la barra de herramientas Configuración, haz clic en Integraciones > Cloud Funnel.
- En la lista Proveedor de Cloud, seleccione Google Cloud.
- En el campo Nombre de almacenamiento de GCS, introduce el nombre del segmento de Cloud Storage.
- Haga clic en Validar para comprobar si el segmento existe y si SentinelOne tiene acceso de lectura y escritura al segmento.
- Selecciona Habilitar la transmisión de telemetría para transmitir tus datos de XDR a tu segmento.
Configurar feeds
Hay dos puntos de entrada diferentes para configurar feeds en la plataforma Google SecOps:
- Configuración de SIEM > Feeds > Añadir nuevo feed
- Centro de contenido > Paquetes de contenido > Empezar
Cómo configurar el feed de SentinelOne Singularity Cloud Funnel
- Haz clic en el paquete SentinelOne.
- Haga clic en el tipo de registro SentinelOne Singularity Cloud Funnel.
- Especifique los valores de los siguientes campos: - Tipo de fuente: Google Cloud Storage V2.
- URI del segmento de almacenamiento: el URI de origen del segmento de Google Cloud Storage.
- Opción de eliminación de la fuente: si quieres eliminar los archivos o directorios después de transferirlos. Selecciona la opción Eliminar archivos transferidos en Opción de eliminación de la fuente.
- Antigüedad máxima del archivo: incluye los archivos modificados en los últimos días. El valor predeterminado es 180 días.
- Cuenta de servicio de Chronicle: copia la cuenta de servicio. La necesitarás para añadir permisos en el segmento a esta cuenta de servicio y permitir que Google SecOps lea o elimine datos del segmento.
 - Opciones avanzadas - Nombre del feed: un valor rellenado automáticamente que identifica el feed.
- Espacio de nombres del recurso: espacio de nombres asociado al feed.
- Etiquetas de ingestión: etiquetas aplicadas a todos los eventos de este feed.
 
- Haga clic en Crear feed. 
Para obtener más información sobre cómo configurar varios feeds para diferentes tipos de registros en esta familia de productos, consulta el artículo Configurar feeds por producto.
En el Google Cloud segmento de Storage, para añadir los permisos Administrador de objetos de Storage o Usuario de objetos de Storage a esta cuenta de servicio, sigue estos pasos:
- En tu Google Cloud consola, ve a Segmentos y selecciona el nombre del segmento. 
- En Detalles del contenedor, ve a Permisos > Conceder acceso. 
- En Nuevos principales, pega la cuenta de servicio que has copiado. 
- En Selecciona un rol, elige Cloud Storage y, a continuación, el rol Administrador de objetos de Storage o Usuario de objetos de Storage. 
- Haz clic en Siguiente y, a continuación, en Enviar. 
Formatos de registro de SentinelOne Cloud Funnel admitidos
El analizador de SentinelOne Cloud Funnel admite registros en formato JSON.
Registros de ejemplo de SentinelOne Cloud Funnel admitidos
- JSON - { "src.process.parent.isStorylineRoot": true, "event.category": "group", "src.process.parent.image.sha1": "2d79a17a7f226b4a3bc25d47d73570f9a33aac1a", "site.id": "767524645468373018", "src.process.parent.displayName": "Services and Controller app", "src.process.image.binaryIsExecutable": true, "src.process.parent.subsystem": "SYS_WIN32", "src.process.user": "NT AUTHORITY\\\\SYSTEM", "src.process.indicatorRansomwareCount": 0, "src.process.crossProcessDupRemoteProcessHandleCount": 0, "src.process.tgtFileCreationCount": 0, "src.process.indicatorInjectionCount": 0, "src.process.moduleCount": 121, "i.version": "preprocess-lib-1.0", "src.process.parent.name": "services.exe", "src.process.image.md5": "b7f884c1b74a263f746ee12a5f7c9f6a", "src.process.indicatorReconnaissanceCount": 0, "src.process.storyline.id": "93CD8594B971B84A", "src.process.childProcCount": 0, "mgmt.url": "euce1-dummy.xyz.net", "src.process.crossProcessOpenProcessCount": 0, "src.process.subsystem": "SYS_WIN32", "meta.event.name": "GROUPCREATION", "src.process.parent.integrityLevel": "SYSTEM", "src.process.indicatorExploitationCount": 0, "src.process.parent.storyline.id": "31E78494B971B84A", "i.scheme": "edr", "src.process.integrityLevel": "SYSTEM", "site.name": "Dummy Corp", "src.process.netConnInCount": 0, "event.time": 1692575814995, "timestamp": "2023-08-20T23:56:54.995Z", "account.id": "767524645367709720", "dataSource.name": "SentinelOne", "endpoint.name": "Dummy Endpoint", "src.process.image.sha1": "1bc5066ddf693fc034d6514618854e26a84fd0d1", "src.process.isStorylineRoot": true, "src.process.parent.image.path": "C:\\\\windows\\\\System32\\\\services.exe", "dataSource.vendor": "SentinelOne", "src.process.pid": 21760, "tgt.file.isSigned": "signed", "dataSource.category": "security", "src.process.cmdline": "C:\\\\windows\\\\system32\\\\svchost.exe -k netsvcs -p -s wlidsvc", "src.process.publisher": "MICROSOFT WINDOWS", "src.process.crossProcessThreadCreateCount": 0, "src.process.parent.isNative64Bit": false, "src.process.parent.isRedirectCmdProcessor": false, "src.process.crossProcessCount": 0, "src.process.signedStatus": "signed", "event.id": "01H8B5MR9QQEYRC77NV97T2PR0_468", "src.process.parent.cmdline": "C:\\\\windows\\\\system32\\\\services.exe", "src.process.image.path": "C:\\\\windows\\\\System32\\\\svchost.exe", "src.process.tgtFileModificationCount": 0, "src.process.indicatorEvasionCount": 0, "src.process.netConnOutCount": 2, "src.process.crossProcessDupThreadHandleCount": 0, "endpoint.os": "windows", "src.process.tgtFileDeletionCount": 0, "src.process.startTime": 1692575814987, "mgmt.id": "12277", "os.name": "Windows 10 Enterprise", "src.process.displayName": "Host Process for Windows Services", "src.process.parent.sessionId": 0, "src.process.isNative64Bit": false, "src.process.uid": "92CD8594B971B84A", "src.process.parent.image.md5": "14b88ff4833012512278a5f3a5712bd2", "src.process.indicatorBootConfigurationUpdateCount": 0, "src.process.indicatorInfostealerCount": 20, "process.unique.key": "92CD8594B971B84A", "agent.version": "22.2.4.558", "src.process.parent.uid": "30E78494B971B84A", "src.process.parent.image.sha256": "e6fe9a94e8686e957dbcec2b89c1c1ddcf8e75d76e9200d0cbef74d510c71317", "src.process.sessionId": 0, "src.process.netConnCount": 2, "mgmt.osRevision": "19045", "group.id": "93CD8594B971B84A", "src.process.parent.publisher": "MICROSOFT WINDOWS PUBLISHER", "src.process.isRedirectCmdProcessor": false, "src.process.verifiedStatus": "verified", "src.process.parent.startTime": 1692333530832, "src.process.dnsCount": 4, "endpoint.type": "laptop", "trace.id": "01H8B5MR9QQEYRC77NV97T2PR0", "src.process.name": "svchost.exe", "agent.uuid": "615151318b7b4f8fb4fa1d1b28b7ad0f", "src.process.image.sha256": "add683a6910abbbf0e28b557fad0ba998166394932ae2aca069d9aa19ea8fe88", "src.process.indicatorGeneralCount": 8, "src.process.crossProcessOutOfStorylineCount": 0, "packet.id": "80BC84D0E056415C91A410DDA4B523CD", "src.process.registryChangeCount": 0, "src.process.indicatorPersistenceCount": 0, "src.process.parent.signedStatus": "signed", "src.process.parent.user": "NT AUTHORITY\\\\SYSTEM", "event.type": "Group Creation", "src.process.indicatorPostExploitationCount": 0, "src.process.parent.pid": 1568 }
Tipos de registros de SentinelOne Cloud Funnel admitidos
El analizador de SentinelOne Cloud Funnel admite los siguientes tipos de registros:
Event Type
- Process Exit
- Process Modification
- Process Creation
- Duplicate Process Handle
- Duplicate Thread Handle
- Open Remote Process Handle
- Remote Thread Creation
- Remote Process Termination
- Command Script
- IP Connect
- IP Listen
- File Modification
- File Creation
- File Scan
- File Deletion
- File Rename
- Pre Execution Detection
- Login
- Logout
- GET
- OPTIONS
- POST
- PUT
- DELETE
- CONNECT
- HEAD
- DNS Resolved
- DNS Unresolved
- Task Register
- Task Update
- Task Start
- Task Trigger
- Task Delete
- Registry Key Create
- Registry Key Rename
- Registry Key Delete
- Registry Key Export
- Registry Key Security Changed
- Registry Key Import
- Registry Value Modified
- Registry Value Create
- Registry Value Delete
- Behavioral Indicators
- Module Load
- Driver Load
- Not Reported
- Group Creation
- Firmware Test
- Threat Intelligence Indicators
- Named Pipe Creation
- Named Pipe Connection
- Windows Event Log Creation
Configurar feeds desde el Centro de contenido
Especifique los valores de los siguientes campos:
- URI del segmento de almacenamiento: el URI de origen del segmento de Google Cloud Storage.
- El URI es un: selecciona el tipo de URI según la configuración del flujo de registros (Archivo único, Directorio o Directorio que incluye subdirectorios).
- Opciones de eliminación de la fuente: selecciona la opción de eliminación que prefieras según tus preferencias de ingesta.
Opciones avanzadas
- Nombre del feed: un valor rellenado automáticamente que identifica el feed.
- Tipo de fuente: método usado para recoger registros en Google SecOps.
- Espacio de nombres de recursos: espacio de nombres asociado al feed.
- Etiquetas de ingestión: etiquetas aplicadas a todos los eventos de este feed.
Referencia de asignación de campos
En esta sección se explica cómo asigna el analizador de Google Security Operations los campos de SentinelOne a los campos del modelo de datos unificado (UDM) de Google Security Operations.
Referencia de asignación de campos: identificador de evento a tipo de evento
En la siguiente tabla se enumeran losSENTINELONE_CF tipos de registros y sus tipos de eventos de UDM correspondientes.
| Event Identifier | Event Type | 
|---|---|
| Process Exit | PROCESS_TERMINATION | 
| Process Modification | PROCESS_UNCATEGORIZED | 
| Process Creation | PROCESS_LAUNCH | 
| Duplicate Process Handle | PROCESS_UNCATEGORIZED | 
| Duplicate Thread Handle | PROCESS_UNCATEGORIZED | 
| Open Remote Process Handle | PROCESS_UNCATEGORIZED | 
| Remote Thread Creation | PROCESS_UNCATEGORIZED | 
| Remote Process Termination | PROCESS_TERMINATION | 
| Command Script | PROCESS_UNCATEGORIZED | 
| IP Connect | NETWORK_CONNECTION | 
| IP Listen | STATUS_UPDATE | 
| File Modification | FILE_MODIFICATION | 
| File Creation | FILE_CREATION | 
| File Scan | SCAN_FILE | 
| File Deletion | FILE_DELETION | 
| File Rename | FILE_MOVE | 
| Pre Execution Detection | STATUS_UPDATE | 
| Login | USER_LOGIN | 
| Logout | USER_LOGOUT | 
| GET | NETWORK_HTTP | 
| OPTIONS | NETWORK_HTTP | 
| POST | NETWORK_HTTP | 
| PUT | NETWORK_HTTP | 
| DELETE | NETWORK_HTTP | 
| CONNECT | NETWORK_HTTP | 
| HEAD | NETWORK_HTTP | 
| DNS Resolved | NETWORK_DNS | 
| DNS Unresolved | NETWORK_DNS | 
| Task Register | SCHEDULED_TASK_CREATION | 
| Task Update | SCHEDULED_TASK_MODIFICATION | 
| Task Start | SCHEDULED_TASK_UNCATEGORIZED | 
| Task Trigger | SCHEDULED_TASK_UNCATEGORIZED | 
| Task Delete | SCHEDULED_TASK_DELETION | 
| Registry Key Create | REGISTRY_CREATION | 
| Registry Key Rename | REGISTRY_UNCATEGORIZED | 
| Registry Key Delete | REGISTRY_DELETION | 
| Registry Key Export | REGISTRY_UNCATEGORIZED | 
| Registry Key Security Changed | REGISTRY_MODIFICATION | 
| Registry Key Import | REGISTRY_UNCATEGORIZED | 
| Registry Value Modified | REGISTRY_MODIFICATION | 
| Registry Value Create | REGISTRY_CREATION | 
| Registry Value Delete | REGISTRY_DELETION | 
| Behavioral Indicators | STATUS_UPDATE | 
| Module Load | PROCESS_MODULE_LOAD | 
| Driver Load | PROCESS_MODULE_LOAD | 
| Not Reported | NETWORK_HTTP | 
| Group Creation | GROUP_CREATION | 
| Firmware Test | STATUS_UPDATE | 
| Threat Intelligence Indicators | STATUS_UPDATE | 
| Named Pipe Creation | RESOURCE_CREATION | 
| Named Pipe Connection | STATUS_UPDATE | 
Referencia de asignación de campos: SENTINELONE_CF
En la siguiente tabla se enumeran los campos de registro del tipo de registro SENTINELONE_CF y sus campos de UDM correspondientes.
| Log field | UDM mapping | Logic | 
|---|---|---|
| winEventLog.description | about.labels[win_event_log_description](deprecated) | |
| winEventLog.description | additional.fields[win_event_log_description] | |
| event.time | metadata.event_timestamp | |
| winEventLog.creationDate | about.labels[win_event_log_creation_date](deprecated) | |
| winEventLog.creationDate | additional.fields[win_event_log_creation_date] | |
| account.id | metadata.product_deployment_id | |
| event.type | metadata.product_event_type | |
| event.id | metadata.product_log_id | |
| winEventLog.id | about.labels[win_event_log_id](deprecated) | |
| winEventLog.id | additional.fields[win_event_log_id] | |
|  | metadata.vendor_name | The metadata.vendor_nameUDM field is set toSentinelOne. | 
|  | extensions.auth.auth_details | If the event.typelog field value contain one of the following values, then theevent.typelog field is mapped to theextensions.auth.auth_detailsUDM field.
 | 
|  | extensions.auth.mechanism | If the event.login.typelog field value is equal toNETWORK, then theextensions.auth.mechanismUDM field is set toNETWORK.Else, if the event.login.typelog field value is equal toSYSTEM, then theextensions.auth.mechanismUDM field is set toLOCAL.Else, if the event.login.typelog field value is equal toINTERACTIVE, then theextensions.auth.mechanismUDM field is set toINTERACTIVE.Else, if the event.login.typelog field value is equal toBATCH, then theextensions.auth.mechanismUDM field is set toBATCH.Else, if the event.login.typelog field value is equal toSERVICE, then theextensions.auth.mechanismUDM field is set toSERVICE.Else, if the event.login.typelog field value is equal toUNLOCK, then theextensions.auth.mechanismUDM field is set toUNLOCK.Else, if the event.login.typelog field value is equal toNETWORK_CLEAR_TEXT, then theextensions.auth.mechanismUDM field is set toNETWORK_CLEAR_TEXT.Else, if the event.login.typelog field value is equal toNEW_CREDENTIALS, then theextensions.auth.mechanismUDM field is set toNEW_CREDENTIALS.Else, if the event.login.typelog field value is equal toREMOTE_INTERACTIVE, then theextensions.auth.mechanismUDM field is set toREMOTE_INTERACTIVE.Else, if the event.login.typelog field value is equal toCACHED_INTERACTIVE, then theextensions.auth.mechanismUDM field is set toCACHED_INTERACTIVE.Else, if the event.login.typelog field value is equal toCACHED_REMOTE_INTERACTIVE, then theextensions.auth.mechanismUDM field is set toCACHED_REMOTE_INTERACTIVE.Else, if the event.login.typelog field value is equal toCACHED_UNLOCK, then theextensions.auth.mechanismUDM field is set toCACHED_UNLOCK. | 
|  | network.application_protocol | If the event.typelog field value contain one of the following values, then thenetwork.application_protocolUDM field is set toDNS.
 | 
|  | network.direction | If the event.network.directionlog field value is equal toOUTGOING, then thenetwork.directionUDM field is set toOUTBOUND.Else, if the event.network.directionlog field value is equal toINCOMING, then thenetwork.directionUDM field is set toINBOUND. | 
| event.dns.response | network.dns.answers.name | |
| event.dns.response | network.dns.answers.type | |
| event.dns.request | network.dns.questions.name | |
| event.url.action | network.http.method | |
| event.login.sessionId | network.session_id | |
| agent.uuid | principal.asset.asset_id | |
| agent.uuid | principal.asset_id | |
| agent.version | principal.asset.attribute.labels[agent_version] | |
| winEventLog.description.accountDomain | principal.labels[win_event_log_description_account_domain](deprecated) | |
| winEventLog.description.accountDomain | additional.fields[win_event_log_description_account_domain] | |
|  | principal.asset.platform_software.platform | If the endpoint.oslog field value is equal towindows, then theprincipal.asset.platform_software.platformUDM field is set toWINDOWS.Else, if the endpoint.oslog field value is equal tolinux, then theprincipal.asset.platform_software.platformUDM field is set toLINUX. | 
|  | principal.asset.type | If the endpoint.typelog field value is equal tolaptop, then theprincipal.asset.typeUDM field is set toLAPTOP.Else, if the endpoint.typelog field value contain one of the following values, then theprincipal.asset.typeUDM field is set toSERVER.
 endpoint.typelog field value is equal todesktop, then theprincipal.asset.typeUDM field is set toWORKSTATION. | 
| endpoint.name | principal.hostname | |
| endpoint.name | principal.asset.hostname | |
| src.endpoint.ip.address | principal.ip | |
| src.ip.address | principal.ip | |
| osSrc.process.activeContent.hash | principal.labels[os_src_process_active_content_hash](deprecated) | |
| osSrc.process.activeContent.hash | additional.fields[os_src_process_active_content_hash] | |
| osSrc.process.activeContent.id | principal.labels[os_src_process_active_content_id](deprecated) | |
| osSrc.process.activeContent.id | additional.fields[os_src_process_active_content_id] | |
| osSrc.process.activeContent.path | principal.labels[os_src_process_active_content_path](deprecated) | |
| osSrc.process.activeContent.path | additional.fields[os_src_process_active_content_path] | |
| osSrc.process.activeContent.signedStatus | principal.labels[os_src_process_active_content_signed_status](deprecated) | |
| osSrc.process.activeContent.signedStatus | additional.fields[os_src_process_active_content_signed_status] | |
| osSrc.process.activeContentType | principal.labels[os_src_process_active_content_type](deprecated) | |
| osSrc.process.activeContentType | additional.fields[os_src_process_active_content_type] | |
| osSrc.process.childProcCount | principal.labels[os_src_process_child_proc_count](deprecated) | |
| osSrc.process.childProcCount | additional.fields[os_src_process_child_proc_count] | |
| osSrc.process.crossProcessCount | principal.labels[os_src_process_cross_process_count](deprecated) | |
| osSrc.process.crossProcessCount | additional.fields[os_src_process_cross_process_count] | |
| osSrc.process.crossProcessDupRemoteProcessHandleCount | principal.labels[os_src_process_cross_process_dup_rmote_process_handle_count](deprecated) | |
| osSrc.process.crossProcessDupRemoteProcessHandleCount | additional.fields[os_src_process_cross_process_dup_rmote_process_handle_count] | |
| osSrc.process.crossProcessDupThreadHandleCount | principal.labels[os_src_process_cross_process_dup_thread_handle_count](deprecated) | |
| osSrc.process.crossProcessDupThreadHandleCount | additional.fields[os_src_process_cross_process_dup_thread_handle_count] | |
| osSrc.process.crossProcessOpenProcessCount | principal.labels[os_src_process_cross_process_open_process_count](deprecated) | |
| osSrc.process.crossProcessOpenProcessCount | additional.fields[os_src_process_cross_process_open_process_count] | |
| osSrc.process.crossProcessOutOfStorylineCount | principal.labels[os_src_process_cross_process_out_of_storyline_count](deprecated) | |
| osSrc.process.crossProcessOutOfStorylineCount | additional.fields[os_src_process_cross_process_out_of_storyline_count] | |
| osSrc.process.crossProcessThreadCreateCount | principal.labels[os_src_process_cross_process_thread_create_count](deprecated) | |
| osSrc.process.crossProcessThreadCreateCount | additional.fields[os_src_process_cross_process_thread_create_count] | |
| osSrc.process.displayName | principal.labels[os_src_process_display_name](deprecated) | |
| osSrc.process.displayName | additional.fields[os_src_process_display_name] | |
| osSrc.process.dnsCount | principal.labels[os_src_process_dns_count](deprecated) | |
| osSrc.process.dnsCount | additional.fields[os_src_process_dns_count] | |
| osSrc.process.image.binaryIsExecutable | principal.labels[os_src_process_image_binary_is_executable](deprecated) | |
| osSrc.process.image.binaryIsExecutable | additional.fields[os_src_process_image_binary_is_executable] | |
| osSrc.process.indicatorBootConfigurationUpdateCount | principal.labels[os_src_process_indicator_boot_configuration_update_count](deprecated) | |
| osSrc.process.indicatorBootConfigurationUpdateCount | additional.fields[os_src_process_indicator_boot_configuration_update_count] | |
| osSrc.process.indicatorEvasionCount | principal.labels[os_src_process_indicator_evasion_count](deprecated) | |
| osSrc.process.indicatorEvasionCount | additional.fields[os_src_process_indicator_evasion_count] | |
| osSrc.process.indicatorExploitationCount | principal.labels[os_src_process_indicator_exploitation_count](deprecated) | |
| osSrc.process.indicatorExploitationCount | additional.fields[os_src_process_indicator_exploitation_count] | |
| osSrc.process.indicatorGeneral.count | principal.labels[os_src_process_indicator_general_count](deprecated) | |
| osSrc.process.indicatorGeneral.count | additional.fields[os_src_process_indicator_general_count] | |
| osSrc.process.indicatorInfostealerCount | principal.labels[os_src_process_indicator_infostealer_count](deprecated) | |
| osSrc.process.indicatorInfostealerCount | additional.fields[os_src_process_indicator_infostealer_count] | |
| osSrc.process.indicatorInjectionCount | principal.labels[os_src_process_indicator_injection_count](deprecated) | |
| osSrc.process.indicatorInjectionCount | additional.fields[os_src_process_indicator_injection_count] | |
| osSrc.process.indicatorPersistenceCount | principal.labels[os_src_process_indicator_persistence_count](deprecated) | |
| osSrc.process.indicatorPersistenceCount | additional.fields[os_src_process_indicator_persistence_count] | |
| osSrc.process.indicatorPostExploitationCount | principal.labels[os_src_process_indicator_post_exploitation_count](deprecated) | |
| osSrc.process.indicatorPostExploitationCount | additional.fields[os_src_process_indicator_post_exploitation_count] | |
| osSrc.process.indicatorRansomwareCount | principal.labels[os_src_process_indicator_ransomware_count](deprecated) | |
| osSrc.process.indicatorRansomwareCount | additional.fields[os_src_process_indicator_ransomware_count] | |
| osSrc.process.indicatorReconnaissanceCount | principal.labels[os_src_process_indicator_reconnaissance_count](deprecated) | |
| osSrc.process.indicatorReconnaissanceCount | additional.fields[os_src_process_indicator_reconnaissance_count] | |
| osSrc.process.integrityLevel | principal.labels[os_src_process_integrity_level](deprecated) | |
| osSrc.process.integrityLevel | additional.fields[os_src_process_integrity_level] | |
| osSrc.process.isNative64Bit | principal.labels[os_src_process_is_native_64_bit](deprecated) | |
| osSrc.process.isNative64Bit | additional.fields[os_src_process_is_native_64_bit] | |
| osSrc.process.isRedirectCmdProcessor | principal.labels[os_src_process_is_redirect_cmd_processor](deprecated) | |
| osSrc.process.isRedirectCmdProcessor | additional.fields[os_src_process_is_redirect_cmd_processor] | |
| osSrc.process.isStorylineRoot | principal.labels[os_src_process_is_storyline_root](deprecated) | |
| osSrc.process.isStorylineRoot | additional.fields[os_src_process_is_storyline_root] | |
| osSrc.process.moduleCount | principal.labels[os_src_process_module_count](deprecated) | |
| osSrc.process.moduleCount | additional.fields[os_src_process_module_count] | |
| osSrc.process.netConnCount | principal.labels[os_src_process_net_conn_count](deprecated) | |
| osSrc.process.netConnCount | additional.fields[os_src_process_net_conn_count] | |
| osSrc.process.netConnInCount | principal.labels[os_src_process_net_conn_in_count](deprecated) | |
| osSrc.process.netConnInCount | additional.fields[os_src_process_net_conn_in_count] | |
| osSrc.process.netConnOutCount | principal.labels[os_src_process_net_conn_out_count](deprecated) | |
| osSrc.process.netConnOutCount | additional.fields[os_src_process_net_conn_out_count] | |
| osSrc.process.parent.activeContent.hash | principal.labels[os_src_process_parent_active_content_hash](deprecated) | |
| osSrc.process.parent.activeContent.hash | additional.fields[os_src_process_parent_active_content_hash] | |
| osSrc.process.parent.activeContent.id | principal.labels[os_src_process_parent_active_content_id](deprecated) | |
| osSrc.process.parent.activeContent.id | additional.fields[os_src_process_parent_active_content_id] | |
| osSrc.process.parent.activeContent.path | principal.labels[os_src_process_parent_active_content_path](deprecated) | |
| osSrc.process.parent.activeContent.path | additional.fields[os_src_process_parent_active_content_path] | |
| osSrc.process.parent.activeContent.signedStatus | principal.labels[os_src_process_parent_active_content_signed_status](deprecated) | |
| osSrc.process.parent.activeContent.signedStatus | additional.fields[os_src_process_parent_active_content_signed_status] | |
| osSrc.process.parent.activeContentType | principal.labels[os_src_process_parent_active_content_type](deprecated) | |
| osSrc.process.parent.activeContentType | additional.fields[os_src_process_parent_active_content_type] | |
| osSrc.process.parent.displayName | principal.labels[os_src_process_parent_display_name](deprecated) | |
| osSrc.process.parent.displayName | additional.fields[os_src_process_parent_display_name] | |
| osSrc.process.parent.integrityLevel | principal.labels[os_src_process_parent_integrity_level](deprecated) | |
| osSrc.process.parent.integrityLevel | additional.fields[os_src_process_parent_integrity_level] | |
| osSrc.process.parent.isNative64Bit | principal.labels[os_src_process_parent_is_native_64_bit](deprecated) | |
| osSrc.process.parent.isNative64Bit | additional.fields[os_src_process_parent_is_native_64_bit] | |
| osSrc.process.parent.isRedirectCmdProcessor | principal.labels[os_src_process_parent_is_redirect_cmd_processor](deprecated) | |
| osSrc.process.parent.isRedirectCmdProcessor | additional.fields[os_src_process_parent_is_redirect_cmd_processor] | |
| osSrc.process.parent.isStorylineRoot | principal.labels[os_src_process_parent_is_storyline_root](deprecated) | |
| osSrc.process.parent.isStorylineRoot | additional.fields[os_src_process_parent_is_storyline_root] | |
| osSrc.process.parent.publisher | principal.labels[os_src_process_parent_publisher](deprecated) | |
| osSrc.process.parent.publisher | additional.fields[os_src_process_parent_publisher] | |
| osSrc.process.parent.sessionId | principal.labels[os_src_process_parent_session_id](deprecated) | |
| osSrc.process.parent.sessionId | additional.fields[os_src_process_parent_session_id] | |
| osSrc.process.parent.signedStatus | principal.process_ancestors.parent_process.file.signature_info.sigcheck.verification_message | |
| osSrc.process.parent.startTime | principal.labels[os_src_process_parent_start_time](deprecated) | |
| osSrc.process.parent.startTime | additional.fields[os_src_process_parent_start_time] | |
| osSrc.process.parent.storyline.id | principal.labels[os_src_process_parent_storyline_id](deprecated) | |
| osSrc.process.parent.storyline.id | additional.fields[os_src_process_parent_storyline_id] | |
| src.process.parent.storyline.id | principal.labels[src_process_parent_storyline_id](deprecated) | |
| src.process.parent.storyline.id | additional.fields[src_process_parent_storyline_id] | |
| osSrc.process.publisher | principal.labels[os_src_process_publisher](deprecated) | |
| osSrc.process.publisher | additional.fields[os_src_process_publisher] | |
| osSrc.process.registryChangeCount | principal.labels[os_src_process_registry_change_count](deprecated) | |
| osSrc.process.registryChangeCount | additional.fields[os_src_process_registry_change_count] | |
| osSrc.process.sessionId | principal.labels[os_src_process_session_id](deprecated) | |
| osSrc.process.sessionId | additional.fields[os_src_process_session_id] | |
| osSrc.process.signedStatus | principal.process_ancestors.file.signature_info.sigcheck.verification_message | |
| osSrc.process.startTime | principal.labels[os_src_process_start_time](deprecated) | |
| osSrc.process.startTime | additional.fields[os_src_process_start_time] | |
| osSrc.process.storyline.id | principal.labels[os_src_process_storyline_id](deprecated) | |
| osSrc.process.storyline.id | additional.fields[os_src_process_storyline_id] | |
| osSrc.process.subsystem | principal.labels[os_src_process_subsystem](deprecated) | |
| osSrc.process.subsystem | additional.fields[os_src_process_subsystem] | |
| osSrc.process.tgtFileCreationCount | principal.labels[os_src_process_tgt_file_creation_count](deprecated) | |
| osSrc.process.tgtFileCreationCount | additional.fields[os_src_process_tgt_file_creation_count] | |
| osSrc.process.tgtFileDeletionCount | principal.labels[os_src_process_tgt_file_deletion_count](deprecated) | |
| osSrc.process.tgtFileDeletionCount | additional.fields[os_src_process_tgt_file_deletion_count] | |
| osSrc.process.tgtFileModificationCount | principal.labels[os_src_process_tgt_file_modification_count](deprecated) | |
| osSrc.process.tgtFileModificationCount | additional.fields[os_src_process_tgt_file_modification_count] | |
| osSrc.process.verifiedStatus | principal.labels[os_src_process_verified_status](deprecated) | |
| osSrc.process.verifiedStatus | additional.fields[os_src_process_verified_status] | |
| process.unique.key | principal.labels[process_unique_key](deprecated) | |
| process.unique.key | additional.fields[process_unique_key] | |
| site.name | principal.labels[site_name](deprecated) | |
| site.name | additional.fields[site_name] | |
| src.process.activeContent.hash | principal.labels[src_process_active_content_hash](deprecated) | |
| src.process.activeContent.hash | additional.fields[src_process_active_content_hash] | |
| src.process.activeContent.id | principal.labels[src_process_active_content_id](deprecated) | |
| src.process.activeContent.id | additional.fields[src_process_active_content_id] | |
| src.process.activeContent.path | principal.labels[src_process_active_content_path](deprecated) | |
| src.process.activeContent.path | additional.fields[src_process_active_content_path] | |
| src.process.activeContent.signedStatus | principal.labels[src_process_active_content_signed_status](deprecated) | |
| src.process.activeContent.signedStatus | additional.fields[src_process_active_content_signed_status] | |
| src.process.activeContentType | principal.labels[src_process_active_content_type](deprecated) | |
| src.process.activeContentType | additional.fields[src_process_active_content_type] | |
| src.process.childProcCount | principal.labels[src_process_child_proc_count](deprecated) | |
| src.process.childProcCount | additional.fields[src_process_child_proc_count] | |
| src.process.crossProcessCount | principal.labels[src_process_cross_process_count](deprecated) | |
| src.process.crossProcessCount | additional.fields[src_process_cross_process_count] | |
| src.process.crossProcessDupRemoteProcessHandleCount | principal.labels[src_process_cross_process_dup_remote_process_handle_count](deprecated) | |
| src.process.crossProcessDupRemoteProcessHandleCount | additional.fields[src_process_cross_process_dup_remote_process_handle_count] | |
| src.process.crossProcessDupThreadHandleCount | principal.labels[src_process_cross_process_dup_thread_handle_count](deprecated) | |
| src.process.crossProcessDupThreadHandleCount | additional.fields[src_process_cross_process_dup_thread_handle_count] | |
| src.process.crossProcessOpenProcessCount | principal.labels[src_process_cross_process_open_process_count](deprecated) | |
| src.process.crossProcessOpenProcessCount | additional.fields[src_process_cross_process_open_process_count] | |
| src.process.crossProcessOutOfStorylineCount | principal.labels[src_process_cross_process_out_of_storyline_count](deprecated) | |
| src.process.crossProcessOutOfStorylineCount | additional.fields[src_process_cross_process_out_of_storyline_count] | |
| src.process.crossProcessThreadCreateCount | principal.labels[src_process_cross_process_thread_create_count](deprecated) | |
| src.process.crossProcessThreadCreateCount | additional.fields[src_process_cross_process_thread_create_count] | |
| src.process.displayName | principal.labels[src_process_display_name](deprecated) | |
| src.process.displayName | additional.fields[src_process_display_name] | |
| src.process.dnsCount | principal.labels[src_process_dns_count](deprecated) | |
| src.process.dnsCount | additional.fields[src_process_dns_count] | |
| src.process.image.binaryIsExecutable | principal.labels[src_process_image_binary_is_executable](deprecated) | |
| src.process.image.binaryIsExecutable | additional.fields[src_process_image_binary_is_executable] | |
| src.process.indicatorBootConfigurationUpdateCount | principal.labels[src_process_indicator_boot_configuration_update_count](deprecated) | |
| src.process.indicatorBootConfigurationUpdateCount | additional.fields[src_process_indicator_boot_configuration_update_count] | |
| src.process.indicatorEvasionCount | principal.labels[src_process_indicator_evasion_count](deprecated) | |
| src.process.indicatorEvasionCount | additional.fields[src_process_indicator_evasion_count] | |
| src.process.indicatorExploitationCount | principal.labels[src_process_indicator_exploitation_count](deprecated) | |
| src.process.indicatorExploitationCount | additional.fields[src_process_indicator_exploitation_count] | |
| src.process.indicatorGeneralCount | principal.labels[src_process_indicator_general_count](deprecated) | |
| src.process.indicatorGeneralCount | additional.fields[src_process_indicator_general_count] | |
| src.process.indicatorInfostealerCount | principal.labels[src_process_indicator_infostealer_count](deprecated) | |
| src.process.indicatorInfostealerCount | additional.fields[src_process_indicator_infostealer_count] | |
| src.process.indicatorInjectionCount | principal.labels[src_process_indicator_injection_count](deprecated) | |
| src.process.indicatorInjectionCount | additional.fields[src_process_indicator_injection_count] | |
| src.process.indicatorPersistenceCount | principal.labels[src_process_indicator_persistence_count](deprecated) | |
| src.process.indicatorPersistenceCount | additional.fields[src_process_indicator_persistence_count] | |
| src.process.indicatorPostExploitationCount | principal.labels[src_process_indicator_post_exploitation_count](deprecated) | |
| src.process.indicatorPostExploitationCount | additional.fields[src_process_indicator_post_exploitation_count] | |
| src.process.indicatorRansomwareCount | principal.labels[src_process_indicator_ransomware_count](deprecated) | |
| src.process.indicatorRansomwareCount | additional.fields[src_process_indicator_ransomware_count] | |
| src.process.indicatorReconnaissanceCount | principal.labels[src_process_indicator_reconnaissance_count](deprecated) | |
| src.process.indicatorReconnaissanceCount | additional.fields[src_process_indicator_reconnaissance_count] | |
| src.process.integrityLevel | principal.labels[src_process_integrity_level](deprecated) | |
| src.process.integrityLevel | additional.fields[src_process_integrity_level] | |
| src.process.isNative64Bit | principal.labels[src_process_is_native_64_bit](deprecated) | |
| src.process.isNative64Bit | additional.fields[src_process_is_native_64_bit] | |
| src.process.isRedirectCmdProcessor | principal.labels[src_process_is_redirect_cmd_processor](deprecated) | |
| src.process.isRedirectCmdProcessor | additional.fields[src_process_is_redirect_cmd_processor] | |
| src.process.isStorylineRoot | principal.labels[src_process_is_storyline_root](deprecated) | |
| src.process.isStorylineRoot | additional.fields[src_process_is_storyline_root] | |
| src.process.lUserUid | principal.labels[src_process_l_user_uid](deprecated) | |
| src.process.lUserUid | additional.fields[src_process_l_user_uid] | |
| src.process.moduleCount | principal.labels[src_process_module_count](deprecated) | |
| src.process.moduleCount | additional.fields[src_process_module_count] | |
| src.process.netConnCount | principal.labels[src_process_net_conn_count](deprecated) | |
| src.process.netConnCount | additional.fields[src_process_net_conn_count] | |
| src.process.netConnInCount | principal.labels[src_process_net_conn_in_count](deprecated) | |
| src.process.netConnInCount | additional.fields[src_process_net_conn_in_count] | |
| src.process.netConnOutCount | principal.labels[src_process_net_conn_out_count](deprecated) | |
| src.process.netConnOutCount | additional.fields[src_process_net_conn_out_count] | |
| src.process.parent.activeContent.hash | principal.labels[src_process_parent_active_content_hash](deprecated) | |
| src.process.parent.activeContent.hash | additional.fields[src_process_parent_active_content_hash] | |
| src.process.parent.activeContent.id | principal.labels[src_process_parent_active_content_id](deprecated) | |
| src.process.parent.activeContent.id | additional.fields[src_process_parent_active_content_id] | |
| src.process.parent.activeContent.path | principal.labels[src_process_parent_active_content_path](deprecated) | |
| src.process.parent.activeContent.path | additional.fields[src_process_parent_active_content_path] | |
| src.process.parent.activeContent.signedStatus | principal.labels[src_process_parent_active_content_signed_status](deprecated) | |
| src.process.parent.activeContent.signedStatus | additional.fields[src_process_parent_active_content_signed_status] | |
| src.process.parent.activeContentType | principal.labels[src_process_parent_active_content_type](deprecated) | |
| src.process.parent.activeContentType | additional.fields[src_process_parent_active_content_type] | |
| src.process.parent.displayName | principal.labels[src_process_parent_display_name](deprecated) | |
| src.process.parent.displayName | additional.fields[src_process_parent_display_name] | |
| src.process.parent.integrityLevel | principal.labels[src_process_parent_integrity_level](deprecated) | |
| src.process.parent.integrityLevel | additional.fields[src_process_parent_integrity_level] | |
| src.process.parent.isNative64Bit | principal.labels[src_process_parent_is_native_64_bit](deprecated) | |
| src.process.parent.isNative64Bit | additional.fields[src_process_parent_is_native_64_bit] | |
| src.process.parent.isRedirectCmdProcessor | principal.labels[src_process_parent_is_redirect_cmd_processor](deprecated) | |
| src.process.parent.isRedirectCmdProcessor | additional.fields[src_process_parent_is_redirect_cmd_processor] | |
| src.process.parent.isStorylineRoot | principal.labels[src_process_parent_is_storyline_root](deprecated) | |
| src.process.parent.isStorylineRoot | additional.fields[src_process_parent_is_storyline_root] | |
| src.process.parent.publisher | principal.labels[src_process_parent_publisher](deprecated) | |
| src.process.parent.publisher | additional.fields[src_process_parent_publisher] | |
| src.process.parent.reasonSignatureInvalid | principal.labels[src_process_parent_reason_signature_invalid](deprecated) | |
| src.process.parent.reasonSignatureInvalid | additional.fields[src_process_parent_reason_signature_invalid] | |
| src.process.parent.sessionId | principal.labels[src_process_parent_session_id](deprecated) | |
| src.process.parent.sessionId | additional.fields[src_process_parent_session_id] | |
| src.process.parent.signedStatus | principal.process.parent_process.file.signature_info.sigcheck.verification_message | |
| src.process.parent.startTime | principal.labels[src_process_parent_start_time](deprecated) | |
| src.process.parent.startTime | additional.fields[src_process_parent_start_time] | |
| src.process.parent.subsystem | principal.labels[src_process_parent_subsystem](deprecated) | |
| src.process.parent.subsystem | additional.fields[src_process_parent_subsystem] | |
| src.process.publisher | principal.labels[src_process_publisher](deprecated) | |
| src.process.publisher | additional.fields[src_process_publisher] | |
| src.process.reasonSignatureInvalid | principal.labels[src_process_reason_signature_invalid](deprecated) | |
| src.process.reasonSignatureInvalid | additional.fields[src_process_reason_signature_invalid] | |
| src.process.registryChangeCount | principal.labels[src_process_registry_change_count](deprecated) | |
| src.process.registryChangeCount | additional.fields[src_process_registry_change_count] | |
| src.process.rpid | principal.labels[src_process_rpid](deprecated) | |
| src.process.rpid | additional.fields[src_process_rpid] | |
| src.process.sessionId | principal.labels[src_process_session_id](deprecated) | |
| src.process.sessionId | additional.fields[src_process_session_id] | |
| src.process.signedStatus | principal.process.file.signature_info.sigcheck.verification_message | |
| src.process.startTime | principal.labels[src_process_start_time](deprecated) | |
| src.process.startTime | additional.fields[src_process_start_time] | |
| src.process.storyline.id | principal.labels[src_process_storyline_id](deprecated) | |
| src.process.storyline.id | additional.fields[src_process_storyline_id] | |
| src.process.subsystem | principal.labels[src_process_subsystem](deprecated) | |
| src.process.subsystem | additional.fields[src_process_subsystem] | |
| src.process.tgtFileCreationCount | principal.labels[src_process_tgt_file_creation_count](deprecated) | |
| src.process.tgtFileCreationCount | additional.fields[src_process_tgt_file_creation_count] | |
| src.process.tgtFileDeletionCount | principal.labels[src_process_tgt_file_deletion_count](deprecated) | |
| src.process.tgtFileDeletionCount | additional.fields[src_process_tgt_file_deletion_count] | |
| src.process.tgtFileModificationCount | principal.labels[src_process_tgt_file_modification_count](deprecated) | |
| src.process.tgtFileModificationCount | additional.fields[src_process_tgt_file_modification_count] | |
| src.process.tid | principal.labels[src_process_tid](deprecated) | |
| src.process.tid | additional.fields[src_process_tid] | |
|  | principal.process.product_specific_process_id | If the src.process.uidlog field value is not empty, then theSO:%{site.id}:%{account.id}:%{agent.uuid}:%{src.process.uid}log field is mapped to theprincipal.process.product_specific_process_idUDM field. | 
| src.process.verifiedStatus | principal.labels[src_process_verified_status](deprecated) | |
| src.process.verifiedStatus | additional.fields[src_process_verified_status] | |
| site.id | principal.labels[site_id](deprecated) | |
| site.id | additional.fields[site_id] | |
|  | principal.platform | If the os.namelog field value matches the regular expression pattern(?i)win, then theprincipal.platformUDM field is set toWINDOWS.Else, if the os.namelog field value matches the regular expression pattern(?i)lin, then theprincipal.platformUDM field is set toLINUX. | 
| src.port.number | principal.port | |
| osSrc.process.cmdline | principal.process_ancestors.command_line | |
| osSrc.process.image.path | principal.process_ancestors.file.full_path | |
| osSrc.process.image.md5 | principal.process_ancestors.file.md5 | If the osSrc.process.image.md5log field value matches the regular expression pattern^[a-f0-9]{32}$, then theosSrc.process.image.md5log field is mapped to theprincipal.process_ancestors.file.md5UDM field. | 
| osSrc.process.name | principal.process_ancestors.file.names | |
| osSrc.process.image.sha1 | principal.process_ancestors.file.sha1 | If the osSrc.process.image.sha1log field value matches the regular expression pattern^[a-f0-9]{40}$, then theosSrc.process.image.sha1log field is mapped to theprincipal.process_ancestors.file.sha1UDM field. | 
| osSrc.process.image.sha256 | principal.process_ancestors.file.sha256 | If the osSrc.process.image.sha256log field value matches the regular expression pattern^[a-f0-9]{64}$, then theosSrc.process.image.sha256log field is mapped to theprincipal.process_ancestors.file.sha256UDM field. | 
| osSrc.process.parent.cmdline | principal.process_ancestors.parent_process.command_line | |
| osSrc.process.parent.image.path | principal.process_ancestors.parent_process.file.full_path | |
| osSrc.process.parent.image.md5 | principal.process_ancestors.parent_process.file.md5 | If the osSrc.process.parent.image.md5log field value matches the regular expression pattern^[a-f0-9]{32}$, then theosSrc.process.parent.image.md5log field is mapped to theprincipal.process_ancestors.parent_process.file.md5UDM field. | 
| osSrc.process.parent.name | principal.process_ancestors.parent_process.file.names | |
| osSrc.process.parent.image.sha1 | principal.process_ancestors.parent_process.file.sha1 | If the osSrc.process.parent.image.sha1log field value matches the regular expression pattern^[a-f0-9]{40}$, then theosSrc.process.parent.image.sha1log field is mapped to theprincipal.process_ancestors.parent_process.file.sha1UDM field. | 
| osSrc.process.parent.image.sha256 | principal.process_ancestors.parent_process.file.sha256 | If the osSrc.process.parent.image.sha256log field value matches the regular expression pattern^[a-f0-9]{64}$, then theosSrc.process.parent.image.sha256log field is mapped to theprincipal.process_ancestors.parent_process.file.sha256UDM field. | 
| osSrc.process.parent.pid | principal.process_ancestors.parent_process.pid | |
| osSrc.process.pid | principal.process_ancestors.pid | |
|  | principal.process_ancestors.product_specific_process_id | If the osSrc.process.uidlog field value is not empty, then theSO:%{site.id}:%{account.id}:%{agent.uuid}:%{osSrc.process.uid}log field is mapped to theprincipal.process_ancestors.product_specific_process_idUDM field. | 
| src.process.cmdline | principal.process.command_line | |
| src.process.image.path | principal.process.file.full_path | |
| src.process.image.md5 | principal.process.file.md5 | If the src.process.image.md5log field value matches the regular expression pattern^[a-f0-9]{32}$, then thesrc.process.image.md5log field is mapped to theprincipal.process.file.md5UDM field. | 
| src.process.name | principal.process.file.names | |
| src.process.image.sha1 | principal.process.file.sha1 | If the src.process.image.sha1log field value matches the regular expression pattern^[a-f0-9]{40}$, then thesrc.process.image.sha1log field is mapped to theprincipal.process.file.sha1UDM field. | 
| src.process.image.sha256 | principal.process.file.sha256 | If the src.process.image.sha256log field value matches the regular expression pattern^[a-f0-9]{64}$, then thesrc.process.image.sha256log field is mapped to theprincipal.process.file.sha256UDM field. | 
| src.process.parent.cmdline | principal.process.parent_process.command_line | |
| src.process.parent.image.md5 | principal.process.parent_process.file.md5 | If the src.process.parent.image.md5log field value matches the regular expression pattern^[a-f0-9]{32}$, then thesrc.process.parent.image.md5log field is mapped to theprincipal.process.parent_process.file.md5UDM field. | 
| src.process.parent.image.path | principal.process.parent_process.file.full_path | |
| src.process.parent.name | principal.process.parent_process.file.names | |
| src.process.parent.image.sha1 | principal.process.parent_process.file.sha1 | If the src.process.parent.image.sha1log field value matches the regular expression pattern^[a-f0-9]{40}$, then thesrc.process.parent.image.sha1log field is mapped to theprincipal.process.parent_process.file.sha1UDM field. | 
| src.process.parent.image.sha256 | principal.process.parent_process.file.sha256 | If the src.process.parent.image.sha256log field value matches the regular expression pattern^[a-f0-9]{64}$, then thesrc.process.parent.image.sha256log field is mapped to theprincipal.process.parent_process.file.sha256UDM field. | 
| src.process.parent.pid | principal.process.parent_process.pid | |
|  | principal.process_ancestors.parent_process.product_specific_process_id | If the osSrc.process.parent.uidlog field value is not empty, then theSO:%{site.id}:%{account.id}:%{agent.uuid}:%{osSrc.process.parent.uid}log field is mapped to theprincipal.process_ancestors.parent_process.product_specific_process_idUDM field. | 
|  | principal.process.parent_process.product_specific_process_id | If the src.process.parent.uidlog field value is not empty, then theSO:%{site.id}:%{account.id}:%{agent.uuid}:%{src.process.parent.uid}log field is mapped to theprincipal.process.parent_process.product_specific_process_idUDM field. | 
| src.process.pid | principal.process.pid | |
| osSrc.process.user | principal.user.attribute.labels[os_src_process_user] | |
| src.process.eUserUid | principal.user.attribute.labels[src_process_e_user_uid] | |
| src.process.lUserName | principal.user.attribute.labels[src_process_l_user_name] | |
| src.process.parent.eUserUid | principal.user.attribute.labels[src_process_parent_e_user_uid] | |
| src.process.parent.lUserUid | principal.user.attribute.labels[src_process_parent_l_user_uid] | |
| src.process.parent.rUserUid | principal.user.attribute.labels[src_process_parent_r_user_uid] | |
| src.process.rUserName | principal.user.attribute.labels[src_process_r_user_name] | |
| src.process.rUserUid | principal.user.attribute.labels[src_process_r_user_uid] | |
| src.process.eUserName | principal.user.attribute.labels[src_process_e_user_name] | |
| src.process.parent.eUserName | principal.user.attribute.labels[src_process_parent_e_user_name] | |
| src.process.parent.lUserName | principal.user.attribute.labels[src_process_parent_l_user_name] | |
| src.process.parent.rUserName | principal.user.attribute.labels[src_process_parent_r_user_name] | |
| osSrc.process.parent.user | principal.user.attribute.labels[os_src_process_parent_user] | |
| src.process.parent.user | principal.user.attribute.labels[src_process_parent_user] | |
| src.process.user | principal.user.userid | |
| tiIndicator.value | security_result.about.file.md5 | If the tiIndicator.typelog field value is equal toMd5, then thetiIndicator.valuelog field is mapped to thesecurity_result.about.file.md5UDM field. | 
| tiIndicator.value | security_result.about.file.sha1 | If the tiIndicator.typelog field value is equal toSha1, then thetiIndicator.valuelog field is mapped to thesecurity_result.about.file.sha1UDM field. | 
| tiIndicator.value | security_result.about.ip | If the tiIndicator.typelog field value contain one of the following values, then thetiIndicator.valuelog field is mapped to thesecurity_result.about.ipUDM field.
 | 
| tiIndicator.value | security_result.about.labels[tiIndicator.value](deprecated) | If the tiIndicator.typelog field value does not contain one of the following values, then thetiIndicator.valuelog field is mapped to thesecurity_result.about.labelsUDM field.
 | 
| tiIndicator.value | additional.fields[tiIndicator.value] | If the tiIndicator.typelog field value does not contain one of the following values, then thetiIndicator.valuelog field is mapped to theadditional.fieldsUDM field.
 | 
| tiIndicator.value | network.dns.questions.name | If the tiIndicator.typelog field value is equal toDNS, then thetiIndicator.valuelog field is mapped to thenetwork.dns.questions.nameUDM field. | 
| tiIndicator.value | security_result.about.url | If the tiIndicator.typelog field value is equal toURL, then thetiIndicator.valuelog field is mapped to thesecurity_result.about.urlUDM field. | 
| winEventLog.providerName | security_result.about.resource.attribute.labels[win_event_log_provider_name] | |
| tiIndicator.addedBy | security_result.about.user.email_addresses | |
| tiIndicator.threatActors | security_result.about.user.email_addresses | |
|  | security_result.action | If the event.login.loginIsSuccessfullog field value is equal totrue, then thesecurity_result.actionUDM field is set toALLOW.Else, if the event.login.loginIsSuccessfullog field value is equal tofalse, then thesecurity_result.actionUDM field is set toBLOCK.If the event.network.connectionStatuslog field value is equal toSUCCESS, then thesecurity_result.actionUDM field is set toALLOW.Else, if the event.network.connectionStatuslog field value is equal toFAILURE, then thesecurity_result.actionUDM field is set toFAIL.Else, if the event.network.connectionStatuslog field value is equal toBLOCKED, then thesecurity_result.actionUDM field is set toBLOCK. | 
| event.network.connectionStatus | security_result.action_details | |
| tiIndicator.mitreTactics | security_result.attack_details.tactics.name | |
|  | security_result.category | If the indicator.categorylog field value contain one of the following values, then thesecurity_result.categoryUDM field is set toSOFTWARE_MALICIOUS.
 indicator.categorylog field value contain one of the following values, then thesecurity_result.categoryUDM field is set toNETWORK_SUSPICIOUS.
 indicator.categorylog field value contain one of the following values, then thesecurity_result.categoryUDM field is set toSOFTWARE_SUSPICIOUS.
 indicator.categorylog field value contain one of the following values, then thesecurity_result.categoryUDM field is set toSOFTWARE_PUA.
 indicator.categorylog field value is equal toExploit, then thesecurity_result.categoryUDM field is set toEXPLOIT. | 
|  | security_result.category | If the tiIndicator.categorieslog field value matches the regular expression patternmalware, then thesecurity_result.categoryUDM field is set toSOFTWARE_MALICIOUS. | 
| indicator.category | security_result.category_details | |
| tiIndicator.categories | security_result.category_details | |
| indicator.description | security_result.description | |
| event.login.failureReason | security_result.description | |
| tiIndicator.description | security_result.descripton | |
| indicator.metadata | security_result.detection_fields [indicator_metadata] | |
| indicator.name | security_result.detection_fields [indicator_name] | |
| tiIndicator.comparisonMethod | security_result.detection_fields [ti_indicator_comparison_method] | |
| tiIndicator.creationTime | security_result.detection_fields [ti_indicator_creation_time] | |
| tiIndicator.externalId | security_result.detection_fields [ti_indicator_external_id] | |
| tiIndicator.metadata | security_result.detection_fields [ti_indicator_metadata] | |
| tiIndicator.modificationTime | security_result.detection_fields [ti_indicator_modification_time] | |
| tiindicator.originalEvent.id | security_result.detection_fields [ti_indicator_original_event_id] | |
| tiindicator.originalEvent.index | security_result.detection_fields [ti_indicator_original_event_index] | |
| tiindicator.originalEvent.time | security_result.detection_fields [ti_indicator_original_event_time] | |
| tiindicator.originalEvent.traceId | security_result.detection_fields [ti_indicator_original_event_trace_id] | |
| tiIndicator.references | security_result.detection_fields [ti_indicator_references] | |
| tiIndicator.intrusionSets | security_result.detection_fields [ti_indicator_tiIndicator_intrusion_sets] | |
| tiIndicator.type | security_result.detection_fields [ti_indicator_type] | |
| tiIndicator.uid | security_result.detection_fields [ti_indicator_uid] | |
| tiIndicator.uploadTime | security_result.detection_fields [ti_indicator_upload_time] | |
| tiIndicator.validUntil | security_result.detection_fields [ti_indicator_valid_until] | |
| osSrc.process.parent.reasonSignatureInvalid | security_result.detection_fields[os_src_process_parent_reason_signature_invalid] | |
| osSrc.process.reasonSignatureInvalid | security_result.detection_fields[os_src_process_reason_signature_invalid] | |
| tgt.process.reasonSignatureInvalid | security_result.detection_fields[tgt_process_reason_signature_invalid] | |
|  | security_result.severity | If the winEventLog.levellog field value matches the regular expression pattern^(INFO|Informational|Information|Normal|NOTICE)$, then thesecurity_result.severityUDM field is set toINFORMATIONAL.Else, if the winEventLog.levellog field value contain one of the following values, then thesecurity_result.severityUDM field is set toINFORMATIONAL.
 winEventLog.levellog field value matches the regular expression patternError, then thesecurity_result.severityUDM field is set toERROR.Else, if the winEventLog.levellog field value matches the regular expression patternCritical, then thesecurity_result.severityUDM field is set toCRITICAL. | 
| winEventLog.level | security_result.severity_details | |
| tiIndicator.name | security_result.threat_name | |
| tiIndicator.source | security_result.threat_feed_name | |
| tgt.file.oldPath | src.file.full_path | |
| tgt.file.oldMd5 | src.file.md5 | If the tgt.file.oldMd5log field value matches the regular expression pattern^[a-f0-9]{32}$, then thetgt.file.oldMd5log field is mapped to thesrc.file.md5UDM field. | 
| driver.peSha1 | target.process.file.sha1 | If the driver.peSha1log field value matches the regular expression pattern^[a-f0-9]{40}$, then thedriver.peSha1log field is mapped to thetarget.process.file.sha1UDM field. | 
| tgt.file.oldSha1 | src.file.sha1 | If the tgt.file.oldSha1log field value matches the regular expression pattern^[a-f0-9]{40}$, then thetgt.file.oldSha1log field is mapped to thesrc.file.sha1UDM field. | 
| driver.peSha256 | target.process.file.sha256 | If the driver.peSha256log field value matches the regular expression pattern^[a-f0-9]{64}$, then thedriver.peSha256log field is mapped to thetarget.process.file.sha256UDM field. | 
| tgt.file.oldSha256 | src.file.sha256 | If the tgt.file.oldSha256log field value matches the regular expression pattern^[a-f0-9]{64}$, then thetgt.file.oldSha256log field is mapped to thesrc.file.sha256UDM field. | 
| driver.certificate.thumbprintAlgorithm | target.labels[driver_certificate_thumbprint_algorithm](deprecated) | |
| driver.certificate.thumbprintAlgorithm | additional.fields[driver_certificate_thumbprint_algorithm] | |
| driver.certificate.thumbprint | target.labels[driver_certificate_thumbprint](deprecated) | |
| driver.certificate.thumbprint | additional.fields[driver_certificate_thumbprint] | |
| driver.isLoadedBeforeMonitor | target.labels[driver_is_loaded_before_monitor](deprecated) | |
| driver.isLoadedBeforeMonitor | additional.fields[driver_is_loaded_before_monitor] | |
| driver.loadVerdict | target.labels[driver_load_verdict](deprecated) | |
| driver.loadVerdict | additional.fields[driver_load_verdict] | |
| driver.startType | target.labels[driver_start_type](deprecated) | |
| driver.startType | additional.fields[driver_start_type] | |
| registry.oldValueFullSize | src.labels[registry_old_value_full_size](deprecated) | |
| registry.oldValueFullSize | additional.fields[registry_old_value_full_size] | |
| registry.oldValueIsComplete | src.labels[registry_old_valueIs_complete](deprecated) | |
| registry.oldValueIsComplete | additional.fields[registry_old_valueIs_complete] | |
| registry.oldValue | src.registry.registry_value_data | |
| registry.oldValueType | src.registry.registry_value_name | |
| tgt.file.location | target.labels[tgt_file_location](deprecated) | |
| tgt.file.location | additional.fields[tgt_file_location] | |
| cmdScript.applicationName | target.application | |
| event.login.accountDomain | target.domain.name | |
| tgt.file.path | target.file.full_path | |
| tgt.file.modificationTime | target.file.last_modification_time | |
| tgt.file.md5 | target.file.md5 | If the tgt.file.md5log field value matches the regular expression pattern^[a-f0-9]{32}$, then thetgt.file.md5log field is mapped to thetarget.file.md5UDM field. | 
| tgt.file.extension | target.file.mime_type | |
| tgt.file.id | target.file.names | |
| tgt.file.internalName | target.file.names | |
| tgt.file.sha1 | target.file.sha1 | If the tgt.file.sha1log field value matches the regular expression pattern^[a-f0-9]{40}$, then thetgt.file.sha1log field is mapped to thetarget.file.sha1UDM field. | 
| tgt.file.sha256 | target.file.sha256 | If the tgt.file.sha256log field value matches the regular expression pattern^[a-f0-9]{64}$, then thetgt.file.sha256log field is mapped to thetarget.file.sha256UDM field. | 
| tgt.file.size | target.file.size | |
|  | target.file.file_type | If the tgt.file.typelog field value is equal toPE, then thetarget.file.file_typeUDM field is set toFILE_TYPE_PE_EXE.Else, if the tgt.file.typelog field value is equal toELF, then thetarget.file.file_typeUDM field is set toFILE_TYPE_ELF.Else, if the tgt.file.typelog field value is equal toMACH, then thetarget.file.file_typeUDM field is set toFILE_TYPE_MACH_O.Else, if the tgt.file.typelog field value is equal toPDF, then thetarget.file.file_typeUDM field is set toFILE_TYPE_PDF.Else, if the tgt.file.typelog field value is equal toCOM, then thetarget.file.file_typeUDM field is set toFILE_TYPE_DOS_COM.Else, if the tgt.file.typelog field value is equal toCOM, then thetarget.file.file_typeUDM field is set toFILE_TYPE_DOS_COM.Else, if the tgt.file.typelog field value is equal toOPENXML, then thetarget.file.file_typeUDM field is set toFILE_TYPE_XML.Else, if the tgt.file.typelog field value is equal toPKZIP, then thetarget.file.file_typeUDM field is set toFILE_TYPE_ZIP.Else, if the tgt.file.typelog field value is equal toRAR, then thetarget.file.file_typeUDM field is set toFILE_TYPE_RAR.Else, if the tgt.file.typelog field value is equal toBZIP2, then thetarget.file.file_typeUDM field is set toFILE_TYPE_BZIP.Else, if the tgt.file.typelog field value is equal toTAR, then thetarget.file.file_typeUDM field is set toFILE_TYPE_TAR.Else, if the tgt.file.typelog field value is equal toLNK, then thetarget.file.file_typeUDM field is set toFILE_TYPE_LNK. | 
| url.address | target.hostname | The protocolandhostnamefield is extracted fromurl.addresslog field using the Grok pattern, and thehostnameextracted field is mapped to thetarget.hostnameUDM field. | 
| url.address | target.asset.hostname | The protocolandhostnamefield is extracted fromurl.addresslog field using the Grok pattern, and thehostnameextracted field is mapped to thetarget.hostnameUDM field. | 
| dst.ip.address | target.ip | |
| cmdScript.isComplete | target.labels[cmd_script_is_complete](deprecated) | |
| cmdScript.isComplete | additional.fields[cmd_script_is_complete] | |
| registry.keyUid | target.labels[registry_key_uid](deprecated) | |
| registry.keyUid | additional.fields[registry_key_uid] | |
| registry.valueFullSize | target.labels[registry_value_full_size](deprecated) | |
| registry.valueFullSize | additional.fields[registry_value_full_size] | |
| registry.valueIsComplete | target.labels[registry_value_is_complete](deprecated) | |
| registry.valueIsComplete | additional.fields[registry_value_is_complete] | |
| tgt.file.convictedBy | target.labels[tgt_file_convicted_by](deprecated) | |
| tgt.file.convictedBy | additional.fields[tgt_file_convicted_by] | |
| tgt.file.creationTime | target.labels[tgt_file_creation_time](deprecated) | |
| tgt.file.creationTime | additional.fields[tgt_file_creation_time] | |
| tgt.file.description | target.labels[tgt_file_description](deprecated) | |
| tgt.file.description | additional.fields[tgt_file_description] | |
| tgt.file.isExecutable | target.labels[tgt_file_is_executable](deprecated) | |
| tgt.file.isExecutable | additional.fields[tgt_file_is_executable] | |
| tgt.file.isSigned | target.labels[tgt_file_is_signed](deprecated) | |
| tgt.file.isSigned | additional.fields[tgt_file_is_signed] | |
| tgt.process.accessRights | target.labels[tgt_process_access_rights](deprecated) | |
| tgt.process.accessRights | additional.fields[tgt_process_access_rights] | |
| tgt.process.activeContent.hash | target.labels[tgt_process_active_content_hash](deprecated) | |
| tgt.process.activeContent.hash | additional.fields[tgt_process_active_content_hash] | |
| tgt.process.activeContent.id | target.labels[tgt_process_active_content_id](deprecated) | |
| tgt.process.activeContent.id | additional.fields[tgt_process_active_content_id] | |
| tgt.process.activeContent.path | target.labels[tgt_process_active_content_path](deprecated) | |
| tgt.process.activeContent.path | additional.fields[tgt_process_active_content_path] | |
| tgt.process.activeContent.signedStatus | target.labels [tgt_process_active_content_signed_status](deprecated) | |
| tgt.process.activeContent.signedStatus | additional.fields [tgt_process_active_content_signed_status] | |
| tgt.process.activeContentType | target.labels[tgt_process_active_content_type](deprecated) | |
| tgt.process.activeContentType | additional.fields[tgt_process_active_content_type] | |
| tgt.process.displayName | target.labels[tgt_process_display_name](deprecated) | |
| tgt.process.displayName | additional.fields[tgt_process_display_name] | |
| tgt.process.image.binaryIsExecutable | target.labels[tgt_process_image_binary_is_executable](deprecated) | |
| tgt.process.image.binaryIsExecutable | additional.fields[tgt_process_image_binary_is_executable] | |
| tgt.process.integrityLevel | target.labels[tgt_process_integrity_level](deprecated) | |
| tgt.process.integrityLevel | additional.fields[tgt_process_integrity_level] | |
| tgt.process.isNative64Bit | target.labels[tgt_process_is_native_64_bit](deprecated) | |
| tgt.process.isNative64Bit | additional.fields[tgt_process_is_native_64_bit] | |
| tgt.process.isRedirectCmdProcessor | target.labels[tgt_process_is_redirect_cmd_processor](deprecated) | |
| tgt.process.isRedirectCmdProcessor | additional.fields[tgt_process_is_redirect_cmd_processor] | |
| tgt.process.isStorylineRoot | target.labels[tgt_process_is_storyline_root](deprecated) | |
| tgt.process.isStorylineRoot | additional.fields[tgt_process_is_storyline_root] | |
| tgt.process.publisher | target.labels[tgt_process_publisher](deprecated) | |
| tgt.process.publisher | additional.fields[tgt_process_publisher] | |
| tgt.process.relation | target.labels[tgt_process_relation](deprecated) | |
| tgt.process.relation | additional.fields[tgt_process_relation] | |
| tgt.process.sessionId | target.labels[tgt_process_session_id](deprecated) | |
| tgt.process.sessionId | additional.fields[tgt_process_session_id] | |
| tgt.process.signedStatus | target.process.file.signature_info.sigcheck.verification_message | |
| tgt.process.startTime | target.labels[tgt_process_start_time](deprecated) | |
| tgt.process.startTime | additional.fields[tgt_process_start_time] | |
| tgt.process.storyline.id | target.labels[tgt_process_storyline_id](deprecated) | |
| tgt.process.storyline.id | additional.fields[tgt_process_storyline_id] | |
| tgt.process.subsystem | target.labels[tgt_process_subsystem](deprecated) | |
| tgt.process.subsystem | additional.fields[tgt_process_subsystem] | |
| tgt.process.verifiedStatus | target.labels[tgt_process_verified_status](deprecated) | |
| tgt.process.verifiedStatus | additional.fields[tgt_process_verified_status] | |
| dst.port.number | target.port | |
| cmdScript.content | target.process.command_line | |
| tgt.process.cmdline | target.process.command_line | |
| tgt.process.image.path | target.process.file.full_path | |
| tgt.process.image.md5 | target.process.file.md5 | If the tgt.process.image.md5log field value matches the regular expression pattern^[a-f0-9]{32}$, then thetgt.process.image.md5log field is mapped to thetarget.process.file.md5UDM field. | 
| tgt.process.name | target.process.file.names | |
| tgt.process.image.sha1 | target.process.file.sha1 | If the tgt.process.image.sha1log field value matches the regular expression pattern^[a-f0-9]{40}$, then thetgt.process.image.sha1log field is mapped to thetarget.process.file.sha1UDM field. | 
| cmdScript.sha256 | target.process.file.sha256 | If the cmdScript.sha256log field value matches the regular expression pattern^[a-f0-9]{64}$, then thecmdScript.sha256log field is mapped to thetarget.process.file.sha256UDM field. | 
| tgt.process.image.sha256 | target.process.file.sha256 | If the tgt.process.image.sha256log field value matches the regular expression pattern^[a-f0-9]{64}$, then thetgt.process.image.sha256log field is mapped to thetarget.process.file.sha256UDM field. | 
| cmdScript.originalSize | target.process.file.size | |
| tgt.process.pid | target.process.pid | |
|  | target.process.product_specific_process_id | If the tgt.process.uidlog field value is not empty, then theSO:%{site.id}:%{account.id}:%{agent.uuid}:%{tgt.process.uid}log field is mapped to thetarget.process.product_specific_process_idUDM field. | 
| registry.keyPath | target.registry.registry_key | |
| registry.value | target.registry.registry_value_data | |
| registry.valueType | target.registry.registry_value_name | |
| k8sCluster.namespaceLabels | target.resource_ancestors.attribute.labels[k8s_cluster_namespace_labels] | |
| k8sCluster.namespace | target.resource_ancestors.attribute.labels[k8s_cluster_namespace] | |
| k8sCluster.name | target.resource_ancestors.name | |
|  | target.resource_ancestors.resource_type | If the k8sCluster.namelog field value is not empty, then thetarget.resource_ancestors.resource_typeUDM field is set toCLUSTER. | 
| k8sCluster.controllerName | target.resource_ancestors.name | |
| k8sCluster.controllerLabels | target.resource_ancestors.attribute.labels[k8s_cluster_controller_labels] | |
|  | target.resource_ancestors.resource_type | If the k8sCluster.controllerNamelog field value is not empty, then thetarget.resource_ancestors.resource_typeUDM field is set toCLUSTER. | 
| k8sCluster.controllerType | target.resource_ancestors.resource_subtype | |
| k8sCluster.podName | target.resource_ancestors.name | |
| k8sCluster.podLabels | target.resource_ancestors.attribute.labels[k8s_cluster_pod_labels] | |
|  | target.resource_ancestors.resource_type | If the k8sCluster.podNamelog field value is not empty, then thetarget.resource_ancestors.resource_typeUDM field is set toPOD. | 
| k8sCluster.nodeName | target.resource_ancestors.name | |
|  | target.resource_ancestors.resource_type | If the k8sCluster.nodeNamelog field value is not empty, then thetarget.resource_ancestors.resource_typeUDM field is set toCLUSTER. | 
|  | target.resource_ancestors.resource_subtype | If the k8sCluster.nodeNamelog field value is not empty, then thetarget.resource_ancestors.resource_subtypeUDM field is set toNODE. | 
| k8sCluster.containerName | target.resource.name | |
| k8sCluster.containerId | target.resource.product_object_id | |
|  | target.resource.resource_type | If the k8sCluster.containerNamelog field value is not empty or thek8sCluster.containerIdlog field value is not empty, then thetarget.resource.resource_typeUDM field is set toCONTAINER. | 
| k8sCluster.containerImage.sha256 | target.resource.attribute.labels[k8s_cluster_container_image_sha256] | |
| k8sCluster.containerImage | target.resource.attribute.labels[k8s_cluster_container_image] | |
| k8sCluster.containerLabels | target.resource.attribute.labels[k8s_cluster_container_labels] | |
| namedPipe.name | target.resource.name | |
| namedPipe.accessMode | target.resource.attribute.permission.name | |
| namedPipe.connectionType | target.resource.attribute.labels[named_pipe_connection_type] | |
| namedPipe.isFirstInstance | target.resource.attribute.labels[named_pipe_is_first_instance] | |
| namedPipe.isOverlapped | target.resource.attribute.labels[named_pipe_is_overlapped] | |
| namedPipe.isWriteThrough | target.resource.attribute.labels[named_pipe_is_write_through] | |
| namedPipe.maxInstances | target.resource.attribute.labels[named_pipe_max_instances] | |
| namedPipe.readMode | target.resource.attribute.labels[named_pipe_read_mode] | |
| namedPipe.remoteClients | target.resource.attribute.labels[named_pipe_remote_clients] | |
| namedPipe.securityGroups | target.resource.attribute.labels[named_pipe_security_groups] | |
| namedPipe.securityOwner | target.resource.attribute.labels[named_pipe_security_owner] | |
| namedPipe.typeMode | target.resource.attribute.labels[named_pipe_type_mode] | |
| namedPipe.waitMode | target.resource.attribute.labels[named_pipe_wait_mode] | |
| task.name | target.resource.name | |
| task.path | target.resource.attribute.labels[task_path] | |
|  | target.resource.resource_type | If the event.categorylog field value is equal toscheduled_task, then thetarget.resource.resource_typeUDM field is set toTASK.If the event.typelog field value contain one of the following values, then thetarget.resource.resource_typeUDM field is set toPIPE.
 | 
| url.address | target.url | |
| tgt.process.eUserName | target.user.attribute.labels[tgt_process_e_user_name] | |
| tgt.process.eUserUid | target.user.attribute.labels[tgt_process_e_user_uid] | |
| tgt.process.lUserName | target.user.attribute.labels[tgt_process_l_user_name] | |
| tgt.process.lUserUid | target.user.attribute.labels[tgt_process_l_user_uid] | |
| tgt.process.rUserName | target.user.attribute.labels[tgt_process_r_user_name] | |
| tgt.process.rUserUid | target.user.attribute.labels[tgt_process_r_user_uid] | |
| tgt.process.user | target.user.userid | |
| event.login.accountName | target.user.user_display_name | |
|  | target.user.user_role | If the event.login.isAdministratorEquivalentlog field value is equal totrue, then thetarget.user.user_roleUDM field is set toADMINISTRATOR. | 
| event.login.userName | target.user.userid | |
| event.login.accountSid | target.user.windows_sid | |
| module.path | target.process.file.full_path | |
| module.md5 | target.process.file.md5 | If the module.md5log field value matches the regular expression pattern^[a-f0-9]{32}$, then themodule.md5log field is mapped to thetarget.process.file.md5UDM field. | 
| module.sha1 | target.process.file.sha1 | If the module.sha1log field value matches the regular expression pattern^[a-f0-9]{40}$, then themodule.sha1log field is mapped to thetarget.process.file.sha1UDM field. | 
| mgmt.url | about.url | |
| dataSource.category | about.labels[data_source_category](deprecated) | |
| dataSource.category | additional.fields[data_source_category] | |
| dataSource.name | about.labels[data_source_name](deprecated) | |
| dataSource.name | additional.fields[data_source_name] | |
| dataSource.vendor | about.labels[data_source_vendor](deprecated) | |
| dataSource.vendor | additional.fields[data_source_vendor] | |
| event.category | about.labels[event_category](deprecated) | |
| event.category | additional.fields[event_category] | |
| event.login.baseType | about.labels[event_login_base_type](deprecated) | |
| event.login.baseType | additional.fields[event_login_base_type] | |
| event.network.protocolName | about.labels[event_network_protocol_name](deprecated) | |
| event.network.protocolName | additional.fields[event_network_protocol_name] | |
| event.repetitionCount | about.labels[event_repetition_count](deprecated) | |
| event.repetitionCount | additional.fields[event_repetition_count] | |
| event.login.isAdministratorEquivalent | about.labels[event_login_is_administrator_equivalent](deprecated) | |
| event.login.isAdministratorEquivalent | additional.fields[event_login_is_administrator_equivalent] | |
| group.id | about.labels[group_id](deprecated) | If the event.typelog field value is equal toGroup Creation, then thegroup.idlog field is mapped to thetarget.group.product_object_idUDM field.Else, the group.idlog field is mapped to theabout.labelsUDM field. | 
| group.id | additional.fields[group_id] | If the event.typelog field value is equal toGroup Creation, then thegroup.idlog field is mapped to thetarget.group.product_object_idUDM field.Else, the group.idlog field is mapped to theadditional.fieldsUDM field. | 
| i.scheme | about.labels[i_scheme](deprecated) | |
| i.scheme | additional.fields[i_scheme] | |
| i.version | about.labels[i_version](deprecated) | |
| i.version | additional.fields[i_version] | |
| meta.event.name | about.labels[meta_event_name](deprecated) | |
| meta.event.name | additional.fields[meta_event_name] | |
| mgmt.id | about.labels[mgmt_id](deprecated) | |
| mgmt.id | additional.fields[mgmt_id] | |
| mgmt.osRevision | about.labels[mgmt_os_revision](deprecated) | |
| mgmt.osRevision | additional.fields[mgmt_os_revision] | |
| packet.id | about.labels[packet_id](deprecated) | |
| packet.id | additional.fields[packet_id] | |
| sca:atlantisIngestTime | about.labels[sca_atlantis_ingest_time](deprecated) | |
| sca:atlantisIngestTime | additional.fields[sca_atlantis_ingest_time] | |
| sca:ingestTime | about.labels[sca_ingest_time](deprecated) | |
| sca:ingestTime | additional.fields[sca_ingest_time] | |
| timestamp | about.labels[timestamp](deprecated) | |
| timestamp | additional.fields[timestamp] | |
| trace.id | about.labels[trace_id](deprecated) | |
| trace.id | additional.fields[trace_id] | |
| winEventLog.channel | about.labels[win_event_log_channel](deprecated) | |
| winEventLog.channel | additional.fields[win_event_log_channel] | |
| winEventLog.description.additionalInformation | about.labels[win_event_log_description_additional_information](deprecated) | |
| winEventLog.description.additionalInformation | additional.fields[win_event_log_description_additional_information] | |
| winEventLog.description.objectName | about.labels[win_event_log_description_object_name](deprecated) | |
| winEventLog.description.objectName | additional.fields[win_event_log_description_object_name] | |
| winEventLog.description.objectServer | about.labels[win_event_log_description_object_server](deprecated) | |
| winEventLog.description.objectServer | additional.fields[win_event_log_description_object_server] | |
| winEventLog.description.objectType | about.labels[win_event_log_description_object_type](deprecated) | |
| winEventLog.description.objectType | additional.fields[win_event_log_description_object_type] | |
| winEventLog.description.operationType | about.labels[win_event_log_description_operation_type](deprecated) | |
| winEventLog.description.operationType | additional.fields[win_event_log_description_operation_type] | |
| winEventLog.description.securityId | about.labels[win_event_log_description_security_id](deprecated) | |
| winEventLog.description.securityId | additional.fields[win_event_log_description_security_id] | |
| winEventLog.description.userId | about.labels[win_event_log_description_user_id](deprecated) | |
| winEventLog.description.userId | additional.fields[win_event_log_description_user_id] | |
| winEventLog.xml | about.labels[win_event_log_xml](deprecated) | |
| winEventLog.xml | additional.fields[win_event_log_xml] | 
Siguientes pasos
¿Necesitas más ayuda? Recibe respuestas de los miembros de la comunidad y de los profesionales de Google SecOps.