Zscaler Deception ログを収集する
このドキュメントでは、BindPlane エージェントを設定して Zscaler Deception のログをエクスポートする方法と、ログフィールドが Google SecOps 統合データモデル(UDM)フィールドにマッピングされる方法について説明します。
詳細については、Google SecOps へのデータの取り込みをご覧ください。
一般的なデプロイは、Zscaler Deception と、Google SecOps にログを送信するように構成された BindPlane エージェントで構成されます。お客様のデプロイはそれぞれ異なり、より複雑になる場合もあります。
デプロイには次のコンポーネントが含まれます。
- Zscaler Deception: ログを収集するプラットフォーム。 
- BindPlane エージェント: BindPlane エージェントは Zscaler Deception からログを取得し、Google SecOps にログを送信します。 
- Google SecOps: ログを保持して分析します。 
取り込みラベルによって、未加工のログデータを構造化 UDM 形式に正規化するパーサーが識別されます。 このドキュメントの情報は、取り込みラベル ZSCALER_DECEPTION が付加されたパーサーに適用されます。
始める前に
- Zscaler Deception コンソールにアクセスできることを確認します。詳細については、Zscaler Deception のヘルプをご覧ください。
- Zscaler Deception 2024 以降を使用していることを確認します。
- デプロイ アーキテクチャ内のすべてのシステムが、UTC タイムゾーンで構成されていることを確認します。
- Zscaler Deception 管理ポータルと通信してイベントログを送信するように、サービス コネクタが構成されていることを確認します。サービス コネクタの詳細については、サービス コネクタについてをご覧ください。
イベントを BindPlane Agent に転送するように Service Connector を構成する
次の手順に沿って、イベントを BindPlane エージェントに転送するようにサービス コネクタを構成します。
- Zscaler Deception 管理ポータルで、[Orchestrate] > [SIEM Integrations] に移動します。
- [統合を追加] をクリックし、メニューから [Syslog] を選択します。
- [Syslog の詳細] ウィンドウで詳細を入力します。
- [名前] フィールドに、Syslog SIEM 統合の名前を入力します。
- [有効] で [有効にする] を選択して、SIEM 統合を有効にします。
- メニューからサービス コネクタを選択します。
- Zscaler Deception 管理者ポータルで構成されたサービス コネクタを選択すると、管理者ポータルから Syslog にログが送信されます。
- デコイ コネクタで構成されているサービス コネクタを選択すると、選択したデコイ コネクタが Syslog にログを送信します。
 
- [ログの種類] メニューで [イベント] を選択し、Zscaler Deception イベントを転送します。
- [安全なイベントを含める] で [有効] を選択すると、安全とマークされたイベントが Syslog に転送されます。
- [フィルタ] フィールドに、フィルタされたイベントログのみを Syslog に送信するクエリを入力します。空白のままにすると、すべてのイベントログが送信されます。クエリを作成する方法については、クエリの理解と作成をご覧ください。
- [ホスト] フィールドに、Linux 仮想マシンの IP アドレスを入力します。
- [ポート] フィールドに、Linux 仮想マシンがリッスンしているポート番号を入力します。
- [Transport] メニューで、Zscaler Deception イベントの転送に使用するプロトコルを選択します。
- [施設] メニューで施設コードを選択します。各イベントには、イベントログを生成するソフトウェアのタイプを示すファシリティ コードのラベルが付けられます。
- [重大度] メニューで重大度レベルを選択します。各イベントには、イベントログを生成したツールの重大度を示す重大度のラベルが付けられます。
- [アプリ名] フィールドにログ ID を入力します。
- [保存] をクリックします。サービス コネクタの構成方法については、Syslog の SIEM 構成ガイドをご覧ください。
BindPlane Agent を使用してログを Google SecOps に転送する
- Linux 仮想マシンをインストールして設定します。
- ログを Google SecOps に転送するように、Linux に BindPlane エージェントをインストールして構成します。BindPlane Agent のインストールと構成の方法の詳細については、BindPlane Agent のインストールと構成の手順をご覧ください。
フィードの作成時に問題が発生した場合は、Google SecOps サポートにお問い合わせください。
フィールド マッピング リファレンス
フィールド マッピング リファレンス: イベント識別子からイベントタイプへ
次の表に、ZSCALER_DECEPTION ログタイプと対応する UDM のイベントの種類を示します。
| Event Identifier | Event Type | Security Category | 
|---|---|---|
| amqp | USER_RESOURCE_ACCESS |  | 
| aws | USER_STATS |  | 
| azure | USER_STATS |  | 
| credtheft |  | ACL_VIOLATION | 
| custom | USER_STATS |  | 
| email | EMAIL_TRANSACTION |  | 
| endpoint |  | NETWORK_MALICIOUS | 
| itdr |  | NETWORK_MALICIOUS | 
| ransomware |  | NETWORK_MALICIOUS | 
| filetheft | USER_RESOURCE_ACCESS | ACL_VIOLATION | 
| mitm | NETWORK_CONNECTION |  | 
| mongodb | USER_RESOURCE_ACCESS |  | 
| network |  | NETWORK_SUSPICIOUS | 
| postgresql | USER_RESOURCE_ACCESS |  | 
| QOS | USER_RESOURCE_ACCESS |  | 
| recon |  | NETWORK_RECON | 
| scada | USER_RESOURCE_ACCESS |  | 
| ssh |  |  | 
| telnet |  |  | 
| web |  |  | 
| windows |  | NETWORK_MALICIOUS | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - 共通フィールド
次の表に、ZSCALER_DECEPTION ログタイプの一般的なフィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
|  | metadata.product_name | Json dataendthe metadata.product_nameUDM field is set toDeception. | 
|  | metadata.vendor_name | The metadata.vendor_nameUDM field is set toZscaler. | 
| timestamp | metadata.event_timestamp | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - amqp
次の表に、amqp ログタイプの未加工ログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
| type | metadata.product_event_type | |
|  | network.application_protocol | If the typelog field value is equal toamqp, then thenetwork.application_protocolUDM field is set toAMQP. | 
| amqp.connection_id | network.session_id | |
| amqp.user | principal.user.userid | |
| amqp.vhost | target.hostname | |
| amqp.node | target.resource.name | |
|  | target.resource.resource_type | If the amqp.nodelog field value is not empty, then thetarget.resource.resource_typeUDM field is set toCLUSTER. | 
| amqp.channel | additional.fields[amqp_channel] | |
| amqp.exchange | additional.fields[amqp_exchange] | |
| amqp.payload | additional.fields[amqp_payload] | |
| amqp.queue | additional.fields[amqp_queue] | |
| amqp.routed_queues | additional.fields[amqp_routed_queues] | The amqp.routed_queueslog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| amqp.routing_keys | additional.fields[amqp_routing_keys] | The amqp.routing_keyslog field is mapped to theadditional.fields.value.string_valueUDM field. | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - aws
次の表に、aws ログタイプの未加工ログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
| type | metadata.product_event_type | |
| aws.event_id | metadata.product_log_id | |
| aws.user_agent | network.http.user_agent | |
| aws.error_message | security_result.description | |
| decoy.s3.dataset | security_result.rule_set | |
| aws.error_code | security_result.summary | |
| aws.aws_region | target.location.country_or_region | |
| aws.vpc_endpoint_id | target.resource_ancestors.product_object_id | |
|  | target.resource_ancestors.resource_type | If the aws.vpc_endpoint_idlog field value is not empty, then thetarget.resource_ancestors.resource_typeUDM field is set toVPC_NETWORK. | 
| aws.recipient_account_id | target.resource.product_object_id | |
|  | target.resource.resource_type | If the aws.recipient_account_idlog field value is not empty, then thetarget.resource.resource_typeUDM field is set toSERVICE_ACCOUNT. | 
| aws.event_name | additional.fields[aws_event_name] | |
| aws.event_source | additional.fields[aws_event_source] | |
| aws.event_type | additional.fields[aws_event_type] | |
| aws.readonly | additional.fields[aws_readonly] | |
| aws.request_id | additional.fields[aws_request_id] | |
| decoy.public | additional.fields[decoy_public] | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - azure
次の表に、azure ログタイプの未加工ログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
| type | metadata.product_event_type | |
| azure.caller_ip_address.port | principal.port | |
| decoy.dataset | security_result.rule_set | |
| decoy.storage_account | target.resource.name | |
|  | target.resource.resource_type | If the decoy.storage_accountlog field value is not empty, then thetarget.resource.resource_typeUDM field is set toSTORAGE_BUCKET. | 
| decoy.public | additional.fields[decoy_public] | |
| decoy.storage_account_container.dataset | additional.fields[decoy_storage_account_container_dataset] | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - credtheft
次の表に、credtheft ログタイプの未加工ログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
| credtheft.logon_process_name | extensions.auth.auth_details | |
|  | extensions.auth.mechanism | If the credtheft.logon_typelog field value matches the regular expression pattern(?i)interactive, then theextensions.auth.mechanismUDM field is set toINTERACTIVE.Else, if the credtheft.logon_typelog field value matches the regular expression pattern(?i)network, then theextensions.auth.mechanismUDM field is set toNETWORK.Else, if the credtheft.logon_typelog field value matches the regular expression pattern(?i)batch, then theextensions.auth.mechanismUDM field is set toBATCH.Else, if the credtheft.logon_typelog field value matches the regular expression pattern(?i)service, then theextensions.auth.mechanismUDM field is set toSERVICE.Else, if the credtheft.logon_typelog field value matches the regular expression pattern(?i)remoteinteractive, then theextensions.auth.mechanismUDM field is set toREMOTE_INTERACTIVE.Else, if the credtheft.logon_typelog field value matches the regular expression pattern(?i)unlock, then theextensions.auth.mechanismUDM field is set toUNLOCK.Else, if the credtheft.logon_typelog field value matches the regular expression pattern(?i)cached, then theextensions.auth.mechanismUDM field is set toCACHED_INTERACTIVE.Else, if the credtheft.logon_typelog field value is not empty, then theextensions.auth.mechanismUDM field is set toMECHANISM_OTHER. | 
| credtheft.event_id | metadata.description | |
|  | metadata.event_type | If (the credtheft.ip_addresslog field value is not empty or thecredtheft.workstationlog field value is not empty or thecredtheft.workstation_namelog field value is not empty) and (thecredtheft.usernamelog field value is not empty or thecredtheft.subject_user_namelog field value is not empty), then themetadata.event_typeUDM field is set toUSER_LOGIN.Else, the metadata.event_typeUDM field is set toUSER_RESOURCE_ACCESS. | 
| type | metadata.product_event_type | |
| credtheft.event_record_id | metadata.product_log_id | |
| credtheft.authentication_package_name | principal.application | |
| credtheft.subject_domain_name | principal.domain.name | |
| credtheft.workstation | principal.hostname | If the credtheft.workstationlog field value is not empty, then thecredtheft.workstationlog field is mapped to theprincipal.hostnameUDM field. | 
| credtheft.workstation_name | principal.hostname | If the credtheft.workstation_namelog field value is not empty, then thecredtheft.workstation_namelog field is mapped to theprincipal.hostnameUDM field. | 
| credtheft.ip_address | principal.ip | |
| credtheft.ip_port | principal.port | |
| credtheft.trigger_properties | principal.resource.attribute.labels[credtheft_trigger_properties] | |
| credtheft.service_name | principal.resource.name | |
|  | principal.resource.resource_type | If the credtheft.service_namelog field value is not empty, then theprincipal.resource.resource_typeUDM field is set toBACKEND_SERVICE. | 
| credtheft.subject_logon_id | principal.user.product_object_id | |
| credtheft.subject_user_sid | principal.user.windows_sid | |
|  | security_result.action | If the credtheft.statuslog field value matches the regular expression pattern(?i)successful, then thesecurity_result.actionUDM field is set toALLOW.Else, if the credtheft.statuslog field value matches the regular expression pattern(?i)failed, then thesecurity_result.actionUDM field is set toFAIL.Else, if the credtheft.statuslog field value matches the regular expression pattern(?i)denied, then thesecurity_result.actionUDM field is set toBLOCK. | 
| credtheft.status | security_result.action_details | |
| credtheft.operation_type | security_result.action_details | |
|  | security_result.category | The security_result.categoryUDM field is set toNETWORK_MALICIOUS. | 
| credtheft.access_list | security_result.detection_fields[credtheft_access_list] | |
| credtheft.access_mask | security_result.detection_fields[credtheft_access_mask] | |
| credtheft.ticket_encryption_type | security_result.detection_fields[credtheft_ticket_encryption_type] | |
| credtheft.ticket_options | security_result.detection_fields[credtheft_ticket_options] | |
| decoy.ad.asrep_roastable | security_result.detection_fields[decoy_ad_asrep_roastable] | |
| decoy.ad.can_password_expire | security_result.detection_fields[decoy_ad_can_password_expire] | |
| credtheft.target_domain_name | target.domain.name | |
| credtheft.target_server_name | target.domain.name_server | |
| credtheft.object_server | target.domain.name_server | |
| credtheft.properties | target.resource.attribute.labels[credtheft_properties] | |
| credtheft.sub_status | target.resource.attribute.labels[credtheft_sub_status] | |
| credtheft.object_name | target.resource.name | |
| credtheft.object_type | target.resource.resource_subtype | |
|  | target.resource.resource_type | If the credtheft.object_typelog field value matches the regular expression pattern(?i)user, then thetarget.resource.resource_typeUDM field is set toUSER.Else, if the credtheft.object_typelog field value matches the regular expression pattern(?i)computer, then thetarget.resource.resource_typeUDM field is set toDEVICE. | 
| decoy.ad.profile_path | target.user.attribute.labels[decoy_ad_profile_path] | |
| decoy.ad.group_memberships | target.user.group_identifiers | The decoy.ad.group_membershipslog field is mapped to thetarget.user.group_identifiersUDM field. | 
| credtheft.target_user_name | target.user.user_display_name | |
| credtheft.username | target.user.userid | |
| credtheft.subject_user_name | target.user.userid | |
| credtheft.handle_id | additional.fields[credtheft_handle_id] | |
| credtheft.pre_auth_type | additional.fields[credtheft_pre_auth_type] | |
| credtheft.system_time | additional.fields[credtheft_system_time] | |
| decoy.ad.ou | additional.fields[decoy_ad_ou] | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - カスタム
次の表に、custom ログタイプの未加工ログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
| type | metadata.product_event_type | |
| custom.dataset | principal.security_result.rule_set | |
| custom.protocol | security_result.detection_fields[custom_protocol] | |
| decoy.custom.protocol | security_result.detection_fields[decoy_custom_protocol] | |
| decoy.custom.dataset | target.security_result.rule_set | |
| custom.is_binary_request | additional.fields[custom_is_binary_request] | |
| custom.is_binary_response | additional.fields[custom_is_binary_response] | |
| custom.request | additional.fields[custom_request] | |
| custom.response | additional.fields[custom_response] | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - email
次の表に、email ログタイプの未加工ログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
| type | metadata.product_event_type | |
| email.evidence_id | network.email.mail_id | |
| email.subject | network.email.subject | |
| email.body.attachments | additional.fields[email_body_attachments] | The email.body.attachmentslog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| email.body.html | additional.fields[email_body_html] | The email.body.htmllog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| email.body.plain | additional.fields[email_body_plain] | The email.body.plainlog field is mapped to theadditional.fields.value.string_valueUDM field. | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - endpoint、itdr、ransomware
次の表に、endpoint、itdr、ransomware ログタイプの未加工ログフィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
| attacker.event_name | metadata.description | |
| psexec.event_name | metadata.description | |
| triage.event_name | metadata.description | |
| session_enumeration.type | metadata.description | |
|  | metadata.event_type | If the attacker.domain_namelog field value is not empty and at least one of the following log field is not empty, then themetadata.event_typeUDM field is set toPROCESS_TERMINATION.
 attacker.domain_namelog field value is not empty and at least one of the following log field is not empty, then themetadata.event_typeUDM field is set toPROCESS_LAUNCH.
 file.namelog field value is not empty and theattacker.domain_namelog field value is not empty, then if thefile.operationlog field value matches the regular expression pattern(?i)read, then themetadata.event_typeUDM field is set toFILE_READ.Else, if the file.namelog field value is not empty and theattacker.domain_namelog field value is not empty, then if thefile.operationlog field value matches the regular expression pattern(?i)write or modify or encrypt, then themetadata.event_typeUDM field is set toFILE_MODIFICATION.Else, if the file.namelog field value is not empty and theattacker.domain_namelog field value is not empty, then if thefile.operationlog field value matches the regular expression pattern(?i)create, then themetadata.event_typeUDM field is set toFILE_CREATION.Else, if the file.namelog field value is not empty and theattacker.domain_namelog field value is not empty, then if thefile.operationlog field value matches the regular expression pattern(?i)delete, then themetadata.event_typeUDM field is set toFILE_DELETION.Else, if the file.namelog field value is not empty and theattacker.domain_namelog field value is not empty, then if thefile.operationlog field value matches the regular expression pattern(?i)open, then themetadata.event_typeUDM field is set toFILE_OPEN.Else, if the file.namelog field value is not empty and theattacker.domain_namelog field value is not empty, then if thefile.operationlog field value matches the regular expression pattern(?i)sync, then themetadata.event_typeUDM field is set toFILE_SYNC.Else, if the file.namelog field value is not empty and theattacker.domain_namelog field value is not empty, then if thefile.operationlog field value matches the regular expression pattern(?i)copy, then themetadata.event_typeUDM field is set toFILE_COPY.Else, if the file.namelog field value is not empty and theattacker.domain_namelog field value is not empty, then if thefile.operationlog field value matches the regular expression pattern(?i)move, then themetadata.event_typeUDM field is set toFILE_MOVE.Else, if the attacker.user_namelog field value is not empty and (themessagelog field value matches the regular expression pattern(cbf or imc).), then themetadata.event_typeUDM field is set toUSER_UNCATEGORIZED.Else, if the attacker.domain_namelog field value is not empty and thesession_enumeration.network_addresslog field value is not empty, then themetadata.event_typeUDM field is set toNETWORK_CONNECTION.Else, if the attacker.domain_namelog field value is not empty, then themetadata.event_typeUDM field is set toSCAN_HOST.Else, the metadata.event_typeUDM field is set toUSER_RESOURCE_ACCESS. | 
| type | metadata.product_event_type | |
| triage.incident_id | metadata.product_log_id | |
| session_enumeration.endpoint | network.session_id | |
| attacker.domain_name | principal.domain.name | If the attacker.domain_namelog field value is not empty, then theattacker.domain_namelog field is mapped to theprincipal.domain.nameUDM field. | 
| attacker.process.domain_name | principal.domain.name | If the attacker.process.domain_namelog field value is not empty, then theattacker.process.domain_namelog field is mapped to theprincipal.domain.nameUDM field. | 
| attacker.machine_name | principal.hostname | |
| attacker.session_id | principal.network.session_id | |
| attacker.command_line | principal.process.command_line | If the attacker.command_linelog field value is not empty, then theattacker.command_linelog field is mapped to theprincipal.process.command_lineUDM field. | 
| attacker.process.command_line | principal.process.command_line | If the attacker.process.command_linelog field value is not empty, then theattacker.process.command_linelog field is mapped to theprincipal.process.command_lineUDM field. | 
| attacker.process.path | principal.process.file.full_path | |
| attacker.process.md5 | principal.process.file.md5 | |
| attacker.process.sha1 | principal.process.file.sha1 | |
| attacker.process.sha256 | principal.process.file.sha256 | |
| attacker.process.parent_info.command_line | principal.process.parent_process.command_line | |
| attacker.process.parent_info.path | principal.process.parent_process.file.full_path | |
| attacker.process.parent_info.md5 | principal.process.parent_process.file.md5 | |
| attacker.process.parent_info.sha1 | principal.process.parent_process.file.sha1 | |
| attacker.process.parent_info.sha256 | principal.process.parent_process.file.sha256 | |
| attacker.process.parent_info.id | principal.process.parent_process.pid | |
| attacker.process.parent_info.parent | principal.process.parent_process.product_specific_process_id | The Deception:attacker.process.parent_info.parentlog field is mapped to theprincipal.process.parent_process.product_specific_process_idUDM field. | 
| attacker.process.id | principal.process.pid | |
| attacker.process.user_groups | principal.user.group_identifiers | The attacker.process.user_groupslog field is mapped to theprincipal.user.group_identifiersUDM field. | 
| attacker.process.user_ou | principal.user.group_identifiers | The attacker.process.user_groupslog field is mapped to theprincipal.user.group_identifiersUDM field and theattacker.process.user_oulog field is mapped to theprincipal.user.group_identifiersUDM field. | 
| attacker.process.user_name | principal.user.user_display_name | |
| attacker.user_name | principal.user.userid | If the attacker.user_namelog field value is not empty, then theattacker.user_namelog field is mapped to theprincipal.user.useridUDM field.Else, if the attacker.usernamelog field value is not empty, then theattacker.user_namelog field is mapped to theadditional.fieldsUDM field.Else, if the attacker.zcc_userlog field value is not empty, then theattacker.user_namelog field is mapped to theadditional.fieldsUDM field.Else, if the attacker.zia_userlog field value is not empty, then theattacker.user_namelog field is mapped to theadditional.fieldsUDM field.Else, if the attacker.zpa_userlog field value is not empty, then theattacker.user_namelog field is mapped to theadditional.fieldsUDM field. | 
| attacker.username | principal.user.userid | If the attacker.user_namelog field value is not empty, then theattacker.usernamelog field is mapped to theadditional.fieldsUDM field.Else, if the attacker.usernamelog field value is not empty, then theattacker.usernamelog field is mapped to theprincipal.user.useridUDM field.Else, if the attacker.zcc_userlog field value is not empty, then theattacker.usernamelog field is mapped to theadditional.fieldsUDM field.Else, if the attacker.zia_userlog field value is not empty, then theattacker.usernamelog field is mapped to theadditional.fieldsUDM field.Else, if the attacker.zpa_userlog field value is not empty, then theattacker.usernamelog field is mapped to theadditional.fieldsUDM field. | 
| attacker.zcc_user | principal.user.userid | If the attacker.user_namelog field value is not empty, then theattacker.zcc_userlog field is mapped to theadditional.fieldsUDM field.Else, if the attacker.usernamelog field value is not empty, then theattacker.zcc_userlog field is mapped to theadditional.fieldsUDM field.Else, if the attacker.zcc_userlog field value is not empty, then theattacker.zcc_userlog field is mapped to theprincipal.user.useridUDM field.Else, if the attacker.zia_userlog field value is not empty, then theattacker.zcc_userlog field is mapped to theadditional.fieldsUDM field.Else, if the attacker.zpa_userlog field value is not empty, then theattacker.zcc_userlog field is mapped to theadditional.fieldsUDM field. | 
| attacker.zia_user | principal.user.userid | If the attacker.user_namelog field value is not empty, then theattacker.zia_userlog field is mapped to theadditional.fieldsUDM field.Else, if the attacker.usernamelog field value is not empty, then theattacker.zia_userlog field is mapped to theadditional.fieldsUDM field.Else, if the attacker.zcc_userlog field value is not empty, then theattacker.zia_userlog field is mapped to theadditional.fieldsUDM field.Else, if the attacker.zia_userlog field value is not empty, then theattacker.zia_userlog field is mapped to theprincipal.user.useridUDM field.Else, if the attacker.zpa_userlog field value is not empty, then theattacker.zia_userlog field is mapped to theadditional.fieldsUDM field. | 
| attacker.zpa_user | principal.user.userid | If the attacker.user_namelog field value is not empty, then theattacker.zpa_userlog field is mapped to theadditional.fieldsUDM field.Else, if the attacker.usernamelog field value is not empty, then theattacker.zpa_userlog field is mapped to theadditional.fieldsUDM field.Else, if the attacker.zcc_userlog field value is not empty, then theattacker.zpa_userlog field is mapped to theadditional.fieldsUDM field.Else, if the attacker.zia_userlog field value is not empty, then theattacker.zpa_userlog field is mapped to theadditional.fieldsUDM field.Else, if the attacker.zpa_userlog field value is not empty, then theattacker.zpa_userlog field is mapped to theprincipal.user.useridUDM field. | 
| attacker.process.user_sid | principal.user.windows_sid | |
| fake_process.action | security_result.action_details | |
|  | security_result.category | If the typelog field value matches the regular expression patternransomware, then thesecurity_result.categoryUDM field is set toSOFTWARE_MALICIOUS. | 
| cbf.is_ad_decoy_credential | security_result.detection_fields[cbf_is_ad_decoy_credential] | |
| file.operation_string | security_result.detection_fields[file_operation_string] | |
| file.operation | security_result.detection_fields[file_operation] | |
| kerberoast.is_decoy | security_result.detection_fields[kerberoast_is_decoy] | |
| mitm.query | security_result.detection_fields[mitm_query] | |
| mitm.technique | security_result.detection_fields[mitm_technique] | |
| monitor_accounts.win_event_id | security_result.detection_fields[monitor_accounts_win_event_id] | |
| triage.reason | security_result.summary | |
| monitor_accounts.failure_reason | security_result.summary | |
| cbf.target_domain_name | target.domain.name | |
| fake_process.domain_name | target.domain.name | |
| imc.target_domain_name | target.domain.name | |
| psexec.domain_name | target.domain.name | |
| monitor_accounts.target_domain_name | target.domain.name | |
| file.name | target.file.full_path | |
| psexec.machine_name | target.hostname | |
| triage.machine_name | target.hostname | |
| monitor_accounts.workstation_name | target.hostname | |
| session_enumeration.network_address | target.ip | |
| dcshadow.network_address | target.ip | |
| dcsync.network_address | target.ip | |
| zerologon.network_address | target.ip | |
| monitor_accounts.ip_address | target.ip | |
| fake_process.session_id | target.network.session_id | |
| decoy.session_id | target.network.session_id | |
| monitor_accounts.ip_port | target.port | |
| fake_process.command_line | target.process.command_line | |
| pwsh.script_block_text | target.process.command_line | |
| decoy.command_line | target.process.command_line | |
| pwsh.path | target.process.file.full_path | |
| decoy.file_name | target.process.file.full_path | |
| psexec.md5 | target.process.file.md5 | |
| psexec.files_and_pipe_names | target.process.file.names | The psexec.files_and_pipe_nameslog field is mapped to thetarget.process.file.namesUDM field. | 
| psexec.sha1 | target.process.file.sha1 | |
| psexec.sha256 | target.process.file.sha256 | |
| fake_process.parent_process_id | target.process.parent_process.pid | |
| fake_process.process_id | target.process.pid | |
| pwsh.script_block_id | target.process.pid | |
| decoy.process_id | target.process.pid | |
| ad_enumeration.attribute_list | target.resource.attribute.labels[ad_enumeration_attribute_list] | |
| ad_enumeration.scope_of_search_string | target.resource.attribute.labels[ad_enumeration_scope_of_search_string] | |
| ad_enumeration.scope_of_search | target.resource.attribute.labels[ad_enumeration_scope_of_search] | |
| ad_enumeration.search_filter | target.resource.attribute.labels[ad_enumeration_search_filter] | |
| ad_enumeration.distinguished_name | target.resource.name | |
| kerberoast.spn | target.resource.name | |
| psexec.service_name | target.resource.name | |
| ad_enumeration.type | target.resource.resource_subtype | |
|  | target.resource.resource_type | If the ad_enumeration.distinguished_namelog field value is not empty, then thetarget.resource.resource_typeUDM field is set toSTORAGE_BUCKET.Else, if the kerberoast.spnlog field value is not empty or thepsexec.service_namelog field value is not empty, then thetarget.resource.resource_typeUDM field is set toSERVICE_ACCOUNT. | 
| monitor_accounts.is_decoy | target.user.attribute.labels[monitor_accounts_is_decoy] | |
| monitor_accounts.is_privileged | target.user.attribute.labels[monitor_accounts_is_privileged] | |
| monitor_accounts.logon_process_name | target.user.attribute.labels[monitor_accounts_logon_process_name] | |
| monitor_accounts.logon_type | target.user.attribute.labels[monitor_accounts_logon_type] | |
| fake_process.user_groups | target.user.group_identifiers | |
| fake_process.user_ou | target.user.group_identifiers | |
| psexec.user_groups | target.user.group_identifiers | |
| psexec.user_ou | target.user.group_identifiers | |
| cbf.target_user_name | target.user.userid | |
| fake_process.username | target.user.userid | |
| imc.target_user_name | target.user.userid | |
| psexec.user_name | target.user.userid | |
| monitor_accounts.target_user_name | target.user.userid | |
| fake_process.user_sid | target.user.windows_sid | |
| psexec.user_sid | target.user.windows_sid | |
| monitor_accounts.target_sid | target.user.windows_sid | |
| attacker.logon_type | additional.fields[attacker_logon_type] | |
| attacker.process.exit_code | additional.fields[attacker_process_exit_code] | |
| attacker.process.name | additional.fields[attacker_process_name] | |
| attacker.process.parent_info.domain_name | additional.fields[attacker_process_parent_info_domain_name] | |
| attacker.process.parent_info.name | additional.fields[attacker_process_parent_info_name] | |
| attacker.process.parent_info.tree | additional.fields[attacker_process_parent_info_tree] | The attacker.process.parent_info.treelog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| attacker.process.parent_info.user_groups | additional.fields[attacker_process_parent_info_user_groups] | |
| attacker.process.parent_info.user_name | additional.fields[attacker_process_parent_info_user_name] | |
| attacker.process.parent_info.user_ou | additional.fields[attacker_process_parent_info_user_ou] | |
| attacker.process.parent_info.user_sid | additional.fields[attacker_process_parent_info_user_sid] | |
| attacker.process.parent | additional.fields[attacker_process_parent] | |
| attacker.process.tree | additional.fields[attacker_process_tree] | The attacker.process.treelog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| fake_process.exit_code | additional.fields[fake_process_exit_code] | |
| fake_process.process_name | additional.fields[fake_process_process_name] | |
| landmine.version | additional.fields[landmine_version] | |
| monitor_accounts.auth_package | additional.fields[monitor_accounts_auth_package] | |
| monitor_accounts.status | additional.fields[monitor_accounts_status] | |
| monitor_accounts.sub_status_parsed | additional.fields[monitor_accounts_sub_status_parsed] | |
| monitor_accounts.sub_status | additional.fields[monitor_accounts_sub_status] | |
| pwsh.message_number | additional.fields[pwsh_message_number] | |
| pwsh.message_total | additional.fields[pwsh_message_total] | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - filetheft
次の表に、filetheft ログタイプの未加工ログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
| type | metadata.product_event_type | |
| filetheft.useragent | network.http.user_agent | |
| filetheft.filename | target.file.full_path | |
| filetheft.file_uuid | additional.fields[filetheft_file_uuid] | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - mitm
次の表に、mitm ログタイプの未加工ログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
| type | metadata.product_event_type | |
|  | network.application_protocol | The network.application_protocolUDM field is set toDNS. | 
| mitm.answer | network.dns.answers.data | |
| mitm.qtype | network.dns.questions.type | |
| mitm.server | principal.hostname | |
| mitm.hostname | target.hostname | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - mongodb
次の表に、mongodb ログタイプの未加工ログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
| mongodb.message | metadata.description | |
| type | metadata.product_event_type | |
| mongodb.execution_time | network.session_duration.seconds | |
| mongodb.connection_id | network.session_id | |
| mongodb.command | security_result.detection_fields[mongodb_command] | |
| mongodb.object | additional.fields[mongodb_object] | |
| mongodb.protocol | additional.fields[mongodb_protocol] | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - network
次の表に、network ログタイプの未加工ログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
| rfb.authentication_method | extensions.auth.auth_details | |
| ssh.auth_success | extensions.auth.auth_details | |
|  | extensions.auth.mechanism | If the mysql.usernamelog field value is not empty, then theextensions.auth.mechanismUDM field is set toUSERNAME_PASSWORD.Else, if the ntlm.usernamelog field value is not empty, then theextensions.auth.mechanismUDM field is set toINTERACTIVE.Else, if the radius.usernamelog field value is not empty, then theextensions.auth.mechanismUDM field is set toREMOTE.Else, if the rfb.authentication_methodlog field value is not empty, then theextensions.auth.mechanismUDM field is set toREMOTE_INTERACTIVE. | 
| socks.bound | intermediary.hostname | |
| socks.bound_p | intermediary.port | |
| snmp.display_string | metadata.description | |
| syslog.message | metadata.description | |
| threat.event_type | metadata.description | |
|  | metadata.event_type | If (the ntlm.hostnamelog field value is not empty or theradius.maclog field value is not empty or theradius.remote_iplog field value is not empty) and (thentlm.usernamelog field value is not empty or theradius.usernamelog field value is not empty), then themetadata.event_typeUDM field is set toUSER_LOGIN.Else, if the messagelog field value matches the regular expression patternsmtp., then themetadata.event_typeUDM field is set toEMAIL_TRANSACTION.Else, if the messagelog field value matches the regular expression pattern(dnp3 or modbus or scan or snmp or syslog or tunnel)., then themetadata.event_typeUDM field is set toUSER_STATS.Else, the metadata.event_typeUDM field is set toUSER_RESOURCE_ACCESS. | 
| type | metadata.product_event_type | |
| threat.tx_id | metadata.product_log_id | |
|  | network.application_protocol | If the messagelog field value matches the regular expression patterndce_rpc., then thenetwork.application_protocolUDM field is set toDCERPC.Else, if the messagelog field value matches the regular expression patterndnp3., then thenetwork.application_protocolUDM field is set toDNP3.Else, if the messagelog field value matches the regular expression patterndns., then thenetwork.application_protocolUDM field is set toDNS.Else, if the messagelog field value matches the regular expression patternmqtt., then thenetwork.application_protocolUDM field is set toMQTT.Else, if the messagelog field value matches the regular expression patternrdp., then thenetwork.application_protocolUDM field is set toRDP.Else, if the messagelog field value matches the regular expression patternsip., then thenetwork.application_protocolUDM field is set toSIP.Else, if the messagelog field value matches the regular expression patternsmb., then thenetwork.application_protocolUDM field is set toSMB.Else, if the messagelog field value matches the regular expression patternsmtp., then thenetwork.application_protocolUDM field is set toSMTP.Else, if the messagelog field value matches the regular expression patternsnmp., then thenetwork.application_protocolUDM field is set toSNMP.Else, if the messagelog field value matches the regular expression patternssh., then thenetwork.application_protocolUDM field is set toSSH. | 
| mqtt.proto_version | network.application_protocol_version | |
| rdp.client_build | network.application_protocol_version | |
| snmp.version | network.application_protocol_version | |
| ssh.version | network.application_protocol_version | |
|  | network.direction | If the ssh.directionlog field value matches the regular expression pattern(?i)INBOUND, then thenetwork.directionUDM field is set toINBOUND.Else, if the ssh.directionlog field value matches the regular expression pattern(?i)OUTBOUND, then thenetwork.directionUDM field is set toOUTBOUND. | 
| dns.answers | network.dns.answers.data | |
| dns.TTLs | network.dns.answers.ttl | |
| dns.trans_id | network.dns.id | |
| dns.qclass | network.dns.questions.class | |
| dns.query | network.dns.questions.name | |
| dns.qtype | network.dns.questions.type | |
| dns.RA | network.dns.recursion_available | |
| dns.RD | network.dns.recursion_desired | |
| dns.AA | network.dns.response | |
| dns.rcode | network.dns.response_code | |
| dns.rejected | network.dns.truncated | |
| smtp.cc | network.email.cc | |
| smtp.mailfrom | network.email.from | |
| smtp.in_reply_to | network.email.reply_to | |
| smtp.reply_to | network.email.reply_to | |
| smtp.subject | network.email.subject | |
| smtp.to | network.email.to | |
| ftp.command | network.ftp.command | |
| sip.method | network.http.method | |
| sip.status_code | network.http.response_code | |
| sip.user_agent | network.http.user_agent | |
|  | network.ip_protocol | If the dns.protolog field value matches the regular expression pattern(?i)tcp, then thenetwork.ip_protocolUDM field is set toTCP.Else, if the dns.protolog field value matches the regular expression pattern(?i)udp, then thenetwork.ip_protocolUDM field is set toUDP.Else, if the dns.protolog field value matches the regular expression pattern(?i)icmp, then thenetwork.ip_protocolUDM field is set toICMP.Else, if the network.protocollog field value matches the regular expression pattern(?i)tcp, then thenetwork.ip_protocolUDM field is set toTCP.Else, if the network.protocollog field value matches the regular expression pattern(?i)udp, then thenetwork.ip_protocolUDM field is set toUDP.Else, if the network.protocollog field value matches the regular expression pattern(?i)icmp, then thenetwork.ip_protocolUDM field is set toICMP.Else, if the syslog.protolog field value matches the regular expression pattern(?i)tcp, then thenetwork.ip_protocolUDM field is set toTCP.Else, if the syslog.protolog field value matches the regular expression pattern(?i)udp, then thenetwork.ip_protocolUDM field is set toUDP.Else, if the syslog.protolog field value matches the regular expression pattern(?i)icmp, then thenetwork.ip_protocolUDM field is set toICMP. | 
| network.tunnel_parents | network.parent_session_id | |
| network.duration | network.session_duration | |
| network.connection_uid | network.session_id | |
| threat.flow_id | network.session_id | |
| smtp.helo | network.smtp.helo | |
|  | network.smtp.is_tls | If the smtp.tlslog field value matches the regular expression pattern(?i)true, then thenetwork.smtp.is_tlsUDM field is set totrue. | 
| smtp.from | network.smtp.mail_from | |
| smtp.rcptto | network.smtp.rcpt_to | |
| ssl.cipher | network.tls.cipher | |
| ssl.established | network.tls.established | |
| ssl.resumed | network.tls.resumed | |
| ssl.issuer | network.tls.server.certificate.issuer | |
| ssl.subject | network.tls.server.certificate.subject | |
| ssl.version | network.tls.version | |
| rdp.client_dig_product_id | principal.asset.product_object_id | |
| ntlm.domainname | principal.domain.name | |
| threat.alert.gid | principal.group.product_object_id | |
| ntlm.hostname | principal.hostname | |
| rdp.client_name | principal.hostname | |
| radius.remote_ip | principal.ip | |
| smtp.x_originating_ip | principal.ip | |
| radius.mac | principal.mac | |
| network.orig_bytes | principal.network.sent_bytes | |
| network.orig_pkts | principal.network.sent_packets | |
| rfb.client_major_version | principal.platform_version | The rfb.client_major_version rfb.client_minor_versionlog field is mapped to theprincipal.platform_versionUDM field. | 
| rfb.client_minor_version | principal.platform_version | The rfb.client_major_version rfb.client_minor_versionlog field is mapped to theprincipal.platform_versionUDM field. | 
| irc.command | principal.process.command_line | |
| ftp.password | principal.user.attribute.labels[ftp_password] | |
| mysql.password | principal.user.attribute.labels[mysql_password] | |
| socks.password | principal.user.attribute.labels[socks_password] | |
| ftp.user | principal.user.userid | |
| irc.user | principal.user.userid | |
| kerberos.client | principal.user.userid | |
| mqtt.client_id | principal.user.userid | |
| mysql.username | principal.user.userid | |
| rdp.cookie | principal.user.userid | |
| socks.user | principal.user.userid | |
|  | security_result.action | If the rdp.resultlog field value matches the regular expression pattern(?i)(allow or success), then thesecurity_result.actionUDM field is set toALLOW.Else, if the rdp.resultlog field value matches the regular expression pattern(?i)(fail), then thesecurity_result.actionUDM field is set toFAIL.Else, if the rdp.resultlog field value matches the regular expression pattern(?i)(denied or block), then thesecurity_result.actionUDM field is set toBLOCK.Else, if the radius.resultlog field value matches the regular expression pattern(?i)(allow or success), then thesecurity_result.actionUDM field is set toALLOW.Else, if the radius.resultlog field value matches the regular expression pattern(?i)(fail), then thesecurity_result.actionUDM field is set toFAIL.Else, if the radius.resultlog field value matches the regular expression pattern(?i)(denied or block), then thesecurity_result.actionUDM field is set toBLOCK.Else, if the threat.alert.actionlog field value matches the regular expression pattern(?i)(allow or success), then thesecurity_result.actionUDM field is set toALLOW.Else, if the threat.alert.actionlog field value matches the regular expression pattern(?i)(fail), then thesecurity_result.actionUDM field is set toFAIL.Else, if the threat.alert.actionlog field value matches the regular expression pattern(?i)(denied or block), then thesecurity_result.actionUDM field is set toBLOCK. | 
| radius.result | security_result.action_details | |
| rdp.result | security_result.action_details | |
| smb_files.action | security_result.action_details | |
| tunnel.action | security_result.action_details | |
| threat.alert.category | security_result.category_details | |
| kerberos.error_msg | security_result.description | |
| sip.warning | security_result.description | |
| dce_rpc.operation | security_result.detection_fields[dce_rpc_operation] | |
| file.analyzers | security_result.detection_fields[file_analyzers] | |
| mqtt.granted_qos_level | security_result.detection_fields[mqtt_granted_qos_level] | |
| mqtt.qos_val | security_result.detection_fields[mqtt_qos_val] | |
| rdp.cert_count | security_result.detection_fields[rdp_cert_count] | |
| rdp.cert_permanent | security_result.detection_fields[rdp_cert_permanent] | |
| rdp.cert_type | security_result.detection_fields[rdp_cert_type] | |
| rdp.encryption_level | security_result.detection_fields[rdp_encryption_level] | |
| rdp.encryption_method | security_result.detection_fields[rdp_encryption_method] | |
| rdp.security_protocol | security_result.detection_fields[rdp_security_protocol] | |
| ssh.auth_attempts | security_result.detection_fields[ssh_auth_attempts] | |
| ssh.cipher_alg | security_result.detection_fields[ssh_cipher_alg] | |
| ssh.client | security_result.detection_fields[ssh_client] | |
| ssh.compression_alg | security_result.detection_fields[ssh_compression_alg] | |
| ssh.host_key_alg | security_result.detection_fields[ssh_host_key_alg] | |
| ssh.host_key | security_result.detection_fields[ssh_host_key] | |
| ssh.kex_alg | security_result.detection_fields[ssh_kex_alg] | |
| ssh.mac_alg | security_result.detection_fields[ssh_mac_alg] | |
| ssh.server | security_result.detection_fields[ssh_server] | |
| ssl.cert_chain_fuids | security_result.detection_fields[ssl_cert_chain_fuids] | |
| ssl.client_cert_chain_fuids | security_result.detection_fields[ssl_client_cert_chain_fuids] | |
| ssl.validation_status | security_result.detection_fields[ssl_validation_status] | |
| syslog.facility | security_result.detection_fields[syslog_facility] | |
| threat.alert.rev | security_result.detection_fields[threat_alert_rev] | |
| threat.alert.signature_id | security_result.rule_id | |
| decoy.smb.dataset | security_result.rule_labels[decoy_smb_dataset] | The decoy.smb.datasetlog field is mapped to thesecurity_result.rule_labelsUDM field. | 
| threat.alert.signature | security_result.rule_name | |
| decoy.ftp.dataset | security_result.rule_set | |
|  | security_result.severity | If the syslog.severitylog field value matches the regular expression pattern(?i)Low, then thesecurity_result.severityUDM field is set toLOW.Else, if the syslog.severitylog field value matches the regular expression pattern(?i)Informational, then thesecurity_result.severityUDM field is set toINFORMATIONAL.Else, if the syslog.severitylog field value matches the regular expression pattern(?i)Medium, then thesecurity_result.severityUDM field is set toMEDIUM.Else, if the syslog.severitylog field value matches the regular expression pattern(?i)Critical, then thesecurity_result.severityUDM field is set toCRITICAL.Else, if the syslog.severitylog field value matches the regular expression pattern(?i)High, then thesecurity_result.severityUDM field is set toHIGH.Else, if the syslog.severitylog field value matches the regular expression pattern(?i)ERROR, then thesecurity_result.severityUDM field is set toERROR.Else, if the threat.alert.severitylog field value matches the regular expression pattern4 or 5, then thesecurity_result.severityUDM field is set toHIGH.Else, if the threat.alert.severitylog field value matches the regular expression pattern1 or 2, then thesecurity_result.severityUDM field is set toLOW.Else, if the threat.alert.severitylog field value matches the regular expression pattern3, then thesecurity_result.severityUDM field is set toMEDIUM. | 
| syslog.severity | security_result.severity_details | |
| threat.alert.severity | security_result.severity_details | |
|  | security_result.summary | If the kerberos.error_codelog field value is equal to1, then thesecurity_result.summaryUDM field is set toKDC_ERR_NAME_EXP.Else, if the kerberos.error_codelog field value is equal to2, then thesecurity_result.summaryUDM field is set toKDC_ERR_SERVICE_EXP.Else, if the kerberos.error_codelog field value is equal to3, then thesecurity_result.summaryUDM field is set toKDC_ERR_BAD_PVNO.Else, if the kerberos.error_codelog field value is equal to4, then thesecurity_result.summaryUDM field is set toKDC_ERR_C_OLD_MAST_KVNO.Else, if the kerberos.error_codelog field value is equal to5, then thesecurity_result.summaryUDM field is set toKDC_ERR_S_OLD_MAST_KVNO.Else, if the kerberos.error_codelog field value is equal to6, then thesecurity_result.summaryUDM field is set toKDC_ERR_C_PRINCIPAL_UNKNOWN.Else, if the kerberos.error_codelog field value is equal to7, then thesecurity_result.summaryUDM field is set toKDC_ERR_S_PRINCIPAL_UNKNOWN.Else, if the kerberos.error_codelog field value is equal to8, then thesecurity_result.summaryUDM field is set toKDC_ERR_PRINCIPAL_NOT_UNIQUE.Else, if the kerberos.error_codelog field value is equal to9, then thesecurity_result.summaryUDM field is set toKDC_ERR_NULL_KEY.Else, if the kerberos.error_codelog field value is equal to10, then thesecurity_result.summaryUDM field is set toKDC_ERR_CANNOT_POSTDATE.Else, if the kerberos.error_codelog field value is equal to11, then thesecurity_result.summaryUDM field is set toKDC_ERR_NEVER_VALID.Else, if the kerberos.error_codelog field value is equal to12, then thesecurity_result.summaryUDM field is set toKDC_ERR_POLICY.Else, if the kerberos.error_codelog field value is equal to13, then thesecurity_result.summaryUDM field is set toKDC_ERR_BADOPTION.Else, if the kerberos.error_codelog field value is equal to14, then thesecurity_result.summaryUDM field is set toKDC_ERR_ETYPE_NOSUPP.Else, if the kerberos.error_codelog field value is equal to15, then thesecurity_result.summaryUDM field is set toKDC_ERR_SUMTYPE_NOSUPP.Else, if the kerberos.error_codelog field value is equal to16, then thesecurity_result.summaryUDM field is set toKDC_ERR_PADATA_TYPE_NOSUPP.Else, if the kerberos.error_codelog field value is equal to17, then thesecurity_result.summaryUDM field is set toKDC_ERR_TRTYPE_NOSUPP.Else, if the kerberos.error_codelog field value is equal to18, then thesecurity_result.summaryUDM field is set toKDC_ERR_CLIENT_REVOKED.Else, if the kerberos.error_codelog field value is equal to19, then thesecurity_result.summaryUDM field is set toKDC_ERR_SERVICE_REVOKED.Else, if the kerberos.error_codelog field value is equal to20, then thesecurity_result.summaryUDM field is set toKDC_ERR_TGT_REVOKED.Else, if the kerberos.error_codelog field value is equal to21, then thesecurity_result.summaryUDM field is set toKDC_ERR_CLIENT_NOTYET.Else, if the kerberos.error_codelog field value is equal to22, then thesecurity_result.summaryUDM field is set toKDC_ERR_SERVICE_NOTYET.Else, if the kerberos.error_codelog field value is equal to23, then thesecurity_result.summaryUDM field is set toKDC_ERR_KEY_EXPIRED.Else, if the kerberos.error_codelog field value is equal to24, then thesecurity_result.summaryUDM field is set toKDC_ERR_PREAUTH_FAILED.Else, if the kerberos.error_codelog field value is equal to25, then thesecurity_result.summaryUDM field is set toKDC_ERR_PREAUTH_REQUIRED.Else, if the kerberos.error_codelog field value is equal to26, then thesecurity_result.summaryUDM field is set toKDC_ERR_SERVER_NOMATCH.Else, if the kerberos.error_codelog field value is equal to27, then thesecurity_result.summaryUDM field is set toKDC_ERR_MUST_USE_USER2USER.Else, if the kerberos.error_codelog field value is equal to28, then thesecurity_result.summaryUDM field is set toKDC_ERR_PATH_NOT_ACCEPTED.Else, if the kerberos.error_codelog field value is equal to29, then thesecurity_result.summaryUDM field is set toKDC_ERR_SVC_UNAVAILABLE.Else, if the kerberos.error_codelog field value is equal to31, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_BAD_INTEGRITY.Else, if the kerberos.error_codelog field value is equal to32, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_TKT_EXPIRED.Else, if the kerberos.error_codelog field value is equal to33, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_TKT_NYV.Else, if the kerberos.error_codelog field value is equal to34, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_REPEAT.Else, if the kerberos.error_codelog field value is equal to35, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_NOT_US.Else, if the kerberos.error_codelog field value is equal to36, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_BADMATCH.Else, if the kerberos.error_codelog field value is equal to37, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_SKEW.Else, if the kerberos.error_codelog field value is equal to38, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_BADADDR.Else, if the kerberos.error_codelog field value is equal to39, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_BADVERSION.Else, if the kerberos.error_codelog field value is equal to40, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_MSG_TYPE.Else, if the kerberos.error_codelog field value is equal to41, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_MODIFIED.Else, if the kerberos.error_codelog field value is equal to42, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_BADORDER.Else, if the kerberos.error_codelog field value is equal to44, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_BADKEYVER.Else, if the kerberos.error_codelog field value is equal to45, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_NOKEY.Else, if the kerberos.error_codelog field value is equal to46, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_MUT_FAIL.Else, if the kerberos.error_codelog field value is equal to47, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_BADDIRECTION.Else, if the kerberos.error_codelog field value is equal to48, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_METHOD.Else, if the kerberos.error_codelog field value is equal to49, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_BADSEQ.Else, if the kerberos.error_codelog field value is equal to50, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_INAPP_CKSUM.Else, if the kerberos.error_codelog field value is equal to51, then thesecurity_result.summaryUDM field is set toKRB_AP_PATH_NOT_ACCEPTED.Else, if the kerberos.error_codelog field value is equal to52, then thesecurity_result.summaryUDM field is set toKRB_ERR_RESPONSE_TOO_BIG.Else, if the kerberos.error_codelog field value is equal to60, then thesecurity_result.summaryUDM field is set toKRB_ERR_GENERIC.Else, if the kerberos.error_codelog field value is equal to61, then thesecurity_result.summaryUDM field is set toKRB_ERR_FIELD_TOOLONG.Else, if the kerberos.error_codelog field value is equal to62, then thesecurity_result.summaryUDM field is set toKDC_ERROR_CLIENT_NOT_TRUSTED.Else, if the kerberos.error_codelog field value is equal to63, then thesecurity_result.summaryUDM field is set toKDC_ERROR_KDC_NOT_TRUSTED.Else, if the kerberos.error_codelog field value is equal to64, then thesecurity_result.summaryUDM field is set toKDC_ERROR_INVALID_SIG.Else, if the kerberos.error_codelog field value is equal to65, then thesecurity_result.summaryUDM field is set toKDC_ERR_KEY_TOO_WEAK.Else, if the kerberos.error_codelog field value is equal to66, then thesecurity_result.summaryUDM field is set toKDC_ERR_CERTIFICATE_MISMATCH.Else, if the kerberos.error_codelog field value is equal to67, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_NO_TGT.Else, if the kerberos.error_codelog field value is equal to68, then thesecurity_result.summaryUDM field is set toKDC_ERR_WRONG_REALM.Else, if the kerberos.error_codelog field value is equal to69, then thesecurity_result.summaryUDM field is set toKRB_AP_ERR_USER_TO_USER_REQUIRED.Else, if the kerberos.error_codelog field value is equal to70, then thesecurity_result.summaryUDM field is set toKDC_ERR_CANT_VERIFY_CERTIFICATE.Else, if the kerberos.error_codelog field value is equal to71, then thesecurity_result.summaryUDM field is set toKDC_ERR_INVALID_CERTIFICATE.Else, if the kerberos.error_codelog field value is equal to72, then thesecurity_result.summaryUDM field is set toKDC_ERR_REVOKED_CERTIFICATE.Else, if the kerberos.error_codelog field value is equal to73, then thesecurity_result.summaryUDM field is set toKDC_ERR_REVOCATION_STATUS_UNKNOWN.Else, if the kerberos.error_codelog field value is equal to74, then thesecurity_result.summaryUDM field is set toKDC_ERR_REVOCATION_STATUS_UNAVAILABLE.Else, if the kerberos.error_codelog field value is equal to75, then thesecurity_result.summaryUDM field is set toKDC_ERR_CLIENT_NAME_MISMATCH.Else, if the kerberos.error_codelog field value is equal to76, then thesecurity_result.summaryUDM field is set toKDC_ERR_KDC_NAME_MISMATCH. | 
| pe.machine | target.asset.asset_id | The Zscaler:pe.machinelog field is mapped to thetarget.asset.asset_idUDM field. | 
|  | target.file.file_type | If the pe.is_exelog field value is equal totrue, then thetarget.file.file_typeUDM field is set toFILE_TYPE_PE_EXE. | 
| smb_files.times.created | target.file.first_submission_time | |
| file.source | target.file.full_path | |
| smb_files.path | target.file.full_path | |
| smb_mapping.path | target.file.full_path | |
| smb_files.times.accessed | target.file.last_analysis_time | |
| smb_files.times.changed | target.file.last_modification_time | If the smb_files.times.modifiedlog field value is not empty, then thesmb_files.times.modifiedlog field is mapped to thetarget.file.last_modification_timeUDM field.Else, if the smb_files.times.changedlog field value is not empty, then thesmb_files.times.changedlog field is mapped to thetarget.file.last_modification_timeUDM field. | 
| smb_files.times.modified | target.file.last_modification_time | If the smb_files.times.modifiedlog field value is not empty, then thesmb_files.times.modifiedlog field is mapped to thetarget.file.last_modification_timeUDM field. | 
| file.md5 | target.file.md5 | |
| file.mime_type | target.file.mime_type | |
| smb_files.name | target.file.names | |
| pe.compile_ts | target.file.pe_file.compilation_time | |
| pe.section_names | target.file.pe_file.section.name | The pe.section_nameslog field is mapped to thetarget.file.pe_file.section.nameUDM field. | 
| file.sha1 | target.file.sha1 | |
| file.total_bytes | target.file.size | |
| smb_files.size | target.file.size | |
| socks.request | target.hostname | |
| scan.ips | target.ip | The scan.ipslog field is mapped to thetarget.ipUDM field. | 
| network.resp_bytes | target.network.sent_bytes | |
| network.resp_pkts | target.network.sent_packets | |
|  | target.platform | If the pe.oslog field value matches the regular expression pattern(?i)Win, then theprincipal.platformUDM field is set toWINDOWS.Else, if the pe.oslog field value matches the regular expression pattern(?i)Lin, then theprincipal.platformUDM field is set toLINUX.Else, if the pe.oslog field value matches the regular expression pattern(?i)(Mac or iOS), then theprincipal.platformUDM field is set toMAC. | 
| rfb.server_major_version | target.platform_version | The rfb.server_major_version rfb.server_minor_versionlog field is mapped to thetarget.platform_versionUDM field. | 
| rfb.server_minor_version | target.platform_version | The rfb.server_major_version rfb.server_minor_versionlog field is mapped to thetarget.platform_versionUDM field. | 
| scan.ports | target.port | If the indexlog field value is equal to0, then thescan.portslog field is mapped to thetarget.portUDM field.Else, the scan.portslog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| socks.request_p | target.port | The socks.request_plog field is mapped to thetarget.portUDM field. | 
| dce_rpc.endpoint | target.resource_ancestors.name | |
|  | target.resource_ancestors.resource_type | If the dce_rpc.endpointlog field value is not empty, then thetarget.resource_ancestors.resource_typeUDM field is set toBACKEND_SERVICE. | 
| rfb.height | target.resource.attribute.labels[rfb_height] | |
| rfb.width | target.resource.attribute.labels[rfb_width] | |
| dce_rpc.named_pipe | target.resource.name | |
| kerberos.service | target.resource.name | |
| rfb.desktop_name | target.resource.name | |
|  | target.resource.resource_type | If the dce_rpc.named_pipelog field value is not empty, then thetarget.resource.resource_typeUDM field is set toPIPE.Else, if the kerberos.servicelog field value is not empty, then thetarget.resource.resource_typeUDM field is set toBACKEND_SERVICE.Else, if the rfb.desktop_namelog field value is not empty, then thetarget.resource.resource_typeUDM field is set toDEVICE. | 
| sip.uri | target.url | |
| ntlm.username | target.user.userid | |
| radius.username | target.user.userid | |
| dce_rpc.rtt | additional.fields[dce_rpc_rtt] | |
| decoy.ftp.banner | additional.fields[decoy_ftp_banner] | |
| dnp3.fc_reply | additional.fields[dnp3_fc_reply] | |
| dnp3.fc_request | additional.fields[dnp3_fc_request] | |
| dnp3.iin | additional.fields[dnp3_iin] | |
| dns.qclass_name | additional.fields[dns_qclass_name] | |
| dns.qtype_name | additional.fields[dns_qtype_name] | |
| dns.rcode_name | additional.fields[dns_rcode_name] | |
| dns.rtt | additional.fields[dns_rtt] | |
| dns.saw_query | additional.fields[dns_saw_query] | |
| dns.saw_reply | additional.fields[dns_saw_reply] | |
| dns.TC | additional.fields[dns_tc] | |
| dns.total_answers | additional.fields[dns_total_answers] | |
| dns.total_replies | additional.fields[dns_total_replies] | |
| dns.Z | additional.fields[dns_z] | |
| file.depth | additional.fields[file_depth] | |
| file.duration | additional.fields[file_duration] | |
| file.is_orig | additional.fields[file_is_orig] | |
| file.missing_bytes | additional.fields[file_missing_bytes] | |
| file.overflow_bytes | additional.fields[file_overflow_bytes] | |
| file.seen_bytes | additional.fields[file_seen_bytes] | |
| file.timedout | additional.fields[file_timedout] | |
| file.uid | additional.fields[file_uid] | |
| ftp.arg | additional.fields[ftp_arg] | |
| ftp.data_channel.passive | additional.fields[ftp_data_channel_passive] | |
| ftp.reply_code | additional.fields[ftp_reply_code] | |
| ftp.reply_msg | additional.fields[ftp_reply_msg] | |
| irc.addl | additional.fields[irc_addl] | |
| irc.nick | additional.fields[irc_nick] | |
| irc.value | additional.fields[irc_value] | |
| kerberos.cipher | additional.fields[kerberos_cipher] | |
| kerberos.forwardable | additional.fields[kerberos_forwardable] | |
| kerberos.from | additional.fields[kerberos_from] | |
| kerberos.logged | additional.fields[kerberos_logged] | |
| kerberos.renewable | additional.fields[kerberos_renewable] | |
| kerberos.request_type | additional.fields[kerberos_request_type] | |
| kerberos.success | additional.fields[kerberos_success] | |
| kerberos.till | additional.fields[kerberos_till] | |
| modbus.func | additional.fields[modbus_func] | |
| mqtt.ack | additional.fields[mqtt_ack] | |
| mqtt.action | additional.fields[mqtt_action] | |
| mqtt.connect_status | additional.fields[mqtt_connect_status] | |
| mqtt.from_client | additional.fields[mqtt_from_client] | |
| mqtt.message_type | additional.fields[mqtt_message_type] | |
| mqtt.payload_len | additional.fields[mqtt_payload_len] | |
| mqtt.payload | additional.fields[mqtt_payload] | |
| mqtt.retain | additional.fields[mqtt_retain] | |
| mqtt.status | additional.fields[mqtt_status] | |
| mqtt.topic | additional.fields[mqtt_topic] | |
| mqtt.topics | additional.fields[mqtt_topics] | |
| mysql.arg | additional.fields[mysql_arg] | |
| mysql.cmd | additional.fields[mysql_cmd] | |
| mysql.response | additional.fields[mysql_response] | |
| mysql.rows | additional.fields[mysql_rows] | |
| network.conn_state | additional.fields[network_conn_state] | |
| network.connection_uids | additional.fields[network_connection_uids] | The network.connection_uidslog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| network.history | additional.fields[network_history] | |
| network.icmp_type | additional.fields[network_icmp_type] | |
| network.local_orig | additional.fields[network_local_orig] | |
| network.local_resp | additional.fields[network_local_resp] | |
| network.missed_bytes | additional.fields[network_missed_bytes] | |
| network.orig_ip_bytes | additional.fields[network_orig_ip_bytes] | |
| network.resp_ip_bytes | additional.fields[network_resp_ip_bytes] | |
| network.service | additional.fields[network_service] | |
| ntlm.done | additional.fields[ntlm_done] | |
| ntlm.status | additional.fields[ntlm_status] | |
| pe.has_cert_table | additional.fields[pe_has_cert_table] | |
| pe.has_debug_data | additional.fields[pe_has_debug_data] | |
| pe.has_export_table | additional.fields[pe_has_export_table] | |
| pe.has_import_table | additional.fields[pe_has_import_table] | |
| pe.is_64bit | additional.fields[pe_is_64bit] | |
| pe.subsystem | additional.fields[pe_subsystem] | |
| pe.uses_aslr | additional.fields[pe_uses_aslr] | |
| pe.uses_code_integrity | additional.fields[pe_uses_code_integrity] | |
| pe.uses_dep | additional.fields[pe_uses_dep] | |
| pe.uses_seh | additional.fields[pe_uses_seh] | |
| radius.connect_info | additional.fields[radius_connect_info] | |
| radius.logged | additional.fields[radius_logged] | |
| rdp.desktop_height | additional.fields[rdp_desktop_height] | |
| rdp.desktop_width | additional.fields[rdp_desktop_width] | |
| rdp.keyboard_layout | additional.fields[rdp_keyboard_layout] | |
| rdp.requested_color_depth | additional.fields[rdp_requested_color_depth] | |
| rfb.auth | additional.fields[rfb_auth] | |
| rfb.done | additional.fields[rfb_done] | |
| rfb.share_flag | additional.fields[rfb_share_flag] | |
| scan.type | additional.fields[scan_type] | |
| sip.call_id | additional.fields[sip_call_id] | |
| sip.content_type | additional.fields[sip_content_type] | |
| sip.date | additional.fields[sip_date] | |
| sip.reply_to | additional.fields[sip_reply_to] | |
| sip.request_body_len | additional.fields[sip_request_body_len] | |
| sip.request_from | additional.fields[sip_request_from] | |
| sip.request_path | additional.fields[sip_request_path] | The sip.request_pathlog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| sip.request_to | additional.fields[sip_request_to] | |
| sip.response_body_len | additional.fields[sip_response_body_len] | |
| sip.response_from | additional.fields[sip_response_from] | |
| sip.response_path | additional.fields[sip_response_path] | The sip.response_pathlog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| sip.response_to | additional.fields[sip_response_to] | |
| sip.seq | additional.fields[sip_seq] | |
| sip.status_msg | additional.fields[sip_status_msg] | |
| sip.subject | additional.fields[sip_subject] | |
| sip.trans_depth | additional.fields[sip_trans_depth] | |
| smb_mapping.share_type | additional.fields[smb_mapping_share_type] | |
| smtp.date | additional.fields[smtp_date] | |
| smtp.first_received | additional.fields[smtp_first_received] | |
| smtp.has_client_activity | additional.fields[smtp_has_client_activity] | |
| smtp.last_reply | additional.fields[smtp_last_reply] | |
| smtp.msg_id | additional.fields[smtp_msg_id] | |
| smtp.path_list | additional.fields[smtp_path_list] | |
| smtp.process_received_from | additional.fields[smtp_process_received_from] | |
| smtp.second_received | additional.fields[smtp_second_received] | |
| smtp.trans_depth | additional.fields[smtp_trans_depth] | |
| smtp.user_agent | additional.fields[smtp_user_agent] | |
| snmp.duration | additional.fields[snmp_duration] | |
| snmp.get_bulk_requests | additional.fields[snmp_get_bulk_requests] | |
| snmp.get_requests | additional.fields[snmp_get_requests] | |
| snmp.get_responses | additional.fields[snmp_get_responses] | |
| snmp.set_requests | additional.fields[snmp_set_requests] | |
| snmp.up_since | additional.fields[snmp_up_since] | |
| socks.status | additional.fields[socks_status] | |
| socks.version | additional.fields[socks_version] | |
| tunnel.tunnel_type | additional.fields[tunnel_tunnel_type] | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - postgresql
次の表に、postgresql ログタイプの未加工ログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
| postgresql.message | metadata.description | |
| type | metadata.product_event_type | |
| postgresql.user | principal.user.userid | |
| postgresql.error_severity | security_result.severity_details | |
| postgresql.state_code | security_result.detection_fields[postgresql_state_code] | |
| postgresql.application_name | target.application | |
| postgresql.session_id | target.network.session_id | |
| postgresql.statement | target.process.command_line | |
| postgresql.pid | target.process.pid | |
| postgresql.vpid | target.process.product_specific_process_id | The Deception:postgresql.vpidlog field is mapped to thetarget.process.product_specific_process_idUDM field. | 
| postgresql.dbname | target.resource.name | |
|  | target.resource.resource_type | The target.resource.resource_typeUDM field is set toDATABASE. | 
| postgresql.password | additional.fields[postgresql_password] | |
| postgresql.vxid | additional.fields[postgresql_vxid] | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - QOS
次の表に、QOS ログタイプの未加工ログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
| type | metadata.product_event_type | |
| qos.message | metadata.description | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - recon
次の表に、recon ログタイプの未加工ログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
|  | extensions.auth.mechanism | The extensions.auth.mechanismUDM field is set toUSERNAME_PASSWORD. | 
| recon.cve_type | extensions.vulns.vulnerabilities.about.security_result.detection_fields[recon_cve_type] | |
| recon.cve_name | extensions.vulns.vulnerabilities.cve_description | |
| recon.cve_id | extensions.vulns.vulnerabilities.cve_id | |
| timestamp(Europe/Amsterdam) | metadata.event_timestamp | |
|  | metadata.event_type | If (the recon.http_x_forwarded_forlog field value is not empty or theattacker.iplog field value is not empty or theattacker.namelog field value is not empty) and (thedecoy.iplog field value is not empty or therecon.hostlog field value is not empty), then themetadata.event_typeUDM field is set toNETWORK_CONNECTION.Else, if the recon.http_x_forwarded_forlog field value is not empty or theattacker.iplog field value is not empty or theattacker.namelog field value is not empty, then themetadata.event_typeUDM field is set toSTATUS_UPDATE.Else, the metadata.event_typeUDM field is set toUSER_STATS. | 
| type | metadata.product_event_type | |
| id | metadata.product_log_id | |
| recon.bytes_sent | network.sent_bytes | |
| attacker.name | principal.hostname | |
| recon.http_x_forwarded_for | principal.ip | |
| attacker.ip | principal.ip | |
| recon.scheme | principal.network.application_protocol | If the recon.schemelog field value contain one of the following values, then therecon.schemelog field is mapped to theprincipal.network.application_protocolUDM field.
 | 
| attacker.id | principal.network.dns.id | |
| recon.method | principal.network.http.method | |
| recon.http_referrer | principal.network.http.referral_url | |
| recon.status | principal.network.http.response_code | |
| recon.user_agent.string | principal.network.http.user_agent | If the recon.user_agent.stringlog field value is not empty or therecon.user_agent.stringlog field value is not equal to$, then therecon.user_agent.stringlog field is mapped to theprincipal.network.http.user_agentUDM field. | 
|  | principal.platform | If the recon.user_agent.os.familylog field value matches the regular expression pattern(?i)WIN, then theprincipal.platformUDM field is set toWINDOWS.Else, if the recon.user_agent.os.familylog field value matches the regular expression pattern(?i)LIN, then theprincipal.platformUDM field is set toLINUX.Else, if the recon.user_agent.os.familylog field value matches the regular expression pattern(?i)(MAC or iOS), then theprincipal.platformUDM field is set toMAC. | 
| recon.user_agent.os.patch | principal.platform_patch_level | |
| recon.user_agent.os.major | principal.platform_version | The recon.user_agent.os.major recon.user_agent.os.minorlog field is mapped to theprincipal.platform_versionUDM field. | 
| recon.user_agent.os.minor | principal.platform_version | The recon.user_agent.os.major recon.user_agent.os.minorlog field is mapped to theprincipal.platform_versionUDM field. | 
| attacker.port | principal.port | |
| attacker.threat_parse_ids | principal.security_result.detection_fields[attacker_threat_parse_ids] | The attacker.threat_parse_idslog field is mapped to thesecurity_result.detection_fieldsUDM field. | 
| attacker.score | principal.security_result.risk_score | |
| recon.uri | principal.url | |
| recon.post_data.username | principal.user.email_addresses | |
| mitre_ids | security_result.attack_details.techniques.id | The mitre_idslog field is mapped to thesecurity_result.attack_details.techniques.idUDM field. | 
| abuseip.abuseConfidenceScore | security_result.confidence_score | |
| is_itdr | security_result.detection_fields[is_itdr] | |
| kill_chain_phase | security_result.detection_fields[kill_chain_phase] | |
| threat_parse_ids | security_result.detection_fields[threat_parse_ids] | The threat_parse_idslog field is mapped to thesecurity_result.detection_fieldsUDM field. | 
| whitelisted | security_result.detection_fields[whitelisted] | |
| updated_on | security_result.last_updated_time | |
| score | security_result.risk_score | |
| decoy.recon.dataset_type | security_result.rule_labels[decoy_recon_dataset_type] | |
| decoy.recon.dataset | security_result.rule_set | |
| severity | security_result.severity | If the severitylog field value contain one of the following values, then theseveritylog field is mapped to thesecurity_result.severityUDM field.
 | 
| severity | security_result.severity_details | |
| abuseip.ipAddress | src.artifact.ip | |
| abuseip.lastReportedAt | src.artifact.last_seen_time | |
| abuseip.countryCode | src.artifact.location.country_or_region | |
| recon.server_name | target.domain.whois_server | |
| decoy.group | target.group.group_display_name | |
| recon.host | target.hostname | |
| decoy.ip | target.ip | |
|  | target.network.application_protocol | The app_protofield is extracted fromrecon.server_protocollog field using the Grok pattern.If the app_protolog field value contain one of the following values, then theapp_protoextracted field is mapped to thetarget.network.application_protocolUDM field.
 | 
|  | target.network.application_protocol_version | The proto_versionfield is extracted fromrecon.server_protocollog field using the Grok pattern.If the proto_versionlog field value is not empty, then theproto_versionextracted field is mapped to thetarget.network.application_protocol_versionUDM field. | 
| decoy.name | target.resource.name | |
| decoy.id | target.resource.product_object_id | |
| decoy.type | target.resource.resource_subtype | |
| decoy.client.id | target.user.product_object_id | |
| decoy.client.name | target.user.user_display_name | |
| recon.http_basicauth_user | target.user.userid | |
| version | additional.fields[version] | |
| abuseip.ipVersion | additional.fields[abuseip_ipversion] | |
| abuseip.isPublic | additional.fields[abuseip_ispublic] | |
| abuseip.isWhitelisted | additional.fields[abuseip_iswhitelisted] | |
| abuseip.totalReports | additional.fields[abuseip_total_reports] | |
| decoy.appliance.id | additional.fields[decoy_appliance_id] | |
| decoy.appliance.name | additional.fields[decoy_appliance_name] | |
| decoy.network_name | additional.fields[decoy_network_name] | |
| decoy.recon.server_type | additional.fields[decoy_recon_server_type] | |
| decoy.vlan_id | additional.fields[decoy_vlan_id] | |
| heatmap_per_week_15_min | additional.fields[heatmap_per_week_15_min] | |
| indexed_on | additional.fields[indexed_on] | |
| recon.content_length | additional.fields[recon_content_length] | |
| recon.post_data.password | additional.fields[recon_post_data_password] | |
| recon.post_data | additional.fields[recon_post_data] | |
| recon.query_string | additional.fields[recon_query_string] | |
| recon.request_body | additional.fields[recon_request_body] | |
| recon.request_length | additional.fields[recon_request_length] | |
| recon.request_time | additional.fields[recon_request_time] | |
| recon.request_uri | additional.fields[recon_request_uri] | |
| recon.request | additional.fields[recon_request] | |
| recon.user_agent.family | additional.fields[recon_user_agent_family] | |
| recon.user_agent.major | additional.fields[recon_user_agent_major] | |
| recon.user_agent.minor | additional.fields[recon_user_agent_minor] | |
| recon.user_agent.patch | additional.fields[recon_user_agent_patch] | |
| record_type | additional.fields[record_type] | |
| update_id | additional.fields[update_id] | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - scada
次の表に、scada ログタイプの未加工ログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
| scada.event_type | metadata.description | |
| type | metadata.product_event_type | |
| decoy.scada.dataset | security_result.rule_set | |
| scada.data_type | additional.fields[scada_data_type] | |
| scada.request | additional.fields[scada_request] | |
| scada.response | additional.fields[scada_response] | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - ssh、telnet
次の表に、ssh ログタイプと telnet ログタイプの未加工ログフィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
|  | extensions.auth.mechanism | If the linux.remote_hostlog field value is not empty, then theextensions.auth.mechanismUDM field is set toREMOTE. | 
|  | metadata.event_type | If the linux.remote_hostlog field value is not empty and thelinux.userlog field value is not empty, then themetadata.event_typeUDM field is set toUSER_LOGIN.Else, the metadata.event_typeUDM field is set toUSER_RESOURCE_ACCESS. | 
| type | metadata.product_event_type | |
| linux.read_bytes | network.received_bytes | |
| linux.written_bytes | network.sent_bytes | |
| linux.remote_host | principal.ip | |
| linux.vpid | principal.process.pid | |
| linux.owner_id | principal.user.product_object_id | |
| linux.user | principal.user.userid | If the linux.remote_hostlog field value is not empty, then thelinux.userlog field is mapped to thetarget.user.useridUDM field.Else, the linux.userlog field is mapped to theprincipal.user.useridUDM field. | 
| linux.password | security_result.detection_fields[linux_password] | |
| linux.new_path | target.file.full_path | |
| linux.mode | target.file.security_result.detection_fields[linux_mode] | |
| linux.group_id | target.group.product_object_id | |
|  | target.platform | If the decoy.ssh.ostypelog field value matches the regular expression pattern(?i)Win, then thetarget.platformUDM field is set toWINDOWS.Else, if the decoy.ssh.ostypelog field value matches the regular expression pattern(?i)Lin, then thetarget.platformUDM field is set toLINUX.Else, if the decoy.ssh.ostypelog field value matches the regular expression pattern(?i)(Mac or iOS), then thetarget.platformUDM field is set toMAC.If the decoy.telnet.ostypelog field value matches the regular expression pattern(?i)Win, then thetarget.platformUDM field is set toWINDOWS.Else, if the decoy.telnet.ostypelog field value matches the regular expression pattern(?i)Lin, then thetarget.platformUDM field is set toLINUX.Else, if the decoy.telnet.ostypelog field value matches the regular expression pattern(?i)(Mac or iOS), then thetarget.platformUDM field is set toMAC. | 
| linux.command_line | target.process.command_line | |
| linux.path | target.process.file.full_path | |
| linux.ppid | target.process.parent_process.pid | |
| linux.pid | target.process.pid | |
| linux.process_name | target.process.product_specific_process_id | The Deception:linux.process_namelog field is mapped to thetarget.process.product_specific_process_idUDM field. | 
| linux.container_name | target.resource.name | |
|  | target.resource.resource_type | If the linux.container_namelog field value is not empty, then thetarget.resource.resource_typeUDM field is set toCONTAINER. | 
| linux.connection_info | additional.fields[linux_connection_info] | |
| linux.flags | additional.fields[linux_flags] | |
| linux.info | additional.fields[linux_info] | |
| linux.parent_process_name | additional.fields[linux_parent_process_name] | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - web
次の表に、web ログタイプの未加工ログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
|  | extensions.auth.mechanism | The extensions.auth.mechanismUDM field is set toUSERNAME_PASSWORD. | 
| web.cve_type | extensions.vulns.vulnerabilities.about.security_result.detection_fields[web_cve_type] | |
| web.cve_name | extensions.vulns.vulnerabilities.cve_description | |
| web.cve_id | extensions.vulns.vulnerabilities.cve_id | |
|  | metadata.event_type | If the web.http_x_forwarded_forlog field value is not empty and (theweb.http_basicauth_userlog field value is not empty or theweb.post_data.usernamelog field value is not empty), then themetadata.event_typeUDM field is set toUSER_LOGIN.Else, the metadata.event_typeUDM field is set toUSER_RESOURCE_ACCESS. | 
| type | metadata.product_event_type | |
| web.bytes_sent | network.sent_bytes | |
| web.http_x_forwarded_for | principal.ip | |
| web.scheme | principal.network.application_protocol | If the web.schemelog field value contain one of the following values, then theweb.schemelog field is mapped to theprincipal.network.application_protocolUDM field.
 | 
| web.method | principal.network.http.method | |
| web.http_referrer | principal.network.http.referral_url | |
| web.status | principal.network.http.response_code | |
| web.user_agent.string | principal.network.http.user_agent | |
|  | principal.platform | If the web.user_agent.os.familylog field value matches the regular expression pattern(?i)Win, then theprincipal.platformUDM field is set toWINDOWS.Else, if the web.user_agent.os.familylog field value matches the regular expression pattern(?i)Lin, then theprincipal.platformUDM field is set toLINUX.Else, if the web.user_agent.os.familylog field value matches the regular expression pattern(?i)(Mac or iOS), then theprincipal.platformUDM field is set toMAC. | 
| web.user_agent.os.patch | principal.platform_patch_level | |
| web.user_agent.os.major | principal.platform_version | The web.user_agent.os.major web.user_agent.os.minorlog field is mapped to theprincipal.platform_versionUDM field. | 
| web.user_agent.os.minor | principal.platform_version | The web.user_agent.os.major web.user_agent.os.minorlog field is mapped to theprincipal.platform_versionUDM field. | 
| web.uri | principal.url | |
| decoy.web.dataset_type | security_result.rule_labels[decoy_web_dataset_type] | |
| decoy.web.dataset | security_result.rule_set | |
| web.host | target.hostname | |
|  | target.network.application_protocol | The app_protofield is extracted fromweb.server_protocollog field using the Grok pattern.If the app_protolog field value contain one of the following values, then theapp_protoextracted field is mapped to thetarget.network.application_protocolUDM field.
 | 
| web.post_data.username | target.user.email_addresses | |
| web.http_basicauth_user | target.user.userid | |
| decoy.web.server_type | additional.fields[decoy_web_server_type] | |
| web.content_length | additional.fields[web_content_length] | |
| web.post_data.password | additional.fields[web_post_data_password] | |
| web.post_data | additional.fields[web_post_data] | |
| web.query_string | additional.fields[web_query_string] | |
| web.request_body | additional.fields[web_request_body] | |
| web.request_length | additional.fields[web_request_length] | |
| web.request_time | additional.fields[web_request_time] | |
| web.request_uri | additional.fields[web_request_uri] | |
| web.request | additional.fields[web_request] | |
| web.user_agent.family | additional.fields[web_user_agent_family] | |
| web.user_agent.major | additional.fields[web_user_agent_major] | |
| web.user_agent.minor | additional.fields[web_user_agent_minor] | |
| web.user_agent.patch | additional.fields[web_user_agent_patch] | 
フィールド マッピング リファレンス: ZSCALER_DECEPTION - windows
次の表に、windows ログタイプの未加工ログ フィールドと、対応する UDM フィールドを示します。
| Log field | UDM mapping | Logic | 
|---|---|---|
|  | metadata.event_type | If the file.pathlog field value is not empty and theattacker.domainlog field value is not empty, then if thefile.operationlog field value matches the regular expression pattern(?i)read, then themetadata.event_typeUDM field is set toFILE_READ.Else, if the file.pathlog field value is not empty and theattacker.domainlog field value is not empty, then if thefile.operationlog field value matches the regular expression pattern(?i)write or modify or encrypt, then themetadata.event_typeUDM field is set toFILE_MODIFICATION.Else, if the file.pathlog field value is not empty and theattacker.domainlog field value is not empty, then if thefile.operationlog field value matches the regular expression pattern(?i)create, then themetadata.event_typeUDM field is set toFILE_CREATION.Else, if the file.pathlog field value is not empty and theattacker.domainlog field value is not empty, then if thefile.operationlog field value matches the regular expression pattern(?i)delete, then themetadata.event_typeUDM field is set toFILE_DELETION.Else, if the file.pathlog field value is not empty and theattacker.domainlog field value is not empty, then if thefile.operationlog field value matches the regular expression pattern(?i)open, then themetadata.event_typeUDM field is set toFILE_OPEN.Else, if the file.pathlog field value is not empty and theattacker.domainlog field value is not empty, then if thefile.operationlog field value matches the regular expression pattern(?i)sync, then themetadata.event_typeUDM field is set toFILE_SYNC.Else, if the file.pathlog field value is not empty and theattacker.domainlog field value is not empty, then if thefile.operationlog field value matches the regular expression pattern(?i)copy, then themetadata.event_typeUDM field is set toFILE_COPY.Else, if the file.pathlog field value is not empty and theattacker.domainlog field value is not empty, then if thefile.operationlog field value matches the regular expression pattern(?i)move, then themetadata.event_typeUDM field is set toFILE_MOVE.Else, if the attacker.domainlog field value is not empty and (thepowershell.pathlog field value is not empty or thepowershell.script_block_idlog field value is not empty or thepowershell.script_block_textlog field value is not empty), then themetadata.event_typeUDM field is set toPROCESS_TERMINATION.Else, if the attacker.domainlog field value is not empty and (thesmb.pathlog field value is not empty or thesmb.file_namelog field value is not empty), then themetadata.event_typeUDM field is set toFILE_READ.Else, if the attacker.domainlog field value is not empty and thenetwork.destination.iplog field value is not empty, then themetadata.event_typeUDM field is set toNETWORK_CONNECTION.Else, if the attacker.domainlog field value is not empty and (thewmi_process.command_linelog field value is not empty or thewmi_process.created_process_idlog field value is not empty), then themetadata.event_typeUDM field is set toPROCESS_LAUNCH.Else, if the attacker.domainlog field value is not empty and thewindows.base_vm_iplog field value is not empty, then themetadata.event_typeUDM field is set toSTATUS_STARTUP.Else, the metadata.event_typeUDM field is set toUSER_RESOURCE_ACCESS. | 
| type | metadata.product_event_type | |
| windows.incident_id | metadata.product_log_id | |
|  | network.application_protocol | If the messagelog field value matches the regular expression patternldap., then thenetwork.application_protocolUDM field is set toLDAP.Else, if the messagelog field value matches the regular expression patternrdp., then thenetwork.application_protocolUDM field is set toRDP.Else, if the messagelog field value matches the regular expression patternsmb., then thenetwork.application_protocolUDM field is set toSMB. | 
| smb.session_guid | network.session_id | |
| winrm.activity_id | network.session_id | |
| attacker.process.domain_name | principal.domain.name | |
| attacker.domain | principal.hostname | |
| attacker.process.session_id | principal.network.session_id | |
| attacker.process.command_line | principal.process.command_line | |
| attacker.process.md5 | principal.process.file.md5 | |
| attacker.process.sha1 | principal.process.file.sha1 | |
| attacker.process.sha256 | principal.process.file.sha256 | |
| attacker.process.parent | principal.process.parent_process.pid | |
| attacker.process.id | principal.process.pid | |
| psexec.service_name | principal.resource.name | |
|  | principal.resource.resource_type | If the psexec.service_namelog field value is not empty, then theprincipal.resource.resource_typeUDM field is set toBACKEND_SERVICE. | 
| attacker.process.user_groups | principal.user.group_identifiers | The attacker.process.user_groupslog field is mapped to theprincipal.user.group_identifiersUDM field. | 
| attacker.process.user_ou | principal.user.group_identifiers | The attacker.process.user_groupslog field is mapped to theprincipal.user.group_identifiersUDM field and theattacker.process.user_oulog field is mapped to theprincipal.user.group_identifiersUDM field. | 
| attacker.process.user_name | principal.user.user_display_name | |
| attacker.user | principal.user.userid | |
| attacker.process.user_sid | principal.user.windows_sid | |
| attacker.process.exit_code | security_result.detection_fields[attacker_process_exit_code] | |
| file.operation_string | security_result.detection_fields[file_operation_string] | |
| file.operation | security_result.detection_fields[file_operation] | |
| mssql.data_sensitivity_information | security_result.detection_fields[mssql_data_sensitivity_information] | |
| mssql.is_column_permission | security_result.detection_fields[mssql_is_column_permission] | |
| decoy.smb.dataset | security_result.rule_set | |
| smb.disconnect_reason | security_result.summary | |
| network.source.hostname | src.hostname | |
| network.source.ip | src.ip | |
| network.source.port | src.port | |
| wmi_process.client_machine_fqdn | target.domain.name | |
| mssql.server_instance_name | target.domain.name_server | |
| file.path | target.file.full_path | |
| smb.path | target.file.full_path | |
| psexec.md5 | target.file.md5 | |
| file.file_name | target.file.names | |
| psexec.file_and_pipe_names | target.file.names | The psexec.file_and_pipe_nameslog field is mapped to thetarget.file.namesUDM field. | 
| smb.file_name | target.file.names | |
| psexec.sha1 | target.file.sha1 | |
| psexec.sha256 | target.file.sha256 | |
| mssql.host_name | target.hostname | |
| network.destination.hostname | target.hostname | |
| wmi_process.client_machine | target.hostname | |
| windows.base_vm_ip | target.ip | |
| mssql.client_ip | target.ip | |
| network.destination.ip | target.ip | |
| mssql.duration_milliseconds | target.network.session_duration.seconds | |
| mssql.session_id | target.network.session_id | |
| rdp.session_id | target.network.session_id | |
| smb.connection_guid | target.network.session_id | |
|  | target.platform | If the decoy.vm.oslog field value matches the regular expression pattern(?i)Win, then thetarget.platformUDM field is set toWINDOWS.Else, if the decoy.vm.oslog field value matches the regular expression pattern(?i)Lin, then thetarget.platformUDM field is set toLINUX.Else, if the decoy.vm.oslog field value matches the regular expression pattern(?i)(Mac or iOS), then thetarget.platformUDM field is set toMAC. | 
| network.destination.port | target.port | |
| wmi_process.command_line | target.process.command_line | |
| powershell.script_block_text | target.process.command_line | |
| powershell.path | target.process.file.full_path | |
| wmi_process.client_process_id | target.process.parent_process.pid | |
| wmi_process.created_process_id | target.process.pid | |
| powershell.script_block_id | target.process.product_specific_process_id | The Deception:powershell.script_block_idlog field is mapped to thetarget.process.product_specific_process_idUDM field. | 
| mssql.database_principal_id | target.resource_ancestors.attribute.labels[mssql_database_principal_id] | |
| mssql.database_principal_name | target.resource_ancestors.attribute.labels[mssql_database_principal_name] | |
|  | target.resource_ancestors.resource_type | If the mssql.database_namelog field value is not empty, then thetarget.resource_ancestors.resource_typeUDM field is set toDATABASE. | 
| ldap.attribute_list | target.resource.attribute.labels[ldap_attribute_list] | The ldap.attribute_listlog field is mapped to thetarget.resource.attribute.labelsUDM field. | 
| ldap.distinguished_name | target.resource.attribute.labels[ldap_distinguished_name] | |
| ldap.scope_of_search_string | target.resource.attribute.labels[ldap_scope_of_search_string] | |
| ldap.scope_of_search | target.resource.attribute.labels[ldap_scope_of_search] | |
| ldap.search_filter | target.resource.attribute.labels[ldap_search_filter] | |
| decoy.vm.name | target.resource.name | |
| mssql.database_name | target.resource.name | |
| decoy.vm.id | target.resource.product_object_id | |
| smb.tree_connect_guid | target.resource.product_object_id | |
|  | target.resource.resource_type | If the decoy.vm.idlog field value is not empty or thedecoy.vm.namelog field value is not empty, then thetarget.resource.resource_typeUDM field is set toVIRTUAL_MACHINE. | 
| attacker.process.name | additional.fields[attacker_process_name] | |
| attacker.process.thread_id | additional.fields[attacker_process_thread_id] | |
| attacker.process.tree | additional.fields[attacker_process_tree] | The attacker.process.treelog field is mapped to theadditional.fields.value.string_valueUDM field. | 
| mssql.action_id | additional.fields[mssql_action_id] | |
| mssql.action_string | additional.fields[mssql_action_string] | |
| mssql.additional_information | additional.fields[mssql_additional_information] | |
| mssql.affected_rows | additional.fields[mssql_affected_rows] | |
| mssql.application_name | additional.fields[mssql_application_name] | |
| mssql.audit_schema_version | additional.fields[mssql_audit_schema_version] | |
| mssql.class_type_string | additional.fields[mssql_class_type_string] | |
| mssql.class_type | additional.fields[mssql_class_type] | |
| mssql.connection_id | additional.fields[mssql_connection_id] | |
| mssql.event_time | additional.fields[mssql_event_time] | |
| mssql.object_id | additional.fields[mssql_object_id] | |
| mssql.object_name | additional.fields[mssql_object_name] | |
| mssql.permission_bitmask | additional.fields[mssql_permission_bitmask] | |
| mssql.response_rows | additional.fields[mssql_response_rows] | |
| mssql.schema_name | additional.fields[mssql_schema_name] | |
| mssql.sequence_group_id | additional.fields[mssql_sequence_group_id] | |
| mssql.sequence_number | additional.fields[mssql_sequence_number] | |
| mssql.server_principal_id | additional.fields[mssql_server_principal_id] | |
| mssql.server_principal_name | additional.fields[mssql_server_principal_name] | |
| mssql.server_principal_sid | additional.fields[mssql_server_principal_sid] | |
| mssql.session_server_principal_name | additional.fields[mssql_session_server_principal_name] | |
| mssql.statement | additional.fields[mssql_statement] | |
| mssql.succeeded | additional.fields[mssql_succeeded] | |
| mssql.target_database_principal_id | additional.fields[mssql_target_database_principal_id] | |
| mssql.target_database_principal_name | additional.fields[mssql_target_database_principal_name] | |
| mssql.target_server_principal_id | additional.fields[mssql_target_server_principal_id] | |
| mssql.target_server_principal_name | additional.fields[mssql_target_server_principal_name] | |
| mssql.target_server_principal_sid | additional.fields[mssql_target_server_principal_sid] | |
| mssql.transaction_id | additional.fields[mssql_transaction_id] | |
| mssql.user_defined_event_id | additional.fields[mssql_user_defined_event_id] | |
| mssql.user_defined_information | additional.fields[mssql_user_defined_information] | |
| powershell.message_number | additional.fields[powershell_message_number] | |
| powershell.message_total | additional.fields[powershell_message_total] | |
| rdp.activity_id | additional.fields[rdp_activity_id] | |
| smb.lease_id | additional.fields[smb_lease_id] | |
| smb.open_guid | additional.fields[smb_open_guid] | |
| smb.share_guid | additional.fields[smb_share_guid] | |
| wmi_process.client_process_creation_time | additional.fields[wmi_process_client_process_creation_time] | |
| wmi_process.correlation_id | additional.fields[wmi_process_correlation_id] | |
| wmi_process.created_process_creation_time | additional.fields[wmi_process_created_process_creation_time] | |
| wmi_process.group_operation_id | additional.fields[wmi_process_group_operation_id] | |
| wmi_process.is_local | additional.fields[wmi_process_is_local] | |
| wmi_process.operation_id | additional.fields[wmi_process_operation_id] | 
さらにサポートが必要な場合 コミュニティ メンバーや Google SecOps のプロフェッショナルから回答を得ることができます。