Change log for ESET_AV

Date Changes
2025-04-10 Enhancement:
- event.idm.read_only_udm.security_result.detection_fields: Newly mapped `threatHandled` and 'needRestart' raw log field with `event.idm.read_only_udm.security_result.detection_fields` UDM field.
- event.idm.read_only_udm.security_result.action_details: Newly mapped `actionTaken` raw log field with `event.idm.read_only_udm.security_result.action_details` UDM field.
- event.idm.read_only_udm.security_result.threat_name: Newly mapped `threatName` raw log field with `event.idm.read_only_udm.security_result.threat_name` UDM field.
- event.idm.read_only_udm.security_result.summary: Newly mapped `threatType` raw log field with `event.idm.read_only_udm.security_result.summary` UDM field.
- If 'threatHandled' value is '1' then map 'event.idm.read_only_udm.security_result.action' to "BLOCK" else if 'threatHandled' value is '0' then map 'event.idm.read_only_udm.security_result.action' to "ALLOW".
- If 'severity' is in '7' or '8' then map 'event.idm.read_only_udm.security_result.severity' to "HIGH" else if 'severity' is '6' then map 'event.idm.read_only_udm.security_result.severity' to "MEDIUM" else if 'severity' is in '3' or '1' then map 'event.idm.read_only_udm.security_result.severity' to "LOW" else if 'severity' is '10' then map 'event.idm.read_only_udm.security_result.severity' to "CRITICAL".
2025-03-04 Enhancement:
- Added a new Grok pattern to parse new type of logs.
- Mapped "time" to "metadata.event_timestamp".
- Mapped "target" to "target.resource.attribute.labels".
2024-06-25 Enhancement:
- Mapped "object_uri" to "target.url".
- Mapped "severity" to "security_result.severity_details"
- Mapped "threat_flags" to "security_result.detection_fields".
- Mapped "category" to "security_result.category_details".
- Mapped "object_type" and "engine_version" to "principal.resource.attribute.labels"
- If value of the field "detail" is null, then mapped "circumstances" to "security_result.description".
- If value of the field "action_taken" is similar to "Block", then mapped "security_result_action" to "BLOCK".
- If value of the field "action_taken" is similar to "Start" or "Allow", then mapped "security_result_action" to "ALLOW".
- If the value of "not_json" is true, then added a Grok pattern over "json_data" to extract "category", "hostname", and "group_name".
2024-05-31 Enhancement:
- Mapped "action_taken" to "security_result.action_details".
- Mapped "threat_type" to "security_result.threat_id".
- Mapped "scan_id", "scanner_id", and "threat_handled" to "security_result.detection_fields".
- Mapped "need_restart" to "additional.fields".
2024-05-21 Enhancement:
- Changed the case of the value of the field "hash" to lowercase, and then mapped "hash" to "principal.file.sha1".
2024-03-14 Enhancement:
- Mapped "username" to "principal.user.userid".
- Mapped "group_name" to "principal.group_display_name".
- Mapped "hash" to "principal.resource.attribute.labels".
- Mapped "eiconsolelink" to "principal.url".
- Mapped "os_name" to "principal.platform_version".
- Mapped "processname" to "principal.process.file.full_path".
- Mapped "rulename" to "security_result.rule_name".
- Mapped "result" to "security_result.summary".
- Mapped "eialarmid" to "security_result.detection_fields".
- Mapped "severity_score" to "security_result.detection_fields".
- Mapped "computer_severity_score" to "security_result.detection_fields".
2023-01-10 Newly created parser.