Information about the Entity and the product where the entity was created. Next Tag: 17
JSON representation |
---|
{ "productEntityId": string, "collectedTimestamp": string, "creationTimestamp": string, "interval": { object ( |
Fields | |
---|---|
productEntityId |
A vendor-specific identifier that uniquely identifies the entity (e.g. a GUID, LDAP, OID, or similar). |
collectedTimestamp |
GMT timestamp when the entity information was collected by the vendor's local collection infrastructure. Uses RFC 3339, where generated output will always be Z-normalized and use 0, 3, 6 or 9 fractional digits. Offsets other than "Z" are also accepted. Examples: |
creationTimestamp |
GMT timestamp when the entity described by the productEntityId was created on the system where data was collected. Uses RFC 3339, where generated output will always be Z-normalized and use 0, 3, 6 or 9 fractional digits. Offsets other than "Z" are also accepted. Examples: |
interval |
Valid existence time range for the version of the entity represented by this entity data. |
vendorName |
Vendor name of the product that produced the entity information. |
productName |
Product name that produced the entity information. |
feed |
Vendor feed name for a threat indicator feed. |
productVersion |
Version of the product that produced the entity information. |
entityType |
Entity type. If an entity has multiple possible types, this specifies the most specific type. |
description |
Human-readable description of the entity. |
threat[] |
Metadata provided by a threat intelligence feed that identified the entity as malicious. |
sourceType |
The source of the entity. |
sourceLabels[] |
Entity source metadata labels. |
eventMetadata |
Metadata field from the event. |
structuredFields |
Structured fields extracted from the log. |
extracted |
Flattened fields extracted from the log. |