input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-29T19:27:09.436Z","agent":{"ephemeral_id":"39ab588f-d36e-4a7a-a6f5-1023171b42ed","id":"d6f458d6-d6e2-4877-833b-19780e0f6d3b","name":"NVIPROCPRDWEB03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1000","created":"2024-07-29T19:27:09.968Z","kind":"event","provider":".NET Runtime"},"host":{"name":"NVIPROCPRDWEB03.prdnvi.oscorpint.com"},"log":{"level":"warning"},"message":"Category: Microsoft.AspNetCore.DataProtection.Repositories.EphemeralXmlRepository\nEventId: 50\n\nUsing an in-memory repository. Keys will not be persisted to storage.","organization":"oscorp","senderHost":"10.160.18.53","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDWEB03.prdnvi.oscorpint.com","event_data":{"param1":"Category: Microsoft.AspNetCore.DataProtection.Repositories.EphemeralXmlRepository\nEventId: 50\n\nUsing an in-memory repository. Keys will not be persisted to storage."},"event_id":"1000","keywords":["Classic"],"opcode":"Info","provider_name":".NET Runtime","record_id":1484253,"task":"None"}}
|
{
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-29T19:27:09.436Z\",\"agent\":{\"ephemeral_id\":\"39ab588f-d36e-4a7a-a6f5-1023171b42ed\",\"id\":\"d6f458d6-d6e2-4877-833b-19780e0f6d3b\",\"name\":\"NVIPROCPRDWEB03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"1000\",\"created\":\"2024-07-29T19:27:09.968Z\",\"kind\":\"event\",\"provider\":\".NET Runtime\"},\"host\":{\"name\":\"NVIPROCPRDWEB03.prdnvi.oscorpint.com\"},\"log\":{\"level\":\"warning\"},\"message\":\"Category: Microsoft.AspNetCore.DataProtection.Repositories.EphemeralXmlRepository\\nEventId: 50\\n\\nUsing an in-memory repository. Keys will not be persisted to storage.\",\"organization\":\"oscorp\",\"senderHost\":\"10.160.18.53\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"NVIPROCPRDWEB03.prdnvi.oscorpint.com\",\"event_data\":{\"param1\":\"Category: Microsoft.AspNetCore.DataProtection.Repositories.EphemeralXmlRepository\\nEventId: 50\\n\\nUsing an in-memory repository. Keys will not be persisted to storage.\"},\"event_id\":\"1000\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_name\":\".NET Runtime\",\"record_id\":1484253,\"task\":\"None\"}}",
"messageType": "1000",
"senderHost": "10.160.18.53",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": ".net runtime",
"tags": [
"v8",
"eventId:1000",
".net runtime",
"1000"
],
"vendorCode": "1484253"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-29T19:27:09.436Z","agent":{"ephemeral_id":"39ab588f-d36e-4a7a-a6f5-1023171b42ed","id":"d6f458d6-d6e2-4877-833b-19780e0f6d3b","name":"NVIPROCPRDWEB03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1000","created":"2024-07-29T19:27:09.968Z","kind":"event","provider":".NET Runtime"},"host":{"name":"NVIPROCPRDWEB03.prdnvi.oscorpint.com"},"log":{"level":"warning"},"message":"Category: Microsoft.AspNetCore.DataProtection.Repositories.EphemeralXmlRepository\nEventId: 50\n\nUsing an in-memory repository. Keys will not be persisted to storage.","organization":"oscorp","senderHost":"10.160.18.53","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDWEB03.prdnvi.oscorpint.com","event_data":{"param1":"Category: Microsoft.AspNetCore.DataProtection.Repositories.EphemeralXmlRepository\nEventId: 50\n\nUsing an in-memory repository. Keys will not be persisted to storage."},"event_id":"1000","keywords":["Classic"],"opcode":"Info","provider_name":".NET Runtime","record_id":1484253,"task":"None"}}
|
Product: .net runtime
Vendor: .net runtime
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-29T19:27:09.436Z","agent":{"ephemeral_id":"39ab588f-d36e-4a7a-a6f5-1023171b42ed","id":"d6f458d6-d6e2-4877-833b-19780e0f6d3b","name":"NVIPROCPRDWEB03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1000","created":"2024-07-29T19:27:09.968Z","kind":"event","provider":".NET Runtime"},"host":{"name":"NVIPROCPRDWEB03.prdnvi.oscorpint.com"},"log":{"level":"warning"},"message":"Category: Microsoft.AspNetCore.DataProtection.Repositories.EphemeralXmlRepository\nEventId: 50\n\nUsing an in-memory repository. Keys will not be persisted to storage.","organization":"oscorp","senderHost":"10.160.18.53","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDWEB03.prdnvi.oscorpint.com","event_data":{"param1":"Category: Microsoft.AspNetCore.DataProtection.Repositories.EphemeralXmlRepository\nEventId: 50\n\nUsing an in-memory repository. Keys will not be persisted to storage."},"event_id":"1000","keywords":["Classic"],"opcode":"Info","provider_name":".NET Runtime","record_id":1484253,"task":"None"}}
|
This is a syslog message from a product called .net runtime by .net runtime. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 1000
senderHost: 10.160.18.53
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: .net runtime
tags: ['v8', 'eventId:1000', '.net runtime', '1000']
vendorCode: 1484253
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:23.735Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"10148","created":"2024-07-27T02:19:21.704Z","kind":"event","provider":"Microsoft-Windows-WinRM"},"host":{"name":"TS01-2016.acme.com"},"log":{"level":"information"},"message":"The WinRM service is listening for WS-Management requests. \n\n User Action \n Use the following command to see the specific IPs on which WinRM is listening: \n\n winrm enumerate winrm/config/listener","organization":"acme","senderHost":"TS01-2016.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.acme.com","event_id":"10148","keywords":["Classic"],"opcode":"Info","provider_guid":"{A7975C8F-AC13-49F1-87DA-5A984A4AB417}","provider_name":"Microsoft-Windows-WinRM","record_id":159352,"task":"None"}}
|
{
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T02:16:23.735Z\",\"agent\":{\"ephemeral_id\":\"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c\",\"id\":\"1e289ed9-fa81-478d-9ec3-98d5119c9f2e\",\"name\":\"TS01-2016\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"10148\",\"created\":\"2024-07-27T02:19:21.704Z\",\"kind\":\"event\",\"provider\":\"Microsoft-Windows-WinRM\"},\"host\":{\"name\":\"TS01-2016.acme.com\"},\"log\":{\"level\":\"information\"},\"message\":\"The WinRM service is listening for WS-Management requests. \\n\\n User Action \\n Use the following command to see the specific IPs on which WinRM is listening: \\n\\n winrm enumerate winrm/config/listener\",\"organization\":\"acme\",\"senderHost\":\"TS01-2016.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"TS01-2016.acme.com\",\"event_id\":\"10148\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_guid\":\"{A7975C8F-AC13-49F1-87DA-5A984A4AB417}\",\"provider_name\":\"Microsoft-Windows-WinRM\",\"record_id\":159352,\"task\":\"None\"}}",
"messageType": "10148",
"senderHost": "TS01-2016.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "microsoft-windows-winrm",
"tags": [
"v8",
"eventId:10148",
"microsoft-windows-winrm",
"10148"
],
"vendorCode": "159352"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:23.735Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"10148","created":"2024-07-27T02:19:21.704Z","kind":"event","provider":"Microsoft-Windows-WinRM"},"host":{"name":"TS01-2016.acme.com"},"log":{"level":"information"},"message":"The WinRM service is listening for WS-Management requests. \n\n User Action \n Use the following command to see the specific IPs on which WinRM is listening: \n\n winrm enumerate winrm/config/listener","organization":"acme","senderHost":"TS01-2016.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.acme.com","event_id":"10148","keywords":["Classic"],"opcode":"Info","provider_guid":"{A7975C8F-AC13-49F1-87DA-5A984A4AB417}","provider_name":"Microsoft-Windows-WinRM","record_id":159352,"task":"None"}}
|
Product: microsoft-windows-winrm
Vendor: microsoft-windows-winrm
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:23.735Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"10148","created":"2024-07-27T02:19:21.704Z","kind":"event","provider":"Microsoft-Windows-WinRM"},"host":{"name":"TS01-2016.acme.com"},"log":{"level":"information"},"message":"The WinRM service is listening for WS-Management requests. \n\n User Action \n Use the following command to see the specific IPs on which WinRM is listening: \n\n winrm enumerate winrm/config/listener","organization":"acme","senderHost":"TS01-2016.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.acme.com","event_id":"10148","keywords":["Classic"],"opcode":"Info","provider_guid":"{A7975C8F-AC13-49F1-87DA-5A984A4AB417}","provider_name":"Microsoft-Windows-WinRM","record_id":159352,"task":"None"}}
|
This is a syslog message from a product called microsoft-windows-winrm by microsoft-windows-winrm. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 10148
senderHost: TS01-2016.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: microsoft-windows-winrm
tags: ['v8', 'eventId:10148', 'microsoft-windows-winrm', '10148']
vendorCode: 159352
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:23.736Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"10121","created":"2024-07-27T02:19:21.704Z","kind":"event","provider":"Microsoft-Windows-WinRM"},"host":{"name":"TS01-2016.stark.com"},"log":{"level":"information"},"message":"The WinRM service has been configured to accept basic authentication for unsecure HTTP connections. \n\n This is not a secure configuration. \n\n User Action \n Set AllowUnencrypted to False in WinRM configuration to ensure packets are encrypted on the wire.","organization":"stark","senderHost":"TS01-2016.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.stark.com","event_id":"10121","keywords":["Classic"],"opcode":"Info","provider_guid":"{A7975C8F-AC13-49F1-87DA-5A984A4AB417}","provider_name":"Microsoft-Windows-WinRM","record_id":159353,"task":"None"}}
|
{
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T02:16:23.736Z\",\"agent\":{\"ephemeral_id\":\"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c\",\"id\":\"1e289ed9-fa81-478d-9ec3-98d5119c9f2e\",\"name\":\"TS01-2016\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"10121\",\"created\":\"2024-07-27T02:19:21.704Z\",\"kind\":\"event\",\"provider\":\"Microsoft-Windows-WinRM\"},\"host\":{\"name\":\"TS01-2016.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"The WinRM service has been configured to accept basic authentication for unsecure HTTP connections. \\n\\n This is not a secure configuration. \\n\\n User Action \\n Set AllowUnencrypted to False in WinRM configuration to ensure packets are encrypted on the wire.\",\"organization\":\"stark\",\"senderHost\":\"TS01-2016.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"TS01-2016.stark.com\",\"event_id\":\"10121\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_guid\":\"{A7975C8F-AC13-49F1-87DA-5A984A4AB417}\",\"provider_name\":\"Microsoft-Windows-WinRM\",\"record_id\":159353,\"task\":\"None\"}}",
"messageType": "10121",
"senderHost": "TS01-2016.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "microsoft-windows-winrm",
"tags": [
"v8",
"eventId:10121",
"microsoft-windows-winrm",
"10121"
],
"vendorCode": "159353"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:23.736Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"10121","created":"2024-07-27T02:19:21.704Z","kind":"event","provider":"Microsoft-Windows-WinRM"},"host":{"name":"TS01-2016.stark.com"},"log":{"level":"information"},"message":"The WinRM service has been configured to accept basic authentication for unsecure HTTP connections. \n\n This is not a secure configuration. \n\n User Action \n Set AllowUnencrypted to False in WinRM configuration to ensure packets are encrypted on the wire.","organization":"stark","senderHost":"TS01-2016.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.stark.com","event_id":"10121","keywords":["Classic"],"opcode":"Info","provider_guid":"{A7975C8F-AC13-49F1-87DA-5A984A4AB417}","provider_name":"Microsoft-Windows-WinRM","record_id":159353,"task":"None"}}
|
Product: microsoft-windows-winrm
Vendor: microsoft-windows-winrm
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:23.736Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"10121","created":"2024-07-27T02:19:21.704Z","kind":"event","provider":"Microsoft-Windows-WinRM"},"host":{"name":"TS01-2016.stark.com"},"log":{"level":"information"},"message":"The WinRM service has been configured to accept basic authentication for unsecure HTTP connections. \n\n This is not a secure configuration. \n\n User Action \n Set AllowUnencrypted to False in WinRM configuration to ensure packets are encrypted on the wire.","organization":"stark","senderHost":"TS01-2016.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.stark.com","event_id":"10121","keywords":["Classic"],"opcode":"Info","provider_guid":"{A7975C8F-AC13-49F1-87DA-5A984A4AB417}","provider_name":"Microsoft-Windows-WinRM","record_id":159353,"task":"None"}}
|
This is a syslog message from a product called microsoft-windows-winrm by microsoft-windows-winrm. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 10121
senderHost: TS01-2016.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: microsoft-windows-winrm
tags: ['v8', 'eventId:10121', 'microsoft-windows-winrm', '10121']
vendorCode: 159353
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:22.992Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"6","created":"2024-07-27T02:19:21.704Z","kind":"event","provider":"Microsoft-Windows-FilterManager"},"host":{"name":"TS01-2016.stark.com"},"log":{"level":"information"},"message":"File System Filter 'TSFairShare' (10.0, β2016β-β07β-β15T22:11:15.000000000Z) has successfully loaded and registered with Filter Manager.","organization":"stark","senderHost":"TS01-2016.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.stark.com","event_data":{"DeviceName":"TSFairShare","DeviceNameLength":"11","DeviceTime":"2016-07-15T22:11:15.000000000Z","DeviceVersionMajor":"10","DeviceVersionMinor":"0","ExtraInfoLength":"184","ExtraInfoString":"{ \"flags\" : \"0x00000010\" , \"registration_version\" : \"0x00000203\" , \"tx\" : false , \"sections\" : false , \"frame\" : 0 , \"class_name\" : \"(null)\" , \"instances\" : [[\"400010\",\"0x00000000\"]] }","FilterID":"{02000000-000D-0000-D40F-E5F9CADFDA01}","FinalStatus":"0x0"},"event_id":"6","keywords":["ms:Measures"],"opcode":"Info","process":{"pid":4,"thread":{"id":32}},"provider_guid":"{F3C5E28E-63F6-49C7-A204-E48A1BC4B09D}","provider_name":"Microsoft-Windows-FilterManager","record_id":159347,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"},"version":1}}
|
{
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T02:16:22.992Z\",\"agent\":{\"ephemeral_id\":\"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c\",\"id\":\"1e289ed9-fa81-478d-9ec3-98d5119c9f2e\",\"name\":\"TS01-2016\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"6\",\"created\":\"2024-07-27T02:19:21.704Z\",\"kind\":\"event\",\"provider\":\"Microsoft-Windows-FilterManager\"},\"host\":{\"name\":\"TS01-2016.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"File System Filter 'TSFairShare' (10.0, \u200e2016\u200e-\u200e07\u200e-\u200e15T22:11:15.000000000Z) has successfully loaded and registered with Filter Manager.\",\"organization\":\"stark\",\"senderHost\":\"TS01-2016.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"TS01-2016.stark.com\",\"event_data\":{\"DeviceName\":\"TSFairShare\",\"DeviceNameLength\":\"11\",\"DeviceTime\":\"2016-07-15T22:11:15.000000000Z\",\"DeviceVersionMajor\":\"10\",\"DeviceVersionMinor\":\"0\",\"ExtraInfoLength\":\"184\",\"ExtraInfoString\":\"{ \\\"flags\\\" : \\\"0x00000010\\\" , \\\"registration_version\\\" : \\\"0x00000203\\\" , \\\"tx\\\" : false , \\\"sections\\\" : false , \\\"frame\\\" : 0 , \\\"class_name\\\" : \\\"(null)\\\" , \\\"instances\\\" : [[\\\"400010\\\",\\\"0x00000000\\\"]] }\",\"FilterID\":\"{02000000-000D-0000-D40F-E5F9CADFDA01}\",\"FinalStatus\":\"0x0\"},\"event_id\":\"6\",\"keywords\":[\"ms:Measures\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":32}},\"provider_guid\":\"{F3C5E28E-63F6-49C7-A204-E48A1BC4B09D}\",\"provider_name\":\"Microsoft-Windows-FilterManager\",\"record_id\":159347,\"task\":\"None\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-18\",\"name\":\"SYSTEM\",\"type\":\"User\"},\"version\":1}}",
"messageType": "6",
"senderHost": "TS01-2016.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "microsoft-windows-filtermanager",
"tags": [
"v8",
"eventId:6",
"microsoft-windows-filtermanager",
"6"
],
"vendorCode": "159347"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:22.992Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"6","created":"2024-07-27T02:19:21.704Z","kind":"event","provider":"Microsoft-Windows-FilterManager"},"host":{"name":"TS01-2016.stark.com"},"log":{"level":"information"},"message":"File System Filter 'TSFairShare' (10.0, β2016β-β07β-β15T22:11:15.000000000Z) has successfully loaded and registered with Filter Manager.","organization":"stark","senderHost":"TS01-2016.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.stark.com","event_data":{"DeviceName":"TSFairShare","DeviceNameLength":"11","DeviceTime":"2016-07-15T22:11:15.000000000Z","DeviceVersionMajor":"10","DeviceVersionMinor":"0","ExtraInfoLength":"184","ExtraInfoString":"{ \"flags\" : \"0x00000010\" , \"registration_version\" : \"0x00000203\" , \"tx\" : false , \"sections\" : false , \"frame\" : 0 , \"class_name\" : \"(null)\" , \"instances\" : [[\"400010\",\"0x00000000\"]] }","FilterID":"{02000000-000D-0000-D40F-E5F9CADFDA01}","FinalStatus":"0x0"},"event_id":"6","keywords":["ms:Measures"],"opcode":"Info","process":{"pid":4,"thread":{"id":32}},"provider_guid":"{F3C5E28E-63F6-49C7-A204-E48A1BC4B09D}","provider_name":"Microsoft-Windows-FilterManager","record_id":159347,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"},"version":1}}
|
Product: microsoft-windows-filtermanager
Vendor: microsoft-windows-filtermanager
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:22.992Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"6","created":"2024-07-27T02:19:21.704Z","kind":"event","provider":"Microsoft-Windows-FilterManager"},"host":{"name":"TS01-2016.stark.com"},"log":{"level":"information"},"message":"File System Filter 'TSFairShare' (10.0, β2016β-β07β-β15T22:11:15.000000000Z) has successfully loaded and registered with Filter Manager.","organization":"stark","senderHost":"TS01-2016.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.stark.com","event_data":{"DeviceName":"TSFairShare","DeviceNameLength":"11","DeviceTime":"2016-07-15T22:11:15.000000000Z","DeviceVersionMajor":"10","DeviceVersionMinor":"0","ExtraInfoLength":"184","ExtraInfoString":"{ \"flags\" : \"0x00000010\" , \"registration_version\" : \"0x00000203\" , \"tx\" : false , \"sections\" : false , \"frame\" : 0 , \"class_name\" : \"(null)\" , \"instances\" : [[\"400010\",\"0x00000000\"]] }","FilterID":"{02000000-000D-0000-D40F-E5F9CADFDA01}","FinalStatus":"0x0"},"event_id":"6","keywords":["ms:Measures"],"opcode":"Info","process":{"pid":4,"thread":{"id":32}},"provider_guid":"{F3C5E28E-63F6-49C7-A204-E48A1BC4B09D}","provider_name":"Microsoft-Windows-FilterManager","record_id":159347,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"},"version":1}}
|
This is a syslog message from a product called microsoft-windows-filtermanager by microsoft-windows-filtermanager. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 6
senderHost: TS01-2016.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: microsoft-windows-filtermanager
tags: ['v8', 'eventId:6', 'microsoft-windows-filtermanager', '6']
vendorCode: 159347
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:22.992Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"258","created":"2024-07-27T02:19:21.704Z","kind":"event","provider":"Microsoft-Windows-TerminalServices-TSFairShare-Events"},"host":{"name":"TS01-2016.wayne.com"},"log":{"level":"information"},"message":"Remote Desktop Services Disk Fair Share started.","organization":"wayne","senderHost":"TS01-2016.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.wayne.com","event_id":"258","opcode":"Info","process":{"pid":4,"thread":{"id":32}},"provider_guid":"{8D83AEC0-01DE-4772-A317-2093B6DC3BAB}","provider_name":"Microsoft-Windows-TerminalServices-TSFairShare-Events","record_id":159348,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}}
|
{
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T02:16:22.992Z\",\"agent\":{\"ephemeral_id\":\"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c\",\"id\":\"1e289ed9-fa81-478d-9ec3-98d5119c9f2e\",\"name\":\"TS01-2016\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"258\",\"created\":\"2024-07-27T02:19:21.704Z\",\"kind\":\"event\",\"provider\":\"Microsoft-Windows-TerminalServices-TSFairShare-Events\"},\"host\":{\"name\":\"TS01-2016.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"Remote Desktop Services Disk Fair Share started.\",\"organization\":\"wayne\",\"senderHost\":\"TS01-2016.wayne.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"TS01-2016.wayne.com\",\"event_id\":\"258\",\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":32}},\"provider_guid\":\"{8D83AEC0-01DE-4772-A317-2093B6DC3BAB}\",\"provider_name\":\"Microsoft-Windows-TerminalServices-TSFairShare-Events\",\"record_id\":159348,\"task\":\"None\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-18\",\"name\":\"SYSTEM\",\"type\":\"User\"}}}",
"messageType": "258",
"senderHost": "TS01-2016.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "microsoft-windows-terminalservices-tsfairshare-events",
"tags": [
"v8",
"eventId:258",
"microsoft-windows-terminalservices-tsfairshare-events",
"258"
],
"vendorCode": "159348"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:22.992Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"258","created":"2024-07-27T02:19:21.704Z","kind":"event","provider":"Microsoft-Windows-TerminalServices-TSFairShare-Events"},"host":{"name":"TS01-2016.wayne.com"},"log":{"level":"information"},"message":"Remote Desktop Services Disk Fair Share started.","organization":"wayne","senderHost":"TS01-2016.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.wayne.com","event_id":"258","opcode":"Info","process":{"pid":4,"thread":{"id":32}},"provider_guid":"{8D83AEC0-01DE-4772-A317-2093B6DC3BAB}","provider_name":"Microsoft-Windows-TerminalServices-TSFairShare-Events","record_id":159348,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}}
|
Product: microsoft-windows-terminalservices-tsfairshare-events
Vendor: microsoft-windows-terminalservices-tsfairshare-events
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:22.992Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"258","created":"2024-07-27T02:19:21.704Z","kind":"event","provider":"Microsoft-Windows-TerminalServices-TSFairShare-Events"},"host":{"name":"TS01-2016.wayne.com"},"log":{"level":"information"},"message":"Remote Desktop Services Disk Fair Share started.","organization":"wayne","senderHost":"TS01-2016.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.wayne.com","event_id":"258","opcode":"Info","process":{"pid":4,"thread":{"id":32}},"provider_guid":"{8D83AEC0-01DE-4772-A317-2093B6DC3BAB}","provider_name":"Microsoft-Windows-TerminalServices-TSFairShare-Events","record_id":159348,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}}
|
This is a syslog message from a product called microsoft-windows-terminalservices-tsfairshare-events by microsoft-windows-terminalservices-tsfairshare-events. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 258
senderHost: TS01-2016.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: microsoft-windows-terminalservices-tsfairshare-events
tags: ['v8', 'eventId:258', 'microsoft-windows-terminalservices-tsfairshare-events', '258']
vendorCode: 159348
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:22.991Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"256","created":"2024-07-27T02:19:21.704Z","kind":"event","provider":"Microsoft-Windows-TerminalServices-TSFairShare-Events"},"host":{"name":"TS01-2016.oscorp.com"},"log":{"level":"information"},"message":"Remote Desktop Services Fair Share started.","organization":"oscorp","senderHost":"TS01-2016.oscorp.com","sensitivity":"normal","winlog":{"activity_id":"{8D83AEC0-01DE-4772-A317-2093B6DC3BAB}","api":"wineventlog","channel":"System","computer_name":"TS01-2016.oscorp.com","event_id":"256","opcode":"Info","process":{"pid":4,"thread":{"id":32}},"provider_guid":"{8D83AEC0-01DE-4772-A317-2093B6DC3BAB}","provider_name":"Microsoft-Windows-TerminalServices-TSFairShare-Events","record_id":159346,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}}
|
{
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T02:16:22.991Z\",\"agent\":{\"ephemeral_id\":\"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c\",\"id\":\"1e289ed9-fa81-478d-9ec3-98d5119c9f2e\",\"name\":\"TS01-2016\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"256\",\"created\":\"2024-07-27T02:19:21.704Z\",\"kind\":\"event\",\"provider\":\"Microsoft-Windows-TerminalServices-TSFairShare-Events\"},\"host\":{\"name\":\"TS01-2016.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"Remote Desktop Services Fair Share started.\",\"organization\":\"oscorp\",\"senderHost\":\"TS01-2016.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{8D83AEC0-01DE-4772-A317-2093B6DC3BAB}\",\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"TS01-2016.oscorp.com\",\"event_id\":\"256\",\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":32}},\"provider_guid\":\"{8D83AEC0-01DE-4772-A317-2093B6DC3BAB}\",\"provider_name\":\"Microsoft-Windows-TerminalServices-TSFairShare-Events\",\"record_id\":159346,\"task\":\"None\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-18\",\"name\":\"SYSTEM\",\"type\":\"User\"}}}",
"messageType": "256",
"senderHost": "TS01-2016.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "microsoft-windows-terminalservices-tsfairshare-events",
"tags": [
"v8",
"eventId:256",
"microsoft-windows-terminalservices-tsfairshare-events",
"256"
],
"vendorCode": "159346"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:22.991Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"256","created":"2024-07-27T02:19:21.704Z","kind":"event","provider":"Microsoft-Windows-TerminalServices-TSFairShare-Events"},"host":{"name":"TS01-2016.oscorp.com"},"log":{"level":"information"},"message":"Remote Desktop Services Fair Share started.","organization":"oscorp","senderHost":"TS01-2016.oscorp.com","sensitivity":"normal","winlog":{"activity_id":"{8D83AEC0-01DE-4772-A317-2093B6DC3BAB}","api":"wineventlog","channel":"System","computer_name":"TS01-2016.oscorp.com","event_id":"256","opcode":"Info","process":{"pid":4,"thread":{"id":32}},"provider_guid":"{8D83AEC0-01DE-4772-A317-2093B6DC3BAB}","provider_name":"Microsoft-Windows-TerminalServices-TSFairShare-Events","record_id":159346,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}}
|
Product: microsoft-windows-terminalservices-tsfairshare-events
Vendor: microsoft-windows-terminalservices-tsfairshare-events
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:22.991Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"256","created":"2024-07-27T02:19:21.704Z","kind":"event","provider":"Microsoft-Windows-TerminalServices-TSFairShare-Events"},"host":{"name":"TS01-2016.oscorp.com"},"log":{"level":"information"},"message":"Remote Desktop Services Fair Share started.","organization":"oscorp","senderHost":"TS01-2016.oscorp.com","sensitivity":"normal","winlog":{"activity_id":"{8D83AEC0-01DE-4772-A317-2093B6DC3BAB}","api":"wineventlog","channel":"System","computer_name":"TS01-2016.oscorp.com","event_id":"256","opcode":"Info","process":{"pid":4,"thread":{"id":32}},"provider_guid":"{8D83AEC0-01DE-4772-A317-2093B6DC3BAB}","provider_name":"Microsoft-Windows-TerminalServices-TSFairShare-Events","record_id":159346,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}}
|
This is a syslog message from a product called microsoft-windows-terminalservices-tsfairshare-events by microsoft-windows-terminalservices-tsfairshare-events. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 256
senderHost: TS01-2016.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: microsoft-windows-terminalservices-tsfairshare-events
tags: ['v8', 'eventId:256', 'microsoft-windows-terminalservices-tsfairshare-events', '256']
vendorCode: 159346
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:23.149Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1500","created":"2024-07-27T02:19:21.703Z","kind":"event","provider":"SNMP"},"host":{"name":"TS01-2016.oscorp.com"},"log":{"level":"error"},"message":"The SNMP Service encountered an error while accessing the registry key SYSTEM\\CurrentControlSet\\Services\\SNMP\\Parameters\\TrapConfiguration.","organization":"oscorp","senderHost":"TS01-2016.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.oscorp.com","event_data":{"Binary":"02000000","param1":"SYSTEM\\CurrentControlSet\\Services\\SNMP\\Parameters\\TrapConfiguration"},"event_id":"1500","keywords":["Classic"],"provider_name":"SNMP","record_id":159338,"task":"None"}}
|
{
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T02:16:23.149Z\",\"agent\":{\"ephemeral_id\":\"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c\",\"id\":\"1e289ed9-fa81-478d-9ec3-98d5119c9f2e\",\"name\":\"TS01-2016\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"1500\",\"created\":\"2024-07-27T02:19:21.703Z\",\"kind\":\"event\",\"provider\":\"SNMP\"},\"host\":{\"name\":\"TS01-2016.oscorp.com\"},\"log\":{\"level\":\"error\"},\"message\":\"The SNMP Service encountered an error while accessing the registry key SYSTEM\\\\CurrentControlSet\\\\Services\\\\SNMP\\\\Parameters\\\\TrapConfiguration.\",\"organization\":\"oscorp\",\"senderHost\":\"TS01-2016.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"TS01-2016.oscorp.com\",\"event_data\":{\"Binary\":\"02000000\",\"param1\":\"SYSTEM\\\\CurrentControlSet\\\\Services\\\\SNMP\\\\Parameters\\\\TrapConfiguration\"},\"event_id\":\"1500\",\"keywords\":[\"Classic\"],\"provider_name\":\"SNMP\",\"record_id\":159338,\"task\":\"None\"}}",
"messageType": "1500",
"senderHost": "TS01-2016.mingledorffs.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "snmp",
"tags": [
"v8",
"eventId:1500",
"snmp",
"1500"
],
"vendorCode": "159338"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:23.149Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1500","created":"2024-07-27T02:19:21.703Z","kind":"event","provider":"SNMP"},"host":{"name":"TS01-2016.oscorp.com"},"log":{"level":"error"},"message":"The SNMP Service encountered an error while accessing the registry key SYSTEM\\CurrentControlSet\\Services\\SNMP\\Parameters\\TrapConfiguration.","organization":"oscorp","senderHost":"TS01-2016.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.oscorp.com","event_data":{"Binary":"02000000","param1":"SYSTEM\\CurrentControlSet\\Services\\SNMP\\Parameters\\TrapConfiguration"},"event_id":"1500","keywords":["Classic"],"provider_name":"SNMP","record_id":159338,"task":"None"}}
|
Product: snmp
Vendor: snmp
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:23.149Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1500","created":"2024-07-27T02:19:21.703Z","kind":"event","provider":"SNMP"},"host":{"name":"TS01-2016.oscorp.com"},"log":{"level":"error"},"message":"The SNMP Service encountered an error while accessing the registry key SYSTEM\\CurrentControlSet\\Services\\SNMP\\Parameters\\TrapConfiguration.","organization":"oscorp","senderHost":"TS01-2016.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.oscorp.com","event_data":{"Binary":"02000000","param1":"SYSTEM\\CurrentControlSet\\Services\\SNMP\\Parameters\\TrapConfiguration"},"event_id":"1500","keywords":["Classic"],"provider_name":"SNMP","record_id":159338,"task":"None"}}
|
This is a syslog message from a product called snmp by snmp. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 1500
senderHost: TS01-2016.mingledorffs.com
sensitivity: normal
sourceInfo: unknown
streamName: snmp
tags: ['v8', 'eventId:1500', 'snmp', '1500']
vendorCode: 159338
|
Explain this syslog message
|
<134>1 2024-07-26T22:59:10.124549-05:00 vcenter vapi-endpoint-access - - - 2024-07-26T22:59:10.124-05:00 | vAPI-I/O dispatcher-1 | 117.207.44.136 - - [27/Jul/2024:03:59:10 +0000] "POST /rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges HTTP/1.1" 200 16 "-" "Go-http-client/1.1" 6
|
{
"clientIP": "117.207.44.136",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "apache",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T22:59:10.124549-05:00",
"message": "<134>1 2024-07-26T22:59:10.124549-05:00 vcenter vapi-endpoint-access - - - 2024-07-26T22:59:10.124-05:00 | vAPI-I/O dispatcher-1 | 117.207.44.136 - - [27/Jul/2024:03:59:10 +0000] \"POST /rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges HTTP/1.1\" 200 16 \"-\" \"Go-http-client/1.1\" 6\n",
"messageType": "access_log",
"priority": 134,
"program": "vapi-endpoint-access",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"serverBytes": 16,
"severityCode": 6,
"severityLabel": "informational",
"sourceInfo": "unknown",
"streamName": "apache_access_log",
"tags": [
"access_log",
"HTTP:POST",
"rfc5424",
"apache_access_log",
"HTTP_RESPONSE_CODE:200",
"apache"
],
"uri": "/rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges"
}
|
Create a JSON artifact from the message
|
<134>1 2024-07-26T22:59:10.124549-05:00 vcenter vapi-endpoint-access - - - 2024-07-26T22:59:10.124-05:00 | vAPI-I/O dispatcher-1 | 117.207.44.136 - - [27/Jul/2024:03:59:10 +0000] "POST /rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges HTTP/1.1" 200 16 "-" "Go-http-client/1.1" 6
|
Product: Apache Web Server
Vendor: Apache
|
Identify this syslog message
|
<134>1 2024-07-26T22:59:10.124549-05:00 vcenter vapi-endpoint-access - - - 2024-07-26T22:59:10.124-05:00 | vAPI-I/O dispatcher-1 | 117.207.44.136 - - [27/Jul/2024:03:59:10 +0000] "POST /rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges HTTP/1.1" 200 16 "-" "Go-http-client/1.1" 6
|
This is a syslog message from a product called Apache Web Server by Apache. The following fields were extracted from the message:
clientIP: 117.207.44.136
facilityCode: 16
facilityLabel: local0
fieldExtractorName: apache
localHostname: vcenter
localStartTime: 2024-07-26T22:59:10.124549-05:00
messageType: access_log
priority: 134
program: vapi-endpoint-access
senderHost: 10.0.0.20
sensitivity: normal
serverBytes: 16
severityCode: 6
severityLabel: informational
sourceInfo: unknown
streamName: apache_access_log
tags: ['access_log', 'HTTP:POST', 'rfc5424', 'apache_access_log', 'HTTP_RESPONSE_CODE:200', 'apache']
uri: /rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T09:42:25.887Z","agent":{"ephemeral_id":"1f40bbc4-35d9-4985-9358-8ac7fe523d04","id":"2a2928ba-06c3-4721-8cfc-2e30c2f4dac6","name":"NVIPROCPRDAPP01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1704","created":"2024-07-30T09:42:25.933Z","kind":"event","provider":"SceCli"},"host":{"name":"NVIPROCPRDAPP01.prdnvi.oscorpint.com"},"log":{"level":"information"},"message":"Security policy in the Group policy objects has been applied successfully.","organization":"oscorp","senderHost":"10.160.20.12","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDAPP01.prdnvi.oscorpint.com","event_id":"1704","keywords":["Classic"],"provider_name":"SceCli","record_id":24737,"task":"None"}}
|
{
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-30T09:42:25.887Z\",\"agent\":{\"ephemeral_id\":\"1f40bbc4-35d9-4985-9358-8ac7fe523d04\",\"id\":\"2a2928ba-06c3-4721-8cfc-2e30c2f4dac6\",\"name\":\"NVIPROCPRDAPP01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"1704\",\"created\":\"2024-07-30T09:42:25.933Z\",\"kind\":\"event\",\"provider\":\"SceCli\"},\"host\":{\"name\":\"NVIPROCPRDAPP01.prdnvi.oscorpint.com\"},\"log\":{\"level\":\"information\"},\"message\":\"Security policy in the Group policy objects has been applied successfully.\",\"organization\":\"oscorp\",\"senderHost\":\"10.160.20.12\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"NVIPROCPRDAPP01.prdnvi.oscorpint.com\",\"event_id\":\"1704\",\"keywords\":[\"Classic\"],\"provider_name\":\"SceCli\",\"record_id\":24737,\"task\":\"None\"}}",
"messageType": "1704",
"senderHost": "10.160.20.12",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "scecli",
"tags": [
"v8",
"eventId:1704",
"scecli",
"1704"
],
"vendorCode": "24737"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T09:42:25.887Z","agent":{"ephemeral_id":"1f40bbc4-35d9-4985-9358-8ac7fe523d04","id":"2a2928ba-06c3-4721-8cfc-2e30c2f4dac6","name":"NVIPROCPRDAPP01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1704","created":"2024-07-30T09:42:25.933Z","kind":"event","provider":"SceCli"},"host":{"name":"NVIPROCPRDAPP01.prdnvi.oscorpint.com"},"log":{"level":"information"},"message":"Security policy in the Group policy objects has been applied successfully.","organization":"oscorp","senderHost":"10.160.20.12","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDAPP01.prdnvi.oscorpint.com","event_id":"1704","keywords":["Classic"],"provider_name":"SceCli","record_id":24737,"task":"None"}}
|
Product: scecli
Vendor: scecli
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T09:42:25.887Z","agent":{"ephemeral_id":"1f40bbc4-35d9-4985-9358-8ac7fe523d04","id":"2a2928ba-06c3-4721-8cfc-2e30c2f4dac6","name":"NVIPROCPRDAPP01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1704","created":"2024-07-30T09:42:25.933Z","kind":"event","provider":"SceCli"},"host":{"name":"NVIPROCPRDAPP01.prdnvi.oscorpint.com"},"log":{"level":"information"},"message":"Security policy in the Group policy objects has been applied successfully.","organization":"oscorp","senderHost":"10.160.20.12","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDAPP01.prdnvi.oscorpint.com","event_id":"1704","keywords":["Classic"],"provider_name":"SceCli","record_id":24737,"task":"None"}}
|
This is a syslog message from a product called scecli by scecli. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 1704
senderHost: 10.160.20.12
sensitivity: normal
sourceInfo: unknown
streamName: scecli
tags: ['v8', 'eventId:1704', 'scecli', '1704']
vendorCode: 24737
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:30.048Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Process Creation","code":"4688","created":"2024-07-30T14:34:31.319Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com"},"log":{"level":"information"},"message":"A new process has been created.\n\nCreator Subject:\n\tSecurity ID:\t\tS-1-5-21-855572474-1402847513-2951438033-32165\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0xC57119\n\nTarget Subject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nProcess Information:\n\tNew Process ID:\t\t0x1c48\n\tNew Process Name:\tC:\\Windows\\System32\\conhost.exe\n\tToken Elevation Type:\t%%1936\n\tMandatory Label:\t\tS-1-16-12288\n\tCreator Process ID:\t0x1670\n\tCreator Process Name:\tC:\\Windows\\System32\\inetsrv\\w3wp.exe\n\tProcess Command Line:\t\n\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\n\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\n\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\n\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.","organization":"oscorp","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com","event_data":{"MandatoryLabel":"S-1-16-12288","NewProcessId":"0x1c48","NewProcessName":"C:\\Windows\\System32\\conhost.exe","ParentProcessName":"C:\\Windows\\System32\\inetsrv\\w3wp.exe","ProcessId":"0x1670","SubjectDomainName":"prdnvi","SubjectLogonId":"0xc57119","SubjectUserName":"procprd-appuser","SubjectUserSid":"S-1-5-21-855572474-1402847513-2951438033-32165","TargetDomainName":"-","TargetLogonId":"0x0","TargetUserName":"-","TargetUserSid":"S-1-0-0","TokenElevationType":"%%1936"},"event_id":"4688","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":3996}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6494593,"task":"Process Creation","version":2}}
|
{
"fieldExtractorName": "symantec_dlp",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-30T14:34:30.048Z\",\"agent\":{\"ephemeral_id\":\"a668c636-ec70-4103-9c98-53517f0df854\",\"id\":\"040c78f0-1741-4108-a30c-aaf00e9af961\",\"name\":\"NVIPROCPRDWEB01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Process Creation\",\"code\":\"4688\",\"created\":\"2024-07-30T14:34:31.319Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NVIPROCPRDWEB01.prdnvi.oscorpint.com\"},\"log\":{\"level\":\"information\"},\"message\":\"A new process has been created.\\n\\nCreator Subject:\\n\\tSecurity ID:\\t\\tS-1-5-21-855572474-1402847513-2951438033-32165\\n\\tAccount Name:\\t\\tprocprd-appuser\\n\\tAccount Domain:\\t\\tprdnvi\\n\\tLogon ID:\\t\\t0xC57119\\n\\nTarget Subject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nProcess Information:\\n\\tNew Process ID:\\t\\t0x1c48\\n\\tNew Process Name:\\tC:\\\\Windows\\\\System32\\\\conhost.exe\\n\\tToken Elevation Type:\\t%%1936\\n\\tMandatory Label:\\t\\tS-1-16-12288\\n\\tCreator Process ID:\\t0x1670\\n\\tCreator Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\w3wp.exe\\n\\tProcess Command Line:\\t\\n\\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\\n\\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\\n\\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\\n\\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.\",\"organization\":\"oscorp\",\"senderHost\":\"10.160.18.44\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NVIPROCPRDWEB01.prdnvi.oscorpint.com\",\"event_data\":{\"MandatoryLabel\":\"S-1-16-12288\",\"NewProcessId\":\"0x1c48\",\"NewProcessName\":\"C:\\\\Windows\\\\System32\\\\conhost.exe\",\"ParentProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\w3wp.exe\",\"ProcessId\":\"0x1670\",\"SubjectDomainName\":\"prdnvi\",\"SubjectLogonId\":\"0xc57119\",\"SubjectUserName\":\"procprd-appuser\",\"SubjectUserSid\":\"S-1-5-21-855572474-1402847513-2951438033-32165\",\"TargetDomainName\":\"-\",\"TargetLogonId\":\"0x0\",\"TargetUserName\":\"-\",\"TargetUserSid\":\"S-1-0-0\",\"TokenElevationType\":\"%%1936\"},\"event_id\":\"4688\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":3996}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6494593,\"task\":\"Process Creation\",\"version\":2}}",
"messageType": "data_loss",
"productIds": [
44
],
"senderHost": "10.160.18.44",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "symantec_dlp",
"tags": [
"symantec_dlp",
"data_loss"
]
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:30.048Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Process Creation","code":"4688","created":"2024-07-30T14:34:31.319Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com"},"log":{"level":"information"},"message":"A new process has been created.\n\nCreator Subject:\n\tSecurity ID:\t\tS-1-5-21-855572474-1402847513-2951438033-32165\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0xC57119\n\nTarget Subject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nProcess Information:\n\tNew Process ID:\t\t0x1c48\n\tNew Process Name:\tC:\\Windows\\System32\\conhost.exe\n\tToken Elevation Type:\t%%1936\n\tMandatory Label:\t\tS-1-16-12288\n\tCreator Process ID:\t0x1670\n\tCreator Process Name:\tC:\\Windows\\System32\\inetsrv\\w3wp.exe\n\tProcess Command Line:\t\n\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\n\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\n\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\n\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.","organization":"oscorp","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com","event_data":{"MandatoryLabel":"S-1-16-12288","NewProcessId":"0x1c48","NewProcessName":"C:\\Windows\\System32\\conhost.exe","ParentProcessName":"C:\\Windows\\System32\\inetsrv\\w3wp.exe","ProcessId":"0x1670","SubjectDomainName":"prdnvi","SubjectLogonId":"0xc57119","SubjectUserName":"procprd-appuser","SubjectUserSid":"S-1-5-21-855572474-1402847513-2951438033-32165","TargetDomainName":"-","TargetLogonId":"0x0","TargetUserName":"-","TargetUserSid":"S-1-0-0","TokenElevationType":"%%1936"},"event_id":"4688","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":3996}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6494593,"task":"Process Creation","version":2}}
|
Product: Symantec Data Loss Prevention
Vendor: Symantec
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:30.048Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Process Creation","code":"4688","created":"2024-07-30T14:34:31.319Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com"},"log":{"level":"information"},"message":"A new process has been created.\n\nCreator Subject:\n\tSecurity ID:\t\tS-1-5-21-855572474-1402847513-2951438033-32165\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0xC57119\n\nTarget Subject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nProcess Information:\n\tNew Process ID:\t\t0x1c48\n\tNew Process Name:\tC:\\Windows\\System32\\conhost.exe\n\tToken Elevation Type:\t%%1936\n\tMandatory Label:\t\tS-1-16-12288\n\tCreator Process ID:\t0x1670\n\tCreator Process Name:\tC:\\Windows\\System32\\inetsrv\\w3wp.exe\n\tProcess Command Line:\t\n\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\n\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\n\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\n\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.","organization":"oscorp","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.oscorpint.com","event_data":{"MandatoryLabel":"S-1-16-12288","NewProcessId":"0x1c48","NewProcessName":"C:\\Windows\\System32\\conhost.exe","ParentProcessName":"C:\\Windows\\System32\\inetsrv\\w3wp.exe","ProcessId":"0x1670","SubjectDomainName":"prdnvi","SubjectLogonId":"0xc57119","SubjectUserName":"procprd-appuser","SubjectUserSid":"S-1-5-21-855572474-1402847513-2951438033-32165","TargetDomainName":"-","TargetLogonId":"0x0","TargetUserName":"-","TargetUserSid":"S-1-0-0","TokenElevationType":"%%1936"},"event_id":"4688","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":3996}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6494593,"task":"Process Creation","version":2}}
|
This is a syslog message from a product called Symantec Data Loss Prevention by Symantec. The following fields were extracted from the message:
fieldExtractorName: symantec_dlp
messageType: data_loss
productIds: [44]
senderHost: 10.160.18.44
sensitivity: normal
sourceInfo: unknown
streamName: symantec_dlp
tags: ['symantec_dlp', 'data_loss']
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:29.888Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Process Creation","code":"4688","created":"2024-07-30T14:34:31.319Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.starkint.com"},"log":{"level":"information"},"message":"A new process has been created.\n\nCreator Subject:\n\tSecurity ID:\t\tS-1-5-21-855572474-1402847513-2951438033-32165\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0xC57119\n\nTarget Subject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nProcess Information:\n\tNew Process ID:\t\t0x1c78\n\tNew Process Name:\tC:\\Windows\\System32\\conhost.exe\n\tToken Elevation Type:\t%%1936\n\tMandatory Label:\t\tS-1-16-12288\n\tCreator Process ID:\t0x1eec\n\tCreator Process Name:\tC:\\Windows\\System32\\where.exe\n\tProcess Command Line:\t\n\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\n\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\n\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\n\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.","organization":"stark","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.starkint.com","event_data":{"MandatoryLabel":"S-1-16-12288","NewProcessId":"0x1c78","NewProcessName":"C:\\Windows\\System32\\conhost.exe","ParentProcessName":"C:\\Windows\\System32\\where.exe","ProcessId":"0x1eec","SubjectDomainName":"prdnvi","SubjectLogonId":"0xc57119","SubjectUserName":"procprd-appuser","SubjectUserSid":"S-1-5-21-855572474-1402847513-2951438033-32165","TargetDomainName":"-","TargetLogonId":"0x0","TargetUserName":"-","TargetUserSid":"S-1-0-0","TokenElevationType":"%%1936"},"event_id":"4688","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":3996}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6494592,"task":"Process Creation","version":2}}
|
{
"fieldExtractorName": "symantec_dlp",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-30T14:34:29.888Z\",\"agent\":{\"ephemeral_id\":\"a668c636-ec70-4103-9c98-53517f0df854\",\"id\":\"040c78f0-1741-4108-a30c-aaf00e9af961\",\"name\":\"NVIPROCPRDWEB01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Process Creation\",\"code\":\"4688\",\"created\":\"2024-07-30T14:34:31.319Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NVIPROCPRDWEB01.prdnvi.starkint.com\"},\"log\":{\"level\":\"information\"},\"message\":\"A new process has been created.\\n\\nCreator Subject:\\n\\tSecurity ID:\\t\\tS-1-5-21-855572474-1402847513-2951438033-32165\\n\\tAccount Name:\\t\\tprocprd-appuser\\n\\tAccount Domain:\\t\\tprdnvi\\n\\tLogon ID:\\t\\t0xC57119\\n\\nTarget Subject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nProcess Information:\\n\\tNew Process ID:\\t\\t0x1c78\\n\\tNew Process Name:\\tC:\\\\Windows\\\\System32\\\\conhost.exe\\n\\tToken Elevation Type:\\t%%1936\\n\\tMandatory Label:\\t\\tS-1-16-12288\\n\\tCreator Process ID:\\t0x1eec\\n\\tCreator Process Name:\\tC:\\\\Windows\\\\System32\\\\where.exe\\n\\tProcess Command Line:\\t\\n\\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\\n\\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\\n\\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\\n\\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.\",\"organization\":\"stark\",\"senderHost\":\"10.160.18.44\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NVIPROCPRDWEB01.prdnvi.starkint.com\",\"event_data\":{\"MandatoryLabel\":\"S-1-16-12288\",\"NewProcessId\":\"0x1c78\",\"NewProcessName\":\"C:\\\\Windows\\\\System32\\\\conhost.exe\",\"ParentProcessName\":\"C:\\\\Windows\\\\System32\\\\where.exe\",\"ProcessId\":\"0x1eec\",\"SubjectDomainName\":\"prdnvi\",\"SubjectLogonId\":\"0xc57119\",\"SubjectUserName\":\"procprd-appuser\",\"SubjectUserSid\":\"S-1-5-21-855572474-1402847513-2951438033-32165\",\"TargetDomainName\":\"-\",\"TargetLogonId\":\"0x0\",\"TargetUserName\":\"-\",\"TargetUserSid\":\"S-1-0-0\",\"TokenElevationType\":\"%%1936\"},\"event_id\":\"4688\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":3996}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6494592,\"task\":\"Process Creation\",\"version\":2}}",
"messageType": "data_loss",
"productIds": [
44
],
"senderHost": "10.160.18.44",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "symantec_dlp",
"tags": [
"symantec_dlp",
"data_loss"
]
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:29.888Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Process Creation","code":"4688","created":"2024-07-30T14:34:31.319Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.starkint.com"},"log":{"level":"information"},"message":"A new process has been created.\n\nCreator Subject:\n\tSecurity ID:\t\tS-1-5-21-855572474-1402847513-2951438033-32165\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0xC57119\n\nTarget Subject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nProcess Information:\n\tNew Process ID:\t\t0x1c78\n\tNew Process Name:\tC:\\Windows\\System32\\conhost.exe\n\tToken Elevation Type:\t%%1936\n\tMandatory Label:\t\tS-1-16-12288\n\tCreator Process ID:\t0x1eec\n\tCreator Process Name:\tC:\\Windows\\System32\\where.exe\n\tProcess Command Line:\t\n\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\n\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\n\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\n\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.","organization":"stark","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.starkint.com","event_data":{"MandatoryLabel":"S-1-16-12288","NewProcessId":"0x1c78","NewProcessName":"C:\\Windows\\System32\\conhost.exe","ParentProcessName":"C:\\Windows\\System32\\where.exe","ProcessId":"0x1eec","SubjectDomainName":"prdnvi","SubjectLogonId":"0xc57119","SubjectUserName":"procprd-appuser","SubjectUserSid":"S-1-5-21-855572474-1402847513-2951438033-32165","TargetDomainName":"-","TargetLogonId":"0x0","TargetUserName":"-","TargetUserSid":"S-1-0-0","TokenElevationType":"%%1936"},"event_id":"4688","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":3996}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6494592,"task":"Process Creation","version":2}}
|
Product: Symantec Data Loss Prevention
Vendor: Symantec
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:29.888Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Process Creation","code":"4688","created":"2024-07-30T14:34:31.319Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.starkint.com"},"log":{"level":"information"},"message":"A new process has been created.\n\nCreator Subject:\n\tSecurity ID:\t\tS-1-5-21-855572474-1402847513-2951438033-32165\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0xC57119\n\nTarget Subject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nProcess Information:\n\tNew Process ID:\t\t0x1c78\n\tNew Process Name:\tC:\\Windows\\System32\\conhost.exe\n\tToken Elevation Type:\t%%1936\n\tMandatory Label:\t\tS-1-16-12288\n\tCreator Process ID:\t0x1eec\n\tCreator Process Name:\tC:\\Windows\\System32\\where.exe\n\tProcess Command Line:\t\n\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\n\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\n\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\n\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.","organization":"stark","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.starkint.com","event_data":{"MandatoryLabel":"S-1-16-12288","NewProcessId":"0x1c78","NewProcessName":"C:\\Windows\\System32\\conhost.exe","ParentProcessName":"C:\\Windows\\System32\\where.exe","ProcessId":"0x1eec","SubjectDomainName":"prdnvi","SubjectLogonId":"0xc57119","SubjectUserName":"procprd-appuser","SubjectUserSid":"S-1-5-21-855572474-1402847513-2951438033-32165","TargetDomainName":"-","TargetLogonId":"0x0","TargetUserName":"-","TargetUserSid":"S-1-0-0","TokenElevationType":"%%1936"},"event_id":"4688","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":3996}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6494592,"task":"Process Creation","version":2}}
|
This is a syslog message from a product called Symantec Data Loss Prevention by Symantec. The following fields were extracted from the message:
fieldExtractorName: symantec_dlp
messageType: data_loss
productIds: [44]
senderHost: 10.160.18.44
sensitivity: normal
sourceInfo: unknown
streamName: symantec_dlp
tags: ['symantec_dlp', 'data_loss']
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:29.877Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Process Creation","code":"4688","created":"2024-07-30T14:34:31.319Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.starkint.com"},"log":{"level":"information"},"message":"A new process has been created.\n\nCreator Subject:\n\tSecurity ID:\t\tS-1-5-21-855572474-1402847513-2951438033-32165\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0xC57119\n\nTarget Subject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nProcess Information:\n\tNew Process ID:\t\t0x1eec\n\tNew Process Name:\tC:\\Windows\\System32\\where.exe\n\tToken Elevation Type:\t%%1936\n\tMandatory Label:\t\tS-1-16-12288\n\tCreator Process ID:\t0x1670\n\tCreator Process Name:\tC:\\Windows\\System32\\inetsrv\\w3wp.exe\n\tProcess Command Line:\t\n\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\n\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\n\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\n\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.","organization":"stark","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.starkint.com","event_data":{"MandatoryLabel":"S-1-16-12288","NewProcessId":"0x1eec","NewProcessName":"C:\\Windows\\System32\\where.exe","ParentProcessName":"C:\\Windows\\System32\\inetsrv\\w3wp.exe","ProcessId":"0x1670","SubjectDomainName":"prdnvi","SubjectLogonId":"0xc57119","SubjectUserName":"procprd-appuser","SubjectUserSid":"S-1-5-21-855572474-1402847513-2951438033-32165","TargetDomainName":"-","TargetLogonId":"0x0","TargetUserName":"-","TargetUserSid":"S-1-0-0","TokenElevationType":"%%1936"},"event_id":"4688","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":3996}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6494591,"task":"Process Creation","version":2}}
|
{
"fieldExtractorName": "symantec_dlp",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-30T14:34:29.877Z\",\"agent\":{\"ephemeral_id\":\"a668c636-ec70-4103-9c98-53517f0df854\",\"id\":\"040c78f0-1741-4108-a30c-aaf00e9af961\",\"name\":\"NVIPROCPRDWEB01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Process Creation\",\"code\":\"4688\",\"created\":\"2024-07-30T14:34:31.319Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NVIPROCPRDWEB01.prdnvi.starkint.com\"},\"log\":{\"level\":\"information\"},\"message\":\"A new process has been created.\\n\\nCreator Subject:\\n\\tSecurity ID:\\t\\tS-1-5-21-855572474-1402847513-2951438033-32165\\n\\tAccount Name:\\t\\tprocprd-appuser\\n\\tAccount Domain:\\t\\tprdnvi\\n\\tLogon ID:\\t\\t0xC57119\\n\\nTarget Subject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nProcess Information:\\n\\tNew Process ID:\\t\\t0x1eec\\n\\tNew Process Name:\\tC:\\\\Windows\\\\System32\\\\where.exe\\n\\tToken Elevation Type:\\t%%1936\\n\\tMandatory Label:\\t\\tS-1-16-12288\\n\\tCreator Process ID:\\t0x1670\\n\\tCreator Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\w3wp.exe\\n\\tProcess Command Line:\\t\\n\\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\\n\\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\\n\\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\\n\\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.\",\"organization\":\"stark\",\"senderHost\":\"10.160.18.44\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NVIPROCPRDWEB01.prdnvi.starkint.com\",\"event_data\":{\"MandatoryLabel\":\"S-1-16-12288\",\"NewProcessId\":\"0x1eec\",\"NewProcessName\":\"C:\\\\Windows\\\\System32\\\\where.exe\",\"ParentProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\w3wp.exe\",\"ProcessId\":\"0x1670\",\"SubjectDomainName\":\"prdnvi\",\"SubjectLogonId\":\"0xc57119\",\"SubjectUserName\":\"procprd-appuser\",\"SubjectUserSid\":\"S-1-5-21-855572474-1402847513-2951438033-32165\",\"TargetDomainName\":\"-\",\"TargetLogonId\":\"0x0\",\"TargetUserName\":\"-\",\"TargetUserSid\":\"S-1-0-0\",\"TokenElevationType\":\"%%1936\"},\"event_id\":\"4688\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":3996}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6494591,\"task\":\"Process Creation\",\"version\":2}}",
"messageType": "data_loss",
"productIds": [
44
],
"senderHost": "10.160.18.44",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "symantec_dlp",
"tags": [
"symantec_dlp",
"data_loss"
]
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:29.877Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Process Creation","code":"4688","created":"2024-07-30T14:34:31.319Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.starkint.com"},"log":{"level":"information"},"message":"A new process has been created.\n\nCreator Subject:\n\tSecurity ID:\t\tS-1-5-21-855572474-1402847513-2951438033-32165\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0xC57119\n\nTarget Subject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nProcess Information:\n\tNew Process ID:\t\t0x1eec\n\tNew Process Name:\tC:\\Windows\\System32\\where.exe\n\tToken Elevation Type:\t%%1936\n\tMandatory Label:\t\tS-1-16-12288\n\tCreator Process ID:\t0x1670\n\tCreator Process Name:\tC:\\Windows\\System32\\inetsrv\\w3wp.exe\n\tProcess Command Line:\t\n\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\n\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\n\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\n\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.","organization":"stark","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.starkint.com","event_data":{"MandatoryLabel":"S-1-16-12288","NewProcessId":"0x1eec","NewProcessName":"C:\\Windows\\System32\\where.exe","ParentProcessName":"C:\\Windows\\System32\\inetsrv\\w3wp.exe","ProcessId":"0x1670","SubjectDomainName":"prdnvi","SubjectLogonId":"0xc57119","SubjectUserName":"procprd-appuser","SubjectUserSid":"S-1-5-21-855572474-1402847513-2951438033-32165","TargetDomainName":"-","TargetLogonId":"0x0","TargetUserName":"-","TargetUserSid":"S-1-0-0","TokenElevationType":"%%1936"},"event_id":"4688","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":3996}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6494591,"task":"Process Creation","version":2}}
|
Product: Symantec Data Loss Prevention
Vendor: Symantec
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:29.877Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Process Creation","code":"4688","created":"2024-07-30T14:34:31.319Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.starkint.com"},"log":{"level":"information"},"message":"A new process has been created.\n\nCreator Subject:\n\tSecurity ID:\t\tS-1-5-21-855572474-1402847513-2951438033-32165\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0xC57119\n\nTarget Subject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nProcess Information:\n\tNew Process ID:\t\t0x1eec\n\tNew Process Name:\tC:\\Windows\\System32\\where.exe\n\tToken Elevation Type:\t%%1936\n\tMandatory Label:\t\tS-1-16-12288\n\tCreator Process ID:\t0x1670\n\tCreator Process Name:\tC:\\Windows\\System32\\inetsrv\\w3wp.exe\n\tProcess Command Line:\t\n\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\n\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\n\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\n\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.","organization":"stark","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.starkint.com","event_data":{"MandatoryLabel":"S-1-16-12288","NewProcessId":"0x1eec","NewProcessName":"C:\\Windows\\System32\\where.exe","ParentProcessName":"C:\\Windows\\System32\\inetsrv\\w3wp.exe","ProcessId":"0x1670","SubjectDomainName":"prdnvi","SubjectLogonId":"0xc57119","SubjectUserName":"procprd-appuser","SubjectUserSid":"S-1-5-21-855572474-1402847513-2951438033-32165","TargetDomainName":"-","TargetLogonId":"0x0","TargetUserName":"-","TargetUserSid":"S-1-0-0","TokenElevationType":"%%1936"},"event_id":"4688","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":3996}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6494591,"task":"Process Creation","version":2}}
|
This is a syslog message from a product called Symantec Data Loss Prevention by Symantec. The following fields were extracted from the message:
fieldExtractorName: symantec_dlp
messageType: data_loss
productIds: [44]
senderHost: 10.160.18.44
sensitivity: normal
sourceInfo: unknown
streamName: symantec_dlp
tags: ['symantec_dlp', 'data_loss']
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:30.642Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1032","created":"2024-07-30T14:34:31.269Z","kind":"event","provider":"IIS AspNetCore Module V2"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.starkint.com"},"log":{"level":"information"},"message":"Application 'D:\\PayGo\\PRD_Processing\\PaymentConnect\\' started successfully.","organization":"stark","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDWEB01.prdnvi.starkint.com","event_data":{"param1":"Application 'D:\\PayGo\\PRD_Processing\\PaymentConnect\\' started successfully.","param2":"Process Id: 5744.","param3":"File Version: 16.0.24141.31. Description: IIS ASP.NET Core Module V2 Request Handler. Commit: c967158b960823ccfcb19f1ef56426e2fd38eb3f"},"event_id":"1032","keywords":["Classic"],"opcode":"Info","provider_name":"IIS AspNetCore Module V2","record_id":1477811,"task":"None"}}
|
{
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-30T14:34:30.642Z\",\"agent\":{\"ephemeral_id\":\"a668c636-ec70-4103-9c98-53517f0df854\",\"id\":\"040c78f0-1741-4108-a30c-aaf00e9af961\",\"name\":\"NVIPROCPRDWEB01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"1032\",\"created\":\"2024-07-30T14:34:31.269Z\",\"kind\":\"event\",\"provider\":\"IIS AspNetCore Module V2\"},\"host\":{\"name\":\"NVIPROCPRDWEB01.prdnvi.starkint.com\"},\"log\":{\"level\":\"information\"},\"message\":\"Application 'D:\\\\PayGo\\\\PRD_Processing\\\\PaymentConnect\\\\' started successfully.\",\"organization\":\"stark\",\"senderHost\":\"10.160.18.44\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"NVIPROCPRDWEB01.prdnvi.starkint.com\",\"event_data\":{\"param1\":\"Application 'D:\\\\PayGo\\\\PRD_Processing\\\\PaymentConnect\\\\' started successfully.\",\"param2\":\"Process Id: 5744.\",\"param3\":\"File Version: 16.0.24141.31. Description: IIS ASP.NET Core Module V2 Request Handler. Commit: c967158b960823ccfcb19f1ef56426e2fd38eb3f\"},\"event_id\":\"1032\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_name\":\"IIS AspNetCore Module V2\",\"record_id\":1477811,\"task\":\"None\"}}",
"messageType": "1032",
"senderHost": "10.160.18.44",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "iis aspnetcore module v2",
"tags": [
"v8",
"eventId:1032",
"iis aspnetcore module v2",
"1032"
],
"vendorCode": "1477811"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:30.642Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1032","created":"2024-07-30T14:34:31.269Z","kind":"event","provider":"IIS AspNetCore Module V2"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.starkint.com"},"log":{"level":"information"},"message":"Application 'D:\\PayGo\\PRD_Processing\\PaymentConnect\\' started successfully.","organization":"stark","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDWEB01.prdnvi.starkint.com","event_data":{"param1":"Application 'D:\\PayGo\\PRD_Processing\\PaymentConnect\\' started successfully.","param2":"Process Id: 5744.","param3":"File Version: 16.0.24141.31. Description: IIS ASP.NET Core Module V2 Request Handler. Commit: c967158b960823ccfcb19f1ef56426e2fd38eb3f"},"event_id":"1032","keywords":["Classic"],"opcode":"Info","provider_name":"IIS AspNetCore Module V2","record_id":1477811,"task":"None"}}
|
Product: iis aspnetcore module v2
Vendor: iis aspnetcore module v2
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:30.642Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1032","created":"2024-07-30T14:34:31.269Z","kind":"event","provider":"IIS AspNetCore Module V2"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.starkint.com"},"log":{"level":"information"},"message":"Application 'D:\\PayGo\\PRD_Processing\\PaymentConnect\\' started successfully.","organization":"stark","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDWEB01.prdnvi.starkint.com","event_data":{"param1":"Application 'D:\\PayGo\\PRD_Processing\\PaymentConnect\\' started successfully.","param2":"Process Id: 5744.","param3":"File Version: 16.0.24141.31. Description: IIS ASP.NET Core Module V2 Request Handler. Commit: c967158b960823ccfcb19f1ef56426e2fd38eb3f"},"event_id":"1032","keywords":["Classic"],"opcode":"Info","provider_name":"IIS AspNetCore Module V2","record_id":1477811,"task":"None"}}
|
This is a syslog message from a product called iis aspnetcore module v2 by iis aspnetcore module v2. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 1032
senderHost: 10.160.18.44
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: iis aspnetcore module v2
tags: ['v8', 'eventId:1032', 'iis aspnetcore module v2', '1032']
vendorCode: 1477811
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:30.375Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1000","created":"2024-07-30T14:34:31.269Z","kind":"event","provider":".NET Runtime"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.wayneint.com"},"log":{"level":"warning"},"message":"Category: Microsoft.AspNetCore.DataProtection.KeyManagement.XmlKeyManager\nEventId: 59\n\nNeither user profile nor HKLM registry available. Using an ephemeral key repository. Protected data will be unavailable when application exits.","organization":"wayne","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDWEB01.prdnvi.wayneint.com","event_data":{"param1":"Category: Microsoft.AspNetCore.DataProtection.KeyManagement.XmlKeyManager\nEventId: 59\n\nNeither user profile nor HKLM registry available. Using an ephemeral key repository. Protected data will be unavailable when application exits."},"event_id":"1000","keywords":["Classic"],"opcode":"Info","provider_name":".NET Runtime","record_id":1477809,"task":"None"}}
|
{
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-30T14:34:30.375Z\",\"agent\":{\"ephemeral_id\":\"a668c636-ec70-4103-9c98-53517f0df854\",\"id\":\"040c78f0-1741-4108-a30c-aaf00e9af961\",\"name\":\"NVIPROCPRDWEB01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"1000\",\"created\":\"2024-07-30T14:34:31.269Z\",\"kind\":\"event\",\"provider\":\".NET Runtime\"},\"host\":{\"name\":\"NVIPROCPRDWEB01.prdnvi.wayneint.com\"},\"log\":{\"level\":\"warning\"},\"message\":\"Category: Microsoft.AspNetCore.DataProtection.KeyManagement.XmlKeyManager\\nEventId: 59\\n\\nNeither user profile nor HKLM registry available. Using an ephemeral key repository. Protected data will be unavailable when application exits.\",\"organization\":\"wayne\",\"senderHost\":\"10.160.18.44\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"NVIPROCPRDWEB01.prdnvi.wayneint.com\",\"event_data\":{\"param1\":\"Category: Microsoft.AspNetCore.DataProtection.KeyManagement.XmlKeyManager\\nEventId: 59\\n\\nNeither user profile nor HKLM registry available. Using an ephemeral key repository. Protected data will be unavailable when application exits.\"},\"event_id\":\"1000\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_name\":\".NET Runtime\",\"record_id\":1477809,\"task\":\"None\"}}",
"messageType": "1000",
"senderHost": "10.160.18.44",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": ".net runtime",
"tags": [
"v8",
"eventId:1000",
".net runtime",
"1000"
],
"vendorCode": "1477809"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:30.375Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1000","created":"2024-07-30T14:34:31.269Z","kind":"event","provider":".NET Runtime"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.wayneint.com"},"log":{"level":"warning"},"message":"Category: Microsoft.AspNetCore.DataProtection.KeyManagement.XmlKeyManager\nEventId: 59\n\nNeither user profile nor HKLM registry available. Using an ephemeral key repository. Protected data will be unavailable when application exits.","organization":"wayne","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDWEB01.prdnvi.wayneint.com","event_data":{"param1":"Category: Microsoft.AspNetCore.DataProtection.KeyManagement.XmlKeyManager\nEventId: 59\n\nNeither user profile nor HKLM registry available. Using an ephemeral key repository. Protected data will be unavailable when application exits."},"event_id":"1000","keywords":["Classic"],"opcode":"Info","provider_name":".NET Runtime","record_id":1477809,"task":"None"}}
|
Product: .net runtime
Vendor: .net runtime
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:30.375Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1000","created":"2024-07-30T14:34:31.269Z","kind":"event","provider":".NET Runtime"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.wayneint.com"},"log":{"level":"warning"},"message":"Category: Microsoft.AspNetCore.DataProtection.KeyManagement.XmlKeyManager\nEventId: 59\n\nNeither user profile nor HKLM registry available. Using an ephemeral key repository. Protected data will be unavailable when application exits.","organization":"wayne","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDWEB01.prdnvi.wayneint.com","event_data":{"param1":"Category: Microsoft.AspNetCore.DataProtection.KeyManagement.XmlKeyManager\nEventId: 59\n\nNeither user profile nor HKLM registry available. Using an ephemeral key repository. Protected data will be unavailable when application exits."},"event_id":"1000","keywords":["Classic"],"opcode":"Info","provider_name":".NET Runtime","record_id":1477809,"task":"None"}}
|
This is a syslog message from a product called .net runtime by .net runtime. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 1000
senderHost: 10.160.18.44
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: .net runtime
tags: ['v8', 'eventId:1000', '.net runtime', '1000']
vendorCode: 1477809
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:29.697Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Process Creation","code":"4688","created":"2024-07-30T14:34:31.319Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com"},"log":{"level":"information"},"message":"A new process has been created.\n\nCreator Subject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNVIPROCPRDWEB01$\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x3E7\n\nTarget Subject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0xC57119\n\nProcess Information:\n\tNew Process ID:\t\t0x1670\n\tNew Process Name:\tC:\\Windows\\System32\\inetsrv\\w3wp.exe\n\tToken Elevation Type:\t%%1936\n\tMandatory Label:\t\tS-1-16-12288\n\tCreator Process ID:\t0xb08\n\tCreator Process Name:\tC:\\Windows\\System32\\svchost.exe\n\tProcess Command Line:\t\n\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\n\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\n\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\n\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.","organization":"umbrella","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com","event_data":{"MandatoryLabel":"S-1-16-12288","NewProcessId":"0x1670","NewProcessName":"C:\\Windows\\System32\\inetsrv\\w3wp.exe","ParentProcessName":"C:\\Windows\\System32\\svchost.exe","ProcessId":"0xb08","SubjectDomainName":"prdnvi","SubjectLogonId":"0x3e7","SubjectUserName":"NVIPROCPRDWEB01$","SubjectUserSid":"S-1-5-18","TargetDomainName":"prdnvi","TargetLogonId":"0xc57119","TargetUserName":"procprd-appuser","TargetUserSid":"S-1-0-0","TokenElevationType":"%%1936"},"event_id":"4688","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":1604}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6494590,"task":"Process Creation","version":2}}
|
{
"fieldExtractorName": "symantec_dlp",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-30T14:34:29.697Z\",\"agent\":{\"ephemeral_id\":\"a668c636-ec70-4103-9c98-53517f0df854\",\"id\":\"040c78f0-1741-4108-a30c-aaf00e9af961\",\"name\":\"NVIPROCPRDWEB01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Process Creation\",\"code\":\"4688\",\"created\":\"2024-07-30T14:34:31.319Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NVIPROCPRDWEB01.prdnvi.umbrellaint.com\"},\"log\":{\"level\":\"information\"},\"message\":\"A new process has been created.\\n\\nCreator Subject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNVIPROCPRDWEB01$\\n\\tAccount Domain:\\t\\tprdnvi\\n\\tLogon ID:\\t\\t0x3E7\\n\\nTarget Subject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tprocprd-appuser\\n\\tAccount Domain:\\t\\tprdnvi\\n\\tLogon ID:\\t\\t0xC57119\\n\\nProcess Information:\\n\\tNew Process ID:\\t\\t0x1670\\n\\tNew Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\w3wp.exe\\n\\tToken Elevation Type:\\t%%1936\\n\\tMandatory Label:\\t\\tS-1-16-12288\\n\\tCreator Process ID:\\t0xb08\\n\\tCreator Process Name:\\tC:\\\\Windows\\\\System32\\\\svchost.exe\\n\\tProcess Command Line:\\t\\n\\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\\n\\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\\n\\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\\n\\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.\",\"organization\":\"umbrella\",\"senderHost\":\"10.160.18.44\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NVIPROCPRDWEB01.prdnvi.umbrellaint.com\",\"event_data\":{\"MandatoryLabel\":\"S-1-16-12288\",\"NewProcessId\":\"0x1670\",\"NewProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\w3wp.exe\",\"ParentProcessName\":\"C:\\\\Windows\\\\System32\\\\svchost.exe\",\"ProcessId\":\"0xb08\",\"SubjectDomainName\":\"prdnvi\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NVIPROCPRDWEB01$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"prdnvi\",\"TargetLogonId\":\"0xc57119\",\"TargetUserName\":\"procprd-appuser\",\"TargetUserSid\":\"S-1-0-0\",\"TokenElevationType\":\"%%1936\"},\"event_id\":\"4688\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":1604}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6494590,\"task\":\"Process Creation\",\"version\":2}}",
"messageType": "data_loss",
"productIds": [
44
],
"senderHost": "10.160.18.44",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "symantec_dlp",
"tags": [
"symantec_dlp",
"data_loss"
]
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:29.697Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Process Creation","code":"4688","created":"2024-07-30T14:34:31.319Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com"},"log":{"level":"information"},"message":"A new process has been created.\n\nCreator Subject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNVIPROCPRDWEB01$\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x3E7\n\nTarget Subject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0xC57119\n\nProcess Information:\n\tNew Process ID:\t\t0x1670\n\tNew Process Name:\tC:\\Windows\\System32\\inetsrv\\w3wp.exe\n\tToken Elevation Type:\t%%1936\n\tMandatory Label:\t\tS-1-16-12288\n\tCreator Process ID:\t0xb08\n\tCreator Process Name:\tC:\\Windows\\System32\\svchost.exe\n\tProcess Command Line:\t\n\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\n\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\n\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\n\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.","organization":"umbrella","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com","event_data":{"MandatoryLabel":"S-1-16-12288","NewProcessId":"0x1670","NewProcessName":"C:\\Windows\\System32\\inetsrv\\w3wp.exe","ParentProcessName":"C:\\Windows\\System32\\svchost.exe","ProcessId":"0xb08","SubjectDomainName":"prdnvi","SubjectLogonId":"0x3e7","SubjectUserName":"NVIPROCPRDWEB01$","SubjectUserSid":"S-1-5-18","TargetDomainName":"prdnvi","TargetLogonId":"0xc57119","TargetUserName":"procprd-appuser","TargetUserSid":"S-1-0-0","TokenElevationType":"%%1936"},"event_id":"4688","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":1604}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6494590,"task":"Process Creation","version":2}}
|
Product: Symantec Data Loss Prevention
Vendor: Symantec
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:29.697Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Process Creation","code":"4688","created":"2024-07-30T14:34:31.319Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com"},"log":{"level":"information"},"message":"A new process has been created.\n\nCreator Subject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNVIPROCPRDWEB01$\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0x3E7\n\nTarget Subject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tprocprd-appuser\n\tAccount Domain:\t\tprdnvi\n\tLogon ID:\t\t0xC57119\n\nProcess Information:\n\tNew Process ID:\t\t0x1670\n\tNew Process Name:\tC:\\Windows\\System32\\inetsrv\\w3wp.exe\n\tToken Elevation Type:\t%%1936\n\tMandatory Label:\t\tS-1-16-12288\n\tCreator Process ID:\t0xb08\n\tCreator Process Name:\tC:\\Windows\\System32\\svchost.exe\n\tProcess Command Line:\t\n\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\n\nType 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\n\nType 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\n\nType 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.","organization":"umbrella","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NVIPROCPRDWEB01.prdnvi.umbrellaint.com","event_data":{"MandatoryLabel":"S-1-16-12288","NewProcessId":"0x1670","NewProcessName":"C:\\Windows\\System32\\inetsrv\\w3wp.exe","ParentProcessName":"C:\\Windows\\System32\\svchost.exe","ProcessId":"0xb08","SubjectDomainName":"prdnvi","SubjectLogonId":"0x3e7","SubjectUserName":"NVIPROCPRDWEB01$","SubjectUserSid":"S-1-5-18","TargetDomainName":"prdnvi","TargetLogonId":"0xc57119","TargetUserName":"procprd-appuser","TargetUserSid":"S-1-0-0","TokenElevationType":"%%1936"},"event_id":"4688","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":1604}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6494590,"task":"Process Creation","version":2}}
|
This is a syslog message from a product called Symantec Data Loss Prevention by Symantec. The following fields were extracted from the message:
fieldExtractorName: symantec_dlp
messageType: data_loss
productIds: [44]
senderHost: 10.160.18.44
sensitivity: normal
sourceInfo: unknown
streamName: symantec_dlp
tags: ['symantec_dlp', 'data_loss']
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:30.388Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1000","created":"2024-07-30T14:34:31.269Z","kind":"event","provider":".NET Runtime"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.wayneint.com"},"log":{"level":"warning"},"message":"Category: Microsoft.AspNetCore.DataProtection.KeyManagement.XmlKeyManager\nEventId: 35\n\nNo XML encryptor configured. Key {e6846f2b-ca0d-4a36-ba66-4da0df26a920} may be persisted to storage in unencrypted form.","organization":"wayne","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDWEB01.prdnvi.wayneint.com","event_data":{"param1":"Category: Microsoft.AspNetCore.DataProtection.KeyManagement.XmlKeyManager\nEventId: 35\n\nNo XML encryptor configured. Key {e6846f2b-ca0d-4a36-ba66-4da0df26a920} may be persisted to storage in unencrypted form."},"event_id":"1000","keywords":["Classic"],"opcode":"Info","provider_name":".NET Runtime","record_id":1477810,"task":"None"}}
|
{
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-30T14:34:30.388Z\",\"agent\":{\"ephemeral_id\":\"a668c636-ec70-4103-9c98-53517f0df854\",\"id\":\"040c78f0-1741-4108-a30c-aaf00e9af961\",\"name\":\"NVIPROCPRDWEB01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"1000\",\"created\":\"2024-07-30T14:34:31.269Z\",\"kind\":\"event\",\"provider\":\".NET Runtime\"},\"host\":{\"name\":\"NVIPROCPRDWEB01.prdnvi.wayneint.com\"},\"log\":{\"level\":\"warning\"},\"message\":\"Category: Microsoft.AspNetCore.DataProtection.KeyManagement.XmlKeyManager\\nEventId: 35\\n\\nNo XML encryptor configured. Key {e6846f2b-ca0d-4a36-ba66-4da0df26a920} may be persisted to storage in unencrypted form.\",\"organization\":\"wayne\",\"senderHost\":\"10.160.18.44\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"NVIPROCPRDWEB01.prdnvi.wayneint.com\",\"event_data\":{\"param1\":\"Category: Microsoft.AspNetCore.DataProtection.KeyManagement.XmlKeyManager\\nEventId: 35\\n\\nNo XML encryptor configured. Key {e6846f2b-ca0d-4a36-ba66-4da0df26a920} may be persisted to storage in unencrypted form.\"},\"event_id\":\"1000\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_name\":\".NET Runtime\",\"record_id\":1477810,\"task\":\"None\"}}",
"messageType": "1000",
"senderHost": "10.160.18.44",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": ".net runtime",
"tags": [
"v8",
"eventId:1000",
".net runtime",
"1000"
],
"vendorCode": "1477810"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:30.388Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1000","created":"2024-07-30T14:34:31.269Z","kind":"event","provider":".NET Runtime"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.wayneint.com"},"log":{"level":"warning"},"message":"Category: Microsoft.AspNetCore.DataProtection.KeyManagement.XmlKeyManager\nEventId: 35\n\nNo XML encryptor configured. Key {e6846f2b-ca0d-4a36-ba66-4da0df26a920} may be persisted to storage in unencrypted form.","organization":"wayne","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDWEB01.prdnvi.wayneint.com","event_data":{"param1":"Category: Microsoft.AspNetCore.DataProtection.KeyManagement.XmlKeyManager\nEventId: 35\n\nNo XML encryptor configured. Key {e6846f2b-ca0d-4a36-ba66-4da0df26a920} may be persisted to storage in unencrypted form."},"event_id":"1000","keywords":["Classic"],"opcode":"Info","provider_name":".NET Runtime","record_id":1477810,"task":"None"}}
|
Product: .net runtime
Vendor: .net runtime
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T14:34:30.388Z","agent":{"ephemeral_id":"a668c636-ec70-4103-9c98-53517f0df854","id":"040c78f0-1741-4108-a30c-aaf00e9af961","name":"NVIPROCPRDWEB01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1000","created":"2024-07-30T14:34:31.269Z","kind":"event","provider":".NET Runtime"},"host":{"name":"NVIPROCPRDWEB01.prdnvi.wayneint.com"},"log":{"level":"warning"},"message":"Category: Microsoft.AspNetCore.DataProtection.KeyManagement.XmlKeyManager\nEventId: 35\n\nNo XML encryptor configured. Key {e6846f2b-ca0d-4a36-ba66-4da0df26a920} may be persisted to storage in unencrypted form.","organization":"wayne","senderHost":"10.160.18.44","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDWEB01.prdnvi.wayneint.com","event_data":{"param1":"Category: Microsoft.AspNetCore.DataProtection.KeyManagement.XmlKeyManager\nEventId: 35\n\nNo XML encryptor configured. Key {e6846f2b-ca0d-4a36-ba66-4da0df26a920} may be persisted to storage in unencrypted form."},"event_id":"1000","keywords":["Classic"],"opcode":"Info","provider_name":".NET Runtime","record_id":1477810,"task":"None"}}
|
This is a syslog message from a product called .net runtime by .net runtime. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 1000
senderHost: 10.160.18.44
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: .net runtime
tags: ['v8', 'eventId:1000', '.net runtime', '1000']
vendorCode: 1477810
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T19:55:50.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Server","code":"3197","created":"2024-07-26T19:55:53.886Z","kind":"event","provider":"MSSQL$MICROSOFT##WID"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"information"},"message":"I/O is frozen on database model. No user action is required. However, if I/O is not resumed promptly, you could cancel the backup.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.umbrella.com","event_data":{"Binary":"7D0C00000A00000017000000500052004F0054004500550053005C004D004900430052004F0053004F0046005400230023005700490044000000060000006D006F00640065006C000000","param1":"model"},"event_id":"3197","keywords":["Classic"],"provider_name":"MSSQL$MICROSOFT##WID","record_id":1290425,"task":"Server","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-19","name":"LOCAL SERVICE","type":"Well Known Group"}}}
|
{
"action": "Server",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-26T19:55:50.000Z\",\"agent\":{\"ephemeral_id\":\"964d0404-9b18-4f2b-a3fe-7db4be557fbf\",\"id\":\"8809f950-580f-4473-8f56-fd5ca481b748\",\"name\":\"Proteus\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Server\",\"code\":\"3197\",\"created\":\"2024-07-26T19:55:53.886Z\",\"kind\":\"event\",\"provider\":\"MSSQL$MICROSOFT##WID\"},\"host\":{\"name\":\"Proteus.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"I/O is frozen on database model. No user action is required. However, if I/O is not resumed promptly, you could cancel the backup.\",\"organization\":\"umbrella\",\"senderHost\":\"Proteus.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"Proteus.umbrella.com\",\"event_data\":{\"Binary\":\"7D0C00000A00000017000000500052004F0054004500550053005C004D004900430052004F0053004F0046005400230023005700490044000000060000006D006F00640065006C000000\",\"param1\":\"model\"},\"event_id\":\"3197\",\"keywords\":[\"Classic\"],\"provider_name\":\"MSSQL$MICROSOFT##WID\",\"record_id\":1290425,\"task\":\"Server\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-19\",\"name\":\"LOCAL SERVICE\",\"type\":\"Well Known Group\"}}}",
"messageType": "3197",
"senderHost": "Proteus.mingledorffs.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "mssql$microsoft##wid",
"tags": [
"v8",
"eventId:3197",
"mssql$microsoft##wid",
"3197"
],
"vendorCode": "1290425"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T19:55:50.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Server","code":"3197","created":"2024-07-26T19:55:53.886Z","kind":"event","provider":"MSSQL$MICROSOFT##WID"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"information"},"message":"I/O is frozen on database model. No user action is required. However, if I/O is not resumed promptly, you could cancel the backup.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.umbrella.com","event_data":{"Binary":"7D0C00000A00000017000000500052004F0054004500550053005C004D004900430052004F0053004F0046005400230023005700490044000000060000006D006F00640065006C000000","param1":"model"},"event_id":"3197","keywords":["Classic"],"provider_name":"MSSQL$MICROSOFT##WID","record_id":1290425,"task":"Server","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-19","name":"LOCAL SERVICE","type":"Well Known Group"}}}
|
Product: mssql$microsoft##wid
Vendor: mssql$microsoft##wid
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T19:55:50.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Server","code":"3197","created":"2024-07-26T19:55:53.886Z","kind":"event","provider":"MSSQL$MICROSOFT##WID"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"information"},"message":"I/O is frozen on database model. No user action is required. However, if I/O is not resumed promptly, you could cancel the backup.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.umbrella.com","event_data":{"Binary":"7D0C00000A00000017000000500052004F0054004500550053005C004D004900430052004F0053004F0046005400230023005700490044000000060000006D006F00640065006C000000","param1":"model"},"event_id":"3197","keywords":["Classic"],"provider_name":"MSSQL$MICROSOFT##WID","record_id":1290425,"task":"Server","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-19","name":"LOCAL SERVICE","type":"Well Known Group"}}}
|
This is a syslog message from a product called mssql$microsoft##wid by mssql$microsoft##wid. The following fields were extracted from the message:
action: Server
fieldExtractorName: winlogbeat
messageType: 3197
senderHost: Proteus.mingledorffs.com
sensitivity: normal
sourceInfo: unknown
streamName: mssql$microsoft##wid
tags: ['v8', 'eventId:3197', 'mssql$microsoft##wid', '3197']
vendorCode: 1290425
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T19:55:50.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Server","code":"3197","created":"2024-07-26T19:55:53.886Z","kind":"event","provider":"MSSQL$MICROSOFT##WID"},"host":{"name":"Proteus.wayne.com"},"log":{"level":"information"},"message":"I/O is frozen on database master. No user action is required. However, if I/O is not resumed promptly, you could cancel the backup.","organization":"wayne","senderHost":"Proteus.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.wayne.com","event_data":{"Binary":"7D0C00000A00000017000000500052004F0054004500550053005C004D004900430052004F0053004F0046005400230023005700490044000000070000006D00610073007400650072000000","param1":"master"},"event_id":"3197","keywords":["Classic"],"provider_name":"MSSQL$MICROSOFT##WID","record_id":1290427,"task":"Server","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-19","name":"LOCAL SERVICE","type":"Well Known Group"}}}
|
{
"action": "Server",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-26T19:55:50.000Z\",\"agent\":{\"ephemeral_id\":\"964d0404-9b18-4f2b-a3fe-7db4be557fbf\",\"id\":\"8809f950-580f-4473-8f56-fd5ca481b748\",\"name\":\"Proteus\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Server\",\"code\":\"3197\",\"created\":\"2024-07-26T19:55:53.886Z\",\"kind\":\"event\",\"provider\":\"MSSQL$MICROSOFT##WID\"},\"host\":{\"name\":\"Proteus.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"I/O is frozen on database master. No user action is required. However, if I/O is not resumed promptly, you could cancel the backup.\",\"organization\":\"wayne\",\"senderHost\":\"Proteus.wayne.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"Proteus.wayne.com\",\"event_data\":{\"Binary\":\"7D0C00000A00000017000000500052004F0054004500550053005C004D004900430052004F0053004F0046005400230023005700490044000000070000006D00610073007400650072000000\",\"param1\":\"master\"},\"event_id\":\"3197\",\"keywords\":[\"Classic\"],\"provider_name\":\"MSSQL$MICROSOFT##WID\",\"record_id\":1290427,\"task\":\"Server\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-19\",\"name\":\"LOCAL SERVICE\",\"type\":\"Well Known Group\"}}}",
"messageType": "3197",
"senderHost": "Proteus.mingledorffs.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "mssql$microsoft##wid",
"tags": [
"v8",
"eventId:3197",
"mssql$microsoft##wid",
"3197"
],
"vendorCode": "1290427"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T19:55:50.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Server","code":"3197","created":"2024-07-26T19:55:53.886Z","kind":"event","provider":"MSSQL$MICROSOFT##WID"},"host":{"name":"Proteus.wayne.com"},"log":{"level":"information"},"message":"I/O is frozen on database master. No user action is required. However, if I/O is not resumed promptly, you could cancel the backup.","organization":"wayne","senderHost":"Proteus.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.wayne.com","event_data":{"Binary":"7D0C00000A00000017000000500052004F0054004500550053005C004D004900430052004F0053004F0046005400230023005700490044000000070000006D00610073007400650072000000","param1":"master"},"event_id":"3197","keywords":["Classic"],"provider_name":"MSSQL$MICROSOFT##WID","record_id":1290427,"task":"Server","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-19","name":"LOCAL SERVICE","type":"Well Known Group"}}}
|
Product: mssql$microsoft##wid
Vendor: mssql$microsoft##wid
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T19:55:50.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Server","code":"3197","created":"2024-07-26T19:55:53.886Z","kind":"event","provider":"MSSQL$MICROSOFT##WID"},"host":{"name":"Proteus.wayne.com"},"log":{"level":"information"},"message":"I/O is frozen on database master. No user action is required. However, if I/O is not resumed promptly, you could cancel the backup.","organization":"wayne","senderHost":"Proteus.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.wayne.com","event_data":{"Binary":"7D0C00000A00000017000000500052004F0054004500550053005C004D004900430052004F0053004F0046005400230023005700490044000000070000006D00610073007400650072000000","param1":"master"},"event_id":"3197","keywords":["Classic"],"provider_name":"MSSQL$MICROSOFT##WID","record_id":1290427,"task":"Server","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-19","name":"LOCAL SERVICE","type":"Well Known Group"}}}
|
This is a syslog message from a product called mssql$microsoft##wid by mssql$microsoft##wid. The following fields were extracted from the message:
action: Server
fieldExtractorName: winlogbeat
messageType: 3197
senderHost: Proteus.mingledorffs.com
sensitivity: normal
sourceInfo: unknown
streamName: mssql$microsoft##wid
tags: ['v8', 'eventId:3197', 'mssql$microsoft##wid', '3197']
vendorCode: 1290427
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T19:55:50.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Server","code":"3197","created":"2024-07-26T19:55:53.886Z","kind":"event","provider":"MSSQL$MICROSOFT##WID"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"information"},"message":"I/O is frozen on database msdb. No user action is required. However, if I/O is not resumed promptly, you could cancel the backup.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.umbrella.com","event_data":{"Binary":"7D0C00000A00000017000000500052004F0054004500550053005C004D004900430052004F0053004F0046005400230023005700490044000000050000006D007300640062000000","param1":"msdb"},"event_id":"3197","keywords":["Classic"],"provider_name":"MSSQL$MICROSOFT##WID","record_id":1290426,"task":"Server","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-19","name":"LOCAL SERVICE","type":"Well Known Group"}}}
|
{
"action": "Server",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-26T19:55:50.000Z\",\"agent\":{\"ephemeral_id\":\"964d0404-9b18-4f2b-a3fe-7db4be557fbf\",\"id\":\"8809f950-580f-4473-8f56-fd5ca481b748\",\"name\":\"Proteus\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Server\",\"code\":\"3197\",\"created\":\"2024-07-26T19:55:53.886Z\",\"kind\":\"event\",\"provider\":\"MSSQL$MICROSOFT##WID\"},\"host\":{\"name\":\"Proteus.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"I/O is frozen on database msdb. No user action is required. However, if I/O is not resumed promptly, you could cancel the backup.\",\"organization\":\"umbrella\",\"senderHost\":\"Proteus.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"Proteus.umbrella.com\",\"event_data\":{\"Binary\":\"7D0C00000A00000017000000500052004F0054004500550053005C004D004900430052004F0053004F0046005400230023005700490044000000050000006D007300640062000000\",\"param1\":\"msdb\"},\"event_id\":\"3197\",\"keywords\":[\"Classic\"],\"provider_name\":\"MSSQL$MICROSOFT##WID\",\"record_id\":1290426,\"task\":\"Server\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-19\",\"name\":\"LOCAL SERVICE\",\"type\":\"Well Known Group\"}}}",
"messageType": "3197",
"senderHost": "Proteus.mingledorffs.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "mssql$microsoft##wid",
"tags": [
"v8",
"eventId:3197",
"mssql$microsoft##wid",
"3197"
],
"vendorCode": "1290426"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T19:55:50.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Server","code":"3197","created":"2024-07-26T19:55:53.886Z","kind":"event","provider":"MSSQL$MICROSOFT##WID"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"information"},"message":"I/O is frozen on database msdb. No user action is required. However, if I/O is not resumed promptly, you could cancel the backup.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.umbrella.com","event_data":{"Binary":"7D0C00000A00000017000000500052004F0054004500550053005C004D004900430052004F0053004F0046005400230023005700490044000000050000006D007300640062000000","param1":"msdb"},"event_id":"3197","keywords":["Classic"],"provider_name":"MSSQL$MICROSOFT##WID","record_id":1290426,"task":"Server","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-19","name":"LOCAL SERVICE","type":"Well Known Group"}}}
|
Product: mssql$microsoft##wid
Vendor: mssql$microsoft##wid
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T19:55:50.000Z","agent":{"ephemeral_id":"964d0404-9b18-4f2b-a3fe-7db4be557fbf","id":"8809f950-580f-4473-8f56-fd5ca481b748","name":"Proteus","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Server","code":"3197","created":"2024-07-26T19:55:53.886Z","kind":"event","provider":"MSSQL$MICROSOFT##WID"},"host":{"name":"Proteus.umbrella.com"},"log":{"level":"information"},"message":"I/O is frozen on database msdb. No user action is required. However, if I/O is not resumed promptly, you could cancel the backup.","organization":"umbrella","senderHost":"Proteus.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Proteus.umbrella.com","event_data":{"Binary":"7D0C00000A00000017000000500052004F0054004500550053005C004D004900430052004F0053004F0046005400230023005700490044000000050000006D007300640062000000","param1":"msdb"},"event_id":"3197","keywords":["Classic"],"provider_name":"MSSQL$MICROSOFT##WID","record_id":1290426,"task":"Server","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-19","name":"LOCAL SERVICE","type":"Well Known Group"}}}
|
This is a syslog message from a product called mssql$microsoft##wid by mssql$microsoft##wid. The following fields were extracted from the message:
action: Server
fieldExtractorName: winlogbeat
messageType: 3197
senderHost: Proteus.mingledorffs.com
sensitivity: normal
sourceInfo: unknown
streamName: mssql$microsoft##wid
tags: ['v8', 'eventId:3197', 'mssql$microsoft##wid', '3197']
vendorCode: 1290426
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T09:19:06.387Z","agent":{"ephemeral_id":"03f0e780-e6f7-4f57-aba3-136d3309d30a","id":"dfc891f4-6232-4a7c-9ace-b1c918d618e9","name":"NVIPROCPRDSQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Job Engine","code":"208","created":"2024-07-27T09:19:06.782Z","kind":"event","provider":"SQLAgent$PAYGSQL01"},"host":{"name":"NVIPROCPRDSQL01.prdnvi.oscorpint.com"},"log":{"level":"warning"},"message":"SQL Server Scheduled Job 'DatabaseBackup - USER_DATABASES - LOG' (0xFBDA6B5F0671F1439F1FEF8B70AC2784) - Status: Failed - Invoked on: 2024-07-27 05:17:00 - Message: The job failed. The Job was invoked by Schedule 29 (Every15Min). The last step to run was step 3 (Delete old files).","organization":"oscorp","senderHost":"10.160.22.36","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDSQL01.prdnvi.oscorpint.com","event_data":{"param1":"DatabaseBackup - USER_DATABASES - LOG","param2":"0xFBDA6B5F0671F1439F1FEF8B70AC2784","param3":"Failed","param4":"2024-07-27 05:17:00","param5":"The job failed. The Job was invoked by Schedule 29 (Every15Min). The last step to run was step 3 (Delete old files)."},"event_id":"208","keywords":["Classic"],"provider_name":"SQLAgent$PAYGSQL01","record_id":85149947,"task":"Job Engine"}}
|
{
"action": "Job Engine",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T09:19:06.387Z\",\"agent\":{\"ephemeral_id\":\"03f0e780-e6f7-4f57-aba3-136d3309d30a\",\"id\":\"dfc891f4-6232-4a7c-9ace-b1c918d618e9\",\"name\":\"NVIPROCPRDSQL01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Job Engine\",\"code\":\"208\",\"created\":\"2024-07-27T09:19:06.782Z\",\"kind\":\"event\",\"provider\":\"SQLAgent$PAYGSQL01\"},\"host\":{\"name\":\"NVIPROCPRDSQL01.prdnvi.oscorpint.com\"},\"log\":{\"level\":\"warning\"},\"message\":\"SQL Server Scheduled Job 'DatabaseBackup - USER_DATABASES - LOG' (0xFBDA6B5F0671F1439F1FEF8B70AC2784) - Status: Failed - Invoked on: 2024-07-27 05:17:00 - Message: The job failed. The Job was invoked by Schedule 29 (Every15Min). The last step to run was step 3 (Delete old files).\",\"organization\":\"oscorp\",\"senderHost\":\"10.160.22.36\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"NVIPROCPRDSQL01.prdnvi.oscorpint.com\",\"event_data\":{\"param1\":\"DatabaseBackup - USER_DATABASES - LOG\",\"param2\":\"0xFBDA6B5F0671F1439F1FEF8B70AC2784\",\"param3\":\"Failed\",\"param4\":\"2024-07-27 05:17:00\",\"param5\":\"The job failed. The Job was invoked by Schedule 29 (Every15Min). The last step to run was step 3 (Delete old files).\"},\"event_id\":\"208\",\"keywords\":[\"Classic\"],\"provider_name\":\"SQLAgent$PAYGSQL01\",\"record_id\":85149947,\"task\":\"Job Engine\"}}",
"messageType": "208",
"senderHost": "10.160.22.36",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "sqlagent$paygsql01",
"tags": [
"v8",
"eventId:208",
"sqlagent$paygsql01",
"208"
],
"vendorCode": "85149947"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T09:19:06.387Z","agent":{"ephemeral_id":"03f0e780-e6f7-4f57-aba3-136d3309d30a","id":"dfc891f4-6232-4a7c-9ace-b1c918d618e9","name":"NVIPROCPRDSQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Job Engine","code":"208","created":"2024-07-27T09:19:06.782Z","kind":"event","provider":"SQLAgent$PAYGSQL01"},"host":{"name":"NVIPROCPRDSQL01.prdnvi.oscorpint.com"},"log":{"level":"warning"},"message":"SQL Server Scheduled Job 'DatabaseBackup - USER_DATABASES - LOG' (0xFBDA6B5F0671F1439F1FEF8B70AC2784) - Status: Failed - Invoked on: 2024-07-27 05:17:00 - Message: The job failed. The Job was invoked by Schedule 29 (Every15Min). The last step to run was step 3 (Delete old files).","organization":"oscorp","senderHost":"10.160.22.36","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDSQL01.prdnvi.oscorpint.com","event_data":{"param1":"DatabaseBackup - USER_DATABASES - LOG","param2":"0xFBDA6B5F0671F1439F1FEF8B70AC2784","param3":"Failed","param4":"2024-07-27 05:17:00","param5":"The job failed. The Job was invoked by Schedule 29 (Every15Min). The last step to run was step 3 (Delete old files)."},"event_id":"208","keywords":["Classic"],"provider_name":"SQLAgent$PAYGSQL01","record_id":85149947,"task":"Job Engine"}}
|
Product: sqlagent$paygsql01
Vendor: sqlagent$paygsql01
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T09:19:06.387Z","agent":{"ephemeral_id":"03f0e780-e6f7-4f57-aba3-136d3309d30a","id":"dfc891f4-6232-4a7c-9ace-b1c918d618e9","name":"NVIPROCPRDSQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Job Engine","code":"208","created":"2024-07-27T09:19:06.782Z","kind":"event","provider":"SQLAgent$PAYGSQL01"},"host":{"name":"NVIPROCPRDSQL01.prdnvi.oscorpint.com"},"log":{"level":"warning"},"message":"SQL Server Scheduled Job 'DatabaseBackup - USER_DATABASES - LOG' (0xFBDA6B5F0671F1439F1FEF8B70AC2784) - Status: Failed - Invoked on: 2024-07-27 05:17:00 - Message: The job failed. The Job was invoked by Schedule 29 (Every15Min). The last step to run was step 3 (Delete old files).","organization":"oscorp","senderHost":"10.160.22.36","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDSQL01.prdnvi.oscorpint.com","event_data":{"param1":"DatabaseBackup - USER_DATABASES - LOG","param2":"0xFBDA6B5F0671F1439F1FEF8B70AC2784","param3":"Failed","param4":"2024-07-27 05:17:00","param5":"The job failed. The Job was invoked by Schedule 29 (Every15Min). The last step to run was step 3 (Delete old files)."},"event_id":"208","keywords":["Classic"],"provider_name":"SQLAgent$PAYGSQL01","record_id":85149947,"task":"Job Engine"}}
|
This is a syslog message from a product called sqlagent$paygsql01 by sqlagent$paygsql01. The following fields were extracted from the message:
action: Job Engine
fieldExtractorName: winlogbeat
messageType: 208
senderHost: 10.160.22.36
sensitivity: normal
sourceInfo: unknown
streamName: sqlagent$paygsql01
tags: ['v8', 'eventId:208', 'sqlagent$paygsql01', '208']
vendorCode: 85149947
|
Explain this syslog message
|
<134>Aug 1 05:44:33 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3021|1909|AWS Account Synchronization Finished|3|src=167.133.187.241 suser=fish target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
{
"clientIP": "167.133.187.241",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "cef",
"localHostname": "deepsecurity",
"localStartTime": "Aug 1 05:44:33",
"message": "<134>Aug 1 05:44:33 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3021|1909|AWS Account Synchronization Finished|3|src=167.133.187.241 suser=fish target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 ",
"messageType": "AWS Account Synchronization Finished",
"priority": 134,
"senderHost": "34.205.5.2",
"sensitivity": "normal",
"severityCode": 7,
"severityLabel": "debug",
"sourceInfo": "unknown",
"streamName": "trend micro_deep security manager",
"tags": [
"AWS Account Synchronization Finished",
"trend micro_deep security manager",
"rfc3164",
"cef",
"trend micro_deep security manager_AWS Account Synchronization Finished"
],
"userName": "fish",
"vendorCode": "1909"
}
|
Create a JSON artifact from the message
|
<134>Aug 1 05:44:33 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3021|1909|AWS Account Synchronization Finished|3|src=167.133.187.241 suser=fish target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
Product: trend micro_deep security manager
Vendor: trend micro_deep security manager
|
Identify this syslog message
|
<134>Aug 1 05:44:33 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3021|1909|AWS Account Synchronization Finished|3|src=167.133.187.241 suser=fish target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
This is a syslog message from a product called trend micro_deep security manager by trend micro_deep security manager. The following fields were extracted from the message:
clientIP: 167.133.187.241
facilityCode: 16
facilityLabel: local0
fieldExtractorName: cef
localHostname: deepsecurity
localStartTime: Aug 1 05:44:33
messageType: AWS Account Synchronization Finished
priority: 134
senderHost: 34.205.5.2
sensitivity: normal
severityCode: 7
severityLabel: debug
sourceInfo: unknown
streamName: trend micro_deep security manager
tags: ['AWS Account Synchronization Finished', 'trend micro_deep security manager', 'rfc3164', 'cef', 'trend micro_deep security manager_AWS Account Synchronization Finished']
userName: fish
vendorCode: 1909
|
Explain this syslog message
|
<134>1 2024-07-26T07:19:57.256658-05:00 vcenter vapi-endpoint-access - - - 2024-07-26T07:19:57.256-05:00 | vAPI-I/O dispatcher-0 | 82.203.139.150 - - [26/Jul/2024:12:19:57 +0000] "POST /rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges HTTP/1.1" 200 16 "-" "Go-http-client/1.1" 7
|
{
"clientIP": "82.203.139.150",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "apache",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T07:19:57.256658-05:00",
"message": "<134>1 2024-07-26T07:19:57.256658-05:00 vcenter vapi-endpoint-access - - - 2024-07-26T07:19:57.256-05:00 | vAPI-I/O dispatcher-0 | 82.203.139.150 - - [26/Jul/2024:12:19:57 +0000] \"POST /rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges HTTP/1.1\" 200 16 \"-\" \"Go-http-client/1.1\" 7\n",
"messageType": "access_log",
"priority": 134,
"program": "vapi-endpoint-access",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"serverBytes": 16,
"severityCode": 6,
"severityLabel": "informational",
"sourceInfo": "unknown",
"streamName": "apache_access_log",
"tags": [
"access_log",
"HTTP:POST",
"rfc5424",
"apache_access_log",
"HTTP_RESPONSE_CODE:200",
"apache"
],
"uri": "/rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges"
}
|
Create a JSON artifact from the message
|
<134>1 2024-07-26T07:19:57.256658-05:00 vcenter vapi-endpoint-access - - - 2024-07-26T07:19:57.256-05:00 | vAPI-I/O dispatcher-0 | 82.203.139.150 - - [26/Jul/2024:12:19:57 +0000] "POST /rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges HTTP/1.1" 200 16 "-" "Go-http-client/1.1" 7
|
Product: Apache Web Server
Vendor: Apache
|
Identify this syslog message
|
<134>1 2024-07-26T07:19:57.256658-05:00 vcenter vapi-endpoint-access - - - 2024-07-26T07:19:57.256-05:00 | vAPI-I/O dispatcher-0 | 82.203.139.150 - - [26/Jul/2024:12:19:57 +0000] "POST /rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges HTTP/1.1" 200 16 "-" "Go-http-client/1.1" 7
|
This is a syslog message from a product called Apache Web Server by Apache. The following fields were extracted from the message:
clientIP: 82.203.139.150
facilityCode: 16
facilityLabel: local0
fieldExtractorName: apache
localHostname: vcenter
localStartTime: 2024-07-26T07:19:57.256658-05:00
messageType: access_log
priority: 134
program: vapi-endpoint-access
senderHost: 10.0.0.20
sensitivity: normal
serverBytes: 16
severityCode: 6
severityLabel: informational
sourceInfo: unknown
streamName: apache_access_log
tags: ['access_log', 'HTTP:POST', 'rfc5424', 'apache_access_log', 'HTTP_RESPONSE_CODE:200', 'apache']
uri: /rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges
|
Explain this syslog message
|
<134>Jul 30 01:42:54 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3018|1909|AWS Account Synchronization Finished|3|src=190.217.6.158 suser=bob target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
{
"clientIP": "190.217.6.158",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "cef",
"localHostname": "deepsecurity",
"localStartTime": "Jul 30 01:42:54",
"message": "<134>Jul 30 01:42:54 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3018|1909|AWS Account Synchronization Finished|3|src=190.217.6.158 suser=bob target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 ",
"messageType": "AWS Account Synchronization Finished",
"priority": 134,
"senderHost": "34.205.5.4",
"sensitivity": "normal",
"severityCode": 7,
"severityLabel": "debug",
"sourceInfo": "unknown",
"streamName": "trend micro_deep security manager",
"tags": [
"AWS Account Synchronization Finished",
"trend micro_deep security manager",
"rfc3164",
"cef",
"trend micro_deep security manager_AWS Account Synchronization Finished"
],
"userName": "bob",
"vendorCode": "1909"
}
|
Create a JSON artifact from the message
|
<134>Jul 30 01:42:54 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3018|1909|AWS Account Synchronization Finished|3|src=190.217.6.158 suser=bob target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
Product: trend micro_deep security manager
Vendor: trend micro_deep security manager
|
Identify this syslog message
|
<134>Jul 30 01:42:54 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3018|1909|AWS Account Synchronization Finished|3|src=190.217.6.158 suser=bob target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
This is a syslog message from a product called trend micro_deep security manager by trend micro_deep security manager. The following fields were extracted from the message:
clientIP: 190.217.6.158
facilityCode: 16
facilityLabel: local0
fieldExtractorName: cef
localHostname: deepsecurity
localStartTime: Jul 30 01:42:54
messageType: AWS Account Synchronization Finished
priority: 134
senderHost: 34.205.5.4
sensitivity: normal
severityCode: 7
severityLabel: debug
sourceInfo: unknown
streamName: trend micro_deep security manager
tags: ['AWS Account Synchronization Finished', 'trend micro_deep security manager', 'rfc3164', 'cef', 'trend micro_deep security manager_AWS Account Synchronization Finished']
userName: bob
vendorCode: 1909
|
Explain this syslog message
|
<134>Jul 27 05:05:35 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1909|AWS Account Synchronization Finished|3|src=77.197.182.254 suser=janedoe target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
{
"clientIP": "77.197.182.254",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "cef",
"localHostname": "deepsecurity",
"localStartTime": "Jul 27 05:05:35",
"message": "<134>Jul 27 05:05:35 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1909|AWS Account Synchronization Finished|3|src=77.197.182.254 suser=janedoe target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 ",
"messageType": "AWS Account Synchronization Finished",
"priority": 134,
"senderHost": "34.205.5.2",
"sensitivity": "normal",
"severityCode": 7,
"severityLabel": "debug",
"sourceInfo": "unknown",
"streamName": "trend micro_deep security manager",
"tags": [
"AWS Account Synchronization Finished",
"trend micro_deep security manager",
"rfc3164",
"cef",
"trend micro_deep security manager_AWS Account Synchronization Finished"
],
"userName": "janedoe",
"vendorCode": "1909"
}
|
Create a JSON artifact from the message
|
<134>Jul 27 05:05:35 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1909|AWS Account Synchronization Finished|3|src=77.197.182.254 suser=janedoe target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
Product: trend micro_deep security manager
Vendor: trend micro_deep security manager
|
Identify this syslog message
|
<134>Jul 27 05:05:35 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1909|AWS Account Synchronization Finished|3|src=77.197.182.254 suser=janedoe target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
This is a syslog message from a product called trend micro_deep security manager by trend micro_deep security manager. The following fields were extracted from the message:
clientIP: 77.197.182.254
facilityCode: 16
facilityLabel: local0
fieldExtractorName: cef
localHostname: deepsecurity
localStartTime: Jul 27 05:05:35
messageType: AWS Account Synchronization Finished
priority: 134
senderHost: 34.205.5.2
sensitivity: normal
severityCode: 7
severityLabel: debug
sourceInfo: unknown
streamName: trend micro_deep security manager
tags: ['AWS Account Synchronization Finished', 'trend micro_deep security manager', 'rfc3164', 'cef', 'trend micro_deep security manager_AWS Account Synchronization Finished']
userName: janedoe
vendorCode: 1909
|
Explain this syslog message
|
<134>1 2024-07-26T08:26:43.273986-05:00 vcenter ui-access - - - 127.0.0.1 12.36.13.223 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/data/properties/urn:vmomi:VirtualMwayneine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473?properties=isClusterVM,vmPolicyCompliance,vmPolicyLastStatusUpdateTimestamp HTTP/1.1" 200 172 200044 70001192 http-nio-5090-exec-27 77
|
{
"clientIP": "12.36.13.223",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "apache",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T08:26:43.273986-05:00",
"message": "<134>1 2024-07-26T08:26:43.273986-05:00 vcenter ui-access - - - 127.0.0.1 12.36.13.223 - - [26/Jul/2024:08:26:43 -0500] \"GET /ui/data/properties/urn:vmomi:VirtualMwayneine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473?properties=isClusterVM,vmPolicyCompliance,vmPolicyLastStatusUpdateTimestamp HTTP/1.1\" 200 172 200044 70001192 http-nio-5090-exec-27 77\n",
"messageType": "access_log",
"priority": 134,
"program": "ui-access",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"serverBytes": 172,
"severityCode": 6,
"severityLabel": "informational",
"sourceInfo": "unknown",
"streamName": "apache_access_log",
"tags": [
"access_log",
"rfc5424",
"apache_access_log",
"HTTP_RESPONSE_CODE:200",
"apache",
"HTTP:GET"
],
"uri": "/ui/data/properties/urn:vmomi:VirtualMachine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473?properties=isClusterVM,vmPolicyCompliance,vmPolicyLastStatusUpdateTimestamp"
}
|
Create a JSON artifact from the message
|
<134>1 2024-07-26T08:26:43.273986-05:00 vcenter ui-access - - - 127.0.0.1 12.36.13.223 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/data/properties/urn:vmomi:VirtualMwayneine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473?properties=isClusterVM,vmPolicyCompliance,vmPolicyLastStatusUpdateTimestamp HTTP/1.1" 200 172 200044 70001192 http-nio-5090-exec-27 77
|
Product: Apache Web Server
Vendor: Apache
|
Identify this syslog message
|
<134>1 2024-07-26T08:26:43.273986-05:00 vcenter ui-access - - - 127.0.0.1 12.36.13.223 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/data/properties/urn:vmomi:VirtualMwayneine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473?properties=isClusterVM,vmPolicyCompliance,vmPolicyLastStatusUpdateTimestamp HTTP/1.1" 200 172 200044 70001192 http-nio-5090-exec-27 77
|
This is a syslog message from a product called Apache Web Server by Apache. The following fields were extracted from the message:
clientIP: 12.36.13.223
facilityCode: 16
facilityLabel: local0
fieldExtractorName: apache
localHostname: vcenter
localStartTime: 2024-07-26T08:26:43.273986-05:00
messageType: access_log
priority: 134
program: ui-access
senderHost: 10.0.0.20
sensitivity: normal
serverBytes: 172
severityCode: 6
severityLabel: informational
sourceInfo: unknown
streamName: apache_access_log
tags: ['access_log', 'rfc5424', 'apache_access_log', 'HTTP_RESPONSE_CODE:200', 'apache', 'HTTP:GET']
uri: /ui/data/properties/urn:vmomi:VirtualMachine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473?properties=isClusterVM,vmPolicyCompliance,vmPolicyLastStatusUpdateTimestamp
|
Explain this syslog message
|
<134>1 2024-07-26T08:26:43.273981-05:00 vcenter ui-access - - - 127.0.0.1 31.101.119.225 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/common-module-ui/resources10558761/common-module/views/tags/tagsPortlet.html HTTP/1.1" 200 292 200044 - http-nio-5090-exec-22 2
|
{
"clientIP": "31.101.119.225",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "apache",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T08:26:43.273981-05:00",
"message": "<134>1 2024-07-26T08:26:43.273981-05:00 vcenter ui-access - - - 127.0.0.1 31.101.119.225 - - [26/Jul/2024:08:26:43 -0500] \"GET /ui/common-module-ui/resources10558761/common-module/views/tags/tagsPortlet.html HTTP/1.1\" 200 292 200044 - http-nio-5090-exec-22 2\n",
"messageType": "access_log",
"priority": 134,
"program": "ui-access",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"serverBytes": 292,
"severityCode": 6,
"severityLabel": "informational",
"sourceInfo": "unknown",
"streamName": "apache_access_log",
"tags": [
"access_log",
"rfc5424",
"apache_access_log",
"HTTP_RESPONSE_CODE:200",
"apache",
"HTTP:GET"
],
"uri": "/ui/common-module-ui/resources10558761/common-module/views/tags/tagsPortlet.html"
}
|
Create a JSON artifact from the message
|
<134>1 2024-07-26T08:26:43.273981-05:00 vcenter ui-access - - - 127.0.0.1 31.101.119.225 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/common-module-ui/resources10558761/common-module/views/tags/tagsPortlet.html HTTP/1.1" 200 292 200044 - http-nio-5090-exec-22 2
|
Product: Apache Web Server
Vendor: Apache
|
Identify this syslog message
|
<134>1 2024-07-26T08:26:43.273981-05:00 vcenter ui-access - - - 127.0.0.1 31.101.119.225 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/common-module-ui/resources10558761/common-module/views/tags/tagsPortlet.html HTTP/1.1" 200 292 200044 - http-nio-5090-exec-22 2
|
This is a syslog message from a product called Apache Web Server by Apache. The following fields were extracted from the message:
clientIP: 31.101.119.225
facilityCode: 16
facilityLabel: local0
fieldExtractorName: apache
localHostname: vcenter
localStartTime: 2024-07-26T08:26:43.273981-05:00
messageType: access_log
priority: 134
program: ui-access
senderHost: 10.0.0.20
sensitivity: normal
serverBytes: 292
severityCode: 6
severityLabel: informational
sourceInfo: unknown
streamName: apache_access_log
tags: ['access_log', 'rfc5424', 'apache_access_log', 'HTTP_RESPONSE_CODE:200', 'apache', 'HTTP:GET']
uri: /ui/common-module-ui/resources10558761/common-module/views/tags/tagsPortlet.html
|
Explain this syslog message
|
<134>1 2024-07-26T08:26:43.273978-05:00 vcenter ui-access - - - 127.0.0.1 6.131.69.77 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/tree/children?treeId=vsphere.core.physicalInventorySpec&nodeTypeId=Datacenter&objRef=urn:vmomi:Datacenter:datacenter-3:d1277caf-371e-4f81-bd28-47d2ed482473 HTTP/1.1" 200 340 200044 70001183 http-nio-5090-exec-15 299
|
{
"clientIP": "6.131.69.77",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "apache",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T08:26:43.273978-05:00",
"message": "<134>1 2024-07-26T08:26:43.273978-05:00 vcenter ui-access - - - 127.0.0.1 6.131.69.77 - - [26/Jul/2024:08:26:43 -0500] \"GET /ui/tree/children?treeId=vsphere.core.physicalInventorySpec&nodeTypeId=Datacenter&objRef=urn:vmomi:Datacenter:datacenter-3:d1277caf-371e-4f81-bd28-47d2ed482473 HTTP/1.1\" 200 340 200044 70001183 http-nio-5090-exec-15 299\n",
"messageType": "access_log",
"priority": 134,
"program": "ui-access",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"serverBytes": 340,
"severityCode": 6,
"severityLabel": "informational",
"sourceInfo": "unknown",
"streamName": "apache_access_log",
"tags": [
"access_log",
"rfc5424",
"apache_access_log",
"HTTP_RESPONSE_CODE:200",
"apache",
"HTTP:GET"
],
"uri": "/ui/tree/children?treeId=vsphere.core.physicalInventorySpec&nodeTypeId=Datacenter&objRef=urn:vmomi:Datacenter:datacenter-3:d1277caf-371e-4f81-bd28-47d2ed482473"
}
|
Create a JSON artifact from the message
|
<134>1 2024-07-26T08:26:43.273978-05:00 vcenter ui-access - - - 127.0.0.1 6.131.69.77 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/tree/children?treeId=vsphere.core.physicalInventorySpec&nodeTypeId=Datacenter&objRef=urn:vmomi:Datacenter:datacenter-3:d1277caf-371e-4f81-bd28-47d2ed482473 HTTP/1.1" 200 340 200044 70001183 http-nio-5090-exec-15 299
|
Product: Apache Web Server
Vendor: Apache
|
Identify this syslog message
|
<134>1 2024-07-26T08:26:43.273978-05:00 vcenter ui-access - - - 127.0.0.1 6.131.69.77 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/tree/children?treeId=vsphere.core.physicalInventorySpec&nodeTypeId=Datacenter&objRef=urn:vmomi:Datacenter:datacenter-3:d1277caf-371e-4f81-bd28-47d2ed482473 HTTP/1.1" 200 340 200044 70001183 http-nio-5090-exec-15 299
|
This is a syslog message from a product called Apache Web Server by Apache. The following fields were extracted from the message:
clientIP: 6.131.69.77
facilityCode: 16
facilityLabel: local0
fieldExtractorName: apache
localHostname: vcenter
localStartTime: 2024-07-26T08:26:43.273978-05:00
messageType: access_log
priority: 134
program: ui-access
senderHost: 10.0.0.20
sensitivity: normal
serverBytes: 340
severityCode: 6
severityLabel: informational
sourceInfo: unknown
streamName: apache_access_log
tags: ['access_log', 'rfc5424', 'apache_access_log', 'HTTP_RESPONSE_CODE:200', 'apache', 'HTTP:GET']
uri: /ui/tree/children?treeId=vsphere.core.physicalInventorySpec&nodeTypeId=Datacenter&objRef=urn:vmomi:Datacenter:datacenter-3:d1277caf-371e-4f81-bd28-47d2ed482473
|
Explain this syslog message
|
<134>1 2024-07-26T08:26:43.273958-05:00 vcenter ui-access - - - 127.0.0.1 198.135.247.242 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/computepolicy-ui/resources10558761/computepolicy/views/vm/VmComputePoliciesPortletView.html HTTP/1.1" 200 94 200044 - http-nio-5090-exec-12 3
|
{
"clientIP": "198.135.247.242",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "apache",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T08:26:43.273958-05:00",
"message": "<134>1 2024-07-26T08:26:43.273958-05:00 vcenter ui-access - - - 127.0.0.1 198.135.247.242 - - [26/Jul/2024:08:26:43 -0500] \"GET /ui/computepolicy-ui/resources10558761/computepolicy/views/vm/VmComputePoliciesPortletView.html HTTP/1.1\" 200 94 200044 - http-nio-5090-exec-12 3\n",
"messageType": "access_log",
"priority": 134,
"program": "ui-access",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"serverBytes": 94,
"severityCode": 6,
"severityLabel": "informational",
"sourceInfo": "unknown",
"streamName": "apache_access_log",
"tags": [
"access_log",
"rfc5424",
"apache_access_log",
"HTTP_RESPONSE_CODE:200",
"apache",
"HTTP:GET"
],
"uri": "/ui/computepolicy-ui/resources10558761/computepolicy/views/vm/VmComputePoliciesPortletView.html"
}
|
Create a JSON artifact from the message
|
<134>1 2024-07-26T08:26:43.273958-05:00 vcenter ui-access - - - 127.0.0.1 198.135.247.242 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/computepolicy-ui/resources10558761/computepolicy/views/vm/VmComputePoliciesPortletView.html HTTP/1.1" 200 94 200044 - http-nio-5090-exec-12 3
|
Product: Apache Web Server
Vendor: Apache
|
Identify this syslog message
|
<134>1 2024-07-26T08:26:43.273958-05:00 vcenter ui-access - - - 127.0.0.1 198.135.247.242 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/computepolicy-ui/resources10558761/computepolicy/views/vm/VmComputePoliciesPortletView.html HTTP/1.1" 200 94 200044 - http-nio-5090-exec-12 3
|
This is a syslog message from a product called Apache Web Server by Apache. The following fields were extracted from the message:
clientIP: 198.135.247.242
facilityCode: 16
facilityLabel: local0
fieldExtractorName: apache
localHostname: vcenter
localStartTime: 2024-07-26T08:26:43.273958-05:00
messageType: access_log
priority: 134
program: ui-access
senderHost: 10.0.0.20
sensitivity: normal
serverBytes: 94
severityCode: 6
severityLabel: informational
sourceInfo: unknown
streamName: apache_access_log
tags: ['access_log', 'rfc5424', 'apache_access_log', 'HTTP_RESPONSE_CODE:200', 'apache', 'HTTP:GET']
uri: /ui/computepolicy-ui/resources10558761/computepolicy/views/vm/VmComputePoliciesPortletView.html
|
Explain this syslog message
|
<134>1 2024-07-26T08:26:43.273928-05:00 vcenter ui-access - - - 127.0.0.1 70.55.139.27 - - [26/Jul/2024:08:26:42 -0500] "GET /ui/tree/path?treeId=vsphere.core.physicalInventorySpec&objRef=urn:vmomi:VirtualMoscorpine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473&options=%7B%22selectNode%22:%22urn:vmomi:VirtualMoscorpine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473%22%7D HTTP/1.1" 200 420 200044 70001180 http-nio-5090-exec-17 86
|
{
"clientIP": "70.55.139.27",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "apache",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T08:26:43.273928-05:00",
"message": "<134>1 2024-07-26T08:26:43.273928-05:00 vcenter ui-access - - - 127.0.0.1 70.55.139.27 - - [26/Jul/2024:08:26:42 -0500] \"GET /ui/tree/path?treeId=vsphere.core.physicalInventorySpec&objRef=urn:vmomi:VirtualMoscorpine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473&options=%7B%22selectNode%22:%22urn:vmomi:VirtualMoscorpine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473%22%7D HTTP/1.1\" 200 420 200044 70001180 http-nio-5090-exec-17 86\n",
"messageType": "access_log",
"priority": 134,
"program": "ui-access",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"serverBytes": 420,
"severityCode": 6,
"severityLabel": "informational",
"sourceInfo": "unknown",
"streamName": "apache_access_log",
"tags": [
"access_log",
"rfc5424",
"apache_access_log",
"HTTP_RESPONSE_CODE:200",
"apache",
"HTTP:GET"
],
"uri": "/ui/tree/path?treeId=vsphere.core.physicalInventorySpec&objRef=urn:vmomi:VirtualMachine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473&options=%7B%22selectNode%22:%22urn:vmomi:VirtualMachine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473%22%7D"
}
|
Create a JSON artifact from the message
|
<134>1 2024-07-26T08:26:43.273928-05:00 vcenter ui-access - - - 127.0.0.1 70.55.139.27 - - [26/Jul/2024:08:26:42 -0500] "GET /ui/tree/path?treeId=vsphere.core.physicalInventorySpec&objRef=urn:vmomi:VirtualMoscorpine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473&options=%7B%22selectNode%22:%22urn:vmomi:VirtualMoscorpine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473%22%7D HTTP/1.1" 200 420 200044 70001180 http-nio-5090-exec-17 86
|
Product: Apache Web Server
Vendor: Apache
|
Identify this syslog message
|
<134>1 2024-07-26T08:26:43.273928-05:00 vcenter ui-access - - - 127.0.0.1 70.55.139.27 - - [26/Jul/2024:08:26:42 -0500] "GET /ui/tree/path?treeId=vsphere.core.physicalInventorySpec&objRef=urn:vmomi:VirtualMoscorpine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473&options=%7B%22selectNode%22:%22urn:vmomi:VirtualMoscorpine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473%22%7D HTTP/1.1" 200 420 200044 70001180 http-nio-5090-exec-17 86
|
This is a syslog message from a product called Apache Web Server by Apache. The following fields were extracted from the message:
clientIP: 70.55.139.27
facilityCode: 16
facilityLabel: local0
fieldExtractorName: apache
localHostname: vcenter
localStartTime: 2024-07-26T08:26:43.273928-05:00
messageType: access_log
priority: 134
program: ui-access
senderHost: 10.0.0.20
sensitivity: normal
serverBytes: 420
severityCode: 6
severityLabel: informational
sourceInfo: unknown
streamName: apache_access_log
tags: ['access_log', 'rfc5424', 'apache_access_log', 'HTTP_RESPONSE_CODE:200', 'apache', 'HTTP:GET']
uri: /ui/tree/path?treeId=vsphere.core.physicalInventorySpec&objRef=urn:vmomi:VirtualMachine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473&options=%7B%22selectNode%22:%22urn:vmomi:VirtualMachine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473%22%7D
|
Explain this syslog message
|
<134>1 2024-07-26T08:26:43.273942-05:00 vcenter ui-access - - - 127.0.0.1 161.16.104.154 - - [26/Jul/2024:08:26:42 -0500] "GET /ui/persistence/data/?key=uid&op=%3D&path=&value=com.vmware.usersetting.summaryview.status HTTP/1.1" 200 12 200044 70001184 http-nio-5090-exec-21 6
|
{
"clientIP": "161.16.104.154",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "apache",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T08:26:43.273942-05:00",
"message": "<134>1 2024-07-26T08:26:43.273942-05:00 vcenter ui-access - - - 127.0.0.1 161.16.104.154 - - [26/Jul/2024:08:26:42 -0500] \"GET /ui/persistence/data/?key=uid&op=%3D&path=&value=com.vmware.usersetting.summaryview.status HTTP/1.1\" 200 12 200044 70001184 http-nio-5090-exec-21 6\n",
"messageType": "access_log",
"priority": 134,
"program": "ui-access",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"serverBytes": 12,
"severityCode": 6,
"severityLabel": "informational",
"sourceInfo": "unknown",
"streamName": "apache_access_log",
"tags": [
"access_log",
"rfc5424",
"apache_access_log",
"HTTP_RESPONSE_CODE:200",
"apache",
"HTTP:GET"
],
"uri": "/ui/persistence/data/?key=uid&op=%3D&path=&value=com.vmware.usersetting.summaryview.status"
}
|
Create a JSON artifact from the message
|
<134>1 2024-07-26T08:26:43.273942-05:00 vcenter ui-access - - - 127.0.0.1 161.16.104.154 - - [26/Jul/2024:08:26:42 -0500] "GET /ui/persistence/data/?key=uid&op=%3D&path=&value=com.vmware.usersetting.summaryview.status HTTP/1.1" 200 12 200044 70001184 http-nio-5090-exec-21 6
|
Product: Apache Web Server
Vendor: Apache
|
Identify this syslog message
|
<134>1 2024-07-26T08:26:43.273942-05:00 vcenter ui-access - - - 127.0.0.1 161.16.104.154 - - [26/Jul/2024:08:26:42 -0500] "GET /ui/persistence/data/?key=uid&op=%3D&path=&value=com.vmware.usersetting.summaryview.status HTTP/1.1" 200 12 200044 70001184 http-nio-5090-exec-21 6
|
This is a syslog message from a product called Apache Web Server by Apache. The following fields were extracted from the message:
clientIP: 161.16.104.154
facilityCode: 16
facilityLabel: local0
fieldExtractorName: apache
localHostname: vcenter
localStartTime: 2024-07-26T08:26:43.273942-05:00
messageType: access_log
priority: 134
program: ui-access
senderHost: 10.0.0.20
sensitivity: normal
serverBytes: 12
severityCode: 6
severityLabel: informational
sourceInfo: unknown
streamName: apache_access_log
tags: ['access_log', 'rfc5424', 'apache_access_log', 'HTTP_RESPONSE_CODE:200', 'apache', 'HTTP:GET']
uri: /ui/persistence/data/?key=uid&op=%3D&path=&value=com.vmware.usersetting.summaryview.status
|
Explain this syslog message
|
<134>1 2024-07-26T08:26:43.273961-05:00 vcenter ui-access - - - 127.0.0.1 125.189.161.157 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/cluster-ui/resources10558761/cluster/views/summary/VmHaPortlet.html HTTP/1.1" 200 1031 200044 - http-nio-5090-exec-6 4
|
{
"clientIP": "125.189.161.157",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "apache",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T08:26:43.273961-05:00",
"message": "<134>1 2024-07-26T08:26:43.273961-05:00 vcenter ui-access - - - 127.0.0.1 125.189.161.157 - - [26/Jul/2024:08:26:43 -0500] \"GET /ui/cluster-ui/resources10558761/cluster/views/summary/VmHaPortlet.html HTTP/1.1\" 200 1031 200044 - http-nio-5090-exec-6 4\n",
"messageType": "access_log",
"priority": 134,
"program": "ui-access",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"serverBytes": 1031,
"severityCode": 6,
"severityLabel": "informational",
"sourceInfo": "unknown",
"streamName": "apache_access_log",
"tags": [
"access_log",
"rfc5424",
"apache_access_log",
"HTTP_RESPONSE_CODE:200",
"apache",
"HTTP:GET"
],
"uri": "/ui/cluster-ui/resources10558761/cluster/views/summary/VmHaPortlet.html"
}
|
Create a JSON artifact from the message
|
<134>1 2024-07-26T08:26:43.273961-05:00 vcenter ui-access - - - 127.0.0.1 125.189.161.157 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/cluster-ui/resources10558761/cluster/views/summary/VmHaPortlet.html HTTP/1.1" 200 1031 200044 - http-nio-5090-exec-6 4
|
Product: Apache Web Server
Vendor: Apache
|
Identify this syslog message
|
<134>1 2024-07-26T08:26:43.273961-05:00 vcenter ui-access - - - 127.0.0.1 125.189.161.157 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/cluster-ui/resources10558761/cluster/views/summary/VmHaPortlet.html HTTP/1.1" 200 1031 200044 - http-nio-5090-exec-6 4
|
This is a syslog message from a product called Apache Web Server by Apache. The following fields were extracted from the message:
clientIP: 125.189.161.157
facilityCode: 16
facilityLabel: local0
fieldExtractorName: apache
localHostname: vcenter
localStartTime: 2024-07-26T08:26:43.273961-05:00
messageType: access_log
priority: 134
program: ui-access
senderHost: 10.0.0.20
sensitivity: normal
serverBytes: 1031
severityCode: 6
severityLabel: informational
sourceInfo: unknown
streamName: apache_access_log
tags: ['access_log', 'rfc5424', 'apache_access_log', 'HTTP_RESPONSE_CODE:200', 'apache', 'HTTP:GET']
uri: /ui/cluster-ui/resources10558761/cluster/views/summary/VmHaPortlet.html
|
Explain this syslog message
|
<134>1 2024-07-26T08:26:43.273968-05:00 vcenter ui-access - - - 127.0.0.1 163.123.237.219 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/common-module-ui/resources10558761/common-module/views/related-items/RelatedItemsPortlet.html HTTP/1.1" 200 1156 200044 - http-nio-5090-exec-5 7
|
{
"clientIP": "163.123.237.219",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "apache",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T08:26:43.273968-05:00",
"message": "<134>1 2024-07-26T08:26:43.273968-05:00 vcenter ui-access - - - 127.0.0.1 163.123.237.219 - - [26/Jul/2024:08:26:43 -0500] \"GET /ui/common-module-ui/resources10558761/common-module/views/related-items/RelatedItemsPortlet.html HTTP/1.1\" 200 1156 200044 - http-nio-5090-exec-5 7\n",
"messageType": "access_log",
"priority": 134,
"program": "ui-access",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"serverBytes": 1156,
"severityCode": 6,
"severityLabel": "informational",
"sourceInfo": "unknown",
"streamName": "apache_access_log",
"tags": [
"access_log",
"rfc5424",
"apache_access_log",
"HTTP_RESPONSE_CODE:200",
"apache",
"HTTP:GET"
],
"uri": "/ui/common-module-ui/resources10558761/common-module/views/related-items/RelatedItemsPortlet.html"
}
|
Create a JSON artifact from the message
|
<134>1 2024-07-26T08:26:43.273968-05:00 vcenter ui-access - - - 127.0.0.1 163.123.237.219 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/common-module-ui/resources10558761/common-module/views/related-items/RelatedItemsPortlet.html HTTP/1.1" 200 1156 200044 - http-nio-5090-exec-5 7
|
Product: Apache Web Server
Vendor: Apache
|
Identify this syslog message
|
<134>1 2024-07-26T08:26:43.273968-05:00 vcenter ui-access - - - 127.0.0.1 163.123.237.219 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/common-module-ui/resources10558761/common-module/views/related-items/RelatedItemsPortlet.html HTTP/1.1" 200 1156 200044 - http-nio-5090-exec-5 7
|
This is a syslog message from a product called Apache Web Server by Apache. The following fields were extracted from the message:
clientIP: 163.123.237.219
facilityCode: 16
facilityLabel: local0
fieldExtractorName: apache
localHostname: vcenter
localStartTime: 2024-07-26T08:26:43.273968-05:00
messageType: access_log
priority: 134
program: ui-access
senderHost: 10.0.0.20
sensitivity: normal
serverBytes: 1156
severityCode: 6
severityLabel: informational
sourceInfo: unknown
streamName: apache_access_log
tags: ['access_log', 'rfc5424', 'apache_access_log', 'HTTP_RESPONSE_CODE:200', 'apache', 'HTTP:GET']
uri: /ui/common-module-ui/resources10558761/common-module/views/related-items/RelatedItemsPortlet.html
|
Explain this syslog message
|
<134>1 2024-07-26T08:26:43.273950-05:00 vcenter ui-access - - - 127.0.0.1 220.105.161.163 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/hostedextensions/vsphere.core.vm.summaryView?objectId=urn:vmomi:VirtualMwayneine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473 HTTP/1.1" 200 3797 200044 70001185 http-nio-5090-exec-25 187
|
{
"clientIP": "220.105.161.163",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "apache",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T08:26:43.273950-05:00",
"message": "<134>1 2024-07-26T08:26:43.273950-05:00 vcenter ui-access - - - 127.0.0.1 220.105.161.163 - - [26/Jul/2024:08:26:43 -0500] \"GET /ui/hostedextensions/vsphere.core.vm.summaryView?objectId=urn:vmomi:VirtualMwayneine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473 HTTP/1.1\" 200 3797 200044 70001185 http-nio-5090-exec-25 187\n",
"messageType": "access_log",
"priority": 134,
"program": "ui-access",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"serverBytes": 3797,
"severityCode": 6,
"severityLabel": "informational",
"sourceInfo": "unknown",
"streamName": "apache_access_log",
"tags": [
"access_log",
"rfc5424",
"apache_access_log",
"HTTP_RESPONSE_CODE:200",
"apache",
"HTTP:GET"
],
"uri": "/ui/hostedextensions/vsphere.core.vm.summaryView?objectId=urn:vmomi:VirtualMachine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473"
}
|
Create a JSON artifact from the message
|
<134>1 2024-07-26T08:26:43.273950-05:00 vcenter ui-access - - - 127.0.0.1 220.105.161.163 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/hostedextensions/vsphere.core.vm.summaryView?objectId=urn:vmomi:VirtualMwayneine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473 HTTP/1.1" 200 3797 200044 70001185 http-nio-5090-exec-25 187
|
Product: Apache Web Server
Vendor: Apache
|
Identify this syslog message
|
<134>1 2024-07-26T08:26:43.273950-05:00 vcenter ui-access - - - 127.0.0.1 220.105.161.163 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/hostedextensions/vsphere.core.vm.summaryView?objectId=urn:vmomi:VirtualMwayneine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473 HTTP/1.1" 200 3797 200044 70001185 http-nio-5090-exec-25 187
|
This is a syslog message from a product called Apache Web Server by Apache. The following fields were extracted from the message:
clientIP: 220.105.161.163
facilityCode: 16
facilityLabel: local0
fieldExtractorName: apache
localHostname: vcenter
localStartTime: 2024-07-26T08:26:43.273950-05:00
messageType: access_log
priority: 134
program: ui-access
senderHost: 10.0.0.20
sensitivity: normal
serverBytes: 3797
severityCode: 6
severityLabel: informational
sourceInfo: unknown
streamName: apache_access_log
tags: ['access_log', 'rfc5424', 'apache_access_log', 'HTTP_RESPONSE_CODE:200', 'apache', 'HTTP:GET']
uri: /ui/hostedextensions/vsphere.core.vm.summaryView?objectId=urn:vmomi:VirtualMachine:vm-1002:d1277caf-371e-4f81-bd28-47d2ed482473
|
Explain this syslog message
|
<134>1 2024-07-26T08:26:43.273972-05:00 vcenter ui-access - - - 127.0.0.1 151.8.93.114 - - [26/Jul/2024:08:26:43 -0500] "GET /ui/common-module-ui/resources10558761/common-module/views/notes/Notes.html HTTP/1.1" 200 299 200044 - http-nio-5090-exec-31 6
|
{
"clientIP": "151.8.93.114",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "apache",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T08:26:43.273972-05:00",
"message": "<134>1 2024-07-26T08:26:43.273972-05:00 vcenter ui-access - - - 127.0.0.1 151.8.93.114 - - [26/Jul/2024:08:26:43 -0500] \"GET /ui/common-module-ui/resources10558761/common-module/views/notes/Notes.html HTTP/1.1\" 200 299 200044 - http-nio-5090-exec-31 6\n",
"messageType": "access_log",
"priority": 134,
"program": "ui-access",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"serverBytes": 299,
"severityCode": 6,
"severityLabel": "informational",
"sourceInfo": "unknown",
"streamName": "apache_access_log",
"tags": [
"access_log",
"rfc5424",
"apache_access_log",
"HTTP_RESPONSE_CODE:200",
"apache",
"HTTP:GET"
],
"uri": "/ui/common-module-ui/resources10558761/common-module/views/notes/Notes.html"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.