input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Jul 27 17:21:36 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1909|AWS Account Synchronization Finished|3|src=1.22.131.201 suser=janedoe target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
This is a syslog message from a product called trend micro_deep security manager by trend micro_deep security manager. The following fields were extracted from the message:
clientIP: 1.22.131.201
facilityCode: 16
facilityLabel: local0
fieldExtractorName: cef
localHostname: deepsecurity
localStartTime: Jul 27 17:21:36
messageType: AWS Account Synchronization Finished
priority: 134
senderHost: 34.205.5.2
sensitivity: normal
severityCode: 7
severityLabel: debug
sourceInfo: unknown
streamName: trend micro_deep security manager
tags: ['AWS Account Synchronization Finished', 'trend micro_deep security manager', 'rfc3164', 'cef', 'trend micro_deep security manager_AWS Account Synchronization Finished']
userName: janedoe
vendorCode: 1909
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T01:13:43.812Z","agent":{"ephemeral_id":"e993087a-c16f-4201-b5c0-55caa1b82d38","id":"debd178c-b8a2-4365-8024-647c18398d11","name":"NORDC-SS1-FS01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5158","created":"2024-07-27T01:13:45.025Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-SS1-FS01.umbrella.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a bind to a local port.\n\nApplication Information:\n\tProcess ID:\t\t10496\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tSource Address:\t\t0.0.0.0\n\tSource Port:\t\t64776\n\tProtocol:\t\t6\n\nFilter Information:\n\tFilter Run-Time ID:\t0\n\tLayer Name:\t\tResource Assignment\n\tLayer Run-Time ID:\t36","organization":"umbrella","senderHost":"NORDC-SS1-FS01.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-SS1-FS01.umbrella.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","FilterRTID":"0","LayerName":"%%14608","LayerRTID":"36","ProcessId":"10496","Protocol":"6","SourceAddress":"0.0.0.0","SourcePort":"64776"},"event_id":"5158","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":4964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":76729116,"task":"Filtering Platform Connection"}}
|
{
"fieldExtractorName": "sentinelone",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T01:13:43.812Z\",\"agent\":{\"ephemeral_id\":\"e993087a-c16f-4201-b5c0-55caa1b82d38\",\"id\":\"debd178c-b8a2-4365-8024-647c18398d11\",\"name\":\"NORDC-SS1-FS01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Filtering Platform Connection\",\"code\":\"5158\",\"created\":\"2024-07-27T01:13:45.025Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-SS1-FS01.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"The Windows Filtering Platform has permitted a bind to a local port.\\n\\nApplication Information:\\n\\tProcess ID:\\t\\t10496\\n\\tApplication Name:\\t\\\\device\\\\harddiskvolume2\\\\program files\\\\sentinelone\\\\sentinel agent 23.3.3.264\\\\sentinelagent.exe\\n\\nNetwork Information:\\n\\tSource Address:\\t\\t0.0.0.0\\n\\tSource Port:\\t\\t64776\\n\\tProtocol:\\t\\t6\\n\\nFilter Information:\\n\\tFilter Run-Time ID:\\t0\\n\\tLayer Name:\\t\\tResource Assignment\\n\\tLayer Run-Time ID:\\t36\",\"organization\":\"umbrella\",\"senderHost\":\"NORDC-SS1-FS01.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-SS1-FS01.umbrella.com\",\"event_data\":{\"Application\":\"\\\\device\\\\harddiskvolume2\\\\program files\\\\sentinelone\\\\sentinel agent 23.3.3.264\\\\sentinelagent.exe\",\"FilterRTID\":\"0\",\"LayerName\":\"%%14608\",\"LayerRTID\":\"36\",\"ProcessId\":\"10496\",\"Protocol\":\"6\",\"SourceAddress\":\"0.0.0.0\",\"SourcePort\":\"64776\"},\"event_id\":\"5158\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":4964}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":76729116,\"task\":\"Filtering Platform Connection\"}}",
"messageType": "unknown",
"senderHost": "NORDC-SS1-FS01.mingledorffs.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "sentinelone",
"tags": [
"sentinelone",
"unknown"
]
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T01:13:43.812Z","agent":{"ephemeral_id":"e993087a-c16f-4201-b5c0-55caa1b82d38","id":"debd178c-b8a2-4365-8024-647c18398d11","name":"NORDC-SS1-FS01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5158","created":"2024-07-27T01:13:45.025Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-SS1-FS01.umbrella.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a bind to a local port.\n\nApplication Information:\n\tProcess ID:\t\t10496\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tSource Address:\t\t0.0.0.0\n\tSource Port:\t\t64776\n\tProtocol:\t\t6\n\nFilter Information:\n\tFilter Run-Time ID:\t0\n\tLayer Name:\t\tResource Assignment\n\tLayer Run-Time ID:\t36","organization":"umbrella","senderHost":"NORDC-SS1-FS01.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-SS1-FS01.umbrella.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","FilterRTID":"0","LayerName":"%%14608","LayerRTID":"36","ProcessId":"10496","Protocol":"6","SourceAddress":"0.0.0.0","SourcePort":"64776"},"event_id":"5158","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":4964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":76729116,"task":"Filtering Platform Connection"}}
|
Product: SentinelOne
Vendor: SentinelOne
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T01:13:43.812Z","agent":{"ephemeral_id":"e993087a-c16f-4201-b5c0-55caa1b82d38","id":"debd178c-b8a2-4365-8024-647c18398d11","name":"NORDC-SS1-FS01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5158","created":"2024-07-27T01:13:45.025Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-SS1-FS01.umbrella.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a bind to a local port.\n\nApplication Information:\n\tProcess ID:\t\t10496\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tSource Address:\t\t0.0.0.0\n\tSource Port:\t\t64776\n\tProtocol:\t\t6\n\nFilter Information:\n\tFilter Run-Time ID:\t0\n\tLayer Name:\t\tResource Assignment\n\tLayer Run-Time ID:\t36","organization":"umbrella","senderHost":"NORDC-SS1-FS01.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-SS1-FS01.umbrella.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","FilterRTID":"0","LayerName":"%%14608","LayerRTID":"36","ProcessId":"10496","Protocol":"6","SourceAddress":"0.0.0.0","SourcePort":"64776"},"event_id":"5158","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":4964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":76729116,"task":"Filtering Platform Connection"}}
|
This is a syslog message from a product called SentinelOne by SentinelOne. The following fields were extracted from the message:
fieldExtractorName: sentinelone
messageType: unknown
senderHost: NORDC-SS1-FS01.mingledorffs.com
sensitivity: normal
sourceInfo: unknown
streamName: sentinelone
tags: ['sentinelone', 'unknown']
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T01:13:43.812Z","agent":{"ephemeral_id":"e993087a-c16f-4201-b5c0-55caa1b82d38","id":"debd178c-b8a2-4365-8024-647c18398d11","name":"NORDC-SS1-FS01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5156","created":"2024-07-27T01:13:45.025Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-SS1-FS01.umbrella.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a connection.\n\nApplication Information:\n\tProcess ID:\t\t10496\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tDirection:\t\tOutbound\n\tSource Address:\t\t192.168.14.222\n\tSource Port:\t\t64776\n\tDestination Address:\t192.168.10.46\n\tDestination Port:\t\t389\n\tProtocol:\t\t6\n\tInterface Index:\t\t12\n\nFilter Information:\n\tFilter Origin:\t\tS1-WFP-PROV-CTX\n\tFilter Run-Time ID:\t74664\n\tLayer Name:\t\tConnect\n\tLayer Run-Time ID:\t48\n\tRemote User ID:\t\tS-1-0-0\n\tRemote Mumbrellaine ID:\tS-1-0-0","organization":"umbrella","senderHost":"NORDC-SS1-FS01.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-SS1-FS01.umbrella.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","DestAddress":"192.168.10.46","DestPort":"389","Direction":"%%14593","FilterOrigin":"S1-WFP-PROV-CTX","FilterRTID":"74664","InterfaceIndex":"12","LayerName":"%%14611","LayerRTID":"48","ProcessID":"10496","Protocol":"6","RemoteMumbrellaineID":"S-1-0-0","RemoteUserID":"S-1-0-0","SourceAddress":"192.168.14.222","SourcePort":"64776"},"event_id":"5156","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":4964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":76729117,"task":"Filtering Platform Connection","version":1}}
|
{
"fieldExtractorName": "sentinelone",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T01:13:43.812Z\",\"agent\":{\"ephemeral_id\":\"e993087a-c16f-4201-b5c0-55caa1b82d38\",\"id\":\"debd178c-b8a2-4365-8024-647c18398d11\",\"name\":\"NORDC-SS1-FS01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Filtering Platform Connection\",\"code\":\"5156\",\"created\":\"2024-07-27T01:13:45.025Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-SS1-FS01.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"The Windows Filtering Platform has permitted a connection.\\n\\nApplication Information:\\n\\tProcess ID:\\t\\t10496\\n\\tApplication Name:\\t\\\\device\\\\harddiskvolume2\\\\program files\\\\sentinelone\\\\sentinel agent 23.3.3.264\\\\sentinelagent.exe\\n\\nNetwork Information:\\n\\tDirection:\\t\\tOutbound\\n\\tSource Address:\\t\\t192.168.14.222\\n\\tSource Port:\\t\\t64776\\n\\tDestination Address:\\t192.168.10.46\\n\\tDestination Port:\\t\\t389\\n\\tProtocol:\\t\\t6\\n\\tInterface Index:\\t\\t12\\n\\nFilter Information:\\n\\tFilter Origin:\\t\\tS1-WFP-PROV-CTX\\n\\tFilter Run-Time ID:\\t74664\\n\\tLayer Name:\\t\\tConnect\\n\\tLayer Run-Time ID:\\t48\\n\\tRemote User ID:\\t\\tS-1-0-0\\n\\tRemote Mumbrellaine ID:\\tS-1-0-0\",\"organization\":\"umbrella\",\"senderHost\":\"NORDC-SS1-FS01.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-SS1-FS01.umbrella.com\",\"event_data\":{\"Application\":\"\\\\device\\\\harddiskvolume2\\\\program files\\\\sentinelone\\\\sentinel agent 23.3.3.264\\\\sentinelagent.exe\",\"DestAddress\":\"192.168.10.46\",\"DestPort\":\"389\",\"Direction\":\"%%14593\",\"FilterOrigin\":\"S1-WFP-PROV-CTX\",\"FilterRTID\":\"74664\",\"InterfaceIndex\":\"12\",\"LayerName\":\"%%14611\",\"LayerRTID\":\"48\",\"ProcessID\":\"10496\",\"Protocol\":\"6\",\"RemoteMumbrellaineID\":\"S-1-0-0\",\"RemoteUserID\":\"S-1-0-0\",\"SourceAddress\":\"192.168.14.222\",\"SourcePort\":\"64776\"},\"event_id\":\"5156\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":4964}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":76729117,\"task\":\"Filtering Platform Connection\",\"version\":1}}",
"messageType": "unknown",
"senderHost": "NORDC-SS1-FS01.mingledorffs.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "sentinelone",
"tags": [
"sentinelone",
"unknown"
]
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T01:13:43.812Z","agent":{"ephemeral_id":"e993087a-c16f-4201-b5c0-55caa1b82d38","id":"debd178c-b8a2-4365-8024-647c18398d11","name":"NORDC-SS1-FS01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5156","created":"2024-07-27T01:13:45.025Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-SS1-FS01.umbrella.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a connection.\n\nApplication Information:\n\tProcess ID:\t\t10496\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tDirection:\t\tOutbound\n\tSource Address:\t\t192.168.14.222\n\tSource Port:\t\t64776\n\tDestination Address:\t192.168.10.46\n\tDestination Port:\t\t389\n\tProtocol:\t\t6\n\tInterface Index:\t\t12\n\nFilter Information:\n\tFilter Origin:\t\tS1-WFP-PROV-CTX\n\tFilter Run-Time ID:\t74664\n\tLayer Name:\t\tConnect\n\tLayer Run-Time ID:\t48\n\tRemote User ID:\t\tS-1-0-0\n\tRemote Mumbrellaine ID:\tS-1-0-0","organization":"umbrella","senderHost":"NORDC-SS1-FS01.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-SS1-FS01.umbrella.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","DestAddress":"192.168.10.46","DestPort":"389","Direction":"%%14593","FilterOrigin":"S1-WFP-PROV-CTX","FilterRTID":"74664","InterfaceIndex":"12","LayerName":"%%14611","LayerRTID":"48","ProcessID":"10496","Protocol":"6","RemoteMumbrellaineID":"S-1-0-0","RemoteUserID":"S-1-0-0","SourceAddress":"192.168.14.222","SourcePort":"64776"},"event_id":"5156","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":4964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":76729117,"task":"Filtering Platform Connection","version":1}}
|
Product: SentinelOne
Vendor: SentinelOne
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T01:13:43.812Z","agent":{"ephemeral_id":"e993087a-c16f-4201-b5c0-55caa1b82d38","id":"debd178c-b8a2-4365-8024-647c18398d11","name":"NORDC-SS1-FS01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5156","created":"2024-07-27T01:13:45.025Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-SS1-FS01.umbrella.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a connection.\n\nApplication Information:\n\tProcess ID:\t\t10496\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tDirection:\t\tOutbound\n\tSource Address:\t\t192.168.14.222\n\tSource Port:\t\t64776\n\tDestination Address:\t192.168.10.46\n\tDestination Port:\t\t389\n\tProtocol:\t\t6\n\tInterface Index:\t\t12\n\nFilter Information:\n\tFilter Origin:\t\tS1-WFP-PROV-CTX\n\tFilter Run-Time ID:\t74664\n\tLayer Name:\t\tConnect\n\tLayer Run-Time ID:\t48\n\tRemote User ID:\t\tS-1-0-0\n\tRemote Mumbrellaine ID:\tS-1-0-0","organization":"umbrella","senderHost":"NORDC-SS1-FS01.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-SS1-FS01.umbrella.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","DestAddress":"192.168.10.46","DestPort":"389","Direction":"%%14593","FilterOrigin":"S1-WFP-PROV-CTX","FilterRTID":"74664","InterfaceIndex":"12","LayerName":"%%14611","LayerRTID":"48","ProcessID":"10496","Protocol":"6","RemoteMumbrellaineID":"S-1-0-0","RemoteUserID":"S-1-0-0","SourceAddress":"192.168.14.222","SourcePort":"64776"},"event_id":"5156","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":4964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":76729117,"task":"Filtering Platform Connection","version":1}}
|
This is a syslog message from a product called SentinelOne by SentinelOne. The following fields were extracted from the message:
fieldExtractorName: sentinelone
messageType: unknown
senderHost: NORDC-SS1-FS01.mingledorffs.com
sensitivity: normal
sourceInfo: unknown
streamName: sentinelone
tags: ['sentinelone', 'unknown']
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T01:13:43.807Z","agent":{"ephemeral_id":"e993087a-c16f-4201-b5c0-55caa1b82d38","id":"debd178c-b8a2-4365-8024-647c18398d11","name":"NORDC-SS1-FS01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5156","created":"2024-07-27T01:13:45.025Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-SS1-FS01.stark.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a connection.\n\nApplication Information:\n\tProcess ID:\t\t10496\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tDirection:\t\tOutbound\n\tSource Address:\t\t192.168.14.222\n\tSource Port:\t\t64775\n\tDestination Address:\t192.168.10.46\n\tDestination Port:\t\t389\n\tProtocol:\t\t6\n\tInterface Index:\t\t12\n\nFilter Information:\n\tFilter Origin:\t\tS1-WFP-PROV-CTX\n\tFilter Run-Time ID:\t74664\n\tLayer Name:\t\tConnect\n\tLayer Run-Time ID:\t48\n\tRemote User ID:\t\tS-1-0-0\n\tRemote Mstarkine ID:\tS-1-0-0","organization":"stark","senderHost":"NORDC-SS1-FS01.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-SS1-FS01.stark.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","DestAddress":"192.168.10.46","DestPort":"389","Direction":"%%14593","FilterOrigin":"S1-WFP-PROV-CTX","FilterRTID":"74664","InterfaceIndex":"12","LayerName":"%%14611","LayerRTID":"48","ProcessID":"10496","Protocol":"6","RemoteMstarkineID":"S-1-0-0","RemoteUserID":"S-1-0-0","SourceAddress":"192.168.14.222","SourcePort":"64775"},"event_id":"5156","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":4964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":76729115,"task":"Filtering Platform Connection","version":1}}
|
{
"fieldExtractorName": "sentinelone",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T01:13:43.807Z\",\"agent\":{\"ephemeral_id\":\"e993087a-c16f-4201-b5c0-55caa1b82d38\",\"id\":\"debd178c-b8a2-4365-8024-647c18398d11\",\"name\":\"NORDC-SS1-FS01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Filtering Platform Connection\",\"code\":\"5156\",\"created\":\"2024-07-27T01:13:45.025Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-SS1-FS01.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"The Windows Filtering Platform has permitted a connection.\\n\\nApplication Information:\\n\\tProcess ID:\\t\\t10496\\n\\tApplication Name:\\t\\\\device\\\\harddiskvolume2\\\\program files\\\\sentinelone\\\\sentinel agent 23.3.3.264\\\\sentinelagent.exe\\n\\nNetwork Information:\\n\\tDirection:\\t\\tOutbound\\n\\tSource Address:\\t\\t192.168.14.222\\n\\tSource Port:\\t\\t64775\\n\\tDestination Address:\\t192.168.10.46\\n\\tDestination Port:\\t\\t389\\n\\tProtocol:\\t\\t6\\n\\tInterface Index:\\t\\t12\\n\\nFilter Information:\\n\\tFilter Origin:\\t\\tS1-WFP-PROV-CTX\\n\\tFilter Run-Time ID:\\t74664\\n\\tLayer Name:\\t\\tConnect\\n\\tLayer Run-Time ID:\\t48\\n\\tRemote User ID:\\t\\tS-1-0-0\\n\\tRemote Mstarkine ID:\\tS-1-0-0\",\"organization\":\"stark\",\"senderHost\":\"NORDC-SS1-FS01.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-SS1-FS01.stark.com\",\"event_data\":{\"Application\":\"\\\\device\\\\harddiskvolume2\\\\program files\\\\sentinelone\\\\sentinel agent 23.3.3.264\\\\sentinelagent.exe\",\"DestAddress\":\"192.168.10.46\",\"DestPort\":\"389\",\"Direction\":\"%%14593\",\"FilterOrigin\":\"S1-WFP-PROV-CTX\",\"FilterRTID\":\"74664\",\"InterfaceIndex\":\"12\",\"LayerName\":\"%%14611\",\"LayerRTID\":\"48\",\"ProcessID\":\"10496\",\"Protocol\":\"6\",\"RemoteMstarkineID\":\"S-1-0-0\",\"RemoteUserID\":\"S-1-0-0\",\"SourceAddress\":\"192.168.14.222\",\"SourcePort\":\"64775\"},\"event_id\":\"5156\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":4964}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":76729115,\"task\":\"Filtering Platform Connection\",\"version\":1}}",
"messageType": "unknown",
"senderHost": "NORDC-SS1-FS01.mingledorffs.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "sentinelone",
"tags": [
"sentinelone",
"unknown"
]
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T01:13:43.807Z","agent":{"ephemeral_id":"e993087a-c16f-4201-b5c0-55caa1b82d38","id":"debd178c-b8a2-4365-8024-647c18398d11","name":"NORDC-SS1-FS01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5156","created":"2024-07-27T01:13:45.025Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-SS1-FS01.stark.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a connection.\n\nApplication Information:\n\tProcess ID:\t\t10496\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tDirection:\t\tOutbound\n\tSource Address:\t\t192.168.14.222\n\tSource Port:\t\t64775\n\tDestination Address:\t192.168.10.46\n\tDestination Port:\t\t389\n\tProtocol:\t\t6\n\tInterface Index:\t\t12\n\nFilter Information:\n\tFilter Origin:\t\tS1-WFP-PROV-CTX\n\tFilter Run-Time ID:\t74664\n\tLayer Name:\t\tConnect\n\tLayer Run-Time ID:\t48\n\tRemote User ID:\t\tS-1-0-0\n\tRemote Mstarkine ID:\tS-1-0-0","organization":"stark","senderHost":"NORDC-SS1-FS01.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-SS1-FS01.stark.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","DestAddress":"192.168.10.46","DestPort":"389","Direction":"%%14593","FilterOrigin":"S1-WFP-PROV-CTX","FilterRTID":"74664","InterfaceIndex":"12","LayerName":"%%14611","LayerRTID":"48","ProcessID":"10496","Protocol":"6","RemoteMstarkineID":"S-1-0-0","RemoteUserID":"S-1-0-0","SourceAddress":"192.168.14.222","SourcePort":"64775"},"event_id":"5156","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":4964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":76729115,"task":"Filtering Platform Connection","version":1}}
|
Product: SentinelOne
Vendor: SentinelOne
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T01:13:43.807Z","agent":{"ephemeral_id":"e993087a-c16f-4201-b5c0-55caa1b82d38","id":"debd178c-b8a2-4365-8024-647c18398d11","name":"NORDC-SS1-FS01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5156","created":"2024-07-27T01:13:45.025Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-SS1-FS01.stark.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a connection.\n\nApplication Information:\n\tProcess ID:\t\t10496\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tDirection:\t\tOutbound\n\tSource Address:\t\t192.168.14.222\n\tSource Port:\t\t64775\n\tDestination Address:\t192.168.10.46\n\tDestination Port:\t\t389\n\tProtocol:\t\t6\n\tInterface Index:\t\t12\n\nFilter Information:\n\tFilter Origin:\t\tS1-WFP-PROV-CTX\n\tFilter Run-Time ID:\t74664\n\tLayer Name:\t\tConnect\n\tLayer Run-Time ID:\t48\n\tRemote User ID:\t\tS-1-0-0\n\tRemote Mstarkine ID:\tS-1-0-0","organization":"stark","senderHost":"NORDC-SS1-FS01.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-SS1-FS01.stark.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","DestAddress":"192.168.10.46","DestPort":"389","Direction":"%%14593","FilterOrigin":"S1-WFP-PROV-CTX","FilterRTID":"74664","InterfaceIndex":"12","LayerName":"%%14611","LayerRTID":"48","ProcessID":"10496","Protocol":"6","RemoteMstarkineID":"S-1-0-0","RemoteUserID":"S-1-0-0","SourceAddress":"192.168.14.222","SourcePort":"64775"},"event_id":"5156","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":4964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":76729115,"task":"Filtering Platform Connection","version":1}}
|
This is a syslog message from a product called SentinelOne by SentinelOne. The following fields were extracted from the message:
fieldExtractorName: sentinelone
messageType: unknown
senderHost: NORDC-SS1-FS01.mingledorffs.com
sensitivity: normal
sourceInfo: unknown
streamName: sentinelone
tags: ['sentinelone', 'unknown']
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T01:13:43.807Z","agent":{"ephemeral_id":"e993087a-c16f-4201-b5c0-55caa1b82d38","id":"debd178c-b8a2-4365-8024-647c18398d11","name":"NORDC-SS1-FS01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5158","created":"2024-07-27T01:13:45.025Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-SS1-FS01.oscorp.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a bind to a local port.\n\nApplication Information:\n\tProcess ID:\t\t10496\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tSource Address:\t\t0.0.0.0\n\tSource Port:\t\t64775\n\tProtocol:\t\t6\n\nFilter Information:\n\tFilter Run-Time ID:\t0\n\tLayer Name:\t\tResource Assignment\n\tLayer Run-Time ID:\t36","organization":"oscorp","senderHost":"NORDC-SS1-FS01.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-SS1-FS01.oscorp.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","FilterRTID":"0","LayerName":"%%14608","LayerRTID":"36","ProcessId":"10496","Protocol":"6","SourceAddress":"0.0.0.0","SourcePort":"64775"},"event_id":"5158","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":4964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":76729114,"task":"Filtering Platform Connection"}}
|
{
"fieldExtractorName": "sentinelone",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T01:13:43.807Z\",\"agent\":{\"ephemeral_id\":\"e993087a-c16f-4201-b5c0-55caa1b82d38\",\"id\":\"debd178c-b8a2-4365-8024-647c18398d11\",\"name\":\"NORDC-SS1-FS01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Filtering Platform Connection\",\"code\":\"5158\",\"created\":\"2024-07-27T01:13:45.025Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-SS1-FS01.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"The Windows Filtering Platform has permitted a bind to a local port.\\n\\nApplication Information:\\n\\tProcess ID:\\t\\t10496\\n\\tApplication Name:\\t\\\\device\\\\harddiskvolume2\\\\program files\\\\sentinelone\\\\sentinel agent 23.3.3.264\\\\sentinelagent.exe\\n\\nNetwork Information:\\n\\tSource Address:\\t\\t0.0.0.0\\n\\tSource Port:\\t\\t64775\\n\\tProtocol:\\t\\t6\\n\\nFilter Information:\\n\\tFilter Run-Time ID:\\t0\\n\\tLayer Name:\\t\\tResource Assignment\\n\\tLayer Run-Time ID:\\t36\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-SS1-FS01.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-SS1-FS01.oscorp.com\",\"event_data\":{\"Application\":\"\\\\device\\\\harddiskvolume2\\\\program files\\\\sentinelone\\\\sentinel agent 23.3.3.264\\\\sentinelagent.exe\",\"FilterRTID\":\"0\",\"LayerName\":\"%%14608\",\"LayerRTID\":\"36\",\"ProcessId\":\"10496\",\"Protocol\":\"6\",\"SourceAddress\":\"0.0.0.0\",\"SourcePort\":\"64775\"},\"event_id\":\"5158\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":4964}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":76729114,\"task\":\"Filtering Platform Connection\"}}",
"messageType": "unknown",
"senderHost": "NORDC-SS1-FS01.mingledorffs.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "sentinelone",
"tags": [
"sentinelone",
"unknown"
]
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T01:13:43.807Z","agent":{"ephemeral_id":"e993087a-c16f-4201-b5c0-55caa1b82d38","id":"debd178c-b8a2-4365-8024-647c18398d11","name":"NORDC-SS1-FS01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5158","created":"2024-07-27T01:13:45.025Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-SS1-FS01.oscorp.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a bind to a local port.\n\nApplication Information:\n\tProcess ID:\t\t10496\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tSource Address:\t\t0.0.0.0\n\tSource Port:\t\t64775\n\tProtocol:\t\t6\n\nFilter Information:\n\tFilter Run-Time ID:\t0\n\tLayer Name:\t\tResource Assignment\n\tLayer Run-Time ID:\t36","organization":"oscorp","senderHost":"NORDC-SS1-FS01.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-SS1-FS01.oscorp.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","FilterRTID":"0","LayerName":"%%14608","LayerRTID":"36","ProcessId":"10496","Protocol":"6","SourceAddress":"0.0.0.0","SourcePort":"64775"},"event_id":"5158","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":4964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":76729114,"task":"Filtering Platform Connection"}}
|
Product: SentinelOne
Vendor: SentinelOne
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T01:13:43.807Z","agent":{"ephemeral_id":"e993087a-c16f-4201-b5c0-55caa1b82d38","id":"debd178c-b8a2-4365-8024-647c18398d11","name":"NORDC-SS1-FS01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5158","created":"2024-07-27T01:13:45.025Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-SS1-FS01.oscorp.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a bind to a local port.\n\nApplication Information:\n\tProcess ID:\t\t10496\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tSource Address:\t\t0.0.0.0\n\tSource Port:\t\t64775\n\tProtocol:\t\t6\n\nFilter Information:\n\tFilter Run-Time ID:\t0\n\tLayer Name:\t\tResource Assignment\n\tLayer Run-Time ID:\t36","organization":"oscorp","senderHost":"NORDC-SS1-FS01.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-SS1-FS01.oscorp.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","FilterRTID":"0","LayerName":"%%14608","LayerRTID":"36","ProcessId":"10496","Protocol":"6","SourceAddress":"0.0.0.0","SourcePort":"64775"},"event_id":"5158","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":4964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":76729114,"task":"Filtering Platform Connection"}}
|
This is a syslog message from a product called SentinelOne by SentinelOne. The following fields were extracted from the message:
fieldExtractorName: sentinelone
messageType: unknown
senderHost: NORDC-SS1-FS01.mingledorffs.com
sensitivity: normal
sourceInfo: unknown
streamName: sentinelone
tags: ['sentinelone', 'unknown']
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:28:28.160Z","agent":{"ephemeral_id":"2684bcd2-4a2b-4981-9139-d620c6b2af92","id":"a5def5dd-6173-4dfd-bc91-3ca20122db53","name":"Nordc-APP-ADFS1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Server","code":"405","created":"2024-07-27T02:28:28.230Z","kind":"event","provider":"ADSync"},"host":{"name":"Nordc-APP-ADFS1.umbrella.com"},"log":{"level":"information"},"message":"Call sync ldap_bind for DomainName=UMBRELLA.COM, UserName=MSOL_58bd55ff84ea.","organization":"umbrella","senderHost":"192.168.10.55","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Nordc-APP-ADFS1.umbrella.com","event_data":{"param1":"UMBRELLA.COM","param2":"MSOL_58bd55ff84ea"},"event_id":"405","keywords":["Classic"],"provider_name":"ADSync","record_id":16090226,"task":"Server"}}
|
{
"action": "Server",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T02:28:28.160Z\",\"agent\":{\"ephemeral_id\":\"2684bcd2-4a2b-4981-9139-d620c6b2af92\",\"id\":\"a5def5dd-6173-4dfd-bc91-3ca20122db53\",\"name\":\"Nordc-APP-ADFS1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Server\",\"code\":\"405\",\"created\":\"2024-07-27T02:28:28.230Z\",\"kind\":\"event\",\"provider\":\"ADSync\"},\"host\":{\"name\":\"Nordc-APP-ADFS1.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"Call sync ldap_bind for DomainName=UMBRELLA.COM, UserName=MSOL_58bd55ff84ea.\",\"organization\":\"umbrella\",\"senderHost\":\"192.168.10.55\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"Nordc-APP-ADFS1.umbrella.com\",\"event_data\":{\"param1\":\"UMBRELLA.COM\",\"param2\":\"MSOL_58bd55ff84ea\"},\"event_id\":\"405\",\"keywords\":[\"Classic\"],\"provider_name\":\"ADSync\",\"record_id\":16090226,\"task\":\"Server\"}}",
"messageType": "405",
"senderHost": "192.168.10.55",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "adsync",
"tags": [
"v8",
"eventId:405",
"adsync",
"405"
],
"vendorCode": "16090226"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:28:28.160Z","agent":{"ephemeral_id":"2684bcd2-4a2b-4981-9139-d620c6b2af92","id":"a5def5dd-6173-4dfd-bc91-3ca20122db53","name":"Nordc-APP-ADFS1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Server","code":"405","created":"2024-07-27T02:28:28.230Z","kind":"event","provider":"ADSync"},"host":{"name":"Nordc-APP-ADFS1.umbrella.com"},"log":{"level":"information"},"message":"Call sync ldap_bind for DomainName=UMBRELLA.COM, UserName=MSOL_58bd55ff84ea.","organization":"umbrella","senderHost":"192.168.10.55","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Nordc-APP-ADFS1.umbrella.com","event_data":{"param1":"UMBRELLA.COM","param2":"MSOL_58bd55ff84ea"},"event_id":"405","keywords":["Classic"],"provider_name":"ADSync","record_id":16090226,"task":"Server"}}
|
Product: adsync
Vendor: adsync
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:28:28.160Z","agent":{"ephemeral_id":"2684bcd2-4a2b-4981-9139-d620c6b2af92","id":"a5def5dd-6173-4dfd-bc91-3ca20122db53","name":"Nordc-APP-ADFS1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Server","code":"405","created":"2024-07-27T02:28:28.230Z","kind":"event","provider":"ADSync"},"host":{"name":"Nordc-APP-ADFS1.umbrella.com"},"log":{"level":"information"},"message":"Call sync ldap_bind for DomainName=UMBRELLA.COM, UserName=MSOL_58bd55ff84ea.","organization":"umbrella","senderHost":"192.168.10.55","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Nordc-APP-ADFS1.umbrella.com","event_data":{"param1":"UMBRELLA.COM","param2":"MSOL_58bd55ff84ea"},"event_id":"405","keywords":["Classic"],"provider_name":"ADSync","record_id":16090226,"task":"Server"}}
|
This is a syslog message from a product called adsync by adsync. The following fields were extracted from the message:
action: Server
fieldExtractorName: winlogbeat
messageType: 405
senderHost: 192.168.10.55
sensitivity: normal
sourceInfo: unknown
streamName: adsync
tags: ['v8', 'eventId:405', 'adsync', '405']
vendorCode: 16090226
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:28:28.175Z","agent":{"ephemeral_id":"2684bcd2-4a2b-4981-9139-d620c6b2af92","id":"a5def5dd-6173-4dfd-bc91-3ca20122db53","name":"Nordc-APP-ADFS1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Management Agent Run Profile","code":"6946","created":"2024-07-27T02:28:28.230Z","kind":"event","provider":"ADSync"},"host":{"name":"Nordc-APP-ADFS1.umbrella.com"},"log":{"level":"information"},"message":"Internal Connector run settings: \nConnector name: umbrella.com\nDomain (partition): DC=umbrella,DC=com\nLogin User domain: UMBRELLA.COM\nLogin User name: MSOL_58bd55ff84ea\nWhistler mode: Yes\n2008R2 mode: Yes\nIsRecycleBinEnabled: Yes\nACL Security: Yes\nDeleted Objects Container: CN=Deleted Objects,DC=umbrella,DC=com","organization":"umbrella","senderHost":"192.168.10.55","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Nordc-APP-ADFS1.umbrella.com","event_data":{"param1":"Internal Connector run settings: \nConnector name: umbrella.com\nDomain (partition): DC=umbrella,DC=com\nLogin User domain: UMBRELLA.COM\nLogin User name: MSOL_58bd55ff84ea\nWhistler mode: Yes\n2008R2 mode: Yes\nIsRecycleBinEnabled: Yes\nACL Security: Yes\nDeleted Objects Container: CN=Deleted Objects,DC=umbrella,DC=com"},"event_id":"6946","keywords":["Classic"],"provider_name":"ADSync","record_id":16090227,"task":"Management Agent Run Profile"}}
|
{
"action": "Management Agent Run Profile",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T02:28:28.175Z\",\"agent\":{\"ephemeral_id\":\"2684bcd2-4a2b-4981-9139-d620c6b2af92\",\"id\":\"a5def5dd-6173-4dfd-bc91-3ca20122db53\",\"name\":\"Nordc-APP-ADFS1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Management Agent Run Profile\",\"code\":\"6946\",\"created\":\"2024-07-27T02:28:28.230Z\",\"kind\":\"event\",\"provider\":\"ADSync\"},\"host\":{\"name\":\"Nordc-APP-ADFS1.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"Internal Connector run settings: \\nConnector name: umbrella.com\\nDomain (partition): DC=umbrella,DC=com\\nLogin User domain: UMBRELLA.COM\\nLogin User name: MSOL_58bd55ff84ea\\nWhistler mode: Yes\\n2008R2 mode: Yes\\nIsRecycleBinEnabled: Yes\\nACL Security: Yes\\nDeleted Objects Container: CN=Deleted Objects,DC=umbrella,DC=com\",\"organization\":\"umbrella\",\"senderHost\":\"192.168.10.55\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"Nordc-APP-ADFS1.umbrella.com\",\"event_data\":{\"param1\":\"Internal Connector run settings: \\nConnector name: umbrella.com\\nDomain (partition): DC=umbrella,DC=com\\nLogin User domain: UMBRELLA.COM\\nLogin User name: MSOL_58bd55ff84ea\\nWhistler mode: Yes\\n2008R2 mode: Yes\\nIsRecycleBinEnabled: Yes\\nACL Security: Yes\\nDeleted Objects Container: CN=Deleted Objects,DC=umbrella,DC=com\"},\"event_id\":\"6946\",\"keywords\":[\"Classic\"],\"provider_name\":\"ADSync\",\"record_id\":16090227,\"task\":\"Management Agent Run Profile\"}}",
"messageType": "6946",
"senderHost": "192.168.10.55",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "adsync",
"tags": [
"v8",
"eventId:6946",
"adsync",
"6946"
],
"vendorCode": "16090227"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:28:28.175Z","agent":{"ephemeral_id":"2684bcd2-4a2b-4981-9139-d620c6b2af92","id":"a5def5dd-6173-4dfd-bc91-3ca20122db53","name":"Nordc-APP-ADFS1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Management Agent Run Profile","code":"6946","created":"2024-07-27T02:28:28.230Z","kind":"event","provider":"ADSync"},"host":{"name":"Nordc-APP-ADFS1.umbrella.com"},"log":{"level":"information"},"message":"Internal Connector run settings: \nConnector name: umbrella.com\nDomain (partition): DC=umbrella,DC=com\nLogin User domain: UMBRELLA.COM\nLogin User name: MSOL_58bd55ff84ea\nWhistler mode: Yes\n2008R2 mode: Yes\nIsRecycleBinEnabled: Yes\nACL Security: Yes\nDeleted Objects Container: CN=Deleted Objects,DC=umbrella,DC=com","organization":"umbrella","senderHost":"192.168.10.55","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Nordc-APP-ADFS1.umbrella.com","event_data":{"param1":"Internal Connector run settings: \nConnector name: umbrella.com\nDomain (partition): DC=umbrella,DC=com\nLogin User domain: UMBRELLA.COM\nLogin User name: MSOL_58bd55ff84ea\nWhistler mode: Yes\n2008R2 mode: Yes\nIsRecycleBinEnabled: Yes\nACL Security: Yes\nDeleted Objects Container: CN=Deleted Objects,DC=umbrella,DC=com"},"event_id":"6946","keywords":["Classic"],"provider_name":"ADSync","record_id":16090227,"task":"Management Agent Run Profile"}}
|
Product: adsync
Vendor: adsync
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:28:28.175Z","agent":{"ephemeral_id":"2684bcd2-4a2b-4981-9139-d620c6b2af92","id":"a5def5dd-6173-4dfd-bc91-3ca20122db53","name":"Nordc-APP-ADFS1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Management Agent Run Profile","code":"6946","created":"2024-07-27T02:28:28.230Z","kind":"event","provider":"ADSync"},"host":{"name":"Nordc-APP-ADFS1.umbrella.com"},"log":{"level":"information"},"message":"Internal Connector run settings: \nConnector name: umbrella.com\nDomain (partition): DC=umbrella,DC=com\nLogin User domain: UMBRELLA.COM\nLogin User name: MSOL_58bd55ff84ea\nWhistler mode: Yes\n2008R2 mode: Yes\nIsRecycleBinEnabled: Yes\nACL Security: Yes\nDeleted Objects Container: CN=Deleted Objects,DC=umbrella,DC=com","organization":"umbrella","senderHost":"192.168.10.55","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Nordc-APP-ADFS1.umbrella.com","event_data":{"param1":"Internal Connector run settings: \nConnector name: umbrella.com\nDomain (partition): DC=umbrella,DC=com\nLogin User domain: UMBRELLA.COM\nLogin User name: MSOL_58bd55ff84ea\nWhistler mode: Yes\n2008R2 mode: Yes\nIsRecycleBinEnabled: Yes\nACL Security: Yes\nDeleted Objects Container: CN=Deleted Objects,DC=umbrella,DC=com"},"event_id":"6946","keywords":["Classic"],"provider_name":"ADSync","record_id":16090227,"task":"Management Agent Run Profile"}}
|
This is a syslog message from a product called adsync by adsync. The following fields were extracted from the message:
action: Management Agent Run Profile
fieldExtractorName: winlogbeat
messageType: 6946
senderHost: 192.168.10.55
sensitivity: normal
sourceInfo: unknown
streamName: adsync
tags: ['v8', 'eventId:6946', 'adsync', '6946']
vendorCode: 16090227
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T11:40:01.433Z","agent":{"ephemeral_id":"e8fb59cc-e149-43a7-ab4b-53ab61624426","id":"68d26628-116d-42f1-a6e0-d53dfced01df","name":"NORDC-APP-LATz1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1502","created":"2024-07-26T11:40:02.125Z","kind":"event","provider":"Microsoft-Windows-GroupPolicy"},"host":{"name":"NORDC-APP-LATz1.wayne.com"},"log":{"level":"information"},"message":"The Group Policy settings for the computer were processed successfully. New settings from 9 Group Policy objects were detected and applied.","organization":"wayne","senderHost":"192.168.12.141","sensitivity":"normal","winlog":{"activity_id":"{e15b1e98-1e98-4a03-8b14-1242699f81a6}","api":"wineventlog","channel":"System","computer_name":"NORDC-APP-LATz1.wayne.com","event_data":{"DCName":"\\\\Nordc-DC-03.wayne.com","NumberOfGroupPolicyObjects":"9","ProcessingMode":"0","ProcessingTimeInMilliseconds":"2359","SupportInfo1":"1","SupportInfo2":"4352"},"event_id":"1502","opcode":"Start","process":{"pid":1564,"thread":{"id":2188}},"provider_guid":"{aea1b4fa-97d1-45f2-a64c-4d69fffd92c9}","provider_name":"Microsoft-Windows-GroupPolicy","record_id":217982,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}}
|
{
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-26T11:40:01.433Z\",\"agent\":{\"ephemeral_id\":\"e8fb59cc-e149-43a7-ab4b-53ab61624426\",\"id\":\"68d26628-116d-42f1-a6e0-d53dfced01df\",\"name\":\"NORDC-APP-LATz1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"1502\",\"created\":\"2024-07-26T11:40:02.125Z\",\"kind\":\"event\",\"provider\":\"Microsoft-Windows-GroupPolicy\"},\"host\":{\"name\":\"NORDC-APP-LATz1.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"The Group Policy settings for the computer were processed successfully. New settings from 9 Group Policy objects were detected and applied.\",\"organization\":\"wayne\",\"senderHost\":\"192.168.12.141\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{e15b1e98-1e98-4a03-8b14-1242699f81a6}\",\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"NORDC-APP-LATz1.wayne.com\",\"event_data\":{\"DCName\":\"\\\\\\\\Nordc-DC-03.wayne.com\",\"NumberOfGroupPolicyObjects\":\"9\",\"ProcessingMode\":\"0\",\"ProcessingTimeInMilliseconds\":\"2359\",\"SupportInfo1\":\"1\",\"SupportInfo2\":\"4352\"},\"event_id\":\"1502\",\"opcode\":\"Start\",\"process\":{\"pid\":1564,\"thread\":{\"id\":2188}},\"provider_guid\":\"{aea1b4fa-97d1-45f2-a64c-4d69fffd92c9}\",\"provider_name\":\"Microsoft-Windows-GroupPolicy\",\"record_id\":217982,\"task\":\"None\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-18\",\"name\":\"SYSTEM\",\"type\":\"User\"}}}",
"messageType": "1502",
"senderHost": "192.168.12.141",
"sensitivity": "normal",
"severityLabel": "Start",
"sourceInfo": "unknown",
"streamName": "microsoft-windows-grouppolicy",
"tags": [
"v8",
"eventId:1502",
"microsoft-windows-grouppolicy",
"1502"
],
"vendorCode": "217982"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T11:40:01.433Z","agent":{"ephemeral_id":"e8fb59cc-e149-43a7-ab4b-53ab61624426","id":"68d26628-116d-42f1-a6e0-d53dfced01df","name":"NORDC-APP-LATz1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1502","created":"2024-07-26T11:40:02.125Z","kind":"event","provider":"Microsoft-Windows-GroupPolicy"},"host":{"name":"NORDC-APP-LATz1.wayne.com"},"log":{"level":"information"},"message":"The Group Policy settings for the computer were processed successfully. New settings from 9 Group Policy objects were detected and applied.","organization":"wayne","senderHost":"192.168.12.141","sensitivity":"normal","winlog":{"activity_id":"{e15b1e98-1e98-4a03-8b14-1242699f81a6}","api":"wineventlog","channel":"System","computer_name":"NORDC-APP-LATz1.wayne.com","event_data":{"DCName":"\\\\Nordc-DC-03.wayne.com","NumberOfGroupPolicyObjects":"9","ProcessingMode":"0","ProcessingTimeInMilliseconds":"2359","SupportInfo1":"1","SupportInfo2":"4352"},"event_id":"1502","opcode":"Start","process":{"pid":1564,"thread":{"id":2188}},"provider_guid":"{aea1b4fa-97d1-45f2-a64c-4d69fffd92c9}","provider_name":"Microsoft-Windows-GroupPolicy","record_id":217982,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}}
|
Product: microsoft-windows-grouppolicy
Vendor: microsoft-windows-grouppolicy
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T11:40:01.433Z","agent":{"ephemeral_id":"e8fb59cc-e149-43a7-ab4b-53ab61624426","id":"68d26628-116d-42f1-a6e0-d53dfced01df","name":"NORDC-APP-LATz1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1502","created":"2024-07-26T11:40:02.125Z","kind":"event","provider":"Microsoft-Windows-GroupPolicy"},"host":{"name":"NORDC-APP-LATz1.wayne.com"},"log":{"level":"information"},"message":"The Group Policy settings for the computer were processed successfully. New settings from 9 Group Policy objects were detected and applied.","organization":"wayne","senderHost":"192.168.12.141","sensitivity":"normal","winlog":{"activity_id":"{e15b1e98-1e98-4a03-8b14-1242699f81a6}","api":"wineventlog","channel":"System","computer_name":"NORDC-APP-LATz1.wayne.com","event_data":{"DCName":"\\\\Nordc-DC-03.wayne.com","NumberOfGroupPolicyObjects":"9","ProcessingMode":"0","ProcessingTimeInMilliseconds":"2359","SupportInfo1":"1","SupportInfo2":"4352"},"event_id":"1502","opcode":"Start","process":{"pid":1564,"thread":{"id":2188}},"provider_guid":"{aea1b4fa-97d1-45f2-a64c-4d69fffd92c9}","provider_name":"Microsoft-Windows-GroupPolicy","record_id":217982,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"}}}
|
This is a syslog message from a product called microsoft-windows-grouppolicy by microsoft-windows-grouppolicy. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 1502
senderHost: 192.168.12.141
sensitivity: normal
severityLabel: Start
sourceInfo: unknown
streamName: microsoft-windows-grouppolicy
tags: ['v8', 'eventId:1502', 'microsoft-windows-grouppolicy', '1502']
vendorCode: 217982
|
Explain this syslog message
|
<43>1 2024-07-26T14:06:58.958382-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
{
"facilityCode": 5,
"facilityLabel": "syslogd",
"fieldExtractorName": "generic_log",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T14:06:58.958382-05:00",
"message": "<43>1 2024-07-26T14:06:58.958382-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]\n",
"messageType": "systemd_event",
"priority": 43,
"program": "rsyslogd",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"severityCode": 3,
"severityLabel": "error",
"sourceInfo": "unknown",
"streamName": "rsyslogd",
"tags": [
"rfc5424",
"rsyslogd",
"systemd_event"
]
}
|
Create a JSON artifact from the message
|
<43>1 2024-07-26T14:06:58.958382-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
Product: rsyslogd
Vendor: rsyslogd
|
Identify this syslog message
|
<43>1 2024-07-26T14:06:58.958382-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
This is a syslog message from a product called rsyslogd by rsyslogd. The following fields were extracted from the message:
facilityCode: 5
facilityLabel: syslogd
fieldExtractorName: generic_log
localHostname: vcenter
localStartTime: 2024-07-26T14:06:58.958382-05:00
messageType: systemd_event
priority: 43
program: rsyslogd
senderHost: 10.0.0.20
sensitivity: normal
severityCode: 3
severityLabel: error
sourceInfo: unknown
streamName: rsyslogd
tags: ['rfc5424', 'rsyslogd', 'systemd_event']
|
Explain this syslog message
|
<43>1 2024-07-26T14:06:58.955367-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
{
"facilityCode": 5,
"facilityLabel": "syslogd",
"fieldExtractorName": "generic_log",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T14:06:58.955367-05:00",
"message": "<43>1 2024-07-26T14:06:58.955367-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]\n",
"messageType": "systemd_event",
"priority": 43,
"program": "rsyslogd",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"severityCode": 3,
"severityLabel": "error",
"sourceInfo": "unknown",
"streamName": "rsyslogd",
"tags": [
"rfc5424",
"rsyslogd",
"systemd_event"
]
}
|
Create a JSON artifact from the message
|
<43>1 2024-07-26T14:06:58.955367-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
Product: rsyslogd
Vendor: rsyslogd
|
Identify this syslog message
|
<43>1 2024-07-26T14:06:58.955367-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
This is a syslog message from a product called rsyslogd by rsyslogd. The following fields were extracted from the message:
facilityCode: 5
facilityLabel: syslogd
fieldExtractorName: generic_log
localHostname: vcenter
localStartTime: 2024-07-26T14:06:58.955367-05:00
messageType: systemd_event
priority: 43
program: rsyslogd
senderHost: 10.0.0.20
sensitivity: normal
severityCode: 3
severityLabel: error
sourceInfo: unknown
streamName: rsyslogd
tags: ['rfc5424', 'rsyslogd', 'systemd_event']
|
Explain this syslog message
|
<43>1 2024-07-26T14:06:58.957123-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
{
"facilityCode": 5,
"facilityLabel": "syslogd",
"fieldExtractorName": "generic_log",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T14:06:58.957123-05:00",
"message": "<43>1 2024-07-26T14:06:58.957123-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]\n",
"messageType": "systemd_event",
"priority": 43,
"program": "rsyslogd",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"severityCode": 3,
"severityLabel": "error",
"sourceInfo": "unknown",
"streamName": "rsyslogd",
"tags": [
"rfc5424",
"rsyslogd",
"systemd_event"
]
}
|
Create a JSON artifact from the message
|
<43>1 2024-07-26T14:06:58.957123-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
Product: rsyslogd
Vendor: rsyslogd
|
Identify this syslog message
|
<43>1 2024-07-26T14:06:58.957123-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
This is a syslog message from a product called rsyslogd by rsyslogd. The following fields were extracted from the message:
facilityCode: 5
facilityLabel: syslogd
fieldExtractorName: generic_log
localHostname: vcenter
localStartTime: 2024-07-26T14:06:58.957123-05:00
messageType: systemd_event
priority: 43
program: rsyslogd
senderHost: 10.0.0.20
sensitivity: normal
severityCode: 3
severityLabel: error
sourceInfo: unknown
streamName: rsyslogd
tags: ['rfc5424', 'rsyslogd', 'systemd_event']
|
Explain this syslog message
|
<43>1 2024-07-26T14:06:58.950635-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
{
"facilityCode": 5,
"facilityLabel": "syslogd",
"fieldExtractorName": "generic_log",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T14:06:58.950635-05:00",
"message": "<43>1 2024-07-26T14:06:58.950635-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]\n",
"messageType": "systemd_event",
"priority": 43,
"program": "rsyslogd",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"severityCode": 3,
"severityLabel": "error",
"sourceInfo": "unknown",
"streamName": "rsyslogd",
"tags": [
"rfc5424",
"rsyslogd",
"systemd_event"
]
}
|
Create a JSON artifact from the message
|
<43>1 2024-07-26T14:06:58.950635-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
Product: rsyslogd
Vendor: rsyslogd
|
Identify this syslog message
|
<43>1 2024-07-26T14:06:58.950635-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
This is a syslog message from a product called rsyslogd by rsyslogd. The following fields were extracted from the message:
facilityCode: 5
facilityLabel: syslogd
fieldExtractorName: generic_log
localHostname: vcenter
localStartTime: 2024-07-26T14:06:58.950635-05:00
messageType: systemd_event
priority: 43
program: rsyslogd
senderHost: 10.0.0.20
sensitivity: normal
severityCode: 3
severityLabel: error
sourceInfo: unknown
streamName: rsyslogd
tags: ['rfc5424', 'rsyslogd', 'systemd_event']
|
Explain this syslog message
|
<43>1 2024-07-26T14:06:58.960066-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
{
"facilityCode": 5,
"facilityLabel": "syslogd",
"fieldExtractorName": "generic_log",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T14:06:58.960066-05:00",
"message": "<43>1 2024-07-26T14:06:58.960066-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]\n",
"messageType": "systemd_event",
"priority": 43,
"program": "rsyslogd",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"severityCode": 3,
"severityLabel": "error",
"sourceInfo": "unknown",
"streamName": "rsyslogd",
"tags": [
"rfc5424",
"rsyslogd",
"systemd_event"
]
}
|
Create a JSON artifact from the message
|
<43>1 2024-07-26T14:06:58.960066-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
Product: rsyslogd
Vendor: rsyslogd
|
Identify this syslog message
|
<43>1 2024-07-26T14:06:58.960066-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
This is a syslog message from a product called rsyslogd by rsyslogd. The following fields were extracted from the message:
facilityCode: 5
facilityLabel: syslogd
fieldExtractorName: generic_log
localHostname: vcenter
localStartTime: 2024-07-26T14:06:58.960066-05:00
messageType: systemd_event
priority: 43
program: rsyslogd
senderHost: 10.0.0.20
sensitivity: normal
severityCode: 3
severityLabel: error
sourceInfo: unknown
streamName: rsyslogd
tags: ['rfc5424', 'rsyslogd', 'systemd_event']
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T18:01:18.561Z","agent":{"ephemeral_id":"560ff567-a3d5-4557-8b6c-45687da4c8d6","id":"76eb9f91-c210-4b95-9288-5a2c5f4e1a67","name":"MicroixWeb01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1704","created":"2024-07-26T18:01:19.106Z","kind":"event","provider":"SceCli"},"host":{"name":"MicroixWeb01.DMZ.local"},"log":{"level":"information"},"message":"Security policy in the Group policy objects has been applied successfully.","organization":"stark","senderHost":"10.0.0.75","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"MicroixWeb01.DMZ.local","event_id":"1704","keywords":["Classic"],"provider_name":"SceCli","record_id":39203,"task":"None"}}
|
{
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-26T18:01:18.561Z\",\"agent\":{\"ephemeral_id\":\"560ff567-a3d5-4557-8b6c-45687da4c8d6\",\"id\":\"76eb9f91-c210-4b95-9288-5a2c5f4e1a67\",\"name\":\"MicroixWeb01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"1704\",\"created\":\"2024-07-26T18:01:19.106Z\",\"kind\":\"event\",\"provider\":\"SceCli\"},\"host\":{\"name\":\"MicroixWeb01.DMZ.local\"},\"log\":{\"level\":\"information\"},\"message\":\"Security policy in the Group policy objects has been applied successfully.\",\"organization\":\"stark\",\"senderHost\":\"10.0.0.75\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"MicroixWeb01.DMZ.local\",\"event_id\":\"1704\",\"keywords\":[\"Classic\"],\"provider_name\":\"SceCli\",\"record_id\":39203,\"task\":\"None\"}}",
"messageType": "1704",
"senderHost": "10.0.0.75",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "scecli",
"tags": [
"v8",
"eventId:1704",
"scecli",
"1704"
],
"vendorCode": "39203"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T18:01:18.561Z","agent":{"ephemeral_id":"560ff567-a3d5-4557-8b6c-45687da4c8d6","id":"76eb9f91-c210-4b95-9288-5a2c5f4e1a67","name":"MicroixWeb01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1704","created":"2024-07-26T18:01:19.106Z","kind":"event","provider":"SceCli"},"host":{"name":"MicroixWeb01.DMZ.local"},"log":{"level":"information"},"message":"Security policy in the Group policy objects has been applied successfully.","organization":"stark","senderHost":"10.0.0.75","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"MicroixWeb01.DMZ.local","event_id":"1704","keywords":["Classic"],"provider_name":"SceCli","record_id":39203,"task":"None"}}
|
Product: scecli
Vendor: scecli
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T18:01:18.561Z","agent":{"ephemeral_id":"560ff567-a3d5-4557-8b6c-45687da4c8d6","id":"76eb9f91-c210-4b95-9288-5a2c5f4e1a67","name":"MicroixWeb01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"1704","created":"2024-07-26T18:01:19.106Z","kind":"event","provider":"SceCli"},"host":{"name":"MicroixWeb01.DMZ.local"},"log":{"level":"information"},"message":"Security policy in the Group policy objects has been applied successfully.","organization":"stark","senderHost":"10.0.0.75","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"MicroixWeb01.DMZ.local","event_id":"1704","keywords":["Classic"],"provider_name":"SceCli","record_id":39203,"task":"None"}}
|
This is a syslog message from a product called scecli by scecli. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 1704
senderHost: 10.0.0.75
sensitivity: normal
sourceInfo: unknown
streamName: scecli
tags: ['v8', 'eventId:1704', 'scecli', '1704']
vendorCode: 39203
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T04:58:32.640Z","agent":{"ephemeral_id":"2684bcd2-4a2b-4981-9139-d620c6b2af92","id":"a5def5dd-6173-4dfd-bc91-3ca20122db53","name":"Nordc-APP-ADFS1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Server","code":"405","created":"2024-07-27T04:58:33.446Z","kind":"event","provider":"ADSync"},"host":{"name":"Nordc-APP-ADFS1.oscorp.com"},"log":{"level":"information"},"message":"Call sync ldap_bind for DomainName=OSCORP.COM, UserName=MSOL_58bd55ff84ea.","organization":"oscorp","senderHost":"192.168.10.55","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Nordc-APP-ADFS1.oscorp.com","event_data":{"param1":"OSCORP.COM","param2":"MSOL_58bd55ff84ea"},"event_id":"405","keywords":["Classic"],"provider_name":"ADSync","record_id":16091174,"task":"Server"}}
|
{
"action": "Server",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T04:58:32.640Z\",\"agent\":{\"ephemeral_id\":\"2684bcd2-4a2b-4981-9139-d620c6b2af92\",\"id\":\"a5def5dd-6173-4dfd-bc91-3ca20122db53\",\"name\":\"Nordc-APP-ADFS1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Server\",\"code\":\"405\",\"created\":\"2024-07-27T04:58:33.446Z\",\"kind\":\"event\",\"provider\":\"ADSync\"},\"host\":{\"name\":\"Nordc-APP-ADFS1.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"Call sync ldap_bind for DomainName=OSCORP.COM, UserName=MSOL_58bd55ff84ea.\",\"organization\":\"oscorp\",\"senderHost\":\"192.168.10.55\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"Nordc-APP-ADFS1.oscorp.com\",\"event_data\":{\"param1\":\"OSCORP.COM\",\"param2\":\"MSOL_58bd55ff84ea\"},\"event_id\":\"405\",\"keywords\":[\"Classic\"],\"provider_name\":\"ADSync\",\"record_id\":16091174,\"task\":\"Server\"}}",
"messageType": "405",
"senderHost": "192.168.10.55",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "adsync",
"tags": [
"v8",
"eventId:405",
"adsync",
"405"
],
"vendorCode": "16091174"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T04:58:32.640Z","agent":{"ephemeral_id":"2684bcd2-4a2b-4981-9139-d620c6b2af92","id":"a5def5dd-6173-4dfd-bc91-3ca20122db53","name":"Nordc-APP-ADFS1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Server","code":"405","created":"2024-07-27T04:58:33.446Z","kind":"event","provider":"ADSync"},"host":{"name":"Nordc-APP-ADFS1.oscorp.com"},"log":{"level":"information"},"message":"Call sync ldap_bind for DomainName=OSCORP.COM, UserName=MSOL_58bd55ff84ea.","organization":"oscorp","senderHost":"192.168.10.55","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Nordc-APP-ADFS1.oscorp.com","event_data":{"param1":"OSCORP.COM","param2":"MSOL_58bd55ff84ea"},"event_id":"405","keywords":["Classic"],"provider_name":"ADSync","record_id":16091174,"task":"Server"}}
|
Product: adsync
Vendor: adsync
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T04:58:32.640Z","agent":{"ephemeral_id":"2684bcd2-4a2b-4981-9139-d620c6b2af92","id":"a5def5dd-6173-4dfd-bc91-3ca20122db53","name":"Nordc-APP-ADFS1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Server","code":"405","created":"2024-07-27T04:58:33.446Z","kind":"event","provider":"ADSync"},"host":{"name":"Nordc-APP-ADFS1.oscorp.com"},"log":{"level":"information"},"message":"Call sync ldap_bind for DomainName=OSCORP.COM, UserName=MSOL_58bd55ff84ea.","organization":"oscorp","senderHost":"192.168.10.55","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Nordc-APP-ADFS1.oscorp.com","event_data":{"param1":"OSCORP.COM","param2":"MSOL_58bd55ff84ea"},"event_id":"405","keywords":["Classic"],"provider_name":"ADSync","record_id":16091174,"task":"Server"}}
|
This is a syslog message from a product called adsync by adsync. The following fields were extracted from the message:
action: Server
fieldExtractorName: winlogbeat
messageType: 405
senderHost: 192.168.10.55
sensitivity: normal
sourceInfo: unknown
streamName: adsync
tags: ['v8', 'eventId:405', 'adsync', '405']
vendorCode: 16091174
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T04:58:32.655Z","agent":{"ephemeral_id":"2684bcd2-4a2b-4981-9139-d620c6b2af92","id":"a5def5dd-6173-4dfd-bc91-3ca20122db53","name":"Nordc-APP-ADFS1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Management Agent Run Profile","code":"6946","created":"2024-07-27T04:58:33.446Z","kind":"event","provider":"ADSync"},"host":{"name":"Nordc-APP-ADFS1.stark.com"},"log":{"level":"information"},"message":"Internal Connector run settings: \nConnector name: stark.com\nDomain (partition): DC=stark,DC=com\nLogin User domain: STARK.COM\nLogin User name: MSOL_58bd55ff84ea\nWhistler mode: Yes\n2008R2 mode: Yes\nIsRecycleBinEnabled: Yes\nACL Security: Yes\nDeleted Objects Container: CN=Deleted Objects,DC=stark,DC=com","organization":"stark","senderHost":"192.168.10.55","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Nordc-APP-ADFS1.stark.com","event_data":{"param1":"Internal Connector run settings: \nConnector name: stark.com\nDomain (partition): DC=stark,DC=com\nLogin User domain: STARK.COM\nLogin User name: MSOL_58bd55ff84ea\nWhistler mode: Yes\n2008R2 mode: Yes\nIsRecycleBinEnabled: Yes\nACL Security: Yes\nDeleted Objects Container: CN=Deleted Objects,DC=stark,DC=com"},"event_id":"6946","keywords":["Classic"],"provider_name":"ADSync","record_id":16091175,"task":"Management Agent Run Profile"}}
|
{
"action": "Management Agent Run Profile",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T04:58:32.655Z\",\"agent\":{\"ephemeral_id\":\"2684bcd2-4a2b-4981-9139-d620c6b2af92\",\"id\":\"a5def5dd-6173-4dfd-bc91-3ca20122db53\",\"name\":\"Nordc-APP-ADFS1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Management Agent Run Profile\",\"code\":\"6946\",\"created\":\"2024-07-27T04:58:33.446Z\",\"kind\":\"event\",\"provider\":\"ADSync\"},\"host\":{\"name\":\"Nordc-APP-ADFS1.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"Internal Connector run settings: \\nConnector name: stark.com\\nDomain (partition): DC=stark,DC=com\\nLogin User domain: STARK.COM\\nLogin User name: MSOL_58bd55ff84ea\\nWhistler mode: Yes\\n2008R2 mode: Yes\\nIsRecycleBinEnabled: Yes\\nACL Security: Yes\\nDeleted Objects Container: CN=Deleted Objects,DC=stark,DC=com\",\"organization\":\"stark\",\"senderHost\":\"192.168.10.55\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"Nordc-APP-ADFS1.stark.com\",\"event_data\":{\"param1\":\"Internal Connector run settings: \\nConnector name: stark.com\\nDomain (partition): DC=stark,DC=com\\nLogin User domain: STARK.COM\\nLogin User name: MSOL_58bd55ff84ea\\nWhistler mode: Yes\\n2008R2 mode: Yes\\nIsRecycleBinEnabled: Yes\\nACL Security: Yes\\nDeleted Objects Container: CN=Deleted Objects,DC=stark,DC=com\"},\"event_id\":\"6946\",\"keywords\":[\"Classic\"],\"provider_name\":\"ADSync\",\"record_id\":16091175,\"task\":\"Management Agent Run Profile\"}}",
"messageType": "6946",
"senderHost": "192.168.10.55",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "adsync",
"tags": [
"v8",
"eventId:6946",
"adsync",
"6946"
],
"vendorCode": "16091175"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T04:58:32.655Z","agent":{"ephemeral_id":"2684bcd2-4a2b-4981-9139-d620c6b2af92","id":"a5def5dd-6173-4dfd-bc91-3ca20122db53","name":"Nordc-APP-ADFS1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Management Agent Run Profile","code":"6946","created":"2024-07-27T04:58:33.446Z","kind":"event","provider":"ADSync"},"host":{"name":"Nordc-APP-ADFS1.stark.com"},"log":{"level":"information"},"message":"Internal Connector run settings: \nConnector name: stark.com\nDomain (partition): DC=stark,DC=com\nLogin User domain: STARK.COM\nLogin User name: MSOL_58bd55ff84ea\nWhistler mode: Yes\n2008R2 mode: Yes\nIsRecycleBinEnabled: Yes\nACL Security: Yes\nDeleted Objects Container: CN=Deleted Objects,DC=stark,DC=com","organization":"stark","senderHost":"192.168.10.55","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Nordc-APP-ADFS1.stark.com","event_data":{"param1":"Internal Connector run settings: \nConnector name: stark.com\nDomain (partition): DC=stark,DC=com\nLogin User domain: STARK.COM\nLogin User name: MSOL_58bd55ff84ea\nWhistler mode: Yes\n2008R2 mode: Yes\nIsRecycleBinEnabled: Yes\nACL Security: Yes\nDeleted Objects Container: CN=Deleted Objects,DC=stark,DC=com"},"event_id":"6946","keywords":["Classic"],"provider_name":"ADSync","record_id":16091175,"task":"Management Agent Run Profile"}}
|
Product: adsync
Vendor: adsync
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T04:58:32.655Z","agent":{"ephemeral_id":"2684bcd2-4a2b-4981-9139-d620c6b2af92","id":"a5def5dd-6173-4dfd-bc91-3ca20122db53","name":"Nordc-APP-ADFS1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Management Agent Run Profile","code":"6946","created":"2024-07-27T04:58:33.446Z","kind":"event","provider":"ADSync"},"host":{"name":"Nordc-APP-ADFS1.stark.com"},"log":{"level":"information"},"message":"Internal Connector run settings: \nConnector name: stark.com\nDomain (partition): DC=stark,DC=com\nLogin User domain: STARK.COM\nLogin User name: MSOL_58bd55ff84ea\nWhistler mode: Yes\n2008R2 mode: Yes\nIsRecycleBinEnabled: Yes\nACL Security: Yes\nDeleted Objects Container: CN=Deleted Objects,DC=stark,DC=com","organization":"stark","senderHost":"192.168.10.55","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"Nordc-APP-ADFS1.stark.com","event_data":{"param1":"Internal Connector run settings: \nConnector name: stark.com\nDomain (partition): DC=stark,DC=com\nLogin User domain: STARK.COM\nLogin User name: MSOL_58bd55ff84ea\nWhistler mode: Yes\n2008R2 mode: Yes\nIsRecycleBinEnabled: Yes\nACL Security: Yes\nDeleted Objects Container: CN=Deleted Objects,DC=stark,DC=com"},"event_id":"6946","keywords":["Classic"],"provider_name":"ADSync","record_id":16091175,"task":"Management Agent Run Profile"}}
|
This is a syslog message from a product called adsync by adsync. The following fields were extracted from the message:
action: Management Agent Run Profile
fieldExtractorName: winlogbeat
messageType: 6946
senderHost: 192.168.10.55
sensitivity: normal
sourceInfo: unknown
streamName: adsync
tags: ['v8', 'eventId:6946', 'adsync', '6946']
vendorCode: 16091175
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-31T09:45:01.021Z","agent":{"ephemeral_id":"03f0e780-e6f7-4f57-aba3-136d3309d30a","id":"dfc891f4-6232-4a7c-9ace-b1c918d618e9","name":"NVIPROCPRDSQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Job Engine","code":"208","created":"2024-07-31T09:45:01.247Z","kind":"event","provider":"SQLAgent$PAYGSQL01"},"host":{"name":"NVIPROCPRDSQL01.prdnvi.oscorpint.com"},"log":{"level":"warning"},"message":"SQL Server Scheduled Job 'SSIS Failover Monitor Job' (0x0F1B2606898D4A4683822970A98DD2C0) - Status: Failed - Invoked on: 2024-07-31 05:36:00 - Message: The job failed. The Job was invoked by Schedule 10 (Monitor Scheduler). The last step to run was step 1 (AlwaysOn Failover Monitor).","organization":"oscorp","senderHost":"10.160.22.36","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDSQL01.prdnvi.oscorpint.com","event_data":{"param1":"SSIS Failover Monitor Job","param2":"0x0F1B2606898D4A4683822970A98DD2C0","param3":"Failed","param4":"2024-07-31 05:36:00","param5":"The job failed. The Job was invoked by Schedule 10 (Monitor Scheduler). The last step to run was step 1 (AlwaysOn Failover Monitor)."},"event_id":"208","keywords":["Classic"],"provider_name":"SQLAgent$PAYGSQL01","record_id":85211781,"task":"Job Engine"}}
|
{
"action": "Job Engine",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-31T09:45:01.021Z\",\"agent\":{\"ephemeral_id\":\"03f0e780-e6f7-4f57-aba3-136d3309d30a\",\"id\":\"dfc891f4-6232-4a7c-9ace-b1c918d618e9\",\"name\":\"NVIPROCPRDSQL01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Job Engine\",\"code\":\"208\",\"created\":\"2024-07-31T09:45:01.247Z\",\"kind\":\"event\",\"provider\":\"SQLAgent$PAYGSQL01\"},\"host\":{\"name\":\"NVIPROCPRDSQL01.prdnvi.oscorpint.com\"},\"log\":{\"level\":\"warning\"},\"message\":\"SQL Server Scheduled Job 'SSIS Failover Monitor Job' (0x0F1B2606898D4A4683822970A98DD2C0) - Status: Failed - Invoked on: 2024-07-31 05:36:00 - Message: The job failed. The Job was invoked by Schedule 10 (Monitor Scheduler). The last step to run was step 1 (AlwaysOn Failover Monitor).\",\"organization\":\"oscorp\",\"senderHost\":\"10.160.22.36\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"NVIPROCPRDSQL01.prdnvi.oscorpint.com\",\"event_data\":{\"param1\":\"SSIS Failover Monitor Job\",\"param2\":\"0x0F1B2606898D4A4683822970A98DD2C0\",\"param3\":\"Failed\",\"param4\":\"2024-07-31 05:36:00\",\"param5\":\"The job failed. The Job was invoked by Schedule 10 (Monitor Scheduler). The last step to run was step 1 (AlwaysOn Failover Monitor).\"},\"event_id\":\"208\",\"keywords\":[\"Classic\"],\"provider_name\":\"SQLAgent$PAYGSQL01\",\"record_id\":85211781,\"task\":\"Job Engine\"}}",
"messageType": "208",
"senderHost": "10.160.22.36",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "sqlagent$paygsql01",
"tags": [
"v8",
"eventId:208",
"sqlagent$paygsql01",
"208"
],
"vendorCode": "85211781"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-31T09:45:01.021Z","agent":{"ephemeral_id":"03f0e780-e6f7-4f57-aba3-136d3309d30a","id":"dfc891f4-6232-4a7c-9ace-b1c918d618e9","name":"NVIPROCPRDSQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Job Engine","code":"208","created":"2024-07-31T09:45:01.247Z","kind":"event","provider":"SQLAgent$PAYGSQL01"},"host":{"name":"NVIPROCPRDSQL01.prdnvi.oscorpint.com"},"log":{"level":"warning"},"message":"SQL Server Scheduled Job 'SSIS Failover Monitor Job' (0x0F1B2606898D4A4683822970A98DD2C0) - Status: Failed - Invoked on: 2024-07-31 05:36:00 - Message: The job failed. The Job was invoked by Schedule 10 (Monitor Scheduler). The last step to run was step 1 (AlwaysOn Failover Monitor).","organization":"oscorp","senderHost":"10.160.22.36","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDSQL01.prdnvi.oscorpint.com","event_data":{"param1":"SSIS Failover Monitor Job","param2":"0x0F1B2606898D4A4683822970A98DD2C0","param3":"Failed","param4":"2024-07-31 05:36:00","param5":"The job failed. The Job was invoked by Schedule 10 (Monitor Scheduler). The last step to run was step 1 (AlwaysOn Failover Monitor)."},"event_id":"208","keywords":["Classic"],"provider_name":"SQLAgent$PAYGSQL01","record_id":85211781,"task":"Job Engine"}}
|
Product: sqlagent$paygsql01
Vendor: sqlagent$paygsql01
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-31T09:45:01.021Z","agent":{"ephemeral_id":"03f0e780-e6f7-4f57-aba3-136d3309d30a","id":"dfc891f4-6232-4a7c-9ace-b1c918d618e9","name":"NVIPROCPRDSQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Job Engine","code":"208","created":"2024-07-31T09:45:01.247Z","kind":"event","provider":"SQLAgent$PAYGSQL01"},"host":{"name":"NVIPROCPRDSQL01.prdnvi.oscorpint.com"},"log":{"level":"warning"},"message":"SQL Server Scheduled Job 'SSIS Failover Monitor Job' (0x0F1B2606898D4A4683822970A98DD2C0) - Status: Failed - Invoked on: 2024-07-31 05:36:00 - Message: The job failed. The Job was invoked by Schedule 10 (Monitor Scheduler). The last step to run was step 1 (AlwaysOn Failover Monitor).","organization":"oscorp","senderHost":"10.160.22.36","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDSQL01.prdnvi.oscorpint.com","event_data":{"param1":"SSIS Failover Monitor Job","param2":"0x0F1B2606898D4A4683822970A98DD2C0","param3":"Failed","param4":"2024-07-31 05:36:00","param5":"The job failed. The Job was invoked by Schedule 10 (Monitor Scheduler). The last step to run was step 1 (AlwaysOn Failover Monitor)."},"event_id":"208","keywords":["Classic"],"provider_name":"SQLAgent$PAYGSQL01","record_id":85211781,"task":"Job Engine"}}
|
This is a syslog message from a product called sqlagent$paygsql01 by sqlagent$paygsql01. The following fields were extracted from the message:
action: Job Engine
fieldExtractorName: winlogbeat
messageType: 208
senderHost: 10.160.22.36
sensitivity: normal
sourceInfo: unknown
streamName: sqlagent$paygsql01
tags: ['v8', 'eventId:208', 'sqlagent$paygsql01', '208']
vendorCode: 85211781
|
Explain this syslog message
|
<43>1 2024-07-26T20:14:23.068729-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
{
"facilityCode": 5,
"facilityLabel": "syslogd",
"fieldExtractorName": "generic_log",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T20:14:23.068729-05:00",
"message": "<43>1 2024-07-26T20:14:23.068729-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]\n",
"messageType": "systemd_event",
"priority": 43,
"program": "rsyslogd",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"severityCode": 3,
"severityLabel": "error",
"sourceInfo": "unknown",
"streamName": "rsyslogd",
"tags": [
"rfc5424",
"rsyslogd",
"systemd_event"
]
}
|
Create a JSON artifact from the message
|
<43>1 2024-07-26T20:14:23.068729-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
Product: rsyslogd
Vendor: rsyslogd
|
Identify this syslog message
|
<43>1 2024-07-26T20:14:23.068729-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
This is a syslog message from a product called rsyslogd by rsyslogd. The following fields were extracted from the message:
facilityCode: 5
facilityLabel: syslogd
fieldExtractorName: generic_log
localHostname: vcenter
localStartTime: 2024-07-26T20:14:23.068729-05:00
messageType: systemd_event
priority: 43
program: rsyslogd
senderHost: 10.0.0.20
sensitivity: normal
severityCode: 3
severityLabel: error
sourceInfo: unknown
streamName: rsyslogd
tags: ['rfc5424', 'rsyslogd', 'systemd_event']
|
Explain this syslog message
|
<134>Jul 27 13:26:34 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1908|AWS Account Synchronization Requested|3|src=4.84.224.117 suser=nighthawk target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
{
"clientIP": "4.84.224.117",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "cef",
"localHostname": "deepsecurity",
"localStartTime": "Jul 27 13:26:34",
"message": "<134>Jul 27 13:26:34 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1908|AWS Account Synchronization Requested|3|src=4.84.224.117 suser=nighthawk target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 ",
"messageType": "AWS Account Synchronization Requested",
"priority": 134,
"senderHost": "34.205.5.2",
"sensitivity": "normal",
"severityCode": 7,
"severityLabel": "debug",
"sourceInfo": "unknown",
"streamName": "trend micro_deep security manager",
"tags": [
"trend micro_deep security manager",
"AWS Account Synchronization Requested",
"rfc3164",
"cef",
"trend micro_deep security manager_AWS Account Synchronization Requested"
],
"userName": "nighthawk",
"vendorCode": "1908"
}
|
Create a JSON artifact from the message
|
<134>Jul 27 13:26:34 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1908|AWS Account Synchronization Requested|3|src=4.84.224.117 suser=nighthawk target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
Product: trend micro_deep security manager
Vendor: trend micro_deep security manager
|
Identify this syslog message
|
<134>Jul 27 13:26:34 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1908|AWS Account Synchronization Requested|3|src=4.84.224.117 suser=nighthawk target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
This is a syslog message from a product called trend micro_deep security manager by trend micro_deep security manager. The following fields were extracted from the message:
clientIP: 4.84.224.117
facilityCode: 16
facilityLabel: local0
fieldExtractorName: cef
localHostname: deepsecurity
localStartTime: Jul 27 13:26:34
messageType: AWS Account Synchronization Requested
priority: 134
senderHost: 34.205.5.2
sensitivity: normal
severityCode: 7
severityLabel: debug
sourceInfo: unknown
streamName: trend micro_deep security manager
tags: ['trend micro_deep security manager', 'AWS Account Synchronization Requested', 'rfc3164', 'cef', 'trend micro_deep security manager_AWS Account Synchronization Requested']
userName: nighthawk
vendorCode: 1908
|
Explain this syslog message
|
<134>1 2024-07-26T08:10:07.562834-05:00 vcenter vapi-endpoint-access - - - 2024-07-26T08:10:07.562-05:00 | vAPI-I/O dispatcher-1 | 140.252.244.74 - - [26/Jul/2024:13:10:07 +0000] "POST /rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges HTTP/1.1" 200 16 "-" "Go-http-client/1.1" 5
|
{
"clientIP": "140.252.244.74",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "apache",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T08:10:07.562834-05:00",
"message": "<134>1 2024-07-26T08:10:07.562834-05:00 vcenter vapi-endpoint-access - - - 2024-07-26T08:10:07.562-05:00 | vAPI-I/O dispatcher-1 | 140.252.244.74 - - [26/Jul/2024:13:10:07 +0000] \"POST /rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges HTTP/1.1\" 200 16 \"-\" \"Go-http-client/1.1\" 5\n",
"messageType": "access_log",
"priority": 134,
"program": "vapi-endpoint-access",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"serverBytes": 16,
"severityCode": 6,
"severityLabel": "informational",
"sourceInfo": "unknown",
"streamName": "apache_access_log",
"tags": [
"access_log",
"HTTP:POST",
"rfc5424",
"apache_access_log",
"HTTP_RESPONSE_CODE:200",
"apache"
],
"uri": "/rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges"
}
|
Create a JSON artifact from the message
|
<134>1 2024-07-26T08:10:07.562834-05:00 vcenter vapi-endpoint-access - - - 2024-07-26T08:10:07.562-05:00 | vAPI-I/O dispatcher-1 | 140.252.244.74 - - [26/Jul/2024:13:10:07 +0000] "POST /rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges HTTP/1.1" 200 16 "-" "Go-http-client/1.1" 5
|
Product: Apache Web Server
Vendor: Apache
|
Identify this syslog message
|
<134>1 2024-07-26T08:10:07.562834-05:00 vcenter vapi-endpoint-access - - - 2024-07-26T08:10:07.562-05:00 | vAPI-I/O dispatcher-1 | 140.252.244.74 - - [26/Jul/2024:13:10:07 +0000] "POST /rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges HTTP/1.1" 200 16 "-" "Go-http-client/1.1" 5
|
This is a syslog message from a product called Apache Web Server by Apache. The following fields were extracted from the message:
clientIP: 140.252.244.74
facilityCode: 16
facilityLabel: local0
fieldExtractorName: apache
localHostname: vcenter
localStartTime: 2024-07-26T08:10:07.562834-05:00
messageType: access_log
priority: 134
program: vapi-endpoint-access
senderHost: 10.0.0.20
sensitivity: normal
serverBytes: 16
severityCode: 6
severityLabel: informational
sourceInfo: unknown
streamName: apache_access_log
tags: ['access_log', 'HTTP:POST', 'rfc5424', 'apache_access_log', 'HTTP_RESPONSE_CODE:200', 'apache']
uri: /rest/com/vmware/cis/authz/privilege?~action=batch-has-privileges
|
Explain this syslog message
|
<43>1 2024-07-26T07:19:21.141187-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
{
"facilityCode": 5,
"facilityLabel": "syslogd",
"fieldExtractorName": "generic_log",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T07:19:21.141187-05:00",
"message": "<43>1 2024-07-26T07:19:21.141187-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]\n",
"messageType": "systemd_event",
"priority": 43,
"program": "rsyslogd",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"severityCode": 3,
"severityLabel": "error",
"sourceInfo": "unknown",
"streamName": "rsyslogd",
"tags": [
"rfc5424",
"rsyslogd",
"systemd_event"
]
}
|
Create a JSON artifact from the message
|
<43>1 2024-07-26T07:19:21.141187-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
Product: rsyslogd
Vendor: rsyslogd
|
Identify this syslog message
|
<43>1 2024-07-26T07:19:21.141187-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
This is a syslog message from a product called rsyslogd by rsyslogd. The following fields were extracted from the message:
facilityCode: 5
facilityLabel: syslogd
fieldExtractorName: generic_log
localHostname: vcenter
localStartTime: 2024-07-26T07:19:21.141187-05:00
messageType: systemd_event
priority: 43
program: rsyslogd
senderHost: 10.0.0.20
sensitivity: normal
severityCode: 3
severityLabel: error
sourceInfo: unknown
streamName: rsyslogd
tags: ['rfc5424', 'rsyslogd', 'systemd_event']
|
Explain this syslog message
|
<43>1 2024-07-26T07:19:21.143173-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
{
"facilityCode": 5,
"facilityLabel": "syslogd",
"fieldExtractorName": "generic_log",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T07:19:21.143173-05:00",
"message": "<43>1 2024-07-26T07:19:21.143173-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]\n",
"messageType": "systemd_event",
"priority": 43,
"program": "rsyslogd",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"severityCode": 3,
"severityLabel": "error",
"sourceInfo": "unknown",
"streamName": "rsyslogd",
"tags": [
"rfc5424",
"rsyslogd",
"systemd_event"
]
}
|
Create a JSON artifact from the message
|
<43>1 2024-07-26T07:19:21.143173-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
Product: rsyslogd
Vendor: rsyslogd
|
Identify this syslog message
|
<43>1 2024-07-26T07:19:21.143173-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
This is a syslog message from a product called rsyslogd by rsyslogd. The following fields were extracted from the message:
facilityCode: 5
facilityLabel: syslogd
fieldExtractorName: generic_log
localHostname: vcenter
localStartTime: 2024-07-26T07:19:21.143173-05:00
messageType: systemd_event
priority: 43
program: rsyslogd
senderHost: 10.0.0.20
sensitivity: normal
severityCode: 3
severityLabel: error
sourceInfo: unknown
streamName: rsyslogd
tags: ['rfc5424', 'rsyslogd', 'systemd_event']
|
Explain this syslog message
|
<43>1 2024-07-26T07:19:21.133584-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
{
"facilityCode": 5,
"facilityLabel": "syslogd",
"fieldExtractorName": "generic_log",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T07:19:21.133584-05:00",
"message": "<43>1 2024-07-26T07:19:21.133584-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]\n",
"messageType": "systemd_event",
"priority": 43,
"program": "rsyslogd",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"severityCode": 3,
"severityLabel": "error",
"sourceInfo": "unknown",
"streamName": "rsyslogd",
"tags": [
"rfc5424",
"rsyslogd",
"systemd_event"
]
}
|
Create a JSON artifact from the message
|
<43>1 2024-07-26T07:19:21.133584-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
Product: rsyslogd
Vendor: rsyslogd
|
Identify this syslog message
|
<43>1 2024-07-26T07:19:21.133584-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
This is a syslog message from a product called rsyslogd by rsyslogd. The following fields were extracted from the message:
facilityCode: 5
facilityLabel: syslogd
fieldExtractorName: generic_log
localHostname: vcenter
localStartTime: 2024-07-26T07:19:21.133584-05:00
messageType: systemd_event
priority: 43
program: rsyslogd
senderHost: 10.0.0.20
sensitivity: normal
severityCode: 3
severityLabel: error
sourceInfo: unknown
streamName: rsyslogd
tags: ['rfc5424', 'rsyslogd', 'systemd_event']
|
Explain this syslog message
|
<43>1 2024-07-26T07:19:21.130595-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
{
"facilityCode": 5,
"facilityLabel": "syslogd",
"fieldExtractorName": "generic_log",
"localHostname": "vcenter",
"localStartTime": "2024-07-26T07:19:21.130595-05:00",
"message": "<43>1 2024-07-26T07:19:21.130595-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]\n",
"messageType": "systemd_event",
"priority": 43,
"program": "rsyslogd",
"senderHost": "10.0.0.20",
"sensitivity": "normal",
"severityCode": 3,
"severityLabel": "error",
"sourceInfo": "unknown",
"streamName": "rsyslogd",
"tags": [
"rfc5424",
"rsyslogd",
"systemd_event"
]
}
|
Create a JSON artifact from the message
|
<43>1 2024-07-26T07:19:21.130595-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
Product: rsyslogd
Vendor: rsyslogd
|
Identify this syslog message
|
<43>1 2024-07-26T07:19:21.130595-05:00 vcenter rsyslogd - - - imfile error: message received is larger than max msg size; message will be split and processed as another message [v8.2202.0]
|
This is a syslog message from a product called rsyslogd by rsyslogd. The following fields were extracted from the message:
facilityCode: 5
facilityLabel: syslogd
fieldExtractorName: generic_log
localHostname: vcenter
localStartTime: 2024-07-26T07:19:21.130595-05:00
messageType: systemd_event
priority: 43
program: rsyslogd
senderHost: 10.0.0.20
sensitivity: normal
severityCode: 3
severityLabel: error
sourceInfo: unknown
streamName: rsyslogd
tags: ['rfc5424', 'rsyslogd', 'systemd_event']
|
Explain this syslog message
|
<134>Jul 26 18:56:35 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1908|AWS Account Synchronization Requested|3|src=176.201.181.246 suser=johndoe target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
{
"clientIP": "176.201.181.246",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "cef",
"localHostname": "deepsecurity",
"localStartTime": "Jul 26 18:56:35",
"message": "<134>Jul 26 18:56:35 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1908|AWS Account Synchronization Requested|3|src=176.201.181.246 suser=johndoe target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 ",
"messageType": "AWS Account Synchronization Requested",
"priority": 134,
"senderHost": "34.205.5.2",
"sensitivity": "normal",
"severityCode": 7,
"severityLabel": "debug",
"sourceInfo": "unknown",
"streamName": "trend micro_deep security manager",
"tags": [
"trend micro_deep security manager",
"AWS Account Synchronization Requested",
"rfc3164",
"cef",
"trend micro_deep security manager_AWS Account Synchronization Requested"
],
"userName": "johndoe",
"vendorCode": "1908"
}
|
Create a JSON artifact from the message
|
<134>Jul 26 18:56:35 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1908|AWS Account Synchronization Requested|3|src=176.201.181.246 suser=johndoe target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
Product: trend micro_deep security manager
Vendor: trend micro_deep security manager
|
Identify this syslog message
|
<134>Jul 26 18:56:35 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1908|AWS Account Synchronization Requested|3|src=176.201.181.246 suser=johndoe target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
This is a syslog message from a product called trend micro_deep security manager by trend micro_deep security manager. The following fields were extracted from the message:
clientIP: 176.201.181.246
facilityCode: 16
facilityLabel: local0
fieldExtractorName: cef
localHostname: deepsecurity
localStartTime: Jul 26 18:56:35
messageType: AWS Account Synchronization Requested
priority: 134
senderHost: 34.205.5.2
sensitivity: normal
severityCode: 7
severityLabel: debug
sourceInfo: unknown
streamName: trend micro_deep security manager
tags: ['trend micro_deep security manager', 'AWS Account Synchronization Requested', 'rfc3164', 'cef', 'trend micro_deep security manager_AWS Account Synchronization Requested']
userName: johndoe
vendorCode: 1908
|
Explain this syslog message
|
<134>Jul 26 18:57:15 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1909|AWS Account Synchronization Finished|3|src=122.215.19.109 suser=charlie target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
{
"clientIP": "122.215.19.109",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "cef",
"localHostname": "deepsecurity",
"localStartTime": "Jul 26 18:57:15",
"message": "<134>Jul 26 18:57:15 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1909|AWS Account Synchronization Finished|3|src=122.215.19.109 suser=charlie target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 ",
"messageType": "AWS Account Synchronization Finished",
"priority": 134,
"senderHost": "34.205.5.2",
"sensitivity": "normal",
"severityCode": 7,
"severityLabel": "debug",
"sourceInfo": "unknown",
"streamName": "trend micro_deep security manager",
"tags": [
"AWS Account Synchronization Finished",
"trend micro_deep security manager",
"rfc3164",
"cef",
"trend micro_deep security manager_AWS Account Synchronization Finished"
],
"userName": "charlie",
"vendorCode": "1909"
}
|
Create a JSON artifact from the message
|
<134>Jul 26 18:57:15 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1909|AWS Account Synchronization Finished|3|src=122.215.19.109 suser=charlie target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
Product: trend micro_deep security manager
Vendor: trend micro_deep security manager
|
Identify this syslog message
|
<134>Jul 26 18:57:15 deepsecurity CEF:0|Trend Micro|Deep Security Manager|50.0.3012|1909|AWS Account Synchronization Finished|3|src=122.215.19.109 suser=charlie target=AWS Account - 733177541390 msg=Description Omitted TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873
|
This is a syslog message from a product called trend micro_deep security manager by trend micro_deep security manager. The following fields were extracted from the message:
clientIP: 122.215.19.109
facilityCode: 16
facilityLabel: local0
fieldExtractorName: cef
localHostname: deepsecurity
localStartTime: Jul 26 18:57:15
messageType: AWS Account Synchronization Finished
priority: 134
senderHost: 34.205.5.2
sensitivity: normal
severityCode: 7
severityLabel: debug
sourceInfo: unknown
streamName: trend micro_deep security manager
tags: ['AWS Account Synchronization Finished', 'trend micro_deep security manager', 'rfc3164', 'cef', 'trend micro_deep security manager_AWS Account Synchronization Finished']
userName: charlie
vendorCode: 1909
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T18:58:57.593Z","agent":{"ephemeral_id":"d65d2a9c-d942-4086-bded-1f8eda85e179","id":"9587390f-784c-433f-9da4-e7ddbad3de3b","name":"nordc-app-lat5","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"5612","created":"2024-07-26T18:58:59.222Z","kind":"event","provider":"Microsoft-Windows-WMI"},"host":{"name":"nordc-app-lat5.stark.com"},"log":{"level":"warning"},"message":"Windows Management Instrumentation has stopped WMIPRVSE.EXE because a quota restarked a warning value. Quota: PrivatePageCount Value: 537804800 Maximum value: 536870912 WMIPRVSE PID: 7808 Providers hosted in this process: %systemroot%\\system32\\wbem\\cimwin32.dll","organization":"stark","senderHost":"nordc-app-lat5.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"nordc-app-lat5.stark.com","event_id":"5612","opcode":"Info","process":{"pid":7808,"thread":{"id":14068}},"provider_guid":"{1edeee53-0afe-4609-b846-d8c0b2075b1f}","provider_name":"Microsoft-Windows-WMI","record_id":179600,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-20","name":"NETWORK SERVICE","type":"Well Known Group"},"user_data":{"ProcessID":"7808","ProvidersInHost":"%systemroot%\\system32\\wbem\\cimwin32.dll","QuotaName":"PrivatePageCount","QuotaThreshold":"536870912","QuotaValue":"537804800","xml_name":"data_0x8000003F"},"version":2}}
|
{
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-26T18:58:57.593Z\",\"agent\":{\"ephemeral_id\":\"d65d2a9c-d942-4086-bded-1f8eda85e179\",\"id\":\"9587390f-784c-433f-9da4-e7ddbad3de3b\",\"name\":\"nordc-app-lat5\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"5612\",\"created\":\"2024-07-26T18:58:59.222Z\",\"kind\":\"event\",\"provider\":\"Microsoft-Windows-WMI\"},\"host\":{\"name\":\"nordc-app-lat5.stark.com\"},\"log\":{\"level\":\"warning\"},\"message\":\"Windows Management Instrumentation has stopped WMIPRVSE.EXE because a quota restarked a warning value. Quota: PrivatePageCount Value: 537804800 Maximum value: 536870912 WMIPRVSE PID: 7808 Providers hosted in this process: %systemroot%\\\\system32\\\\wbem\\\\cimwin32.dll\",\"organization\":\"stark\",\"senderHost\":\"nordc-app-lat5.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"nordc-app-lat5.stark.com\",\"event_id\":\"5612\",\"opcode\":\"Info\",\"process\":{\"pid\":7808,\"thread\":{\"id\":14068}},\"provider_guid\":\"{1edeee53-0afe-4609-b846-d8c0b2075b1f}\",\"provider_name\":\"Microsoft-Windows-WMI\",\"record_id\":179600,\"task\":\"None\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-20\",\"name\":\"NETWORK SERVICE\",\"type\":\"Well Known Group\"},\"user_data\":{\"ProcessID\":\"7808\",\"ProvidersInHost\":\"%systemroot%\\\\system32\\\\wbem\\\\cimwin32.dll\",\"QuotaName\":\"PrivatePageCount\",\"QuotaThreshold\":\"536870912\",\"QuotaValue\":\"537804800\",\"xml_name\":\"data_0x8000003F\"},\"version\":2}}",
"messageType": "5612",
"senderHost": "nordc-app-lat5.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "microsoft-windows-wmi",
"tags": [
"v8",
"eventId:5612",
"microsoft-windows-wmi",
"5612"
],
"vendorCode": "179600"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T18:58:57.593Z","agent":{"ephemeral_id":"d65d2a9c-d942-4086-bded-1f8eda85e179","id":"9587390f-784c-433f-9da4-e7ddbad3de3b","name":"nordc-app-lat5","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"5612","created":"2024-07-26T18:58:59.222Z","kind":"event","provider":"Microsoft-Windows-WMI"},"host":{"name":"nordc-app-lat5.stark.com"},"log":{"level":"warning"},"message":"Windows Management Instrumentation has stopped WMIPRVSE.EXE because a quota restarked a warning value. Quota: PrivatePageCount Value: 537804800 Maximum value: 536870912 WMIPRVSE PID: 7808 Providers hosted in this process: %systemroot%\\system32\\wbem\\cimwin32.dll","organization":"stark","senderHost":"nordc-app-lat5.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"nordc-app-lat5.stark.com","event_id":"5612","opcode":"Info","process":{"pid":7808,"thread":{"id":14068}},"provider_guid":"{1edeee53-0afe-4609-b846-d8c0b2075b1f}","provider_name":"Microsoft-Windows-WMI","record_id":179600,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-20","name":"NETWORK SERVICE","type":"Well Known Group"},"user_data":{"ProcessID":"7808","ProvidersInHost":"%systemroot%\\system32\\wbem\\cimwin32.dll","QuotaName":"PrivatePageCount","QuotaThreshold":"536870912","QuotaValue":"537804800","xml_name":"data_0x8000003F"},"version":2}}
|
Product: microsoft-windows-wmi
Vendor: microsoft-windows-wmi
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T18:58:57.593Z","agent":{"ephemeral_id":"d65d2a9c-d942-4086-bded-1f8eda85e179","id":"9587390f-784c-433f-9da4-e7ddbad3de3b","name":"nordc-app-lat5","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"5612","created":"2024-07-26T18:58:59.222Z","kind":"event","provider":"Microsoft-Windows-WMI"},"host":{"name":"nordc-app-lat5.stark.com"},"log":{"level":"warning"},"message":"Windows Management Instrumentation has stopped WMIPRVSE.EXE because a quota restarked a warning value. Quota: PrivatePageCount Value: 537804800 Maximum value: 536870912 WMIPRVSE PID: 7808 Providers hosted in this process: %systemroot%\\system32\\wbem\\cimwin32.dll","organization":"stark","senderHost":"nordc-app-lat5.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"nordc-app-lat5.stark.com","event_id":"5612","opcode":"Info","process":{"pid":7808,"thread":{"id":14068}},"provider_guid":"{1edeee53-0afe-4609-b846-d8c0b2075b1f}","provider_name":"Microsoft-Windows-WMI","record_id":179600,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-20","name":"NETWORK SERVICE","type":"Well Known Group"},"user_data":{"ProcessID":"7808","ProvidersInHost":"%systemroot%\\system32\\wbem\\cimwin32.dll","QuotaName":"PrivatePageCount","QuotaThreshold":"536870912","QuotaValue":"537804800","xml_name":"data_0x8000003F"},"version":2}}
|
This is a syslog message from a product called microsoft-windows-wmi by microsoft-windows-wmi. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 5612
senderHost: nordc-app-lat5.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: microsoft-windows-wmi
tags: ['v8', 'eventId:5612', 'microsoft-windows-wmi', '5612']
vendorCode: 179600
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T18:20:16.399Z","agent":{"ephemeral_id":"4576f7ac-1d18-4bb6-95ad-beac1427bd54","id":"68c40aeb-fef4-4c95-9488-f1cfa06cb53b","name":"NORDC-DEV-APISQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5156","created":"2024-07-26T18:20:17.677Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DEV-APISQL01.acme.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a connection.\n\nApplication Information:\n\tProcess ID:\t\t3160\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tDirection:\t\tOutbound\n\tSource Address:\t\t192.168.15.29\n\tSource Port:\t\t56767\n\tDestination Address:\t35.171.101.124\n\tDestination Port:\t\t443\n\tProtocol:\t\t6\n\tInterface Index:\t\t6\n\nFilter Information:\n\tFilter Origin:\t\tS1-WFP-PROV-CTX\n\tFilter Run-Time ID:\t90306\n\tLayer Name:\t\tConnect\n\tLayer Run-Time ID:\t48\n\tRemote User ID:\t\tS-1-0-0\n\tRemote Macmeine ID:\tS-1-0-0","organization":"acme","senderHost":"NORDC-DEV-APISQL01.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DEV-APISQL01.acme.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","DestAddress":"35.171.101.124","DestPort":"443","Direction":"%%14593","FilterOrigin":"S1-WFP-PROV-CTX","FilterRTID":"90306","InterfaceIndex":"6","LayerName":"%%14611","LayerRTID":"48","ProcessID":"3160","Protocol":"6","RemoteMacmeineID":"S-1-0-0","RemoteUserID":"S-1-0-0","SourceAddress":"192.168.15.29","SourcePort":"56767"},"event_id":"5156","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":16716}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":303441372,"task":"Filtering Platform Connection","version":1}}
|
{
"fieldExtractorName": "sentinelone",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-26T18:20:16.399Z\",\"agent\":{\"ephemeral_id\":\"4576f7ac-1d18-4bb6-95ad-beac1427bd54\",\"id\":\"68c40aeb-fef4-4c95-9488-f1cfa06cb53b\",\"name\":\"NORDC-DEV-APISQL01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Filtering Platform Connection\",\"code\":\"5156\",\"created\":\"2024-07-26T18:20:17.677Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DEV-APISQL01.acme.com\"},\"log\":{\"level\":\"information\"},\"message\":\"The Windows Filtering Platform has permitted a connection.\\n\\nApplication Information:\\n\\tProcess ID:\\t\\t3160\\n\\tApplication Name:\\t\\\\device\\\\harddiskvolume2\\\\program files\\\\sentinelone\\\\sentinel agent 23.3.3.264\\\\sentinelagent.exe\\n\\nNetwork Information:\\n\\tDirection:\\t\\tOutbound\\n\\tSource Address:\\t\\t192.168.15.29\\n\\tSource Port:\\t\\t56767\\n\\tDestination Address:\\t35.171.101.124\\n\\tDestination Port:\\t\\t443\\n\\tProtocol:\\t\\t6\\n\\tInterface Index:\\t\\t6\\n\\nFilter Information:\\n\\tFilter Origin:\\t\\tS1-WFP-PROV-CTX\\n\\tFilter Run-Time ID:\\t90306\\n\\tLayer Name:\\t\\tConnect\\n\\tLayer Run-Time ID:\\t48\\n\\tRemote User ID:\\t\\tS-1-0-0\\n\\tRemote Macmeine ID:\\tS-1-0-0\",\"organization\":\"acme\",\"senderHost\":\"NORDC-DEV-APISQL01.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DEV-APISQL01.acme.com\",\"event_data\":{\"Application\":\"\\\\device\\\\harddiskvolume2\\\\program files\\\\sentinelone\\\\sentinel agent 23.3.3.264\\\\sentinelagent.exe\",\"DestAddress\":\"35.171.101.124\",\"DestPort\":\"443\",\"Direction\":\"%%14593\",\"FilterOrigin\":\"S1-WFP-PROV-CTX\",\"FilterRTID\":\"90306\",\"InterfaceIndex\":\"6\",\"LayerName\":\"%%14611\",\"LayerRTID\":\"48\",\"ProcessID\":\"3160\",\"Protocol\":\"6\",\"RemoteMacmeineID\":\"S-1-0-0\",\"RemoteUserID\":\"S-1-0-0\",\"SourceAddress\":\"192.168.15.29\",\"SourcePort\":\"56767\"},\"event_id\":\"5156\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":16716}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":303441372,\"task\":\"Filtering Platform Connection\",\"version\":1}}",
"messageType": "unknown",
"senderHost": "NORDC-DEV-APISQL01.mingledorffs.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "sentinelone",
"tags": [
"sentinelone",
"unknown"
]
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T18:20:16.399Z","agent":{"ephemeral_id":"4576f7ac-1d18-4bb6-95ad-beac1427bd54","id":"68c40aeb-fef4-4c95-9488-f1cfa06cb53b","name":"NORDC-DEV-APISQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5156","created":"2024-07-26T18:20:17.677Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DEV-APISQL01.acme.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a connection.\n\nApplication Information:\n\tProcess ID:\t\t3160\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tDirection:\t\tOutbound\n\tSource Address:\t\t192.168.15.29\n\tSource Port:\t\t56767\n\tDestination Address:\t35.171.101.124\n\tDestination Port:\t\t443\n\tProtocol:\t\t6\n\tInterface Index:\t\t6\n\nFilter Information:\n\tFilter Origin:\t\tS1-WFP-PROV-CTX\n\tFilter Run-Time ID:\t90306\n\tLayer Name:\t\tConnect\n\tLayer Run-Time ID:\t48\n\tRemote User ID:\t\tS-1-0-0\n\tRemote Macmeine ID:\tS-1-0-0","organization":"acme","senderHost":"NORDC-DEV-APISQL01.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DEV-APISQL01.acme.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","DestAddress":"35.171.101.124","DestPort":"443","Direction":"%%14593","FilterOrigin":"S1-WFP-PROV-CTX","FilterRTID":"90306","InterfaceIndex":"6","LayerName":"%%14611","LayerRTID":"48","ProcessID":"3160","Protocol":"6","RemoteMacmeineID":"S-1-0-0","RemoteUserID":"S-1-0-0","SourceAddress":"192.168.15.29","SourcePort":"56767"},"event_id":"5156","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":16716}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":303441372,"task":"Filtering Platform Connection","version":1}}
|
Product: SentinelOne
Vendor: SentinelOne
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T18:20:16.399Z","agent":{"ephemeral_id":"4576f7ac-1d18-4bb6-95ad-beac1427bd54","id":"68c40aeb-fef4-4c95-9488-f1cfa06cb53b","name":"NORDC-DEV-APISQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5156","created":"2024-07-26T18:20:17.677Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DEV-APISQL01.acme.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a connection.\n\nApplication Information:\n\tProcess ID:\t\t3160\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tDirection:\t\tOutbound\n\tSource Address:\t\t192.168.15.29\n\tSource Port:\t\t56767\n\tDestination Address:\t35.171.101.124\n\tDestination Port:\t\t443\n\tProtocol:\t\t6\n\tInterface Index:\t\t6\n\nFilter Information:\n\tFilter Origin:\t\tS1-WFP-PROV-CTX\n\tFilter Run-Time ID:\t90306\n\tLayer Name:\t\tConnect\n\tLayer Run-Time ID:\t48\n\tRemote User ID:\t\tS-1-0-0\n\tRemote Macmeine ID:\tS-1-0-0","organization":"acme","senderHost":"NORDC-DEV-APISQL01.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DEV-APISQL01.acme.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","DestAddress":"35.171.101.124","DestPort":"443","Direction":"%%14593","FilterOrigin":"S1-WFP-PROV-CTX","FilterRTID":"90306","InterfaceIndex":"6","LayerName":"%%14611","LayerRTID":"48","ProcessID":"3160","Protocol":"6","RemoteMacmeineID":"S-1-0-0","RemoteUserID":"S-1-0-0","SourceAddress":"192.168.15.29","SourcePort":"56767"},"event_id":"5156","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":16716}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":303441372,"task":"Filtering Platform Connection","version":1}}
|
This is a syslog message from a product called SentinelOne by SentinelOne. The following fields were extracted from the message:
fieldExtractorName: sentinelone
messageType: unknown
senderHost: NORDC-DEV-APISQL01.mingledorffs.com
sensitivity: normal
sourceInfo: unknown
streamName: sentinelone
tags: ['sentinelone', 'unknown']
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T18:20:16.399Z","agent":{"ephemeral_id":"4576f7ac-1d18-4bb6-95ad-beac1427bd54","id":"68c40aeb-fef4-4c95-9488-f1cfa06cb53b","name":"NORDC-DEV-APISQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5158","created":"2024-07-26T18:20:17.677Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DEV-APISQL01.umbrella.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a bind to a local port.\n\nApplication Information:\n\tProcess ID:\t\t3160\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tSource Address:\t\t0.0.0.0\n\tSource Port:\t\t56767\n\tProtocol:\t\t6\n\nFilter Information:\n\tFilter Run-Time ID:\t0\n\tLayer Name:\t\tResource Assignment\n\tLayer Run-Time ID:\t36","organization":"umbrella","senderHost":"NORDC-DEV-APISQL01.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DEV-APISQL01.umbrella.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","FilterRTID":"0","LayerName":"%%14608","LayerRTID":"36","ProcessId":"3160","Protocol":"6","SourceAddress":"0.0.0.0","SourcePort":"56767"},"event_id":"5158","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":16716}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":303441371,"task":"Filtering Platform Connection"}}
|
{
"fieldExtractorName": "sentinelone",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-26T18:20:16.399Z\",\"agent\":{\"ephemeral_id\":\"4576f7ac-1d18-4bb6-95ad-beac1427bd54\",\"id\":\"68c40aeb-fef4-4c95-9488-f1cfa06cb53b\",\"name\":\"NORDC-DEV-APISQL01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Filtering Platform Connection\",\"code\":\"5158\",\"created\":\"2024-07-26T18:20:17.677Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DEV-APISQL01.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"The Windows Filtering Platform has permitted a bind to a local port.\\n\\nApplication Information:\\n\\tProcess ID:\\t\\t3160\\n\\tApplication Name:\\t\\\\device\\\\harddiskvolume2\\\\program files\\\\sentinelone\\\\sentinel agent 23.3.3.264\\\\sentinelagent.exe\\n\\nNetwork Information:\\n\\tSource Address:\\t\\t0.0.0.0\\n\\tSource Port:\\t\\t56767\\n\\tProtocol:\\t\\t6\\n\\nFilter Information:\\n\\tFilter Run-Time ID:\\t0\\n\\tLayer Name:\\t\\tResource Assignment\\n\\tLayer Run-Time ID:\\t36\",\"organization\":\"umbrella\",\"senderHost\":\"NORDC-DEV-APISQL01.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DEV-APISQL01.umbrella.com\",\"event_data\":{\"Application\":\"\\\\device\\\\harddiskvolume2\\\\program files\\\\sentinelone\\\\sentinel agent 23.3.3.264\\\\sentinelagent.exe\",\"FilterRTID\":\"0\",\"LayerName\":\"%%14608\",\"LayerRTID\":\"36\",\"ProcessId\":\"3160\",\"Protocol\":\"6\",\"SourceAddress\":\"0.0.0.0\",\"SourcePort\":\"56767\"},\"event_id\":\"5158\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":16716}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":303441371,\"task\":\"Filtering Platform Connection\"}}",
"messageType": "unknown",
"senderHost": "NORDC-DEV-APISQL01.mingledorffs.com",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "sentinelone",
"tags": [
"sentinelone",
"unknown"
]
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T18:20:16.399Z","agent":{"ephemeral_id":"4576f7ac-1d18-4bb6-95ad-beac1427bd54","id":"68c40aeb-fef4-4c95-9488-f1cfa06cb53b","name":"NORDC-DEV-APISQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5158","created":"2024-07-26T18:20:17.677Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DEV-APISQL01.umbrella.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a bind to a local port.\n\nApplication Information:\n\tProcess ID:\t\t3160\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tSource Address:\t\t0.0.0.0\n\tSource Port:\t\t56767\n\tProtocol:\t\t6\n\nFilter Information:\n\tFilter Run-Time ID:\t0\n\tLayer Name:\t\tResource Assignment\n\tLayer Run-Time ID:\t36","organization":"umbrella","senderHost":"NORDC-DEV-APISQL01.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DEV-APISQL01.umbrella.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","FilterRTID":"0","LayerName":"%%14608","LayerRTID":"36","ProcessId":"3160","Protocol":"6","SourceAddress":"0.0.0.0","SourcePort":"56767"},"event_id":"5158","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":16716}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":303441371,"task":"Filtering Platform Connection"}}
|
Product: SentinelOne
Vendor: SentinelOne
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T18:20:16.399Z","agent":{"ephemeral_id":"4576f7ac-1d18-4bb6-95ad-beac1427bd54","id":"68c40aeb-fef4-4c95-9488-f1cfa06cb53b","name":"NORDC-DEV-APISQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Filtering Platform Connection","code":"5158","created":"2024-07-26T18:20:17.677Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DEV-APISQL01.umbrella.com"},"log":{"level":"information"},"message":"The Windows Filtering Platform has permitted a bind to a local port.\n\nApplication Information:\n\tProcess ID:\t\t3160\n\tApplication Name:\t\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe\n\nNetwork Information:\n\tSource Address:\t\t0.0.0.0\n\tSource Port:\t\t56767\n\tProtocol:\t\t6\n\nFilter Information:\n\tFilter Run-Time ID:\t0\n\tLayer Name:\t\tResource Assignment\n\tLayer Run-Time ID:\t36","organization":"umbrella","senderHost":"NORDC-DEV-APISQL01.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DEV-APISQL01.umbrella.com","event_data":{"Application":"\\device\\harddiskvolume2\\program files\\sentinelone\\sentinel agent 23.3.3.264\\sentinelagent.exe","FilterRTID":"0","LayerName":"%%14608","LayerRTID":"36","ProcessId":"3160","Protocol":"6","SourceAddress":"0.0.0.0","SourcePort":"56767"},"event_id":"5158","keywords":["Audit Success"],"opcode":"Info","process":{"pid":4,"thread":{"id":16716}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":303441371,"task":"Filtering Platform Connection"}}
|
This is a syslog message from a product called SentinelOne by SentinelOne. The following fields were extracted from the message:
fieldExtractorName: sentinelone
messageType: unknown
senderHost: NORDC-DEV-APISQL01.mingledorffs.com
sensitivity: normal
sourceInfo: unknown
streamName: sentinelone
tags: ['sentinelone', 'unknown']
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T13:45:00.678Z","agent":{"ephemeral_id":"03f0e780-e6f7-4f57-aba3-136d3309d30a","id":"dfc891f4-6232-4a7c-9ace-b1c918d618e9","name":"NVIPROCPRDSQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Job Engine","code":"208","created":"2024-07-30T13:45:01.077Z","kind":"event","provider":"SQLAgent$PAYGSQL01"},"host":{"name":"NVIPROCPRDSQL01.prdnvi.wayneint.com"},"log":{"level":"warning"},"message":"SQL Server Scheduled Job 'SSIS Failover Monitor Job' (0x0F1B2606898D4A4683822970A98DD2C0) - Status: Failed - Invoked on: 2024-07-30 09:36:00 - Message: The job failed. The Job was invoked by Schedule 10 (Monitor Scheduler). The last step to run was step 1 (AlwaysOn Failover Monitor).","organization":"wayne","senderHost":"10.160.22.36","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDSQL01.prdnvi.wayneint.com","event_data":{"param1":"SSIS Failover Monitor Job","param2":"0x0F1B2606898D4A4683822970A98DD2C0","param3":"Failed","param4":"2024-07-30 09:36:00","param5":"The job failed. The Job was invoked by Schedule 10 (Monitor Scheduler). The last step to run was step 1 (AlwaysOn Failover Monitor)."},"event_id":"208","keywords":["Classic"],"provider_name":"SQLAgent$PAYGSQL01","record_id":85198954,"task":"Job Engine"}}
|
{
"action": "Job Engine",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-30T13:45:00.678Z\",\"agent\":{\"ephemeral_id\":\"03f0e780-e6f7-4f57-aba3-136d3309d30a\",\"id\":\"dfc891f4-6232-4a7c-9ace-b1c918d618e9\",\"name\":\"NVIPROCPRDSQL01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Job Engine\",\"code\":\"208\",\"created\":\"2024-07-30T13:45:01.077Z\",\"kind\":\"event\",\"provider\":\"SQLAgent$PAYGSQL01\"},\"host\":{\"name\":\"NVIPROCPRDSQL01.prdnvi.wayneint.com\"},\"log\":{\"level\":\"warning\"},\"message\":\"SQL Server Scheduled Job 'SSIS Failover Monitor Job' (0x0F1B2606898D4A4683822970A98DD2C0) - Status: Failed - Invoked on: 2024-07-30 09:36:00 - Message: The job failed. The Job was invoked by Schedule 10 (Monitor Scheduler). The last step to run was step 1 (AlwaysOn Failover Monitor).\",\"organization\":\"wayne\",\"senderHost\":\"10.160.22.36\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"NVIPROCPRDSQL01.prdnvi.wayneint.com\",\"event_data\":{\"param1\":\"SSIS Failover Monitor Job\",\"param2\":\"0x0F1B2606898D4A4683822970A98DD2C0\",\"param3\":\"Failed\",\"param4\":\"2024-07-30 09:36:00\",\"param5\":\"The job failed. The Job was invoked by Schedule 10 (Monitor Scheduler). The last step to run was step 1 (AlwaysOn Failover Monitor).\"},\"event_id\":\"208\",\"keywords\":[\"Classic\"],\"provider_name\":\"SQLAgent$PAYGSQL01\",\"record_id\":85198954,\"task\":\"Job Engine\"}}",
"messageType": "208",
"senderHost": "10.160.22.36",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "sqlagent$paygsql01",
"tags": [
"v8",
"eventId:208",
"sqlagent$paygsql01",
"208"
],
"vendorCode": "85198954"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T13:45:00.678Z","agent":{"ephemeral_id":"03f0e780-e6f7-4f57-aba3-136d3309d30a","id":"dfc891f4-6232-4a7c-9ace-b1c918d618e9","name":"NVIPROCPRDSQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Job Engine","code":"208","created":"2024-07-30T13:45:01.077Z","kind":"event","provider":"SQLAgent$PAYGSQL01"},"host":{"name":"NVIPROCPRDSQL01.prdnvi.wayneint.com"},"log":{"level":"warning"},"message":"SQL Server Scheduled Job 'SSIS Failover Monitor Job' (0x0F1B2606898D4A4683822970A98DD2C0) - Status: Failed - Invoked on: 2024-07-30 09:36:00 - Message: The job failed. The Job was invoked by Schedule 10 (Monitor Scheduler). The last step to run was step 1 (AlwaysOn Failover Monitor).","organization":"wayne","senderHost":"10.160.22.36","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDSQL01.prdnvi.wayneint.com","event_data":{"param1":"SSIS Failover Monitor Job","param2":"0x0F1B2606898D4A4683822970A98DD2C0","param3":"Failed","param4":"2024-07-30 09:36:00","param5":"The job failed. The Job was invoked by Schedule 10 (Monitor Scheduler). The last step to run was step 1 (AlwaysOn Failover Monitor)."},"event_id":"208","keywords":["Classic"],"provider_name":"SQLAgent$PAYGSQL01","record_id":85198954,"task":"Job Engine"}}
|
Product: sqlagent$paygsql01
Vendor: sqlagent$paygsql01
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-30T13:45:00.678Z","agent":{"ephemeral_id":"03f0e780-e6f7-4f57-aba3-136d3309d30a","id":"dfc891f4-6232-4a7c-9ace-b1c918d618e9","name":"NVIPROCPRDSQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Job Engine","code":"208","created":"2024-07-30T13:45:01.077Z","kind":"event","provider":"SQLAgent$PAYGSQL01"},"host":{"name":"NVIPROCPRDSQL01.prdnvi.wayneint.com"},"log":{"level":"warning"},"message":"SQL Server Scheduled Job 'SSIS Failover Monitor Job' (0x0F1B2606898D4A4683822970A98DD2C0) - Status: Failed - Invoked on: 2024-07-30 09:36:00 - Message: The job failed. The Job was invoked by Schedule 10 (Monitor Scheduler). The last step to run was step 1 (AlwaysOn Failover Monitor).","organization":"wayne","senderHost":"10.160.22.36","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDSQL01.prdnvi.wayneint.com","event_data":{"param1":"SSIS Failover Monitor Job","param2":"0x0F1B2606898D4A4683822970A98DD2C0","param3":"Failed","param4":"2024-07-30 09:36:00","param5":"The job failed. The Job was invoked by Schedule 10 (Monitor Scheduler). The last step to run was step 1 (AlwaysOn Failover Monitor)."},"event_id":"208","keywords":["Classic"],"provider_name":"SQLAgent$PAYGSQL01","record_id":85198954,"task":"Job Engine"}}
|
This is a syslog message from a product called sqlagent$paygsql01 by sqlagent$paygsql01. The following fields were extracted from the message:
action: Job Engine
fieldExtractorName: winlogbeat
messageType: 208
senderHost: 10.160.22.36
sensitivity: normal
sourceInfo: unknown
streamName: sqlagent$paygsql01
tags: ['v8', 'eventId:208', 'sqlagent$paygsql01', '208']
vendorCode: 85198954
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T18:11:54.775Z","agent":{"ephemeral_id":"973656c4-8721-4cde-9ecd-9b9bce2db3ef","id":"e7af9e12-e634-42b8-a5c0-98459f1c4a8f","name":"NORDC-SS1-WEBD4","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"33","created":"2024-07-26T18:11:56.637Z","kind":"event","provider":"Volsnap"},"host":{"name":"NORDC-SS1-WEBD4.umbrella.com"},"log":{"level":"information"},"message":"The oldest shadow copy of volume C: was deleted to keep disk space usage for shadow copies of volume C: below the user defined limit.","organization":"umbrella","senderHost":"10.20.30.113","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"NORDC-SS1-WEBD4.umbrella.com","event_data":{"Binary":"00000000060030000000000021000640B20000000000000019000000000000000000000000000000","DeviceName":"\\Device\\HarddiskVolumeShadowCopy13","NTSTATUS":"00000000","SourceFileID":"0x0001","SourceLine":"6386","SourceTag":"178","VolumeName":"C:"},"event_id":"33","keywords":["Classic"],"opcode":"Info","process":{"pid":4,"thread":{"id":4548}},"provider_guid":"{cb017cd2-1f37-4e65-82bc-3e91f6a37559}","provider_name":"Volsnap","record_id":72134,"task":"None"}}
|
{
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-26T18:11:54.775Z\",\"agent\":{\"ephemeral_id\":\"973656c4-8721-4cde-9ecd-9b9bce2db3ef\",\"id\":\"e7af9e12-e634-42b8-a5c0-98459f1c4a8f\",\"name\":\"NORDC-SS1-WEBD4\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"33\",\"created\":\"2024-07-26T18:11:56.637Z\",\"kind\":\"event\",\"provider\":\"Volsnap\"},\"host\":{\"name\":\"NORDC-SS1-WEBD4.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"The oldest shadow copy of volume C: was deleted to keep disk space usage for shadow copies of volume C: below the user defined limit.\",\"organization\":\"umbrella\",\"senderHost\":\"10.20.30.113\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"NORDC-SS1-WEBD4.umbrella.com\",\"event_data\":{\"Binary\":\"00000000060030000000000021000640B20000000000000019000000000000000000000000000000\",\"DeviceName\":\"\\\\Device\\\\HarddiskVolumeShadowCopy13\",\"NTSTATUS\":\"00000000\",\"SourceFileID\":\"0x0001\",\"SourceLine\":\"6386\",\"SourceTag\":\"178\",\"VolumeName\":\"C:\"},\"event_id\":\"33\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":4548}},\"provider_guid\":\"{cb017cd2-1f37-4e65-82bc-3e91f6a37559}\",\"provider_name\":\"Volsnap\",\"record_id\":72134,\"task\":\"None\"}}",
"messageType": "33",
"senderHost": "10.20.30.113",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "volsnap",
"tags": [
"v8",
"eventId:33",
"volsnap",
"33"
],
"vendorCode": "72134"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T18:11:54.775Z","agent":{"ephemeral_id":"973656c4-8721-4cde-9ecd-9b9bce2db3ef","id":"e7af9e12-e634-42b8-a5c0-98459f1c4a8f","name":"NORDC-SS1-WEBD4","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"33","created":"2024-07-26T18:11:56.637Z","kind":"event","provider":"Volsnap"},"host":{"name":"NORDC-SS1-WEBD4.umbrella.com"},"log":{"level":"information"},"message":"The oldest shadow copy of volume C: was deleted to keep disk space usage for shadow copies of volume C: below the user defined limit.","organization":"umbrella","senderHost":"10.20.30.113","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"NORDC-SS1-WEBD4.umbrella.com","event_data":{"Binary":"00000000060030000000000021000640B20000000000000019000000000000000000000000000000","DeviceName":"\\Device\\HarddiskVolumeShadowCopy13","NTSTATUS":"00000000","SourceFileID":"0x0001","SourceLine":"6386","SourceTag":"178","VolumeName":"C:"},"event_id":"33","keywords":["Classic"],"opcode":"Info","process":{"pid":4,"thread":{"id":4548}},"provider_guid":"{cb017cd2-1f37-4e65-82bc-3e91f6a37559}","provider_name":"Volsnap","record_id":72134,"task":"None"}}
|
Product: volsnap
Vendor: volsnap
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-26T18:11:54.775Z","agent":{"ephemeral_id":"973656c4-8721-4cde-9ecd-9b9bce2db3ef","id":"e7af9e12-e634-42b8-a5c0-98459f1c4a8f","name":"NORDC-SS1-WEBD4","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"33","created":"2024-07-26T18:11:56.637Z","kind":"event","provider":"Volsnap"},"host":{"name":"NORDC-SS1-WEBD4.umbrella.com"},"log":{"level":"information"},"message":"The oldest shadow copy of volume C: was deleted to keep disk space usage for shadow copies of volume C: below the user defined limit.","organization":"umbrella","senderHost":"10.20.30.113","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"NORDC-SS1-WEBD4.umbrella.com","event_data":{"Binary":"00000000060030000000000021000640B20000000000000019000000000000000000000000000000","DeviceName":"\\Device\\HarddiskVolumeShadowCopy13","NTSTATUS":"00000000","SourceFileID":"0x0001","SourceLine":"6386","SourceTag":"178","VolumeName":"C:"},"event_id":"33","keywords":["Classic"],"opcode":"Info","process":{"pid":4,"thread":{"id":4548}},"provider_guid":"{cb017cd2-1f37-4e65-82bc-3e91f6a37559}","provider_name":"Volsnap","record_id":72134,"task":"None"}}
|
This is a syslog message from a product called volsnap by volsnap. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 33
senderHost: 10.20.30.113
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: volsnap
tags: ['v8', 'eventId:33', 'volsnap', '33']
vendorCode: 72134
|
Explain this syslog message
|
<131>Jul 26 13:31:01 oak-stw-prd1.oscorp.net Stealthwatch[24863]: CEF:0|Cisco|Stealthwatch|7.5.0|Notification:32|High Concern Index|3|msg=The host's concern index has either exceeded the CI threshold or rapidly increased.:Observed 824.73k points. Expected 98.27k points, tolerance of 95 allows up to 821.4k points. dst=140.5.115.155 src=135.141.162.187 start=2024-07-26T13:30:00Z end= externalId=8D-1K6V-CLH4-8U36-P cs3=Users,Gensis cs3Label=SourceHostGroups cs4= cs4Label=TargetHostGroups cs5=https://10.0.1.176/lc-landing-page/smc.html#/host/135.141.162.187 cs5Label=Source_URL cs6=https://10.0.1.176/lc-landing-page/smc.html#/host/140.5.115.155 cs6Label=Target_URL dpt= proto= dvchost=oak-stw-prd2 dvc=10.0.1.175 dvcpid=301 deviceExternalId=oak-stw-prd2 cs2= / / / cs2Label=SGTIdAndSGTName spt= destinationTranslatedAddress= destinationTranslatedPort= sourceTranslatedAddress= sourceTranslatedPort=
|
{
"clientIP": "135.141.162.187",
"facilityCode": 16,
"facilityLabel": "local0",
"fieldExtractorName": "cef",
"localHostname": "oak-stw-prd1.achn.net",
"localStartTime": "Jul 26 13:31:01",
"message": "<131>Jul 26 13:31:01 oak-stw-prd1.oscorp.net Stealthwatch[24863]: CEF:0|Cisco|Stealthwatch|7.5.0|Notification:32|High Concern Index|3|msg=The host's concern index has either exceeded the CI threshold or rapidly increased.:Observed 824.73k points. Expected 98.27k points, tolerance of 95 allows up to 821.4k points. dst=140.5.115.155 src=135.141.162.187 start=2024-07-26T13:30:00Z end= externalId=8D-1K6V-CLH4-8U36-P cs3=Users,Gensis cs3Label=SourceHostGroups cs4= cs4Label=TargetHostGroups cs5=https://10.0.1.176/lc-landing-page/smc.html#/host/135.141.162.187 cs5Label=Source_URL cs6=https://10.0.1.176/lc-landing-page/smc.html#/host/140.5.115.155 cs6Label=Target_URL dpt= proto= dvchost=oak-stw-prd2 dvc=10.0.1.175 dvcpid=301 deviceExternalId=oak-stw-prd2 cs2= / / / cs2Label=SGTIdAndSGTName spt= destinationTranslatedAddress= destinationTranslatedPort= sourceTranslatedAddress= sourceTranslatedPort=",
"messageType": "High Concern Index",
"pid": 24863,
"priority": 131,
"program": "Stealthwatch",
"senderHost": "10.0.1.176",
"sensitivity": "normal",
"serverIP": "140.5.115.155",
"severityCode": 7,
"severityLabel": "debug",
"sourceInfo": "unknown",
"streamName": "cisco_stealthwatch",
"tags": [
"SourceHostGroups:Users,Gensis",
"deviceExternalId:oak-stw-prd2",
"rfc3164",
"cef",
"cisco_stealthwatch_High Concern Index",
"Target_URL:https://10.0.1.176/lc-landing-page/smc.html#/host/0.0.0.0",
"Source_URL:https://10.0.1.176/lc-landing-page/smc.html#/host/10.2.34.182",
"cisco_stealthwatch",
"SGTIdAndSGTName: / / /",
"High Concern Index"
],
"vendorCode": "Notification:32"
}
|
Create a JSON artifact from the message
|
<131>Jul 26 13:31:01 oak-stw-prd1.oscorp.net Stealthwatch[24863]: CEF:0|Cisco|Stealthwatch|7.5.0|Notification:32|High Concern Index|3|msg=The host's concern index has either exceeded the CI threshold or rapidly increased.:Observed 824.73k points. Expected 98.27k points, tolerance of 95 allows up to 821.4k points. dst=140.5.115.155 src=135.141.162.187 start=2024-07-26T13:30:00Z end= externalId=8D-1K6V-CLH4-8U36-P cs3=Users,Gensis cs3Label=SourceHostGroups cs4= cs4Label=TargetHostGroups cs5=https://10.0.1.176/lc-landing-page/smc.html#/host/135.141.162.187 cs5Label=Source_URL cs6=https://10.0.1.176/lc-landing-page/smc.html#/host/140.5.115.155 cs6Label=Target_URL dpt= proto= dvchost=oak-stw-prd2 dvc=10.0.1.175 dvcpid=301 deviceExternalId=oak-stw-prd2 cs2= / / / cs2Label=SGTIdAndSGTName spt= destinationTranslatedAddress= destinationTranslatedPort= sourceTranslatedAddress= sourceTranslatedPort=
|
Product: cisco_stealthwatch
Vendor: cisco_stealthwatch
|
Identify this syslog message
|
<131>Jul 26 13:31:01 oak-stw-prd1.oscorp.net Stealthwatch[24863]: CEF:0|Cisco|Stealthwatch|7.5.0|Notification:32|High Concern Index|3|msg=The host's concern index has either exceeded the CI threshold or rapidly increased.:Observed 824.73k points. Expected 98.27k points, tolerance of 95 allows up to 821.4k points. dst=140.5.115.155 src=135.141.162.187 start=2024-07-26T13:30:00Z end= externalId=8D-1K6V-CLH4-8U36-P cs3=Users,Gensis cs3Label=SourceHostGroups cs4= cs4Label=TargetHostGroups cs5=https://10.0.1.176/lc-landing-page/smc.html#/host/135.141.162.187 cs5Label=Source_URL cs6=https://10.0.1.176/lc-landing-page/smc.html#/host/140.5.115.155 cs6Label=Target_URL dpt= proto= dvchost=oak-stw-prd2 dvc=10.0.1.175 dvcpid=301 deviceExternalId=oak-stw-prd2 cs2= / / / cs2Label=SGTIdAndSGTName spt= destinationTranslatedAddress= destinationTranslatedPort= sourceTranslatedAddress= sourceTranslatedPort=
|
This is a syslog message from a product called cisco_stealthwatch by cisco_stealthwatch. The following fields were extracted from the message:
clientIP: 135.141.162.187
facilityCode: 16
facilityLabel: local0
fieldExtractorName: cef
localHostname: oak-stw-prd1.achn.net
localStartTime: Jul 26 13:31:01
messageType: High Concern Index
pid: 24863
priority: 131
program: Stealthwatch
senderHost: 10.0.1.176
sensitivity: normal
serverIP: 140.5.115.155
severityCode: 7
severityLabel: debug
sourceInfo: unknown
streamName: cisco_stealthwatch
tags: ['SourceHostGroups:Users,Gensis', 'deviceExternalId:oak-stw-prd2', 'rfc3164', 'cef', 'cisco_stealthwatch_High Concern Index', 'Target_URL:https://10.0.1.176/lc-landing-page/smc.html#/host/0.0.0.0', 'Source_URL:https://10.0.1.176/lc-landing-page/smc.html#/host/10.2.34.182', 'cisco_stealthwatch', 'SGTIdAndSGTName: / / /', 'High Concern Index']
vendorCode: Notification:32
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-08-01T04:33:55.131Z","agent":{"ephemeral_id":"03f0e780-e6f7-4f57-aba3-136d3309d30a","id":"dfc891f4-6232-4a7c-9ace-b1c918d618e9","name":"NVIPROCPRDSQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Job Engine","code":"208","created":"2024-08-01T04:33:55.484Z","kind":"event","provider":"SQLAgent$PAYGSQL01"},"host":{"name":"NVIPROCPRDSQL01.prdnvi.wayneint.com"},"log":{"level":"warning"},"message":"SQL Server Scheduled Job 'DatabaseBackup - USER_DATABASES - LOG' (0xFBDA6B5F0671F1439F1FEF8B70AC2784) - Status: Failed - Invoked on: 2024-08-01 00:32:00 - Message: The job failed. The Job was invoked by Schedule 29 (Every15Min). The last step to run was step 3 (Delete old files).","organization":"wayne","senderHost":"10.160.22.36","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDSQL01.prdnvi.wayneint.com","event_data":{"param1":"DatabaseBackup - USER_DATABASES - LOG","param2":"0xFBDA6B5F0671F1439F1FEF8B70AC2784","param3":"Failed","param4":"2024-08-01 00:32:00","param5":"The job failed. The Job was invoked by Schedule 29 (Every15Min). The last step to run was step 3 (Delete old files)."},"event_id":"208","keywords":["Classic"],"provider_name":"SQLAgent$PAYGSQL01","record_id":85223839,"task":"Job Engine"}}
|
{
"action": "Job Engine",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-08-01T04:33:55.131Z\",\"agent\":{\"ephemeral_id\":\"03f0e780-e6f7-4f57-aba3-136d3309d30a\",\"id\":\"dfc891f4-6232-4a7c-9ace-b1c918d618e9\",\"name\":\"NVIPROCPRDSQL01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Job Engine\",\"code\":\"208\",\"created\":\"2024-08-01T04:33:55.484Z\",\"kind\":\"event\",\"provider\":\"SQLAgent$PAYGSQL01\"},\"host\":{\"name\":\"NVIPROCPRDSQL01.prdnvi.wayneint.com\"},\"log\":{\"level\":\"warning\"},\"message\":\"SQL Server Scheduled Job 'DatabaseBackup - USER_DATABASES - LOG' (0xFBDA6B5F0671F1439F1FEF8B70AC2784) - Status: Failed - Invoked on: 2024-08-01 00:32:00 - Message: The job failed. The Job was invoked by Schedule 29 (Every15Min). The last step to run was step 3 (Delete old files).\",\"organization\":\"wayne\",\"senderHost\":\"10.160.22.36\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"NVIPROCPRDSQL01.prdnvi.wayneint.com\",\"event_data\":{\"param1\":\"DatabaseBackup - USER_DATABASES - LOG\",\"param2\":\"0xFBDA6B5F0671F1439F1FEF8B70AC2784\",\"param3\":\"Failed\",\"param4\":\"2024-08-01 00:32:00\",\"param5\":\"The job failed. The Job was invoked by Schedule 29 (Every15Min). The last step to run was step 3 (Delete old files).\"},\"event_id\":\"208\",\"keywords\":[\"Classic\"],\"provider_name\":\"SQLAgent$PAYGSQL01\",\"record_id\":85223839,\"task\":\"Job Engine\"}}",
"messageType": "208",
"senderHost": "10.160.22.36",
"sensitivity": "normal",
"sourceInfo": "unknown",
"streamName": "sqlagent$paygsql01",
"tags": [
"v8",
"eventId:208",
"sqlagent$paygsql01",
"208"
],
"vendorCode": "85223839"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-08-01T04:33:55.131Z","agent":{"ephemeral_id":"03f0e780-e6f7-4f57-aba3-136d3309d30a","id":"dfc891f4-6232-4a7c-9ace-b1c918d618e9","name":"NVIPROCPRDSQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Job Engine","code":"208","created":"2024-08-01T04:33:55.484Z","kind":"event","provider":"SQLAgent$PAYGSQL01"},"host":{"name":"NVIPROCPRDSQL01.prdnvi.wayneint.com"},"log":{"level":"warning"},"message":"SQL Server Scheduled Job 'DatabaseBackup - USER_DATABASES - LOG' (0xFBDA6B5F0671F1439F1FEF8B70AC2784) - Status: Failed - Invoked on: 2024-08-01 00:32:00 - Message: The job failed. The Job was invoked by Schedule 29 (Every15Min). The last step to run was step 3 (Delete old files).","organization":"wayne","senderHost":"10.160.22.36","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDSQL01.prdnvi.wayneint.com","event_data":{"param1":"DatabaseBackup - USER_DATABASES - LOG","param2":"0xFBDA6B5F0671F1439F1FEF8B70AC2784","param3":"Failed","param4":"2024-08-01 00:32:00","param5":"The job failed. The Job was invoked by Schedule 29 (Every15Min). The last step to run was step 3 (Delete old files)."},"event_id":"208","keywords":["Classic"],"provider_name":"SQLAgent$PAYGSQL01","record_id":85223839,"task":"Job Engine"}}
|
Product: sqlagent$paygsql01
Vendor: sqlagent$paygsql01
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-08-01T04:33:55.131Z","agent":{"ephemeral_id":"03f0e780-e6f7-4f57-aba3-136d3309d30a","id":"dfc891f4-6232-4a7c-9ace-b1c918d618e9","name":"NVIPROCPRDSQL01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Job Engine","code":"208","created":"2024-08-01T04:33:55.484Z","kind":"event","provider":"SQLAgent$PAYGSQL01"},"host":{"name":"NVIPROCPRDSQL01.prdnvi.wayneint.com"},"log":{"level":"warning"},"message":"SQL Server Scheduled Job 'DatabaseBackup - USER_DATABASES - LOG' (0xFBDA6B5F0671F1439F1FEF8B70AC2784) - Status: Failed - Invoked on: 2024-08-01 00:32:00 - Message: The job failed. The Job was invoked by Schedule 29 (Every15Min). The last step to run was step 3 (Delete old files).","organization":"wayne","senderHost":"10.160.22.36","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"NVIPROCPRDSQL01.prdnvi.wayneint.com","event_data":{"param1":"DatabaseBackup - USER_DATABASES - LOG","param2":"0xFBDA6B5F0671F1439F1FEF8B70AC2784","param3":"Failed","param4":"2024-08-01 00:32:00","param5":"The job failed. The Job was invoked by Schedule 29 (Every15Min). The last step to run was step 3 (Delete old files)."},"event_id":"208","keywords":["Classic"],"provider_name":"SQLAgent$PAYGSQL01","record_id":85223839,"task":"Job Engine"}}
|
This is a syslog message from a product called sqlagent$paygsql01 by sqlagent$paygsql01. The following fields were extracted from the message:
action: Job Engine
fieldExtractorName: winlogbeat
messageType: 208
senderHost: 10.160.22.36
sensitivity: normal
sourceInfo: unknown
streamName: sqlagent$paygsql01
tags: ['v8', 'eventId:208', 'sqlagent$paygsql01', '208']
vendorCode: 85223839
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:20.622Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"6","created":"2024-07-27T02:19:21.221Z","kind":"event","provider":"Microsoft-Windows-FilterManager"},"host":{"name":"TS01-2016.acme.com"},"log":{"level":"information"},"message":"File System Filter 'wcifs' (10.0, β2016β-β09β-β15T12:42:03.000000000Z) has successfully loaded and registered with Filter Manager.","organization":"acme","senderHost":"TS01-2016.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.acme.com","event_data":{"DeviceName":"wcifs","DeviceNameLength":"5","DeviceTime":"2016-09-15T12:42:03.000000000Z","DeviceVersionMajor":"10","DeviceVersionMinor":"0","ExtraInfoLength":"201","ExtraInfoString":"{ \"flags\" : \"0x00000014\" , \"registration_version\" : \"0x00000203\" , \"tx\" : false , \"sections\" : false , \"frame\" : 0 , \"class_name\" : \"FSFilter Virtualization\" , \"instances\" : [[\"189900\",\"0x00000000\"]] }","FilterID":"{02000000-000B-0000-CE24-7CF8CADFDA01}","FinalStatus":"0x0"},"event_id":"6","keywords":["ms:Measures"],"opcode":"Info","process":{"pid":4,"thread":{"id":416}},"provider_guid":"{F3C5E28E-63F6-49C7-A204-E48A1BC4B09D}","provider_name":"Microsoft-Windows-FilterManager","record_id":159312,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"},"version":1}}
|
{
"action": "None",
"fieldExtractorName": "winlogbeat",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-27T02:16:20.622Z\",\"agent\":{\"ephemeral_id\":\"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c\",\"id\":\"1e289ed9-fa81-478d-9ec3-98d5119c9f2e\",\"name\":\"TS01-2016\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"None\",\"code\":\"6\",\"created\":\"2024-07-27T02:19:21.221Z\",\"kind\":\"event\",\"provider\":\"Microsoft-Windows-FilterManager\"},\"host\":{\"name\":\"TS01-2016.acme.com\"},\"log\":{\"level\":\"information\"},\"message\":\"File System Filter 'wcifs' (10.0, \u200e2016\u200e-\u200e09\u200e-\u200e15T12:42:03.000000000Z) has successfully loaded and registered with Filter Manager.\",\"organization\":\"acme\",\"senderHost\":\"TS01-2016.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"System\",\"computer_name\":\"TS01-2016.acme.com\",\"event_data\":{\"DeviceName\":\"wcifs\",\"DeviceNameLength\":\"5\",\"DeviceTime\":\"2016-09-15T12:42:03.000000000Z\",\"DeviceVersionMajor\":\"10\",\"DeviceVersionMinor\":\"0\",\"ExtraInfoLength\":\"201\",\"ExtraInfoString\":\"{ \\\"flags\\\" : \\\"0x00000014\\\" , \\\"registration_version\\\" : \\\"0x00000203\\\" , \\\"tx\\\" : false , \\\"sections\\\" : false , \\\"frame\\\" : 0 , \\\"class_name\\\" : \\\"FSFilter Virtualization\\\" , \\\"instances\\\" : [[\\\"189900\\\",\\\"0x00000000\\\"]] }\",\"FilterID\":\"{02000000-000B-0000-CE24-7CF8CADFDA01}\",\"FinalStatus\":\"0x0\"},\"event_id\":\"6\",\"keywords\":[\"ms:Measures\"],\"opcode\":\"Info\",\"process\":{\"pid\":4,\"thread\":{\"id\":416}},\"provider_guid\":\"{F3C5E28E-63F6-49C7-A204-E48A1BC4B09D}\",\"provider_name\":\"Microsoft-Windows-FilterManager\",\"record_id\":159312,\"task\":\"None\",\"user\":{\"domain\":\"NT AUTHORITY\",\"identifier\":\"S-1-5-18\",\"name\":\"SYSTEM\",\"type\":\"User\"},\"version\":1}}",
"messageType": "6",
"senderHost": "TS01-2016.mingledorffs.com",
"sensitivity": "normal",
"severityLabel": "Info",
"sourceInfo": "unknown",
"streamName": "microsoft-windows-filtermanager",
"tags": [
"v8",
"eventId:6",
"microsoft-windows-filtermanager",
"6"
],
"vendorCode": "159312"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:20.622Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"6","created":"2024-07-27T02:19:21.221Z","kind":"event","provider":"Microsoft-Windows-FilterManager"},"host":{"name":"TS01-2016.acme.com"},"log":{"level":"information"},"message":"File System Filter 'wcifs' (10.0, β2016β-β09β-β15T12:42:03.000000000Z) has successfully loaded and registered with Filter Manager.","organization":"acme","senderHost":"TS01-2016.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.acme.com","event_data":{"DeviceName":"wcifs","DeviceNameLength":"5","DeviceTime":"2016-09-15T12:42:03.000000000Z","DeviceVersionMajor":"10","DeviceVersionMinor":"0","ExtraInfoLength":"201","ExtraInfoString":"{ \"flags\" : \"0x00000014\" , \"registration_version\" : \"0x00000203\" , \"tx\" : false , \"sections\" : false , \"frame\" : 0 , \"class_name\" : \"FSFilter Virtualization\" , \"instances\" : [[\"189900\",\"0x00000000\"]] }","FilterID":"{02000000-000B-0000-CE24-7CF8CADFDA01}","FinalStatus":"0x0"},"event_id":"6","keywords":["ms:Measures"],"opcode":"Info","process":{"pid":4,"thread":{"id":416}},"provider_guid":"{F3C5E28E-63F6-49C7-A204-E48A1BC4B09D}","provider_name":"Microsoft-Windows-FilterManager","record_id":159312,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"},"version":1}}
|
Product: microsoft-windows-filtermanager
Vendor: microsoft-windows-filtermanager
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-27T02:16:20.622Z","agent":{"ephemeral_id":"0b04a3a3-ae19-4a25-ba8f-ec445b6ffd9c","id":"1e289ed9-fa81-478d-9ec3-98d5119c9f2e","name":"TS01-2016","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"None","code":"6","created":"2024-07-27T02:19:21.221Z","kind":"event","provider":"Microsoft-Windows-FilterManager"},"host":{"name":"TS01-2016.acme.com"},"log":{"level":"information"},"message":"File System Filter 'wcifs' (10.0, β2016β-β09β-β15T12:42:03.000000000Z) has successfully loaded and registered with Filter Manager.","organization":"acme","senderHost":"TS01-2016.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"System","computer_name":"TS01-2016.acme.com","event_data":{"DeviceName":"wcifs","DeviceNameLength":"5","DeviceTime":"2016-09-15T12:42:03.000000000Z","DeviceVersionMajor":"10","DeviceVersionMinor":"0","ExtraInfoLength":"201","ExtraInfoString":"{ \"flags\" : \"0x00000014\" , \"registration_version\" : \"0x00000203\" , \"tx\" : false , \"sections\" : false , \"frame\" : 0 , \"class_name\" : \"FSFilter Virtualization\" , \"instances\" : [[\"189900\",\"0x00000000\"]] }","FilterID":"{02000000-000B-0000-CE24-7CF8CADFDA01}","FinalStatus":"0x0"},"event_id":"6","keywords":["ms:Measures"],"opcode":"Info","process":{"pid":4,"thread":{"id":416}},"provider_guid":"{F3C5E28E-63F6-49C7-A204-E48A1BC4B09D}","provider_name":"Microsoft-Windows-FilterManager","record_id":159312,"task":"None","user":{"domain":"NT AUTHORITY","identifier":"S-1-5-18","name":"SYSTEM","type":"User"},"version":1}}
|
This is a syslog message from a product called microsoft-windows-filtermanager by microsoft-windows-filtermanager. The following fields were extracted from the message:
action: None
fieldExtractorName: winlogbeat
messageType: 6
senderHost: TS01-2016.mingledorffs.com
sensitivity: normal
severityLabel: Info
sourceInfo: unknown
streamName: microsoft-windows-filtermanager
tags: ['v8', 'eventId:6', 'microsoft-windows-filtermanager', '6']
vendorCode: 159312
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.