- Welcome to Exabeam Security Content
- What is Security Content?
- Common Information Model
- What is the Common Information Model?
- Common Information Model Context Elements
- Common Information Model Interface
- Common Information Model Event-naming Format
- Common Information Model Impact on Downstream Processes
- Using the Common Information Model to Create Custom Content
- Transitioning to the Common Information Model
- Understanding the Log
- Exabeam Parsers
- Exabeam Event Building
- Exabeam Enrichment
- Exabeam Persistence and Templates
- Exabeam Models
- Exabeam Rules
Common Information Model Impact on Fields
The following table lists fields that have changed in the new common information model structure. Some fields represent changes in name or definition to legacy fields. Others are brand new fields in the common information model that did not previously exist in the legacy structure.
Legacy Field | New Field Name or Definition |
---|---|
| Represents a user. The |
| For use when the host is the source of an operation OR the host is where the operation originated. |
| For use when the host is the destination of the operation. |
| For use when the IP is the source of the operation OR the IP is where the operation originated. |
| For use when the IP is the destination of the operation. |
| New name: |
| New name: |
| New name: |
| Represents the access type that was requested when a resource (such as a file or process) was opened or was granted a handle. However, if a field represents:
For an example of how access rights are specified, see Generic Access Rights - Win32 apps. |
| For use to identify a user only in a generic form of authentication. For SID, GUID, or other known authentication formats, use more specific fields such as |
| Represents the |
— | New field: |
— | New field: |
| Use |
| Use |
| Represents the |
— | New field: |
— | New field: |
| Use |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| Deprecated. |
| Deprecated. |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| If this field exists for a file event and has a value of |
| Represents the type of login (such as |
| Represents the type of authentication (such as |
| New name: |
| In most cases, use |
| New name: |
| In most cases, use |
| Use |
| In most cases, use |
| Represents the name of the logging service. This field name will be deprecated in the future and be replaced by the |
| Use |
| Use |
| Represents a unique identifier for a single generated event, not to be confused with |
| Represents the name of the operation recorded in the event. This field should correlate directly to the |
| Represents an identifier for the operation type recorded in the event, not to be confused with |
| New name: |
| Represents the service that provided the data to the log. In event viewer, this is the event provider field. In cloud audit logs, this is identical to the |
| New name: |
| New name: |
| In cases where a single log source provides multiple categories of events, this field represents the category that belongs to the event. |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| Use |
| New name: |
| New name: |
| New name: |
| New name: |
| New name: |
| Represents the name of the alert, if an alert occurred. |
| Represents the classification of an alert, according to the vendor. |
| Represents the subject (from the subject interface list) that was the cause of an alert trigger. For example, if an alert was triggered because of a process, the |
| Represents the severity of an alert, according to the vendor. |
| Represents the origin of the alert. The origin can be a third-party, a correlation rule, or an anomaly alert. |
| Represents the action taken against an event, as parsed (such as allowed, blocked, quarantined). Replaces the use of |
| Represents the result of an event's occurrence, as parsed (such as succeeded, failed). Replaces the use of |