Parsers and Generated Fields

Tag Fields Created by Parser forcepoint-dlp
  • #Cps.version

  • #Vendor

  • #ecs.version

  • #event.dataset

  • #event.kind

  • #event.module

  • #event.outcome

  • #observer.type

Fields Identified by Parser forcepoint-dlp
Source FieldCPS FieldDescriptionMapping
Vendor.caseDateAndTime@timestampTimestamp for report dataParsed from Vendor.caseDateAndTime using format dd MMM. yyyy, h:mm:ss a
Vendor.nameagent.nameName of the agentCopied from Vendor.name
Noneagent.typeAgent type identifierStatic value: dlp
Vendor.device.versionagent.versionVersion of the agentCopied from Vendor.device.version
Vendor.destinationHostsdestination.domainDestination host domainCopied from Vendor.destinationHosts when not N/A
Noneecs.versionECS schema versionStatic value: 8.17.0
Vendor.sourceServiceNameevent.actionAction performed in the eventCopied from Vendor.sourceServiceName
Noneevent.category[]Event categorizationArray populated based on event type conditions
Noneevent.datasetDataset classificationStatic value: dlp.report or dlp.event
Vendor.eventIdevent.idUnique identifier for the eventCopied from Vendor.eventId
Vendor.riskScore, Vendor.eventIdevent.kindEvent kind classificationStatic value: alert for reports, event for events
Noneevent.moduleModule identifierStatic value: dlp
Vendor.riskScoreevent.risk_scoreRisk score for report eventsCopied from Vendor.riskScore
Vendor.severityevent.severityMapped severity based on numeric valueMapped from Vendor.severity using severity mapping
Vendor.actevent.type[]Event type classificationArray populated based on event conditions
Vendor.fname (indirect)file.extensionFile extensionExtracted from file name using regex pattern
Vendor.fnamefile.nameFile nameExtracted from Vendor.fname using string splitting
Vendor.fnamefile.sizeFile size in bytesExtracted from Vendor.fname and converted to bytes
Nonefile.typeFile type identifierStatic value: file
Vendor.riskScore (indirect)host.risk.calculated_scoreRisk score mapped to host riskCopied from event.risk_score
Vendor.msgrule.nameName of the rule that triggeredCopied from Vendor.msg
Vendor.sourceIpsource.addressSource IP addressCopied from Vendor.sourceIp when not N/A
Vendor.sourceHostsource.domainSource host domainCopied from Vendor.sourceHost when not N/A
Vendor.sourceIp (indirect)source.ipSource IP addressCopied from source.address
Vendor.severityTypethreat.indicator.confidenceConfidence level of the threat indicatorCopied from Vendor.severityType
Vendor.caseDescriptionthreat.indicator.descriptionDescription of the threat indicatorCopied from Vendor.caseDescription
Vendor.numberOfIncidentsthreat.indicator.sightingsNumber of incidents related to the threatCopied from Vendor.numberOfIncidents
Vendor.loginNameuser.domainDomain extraction from usernameExtracted from Vendor.loginName using regex pattern
Vendor.duseruser.emailUser email addressCopied from Vendor.duser
Vendor.loginNameuser.nameUsernameExtracted from Vendor.loginName using regex pattern