DocumentationRelease Notes
Log In
Documentation

EVENT FORWARDER MESSAGE FIELDS

There are a number of syslog formats supported by BeyondInsight, including newline-delimited, tab-delimited, LEEF, CEF, and a custom JSON structure for added parsing options. This document provides details on the following:

  • Message components and format
  • Persistent and variable fields within each message
  • Event field mappings, event name, event type values, and event category values for Password Safe events
  • Hardware, monitored services, and performance counter events for U-Series Appliance
  • Sample syslog output formats

Overall message structure

The newline-delimited and JSON syslog message structure is outlined below. CEF, LEEF, FireEye TAP, Splunk HTTP EC, and other implementations adhere to the message structures as required by their specifications.

Message components

[priority] [syslog sender time] [syslog sender IP] [message body]
  • Priority: Calculated using the event severity and syslog facility.
  • Syslog Sender Time (yyyy-MM-ddTHH:mm:ss): UTC date and time when the event was forwarded.

ℹ️

Note

If there appears to be a discrepancy with the time of an event, make sure the receiver is configured to use UTC.

  • Syslog Sender IP: The IP address of the sender as an IPv4 address or IPv6 address.
  • Message Body: The current syslog message body implementation is newline-delimited.

Message format

<priority>yyyy-MM-ddTHH:mm:ssZ 10.10.10.10 Key=Value

Example

Sample Message Format

&lt;0&gt;2016-06-13T11:38:21Z 10.101.25.115 AgentId=Retina …

ℹ️

Note

The Event Forwarder only scrapes and forwards events from the database. A comprehensive list of all Syslog Event Messages is currently unavailable.

Persistent Fields

The following keys can be expected within each message.

FieldValue TypeDescription
Event DateDateTimeEvent date (UTC)
Server DateDateTimeDateTime of server event forwarding processing (UTC)
RefTypeStringEvent reference Id
Agent DescStringThe last known relaying agent (for example, Application Bus 3.0)
Agent IDStringThe source or originating agent
Agent VerStringThe version of the agent
Source HostStringThe machine name of the agent (or IP address if the machine name is not available)
Source IPStringThe IP address of the agent
OSStringThe operating system of the agent
CategoryStringEvent Category. This can be any number of verbs (T49152, U11234, Group, Audits, etc.)
Event NameStringThe name of the event
Event DescStringAdditional descriptive details for the event. This varies in level of detail based on the event source, etc.
Event SeverityIntegerIn general, severity ranges from 0-10, where Information = 0, low = 3, medium = 6, and high = 9
Event SubjectStringSubject Identity at the root of the event. This can be a scanned asset (for example, IP or Hostname), an action (for example, Application launch)
Event TypeInteger[Reserved for future use]
UserStringThe computer / machine user associated with the event
Workgroup IDStringThe workgroup ID (for example,BeyondTrust Workgroup)
Workgroup DescStringThe workgroup name (for example, BeyondTrust)
Workgroup LocationStringThe workgroup location (for example, Default Location)

Variable fields

Additional fields may be present following the persistent fields already mentioned. These are message type dependent and can vary over time and can be enabled and disabled using the Event Filters option within an event forwarder connector in BeyondInsight.

Event CategoryEvent DescriptionAgent IDEvent Type IDEvent ID
BeyondInsight Application Audit appaudit  
BeyondTrust Discovery Agent Retina  
Clarity mlwr
 
  
Endpoint Privilege Management for Mac & WindowsApplication Request Elevation
Application Launched
Custom Rule Applied
Shell Rule Applied
ActiveX - Control Rule Applied
ActiveX - Application Request Elevation
UAC Prompt
Denied Rule Applied
Passive Rule Applied
Validate Policy
Policy Applied
 
pbw, pbmac
pbw, pbmac
pbw, pbmac
pbw, pbmac
pbw, pbmac
pbw, pbmac
pbw, pbmac
pbw, pbmac
pbw, pbmac
pbw, pbmac
pbw, pbmac
28691
28692
28693
28694
28695
28696
28697
28698
28699
28702
28703
PBW-EVENT-28691
PBW-EVENT-28692
PBW-EVENT-28693
PBW-EVENT-28694
PBW-EVENT-28695
PBW-EVENT-28696
PBW-EVENT-28697
PBW-EVENT-28698
PBW-EVENT-28699
PBW-EVENT-28702
PBW-EVENT-28703
Endpoint Privilege Management for Unix & LinuxAccept
Finish
Keystroke
Reject
Register
Update
 
pbul
pbul
pbul
pbul
pbul
pbul
 
01
02
03
04
05
06
 
PBUL-EVENT-01
PBUL-EVENT-02
PBUL-EVENT-03
PBUL-EVENT-04
PBUL-EVENT-05
PBUL-EVENT-06
 
File Integrity Monitoring flm
 
  
General Appliance Health GenAppHealth  
Password Safe pbps  
Endpoint Privilege Management ReportingStarts
Logins
Protection
Processes
pmr 01
02
03
04

ℹ️

Note

Endpoint Privilege Management Reporting is available only when the Endpoint Privilege Management Reporting plugin is installed and configured.

Password Safe Events

Password Safe event field mappings

The table below provides the value type and description for each Password Safe field found in events.

FieldValue TypeDescription
Event DateDateTimeEvent date (UTC)
Server DateDateTimeDateTime of server event forwarding processing (UTC)
Agent IDStringPBPS
Source HostStringThe machine name of BeyondInsight instance
Source IPStringThe IP address of BeyondInsight instance
Event NameStringRole used
Event DescStringObject Type + Operation (for example, Functional Account Add)
Event SeverityInteger0 = failed, 1 = success
Event SubjectStringIP address of the browser that initiated the event
UserStringUsername associated with the event
Workgroup IDStringWhere applicable, workgroup ID of the associated asset
Workgroup DescStringWhere applicable, workgroup description of the associated asset
LogSystemIDIntegerPMMLogSytem table reference ID
LogTimeDateTimeMM/dd/yyyy HH:mm:ss
UserNameStringUsername associated with the event
UserIDStringUser ID associated with the event
RoleUsedStringRole used
ObjectTypeIDIntegerObject Type reference ID
ObjectTypeStringObject Type (i.e. Function Account)
ObjectIDIntegerObject reference ID
OperationStringOperation (for example, Add, Update)
FailedBooleanTrue / False
TargetStringDescribes the asset acted upon (for example, FAccount=testuser1 FAlias=testuser1 FDomain=testdomain1 PFid=25)
DetailsStringMiscellaneous additional information

Event triggers

Event name and event type values

The following are potential values that can be found in application audit messages for Event Name, in addition to their corresponding Event Type value shown in parentheses. Events are based on action taken.

ℹ️

Note

This list may change over time and is not guaranteed to include every possible value.

“Event Name” (Event Type)
Default (0)Login (1)Logout (2)Add (3)
Edit (4)Delete (5)Read (6)Assign (11)
Rename (12)Schedule (14)Abort Job (17)Delete Job (18)
Reset (19)Import (20)Copy (23)Generate (24)
Session End (25)Bulk Password Change (26)Bulk Domain Account Unlink (27)Validate (28)
Update (30)Download (35)Unlock (36)Bulk Move Credential (37)

Event category values

The following are potential values that can be found for Category in application audit messages.

ℹ️

Note

This list may change over time and is not guaranteed to include every possible value.

Account LockoutAddress GroupApplication SessionAssetsAttribute
Attribute TypeBeyondInsight Password PolicyBeyondInsight Configuration ToolChange PasswordClient Certificate
Cloud ConnectorConfigureCredentialDatabasesDirect Connect
Direct Connect FailureDirectory QueryDomain ManagementEPM ExclusionEPM Policy Logout
EPM Policy UserEPM RuleEvent ForwarderJIRA Ticket SystemLogin Failure
Managed Account AliasOrganizationPlugin SettingPMM Access PolicyPMM Access Policy Schedule
PMM AccountPMM API Authentication Rule FailurePMM API RegistrationPMM API SignOutPMM Application
PMM Change Email TemplatePMM Connection ProfilePMM Connection Profile FilterPMM DSS Key PoliciesPMM Functional Account
PMM LoginPre-Login BannerPMM Login FailurePMM Managed AccountPMM Managed System
PMM Mask Remedy ConnectorPMM Oracle Internet DirectoryPMM Password RulePropagation ActionPurging Options
Remedy Connector MappingSailpoint STIScanSCIMServiceNow Connector
ServiceNow ExportServiceNow Export MappingServiceNow ImportServiceNow Ticket System MappingServiceNow Ticket System
Session MonitoringSmart RuleSystem OptionsSecrets SafeSecrets Safe Credential
Secrets Safe FolderThird Party ConnectorTicketTOTP Authentication FailureTOTP Device Enrolled
UserUser GroupUser Group - Smart Rule RoleWorker NodeWorkgroup

U-Series Appliance SNMP events

There are 4 event names:

  • EventName = PerformanceAlert / EventID = variable (for example, U-Series Appliance-HARDWARE-001)
  • EventName = ServiceErrorAlert / EventID = U-Series Appliance-SERVICE-001
  • EventName = HardwareFaultAlert / EventID = variable (for example, U-Series Appliance-HARDWARE-001)
  • EventName = DailyPerformanceSummary / EventID = U-Series Appliance-PERFDAILY-001

The sources that trigger the events can be categorized as follows:

  • Hardware Events: Any of the hardware events raised by Dell's OpenManage.
  • Monitored Services: A variety of events around monitored services, such as:
    • Crashes
    • A Service's running state isn’t as expected (for example, running when it should be stopped or vice-versa, or when the previously alerted service is then found to be running in the correct state).
    • Service controller manager generates any of the following events in the event log (crashes or did-not-start type of events): 7034, 7000, 7013, 7023, 7024, 7031, 7032, 7034, 7043.
  • Performance Counters: Events when the various performance monitor counters cross the user-configured thresholds (low, med, or hi and reset).

Possible hardware events

batterywarnbatteryfailfanwarnfanfailhardwarelogwarn
hardwarelogfullintrusionmemprefailmemfailsystempowerwarn
systempowerfailpowersupplypowersupplywarnprocessorwarnprocessorfail
redundegradredunlosttempwarntempfailvoltwarn
voltfailwatchdogasrstoragesyswarnstoragesysfailstoragectrlwarn
storagectrlfailpdiskwarnpdiskfailvdiskwarnvdiskfail
enclosurewarnenclosurefailstoragectrlbatterywarnstoragectrlbatteryfailsystempeakpower

List of monitored services

EventServerManagementConsoleStandaloneEventServerBIDatabaseDatabase
PasswordSafeStandalonePasswordSafePatchManagementThirdPartyPatchRetina
ARCubeARReportingAutoUpdatesEUSUpdater

List of performance counters

SQL Memory usage (% used of the allocated SQL Server memory limit)SQL Server's CPU usageTotal CPU usage
Disk free on each drivePhysical Disk Avg Disk sec
write C:           
Physical Disk Current Disk Queue Length
Memory Pages/sec
SQLServer Batch Requests/Sec
Memory Cache Bytes
SQLServer SQL Compilations/Sec             
Paging File_Percent_Usage
SQLServer SQL_ReCompilations/Sec
SQLServer User ConnectionsSQLServer LockWaits/SecSQLServer PageSplits/Sec
SQLServer ProcessesBlockSQLServer CheckpointPages/Sec 

Sample Syslog Output Formats

ℹ️

Note

This is a small sample of event messages in various formats, not an all-encompassing set of every possible event.

Syslog format: newline-delimited

<0>2015-12-05T11:22:53Z 10.124.101.11 Agent Desc: Application Bus 3.0
Event Date: 2016-06-13 10:14:35
Server Date: 2016-06-13 11:38:21
RefType: 16
Agent ID: retina
Agent Ver: 5.23.1.3108
Category: Processes
Source Host: WIN-4PBV285405S
Event Desc: svchost
Event Name: Process   772
OS: Windows,Microsoft,Windows,Server 2008 R2 Standard Edition (full installation) x64,Service Pack 1
Event Severity: 0
Source IP: 10.200.31.203
Event Subject: 010.200.031.085
Event Type: 0
User: SYSTEM
Workgroup Desc: BeyondTrust
Workgroup ID: BeyondTrust Workgroup
Workgroup Location: Default Location
Process ID: 772 (0x304)
Parent Process ID: 492 (0x1EC)
Start Time: 5/12/2016 9:21:05 AM GMT-04

Syslog format: tab-delimited

<0>2016-12-05T11:22:53Z 10.101.25.167 Agent Desc: Application Bus 3.0Agent ID: retina
    Agent Ver: 5.25.2.3215Category: UserSource Host: WIN-N83HFCB9RNAEvent 
Desc: Built-in account for guest access to the computer/domainEvent Name: GuestOS: 
Windows,Microsoft,Windows,UnknownEvent Severity: 0Source IP: 10.101.25.167
Event Subject: 010.101.025.177Event Type: 0User: WIN-N83HFCB9RNA$
    Workgroup Desc: BeyondTrust	Workgroup ID: BeyondTrust Workgroup	Workgroup 
Location: Default Location	Member of Group (01/001): Guests	Privilege (01/002)
: Guest	Account Disabled (01/003): True	Last Logon (01/004): never 	Last Logoff 
(01/005): unknown 	Expires (01/006): never 	Max Storage (01/007): unlimited	Bad 
PW Count (01/008): 0	Number of Logons (01/009): 0	Logon Server (01/010): \\*	Country
 Code (01/011): 0	RID (01/012): 501	Password Expired (01/013): no	Source 
(01/014): NetUserEnum	SID (01/015): S-1-5-21-2210307081-232491991-3792010023-501

JSON syslog format

<0>2016-06-13T11:38:21 10.101.25.115 
{
          "formatVersion":"1.0", 
          "vendor":"BeyondTrust",
          "product":"BeyondInsight",
          "version":"6.0.0",
          "agentid":"attack",
          "agentdesc":"Application Bus 3.0",
          "agentver":"Unknown",
          "category":"User",
          "severity":"0",
          "eventid":"RET-SCAN-007",
          "eventname":"beyondtrust",
          "eventdesc":"bt admin",
          "eventdate":"Jun 10 2016 03:05:04",
          "sourcehost":"mymachine-ws",
          "os":"Windows,Microsoft,Windows,Unknown",
          "souirceip":"172.168.101.202",
          "eventsubject":"172.168.101.222",
          "eventtype":"0",
          "user":"MYMACHINE-WS$",
          "workgroupid":"BeyondTrust Workgroup",
          "workgroupdesc":"BeyondTrust",
          "workgrouplocation":"Default Location", 
          "nvps":
          {
                        "id":"c85dca8c-df30-4a70-98f8-c8a47f7fc2fa", 
                        "evtdate":"6/10/2016 3:05:04 AM", 
                        "clienthost":"mymachine-ws", 
                        "eventseverity":"0", 
                        "dllversion":"AppBus EMS v3.0 com xml", 
                        "transactiongroup":"5B3A069BE0D84E7EA56F2A40EFDBE253", 
                        "subjectdescription":"mymachine-ws", 
                        "evtsubjbi":"2896693762", 
                        "evtsrcipbi":"2896693762", 
                        "referenceid":"7", 
                        "evtdatatype":"SCAN", 
                        "evtstatus":"True", 
                        "badpwcount0101":"0", 
                        "countrycode0101":"0", 
                        "expires0101":"never ", 
                        "fullname0101":"beyondtrust", 
                        "lastlogoff0101":"unknown ", 
                        "lastlogon0101":"Tue Jun 02 19:26:42 2015", 
                        "logonserver0101":"\\\\*", 
                        "maxstorage0101":"unlimited", 
                        "memberofgroup0101":"Administrators, Performance Log Users, Users", 
                        "numberoflogons0101":"7", 
                        "passwordage0101":"412 days", 
                        "passwordexpired0101":"no", 
                        "privilege0101":"Administrator", 
                        "rid0101":"1006", 
                        "sid0101":"S-1-5-21-4152543990-75340177-3020034217-1006", 
                        "source0101":"NetUserEnum"
          }
}

LEEF syslog format

Jun 13 23:11:40 fe80::ad7a:8589:f107:158a%12 
LEEF:1.0|BeyondTrust|BeyondInsight|6.0.0|RET-SCAN-009|cat=Modules	devTime=Jun 
04 2016 02:08:58	devTimeFormat=MMM dd yyyy HH:mm:ss	sev=0	
	src=10.200.31.212	resource=WIN-AR9FPF5LTJG	dst=10.200.31.84	
	usrName=WIN-AR9FPF5LTJG$	groupID=BeyondTrust Workgroup	
	AgentDesc=Application Bus 3.0	AgentID=retina	AgentVer=5.24.1.3126	
	EventDesc=acrotray.exe	EventName=acrotray.exe	
	Os=Windows,Microsoft,Windows,Unknown	EventType=0	
	WorkgroupDesc=BeyondTrust	WorkgroupLocation=Default Location	Type=Module	
	Name=acrotray.exe	Filename=C:\\Program Files\\Adobe\\Acrobat 
11.0\\Acrobat\\acrotray.exe	MD5=E0DF6506C36AA207F41EFED13D876D83	
	SHA1=11B87A57B626CCD760D121215C1B96AB72F06BAA	Version=11.0.6.70	
	Company Name=Adobe Systems Inc.	Description=AcroTray	Product=AcroTray - 
Adobe Acrobat Distiller helper application.	Signer=Adobe Systems, Incorporated	Image 
Size=3514368	Entry Address=0056F07E	Base Address=003C0000	
	CertSerial=68ADD7AFFC72183C31865ACD3CB2D70C	CertIssuer=Symantec Class 3 
Extended Validation Code Signing CA

CEF syslog format

Jun 13 16:09:00 WIN-TC570BCQDNA CEF:0|BeyondTrust|BeyondInsight|6.0.0|RET-SCAN-012|
IP Start Time|0|rt=Jun 13 2016 19:08:32 deviceExternalId=pbw_vulnerability cat=Status 
src=10.200.31.81 shost=PATCHWIN764X suser=NT AUTHORITY\NETWORK SERVICE msg=2016-
06-13 16:08:33 dst=10.200.31.81 BeyondTrustBeyondInsightAgentDesc=PBW 7.0.2.79 
BeyondTrustBeyondInsightAgentID=pbw_vulnerability 
BeyondTrustBeyondInsightAgentVer=7.0.2.79 BeyondTrustBeyondInsightCategory=Status 
BeyondTrustBeyondInsightClientHost=PATCHWIN764X 
BeyondTrustBeyondInsightEventDesc=2016-06-13 16:08:33 
BeyondTrustBeyondInsightEventName=IP Start Time BeyondTrustBeyondInsightOs=Windows 7 
(X64), Service Pack 1 BeyondTrustBeyondInsightEventSeverity=0 
BeyondTrustBeyondInsightSourceIp=10.200.31.81 
BeyondTrustBeyondInsightEventSubject=10.200.31.81 BeyondTrustBeyondInsightEventType=0 
BeyondTrustBeyondInsightUser=NT AUTHORITY\NETWORK SERVICE 
BeyondTrustBeyondInsightWorkgroupDesc=BeyondTrust Workgroup 
BeyondTrustBeyondInsightWorkgroupID=BeyondTrust Workgroup 
BeyondTrustBeyondInsightWorkgroupLocation=Default Location

©2003-2025 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.