Splunk DB Connect
Splunk DB Connect is an application from Splunk Enterprise you can install in your Splunk Enterprise instance. Splunk DB Connect retrieves events from the database you define, such as BeyondTrust Endpoint Privilege Management Reporting, and inserts the events into Splunk Enterprise.
You can use Splunk DB Connect to query the Export Views for Endpoint Privilege Management.
You can use SQL authentication or any of the default Endpoint Privilege Management Reporting accounts to authenticate with the BeyondTrust database. The default accounts are Report Reader, Event Parser, and Data Admin.
You can retrieve events from your endpoints or your Windows event collector node instead.
Install DB Connect
Prerequisites
- Splunk Enterprise 6.4.0 or later
- Java Platform, Standard Edition Development Kit (JDK) from Oracle. JDK is required. The JRE alone is not sufficient.
- Java Database Connection (JDBC) to connect to databases
For more information, see the following:
Install on Splunk Enterprise
- Open your Splunk Enterprise instance, and click App: Search & Reporting from the top menu bar.
- If DB Connect is installed, it appears in the list. Otherwise, click Find More Apps.
- Type DB Connect in the search box if Splunk can connect to the internet. Follow the onscreen instructions to install DB Connection. Alternatively, you can download DB Connect from the Splunk store to install manually.
- Click App: Search & Reporting > Manage Apps to install DB Connect from a separate installer.
- Click Install app from file and browse to the location of DB Connect you downloaded.
- Click Upload and follow the onscreen instructions to install DB Connect.
- After DB Connect is installed, you can access it from the App: Search & Reporting top menu.
Configure Splunk DB Connect
- Click App: Search & Reporting > Splunk DB Connect.
- Click Configuration > Settings.
- On the General tab, configure the path to your JRE installation on the machine hosting Splunk. The JVM Options and Task Server Port are configured by Splunk.
- Click Save to confirm your settings.
- Click the Databases tab, and then the Identities tab.
- Click New Identity. This is the identity (user) Splunk uses to authenticate to the BeyondTrust database to export events.
- Enter an Identity Name you will use to identify the user.
-
You can either use SQL authentication as shown here, or you can use Windows authentication and any of the Endpoint Privilege Management Reporting accounts that are set up by the installer: ReportReader, Event Parser and Data Admin.
-
Click Save to confirm your identity.
Note
Use the default permission Splunk Enterprise provides on the Permissions tab.
Create a new Splunk connection
- Click the Connections tab. This is where you configure the database you will connect to.
- Enter a Connection Name. This is to identify the connection in Splunk.
- Select the Identity you created from the dropdown list.
- Select the Connection Type, MS SQL Server Using MS Generic Driver.
- Enter the host IP address of your database server. Leave the port as the default 1433.
- Enter the Default Database as the one containing your Endpoint Privilege Management Reporting data.
- You can choose to configure the additional options if they are relevant for your environment.
- Click Save to save your connection. This will also validate the connection.
Note
Use the default permission Splunk Enterprise provides on the Permissions tab.
- Click the Data Lab tab and click New Input on the right-hand side.
- Enter a Name for you to identify the new Input by. You can also enter a Description if required.
- Leave the App dropdown list as Splunk DB Connect.
- Select your Connection from the dropdown menu. This also validates it.
- Click Continue. This allows you to choose and preview a table. You can now import the Export Views into Splunk. These are ExportDefendpointStarts, ExportDefendpointLogins, ExportPrivilegedAccountProtection, and ExportProcesses. This example uses the ExportDefendpointStarts view.
- Select Rising Column. This ensures the events from the Reporting database are incremented rather than retrieving the same events repeatedly.
- You can manually type a SQL query into the field or select the Checkpoint Column and the Checkpoint Value. Use a ? as a placeholder in your SQL query for the Checkpoint Value as you set this manually.
- Click Execute to search for the specified events in the Reporting database. This does not insert them into Splunk.
You can modify the SQL query to filter your results. This will help limit the data imported into Splunk Enterprise and your associated costs. For example, this SQL query imports events where the Endpoint Privilege Management version is 4.3.349.0 only.
SELECT *
FROM exportdefendpointstarts
WHERE sessionid > ?
AND AgentVersion='4.0.349.0'
ORDER BY sessionid asc
- Click Execute to search for the events in the Reporting database. These are displayed below.
- Click Continue. Set parameters for the input here if required.
- Click Continue. Each event imported into Splunk has the metadata you configure here as part of it. You can configure a new Sourcetype from the Settings menu on the top-right if required.
- Click Save to confirm your Input Type and start importing events into Splunk.
Repeat steps 7 to 11 for each of the Export Views.
Work with data in Splunk Enterprise
When using Splunk DB Connect to import data, BeyondTrust provides four denormalized views:
- ExportDefendpointStarts
- ExportLogons
- ExportPrivilegedAccountProtection
- ExportProcesses
The views allow you to import BeyondTrust audit data into SIEM systems such as Splunk Enterprise. Each view has a rising column allowing the SIEM system to track the data already imported.
ExportProcesses
Returns the Process Control events such as elevating or blocking applications.
The columns include:
- ApplicationDescription
- Publisher
- ProductVersion
- UserName
- HostName
- WorkstyleName
Also includes event action flags:
- Elevated
- Blocked
- Passive
ProcessID is the rising column and ProcessStartTime is the timestamp.
ExportLogons
Returns the Logon events in the database.
-
LogonTime
-
UserName
-
HostName
-
WorkstyleName
LogonID is the rising column and LogonTime is the timestamp.
ExportDefendpointStarts
Returns the Endpoint Privilege Management started events in the database.
The columns include:
SessionStartTime
HostName
AgentVersion
OS
SessionID is the rising column and SessionStartTime is the timestamp.
ExportPrivilegedAccountProtection
Returns the Endpoint Privilege Management events in the database.
The columns include:
- TimeGenerated
- Access
- WorkstyleName
- UserName
- HostName
- ApplicationDescription
ID is the rising column and TimeGenerated is the timestamp.
Note
For more information about the fields for each Endpoint Privilege Management export view, see the next section.
Export views
When using Splunk DB Connect to import data, BeyondTrust provides four denormalized export views for Endpoint Privilege Management events:
- ExportDefendpointStarts
- ExportDefendpointLogons
- ExportPrivilegedAccountProtection
- ExportProcesses
Each of the views can be queried in Splunk. For each view, the following data is sent to Splunk. These Export Views are correct as of Endpoint Privilege Management Reporting 4.5.
ExportDefendpointStarts
Column_name | Type | Length | Index | Description | Example |
---|---|---|---|---|---|
SessionID | bigint | 3 | Ascending Identity | 1 | |
SessionGUID | uniqueidentifier | UUID of the session | 5CD221E9-CEB5-441D-B380-CB266400B320 | ||
SessionStartTime | datetime | Time session started | 2017-01-03 10:24:00.000 | ||
SessionEndTime | datetime | Always NULL (not used) | NULL | ||
HostSID | nvarchar | 200 | 1 | Host SID | S-1-21-123456789-123456789-1635717638-390614945 |
AgentVersion | nvarchar | 20 | Endpoint Privilege Management Client Version | 4.0.384.0 | |
ePOMode | int | 1 if DP client is in ePO mode. 0 otherwise. | 1 | ||
CertificateMode | int | Certificate Mode | 0 | ||
PolicyAuditMode | int | Policy Audit Mode | 7 | ||
DefaultUILanguage | int | Locale Identifier of UI Language | 2057 | ||
DefaultLocale | int | Locale Identifier of Locale | 2057 | ||
SystemDefaultTimezone | int | Not set so always 0 | 0 | ||
ChassisType | nvarchar | 40 | Chassis Type | Other | |
HostName | nvarchar | 1024 | 2* | Host name | EGHostWin1 |
HostNameNETBIOS | nvarchar | 15 | 2* | Host NETBIOS | EGHOSTWIN1 |
OS | nvarchar | 20 | OS Version | 6.3 | |
OSProductType | int | 4 | OS Product Type. | 1 | |
PlatformType | nvarchar | 10 | Platform Type | Windows | |
HostDomainSID | nvarchar | 200 | Host Domain SID | S-1-21-123456789-123456789-1635717638 | |
HostDomainName | nvarchar | 1024 | Host Domain | EGDomain | |
HostDomainNameNETBIOS | nvarchar | 15 | Host Domain NETBIOS | EGDOMAIN |
ExportDefendpointLogons
Column_name | Type | Length | Index | Description | Example |
---|---|---|---|---|---|
LogonID | bigint | 3 | Ascending Identity | 1 | |
LogonGUID | uniqueidentifier | UUID of the logon | 819EF606-F9B6-40BE-9C0C-A033A34EC4F8 | ||
HostSID | nvarchar | 200 | 1 | Host SID | S-1-21-123456789-123456789-1635717638-390614945 |
UserSID | nvarchar | 200 | User SID | S-1-21-123456789-123456789-1635717638-1072059836 | |
LogonTime | datetime | Logon Date/Time | 2017-01-03 10:24:00.000 | ||
IsAdmin | bit | 1 if an admin, 0 otherwise | 0 | ||
IsPowerUser | bit | 1 if a power user, 0 otherwise | 0 | ||
UILanguage | int | Locale Identifier of the UI Language | 1033 | ||
Locale | int | Locale Identifier of the Locale | 2057 | ||
UserName | nvarchar | 1024 | User name | EGUser1 | |
UserDomainSID | nvarchar | 200 | User Domain SID | S-1-21-123456789-123456789-1635717638 | |
UserDomainName | nvarchar | 1024 | User Domain | EGDomain | |
UserNameNETBIOS | nvarchar | 15 | User NETBIOS | EGDOMAIN | |
ChassisType | nvarchar | 40 | Chassis Type | Docking Station | |
HostName | nvarchar | 1024 | 2* | Host name | EGHostWin1 |
HostNameNETBIOS | nvarchar | 15 | 2* | Host NETBIOS | EGHOSTWIN1 |
OS | nvarchar | 20 | OS Version | 6.3 | |
OSProductType | int | OS Product Type | 1 | ||
PlatformType | nvarchar | 10 | Platform Type | Windows | |
HostDomainSID | nvarchar | 200 | Host Domain SID | S-1-21-123456789-123456789-1635717638 | |
HostDomainName | nvarchar | 1024 | Host Domain | EGDomain | |
HostDomainNameNETBIOS | nvarchar | 15 | Host Domain NETBIOS | EGDOMAIN | |
PolicyName | nvarchar | 1024 | Policy Name | EventGen Test Policy | |
WorkstyleName | nvarchar | 1024 | Workstyle name | EventGen Test Workstyle |
ExportPrivilegedAccountProtection
Column_name | Type | Length | Index | Description | Example |
---|---|---|---|---|---|
ID | bigint | 1 | Ascending Identity | 1 | |
TimeGenerated | datetime | Event Generation Date/Time | |||
CommandLine | nvarchar | 1024 | Command Line | ||
PrivilegedGroupName | nvarchar | 200 | Privileged Group Name | Administrators | |
PrivilegedGroupRID | nvarchar | 10 | Privileged Group Relative Identifier | 544 | |
Access | nvarchar | 200 | Group Access Details | Add Member, Remove Member, List Members, Read Information | |
PolicyGUID | uniqueidentifier | Policy UUID | E7654321-AAAA-5AD2-B954-12342918D604 | ||
PolicyName | nvarchar | 1024 | Policy Name | EventGen Test Policy | |
WorkstyleName | nvarchar | 1024 | Workstyle name | EventGen Test Workstyle | |
FileName | nvarchar | 255 | File name | ||
ApplicationHash | nvarchar | 40 | Application SHA1 | 921CA2B3293F3FCB905B24A9536D8525461DE2A3 | |
ProductCode | nvarchar | 1024 | Product Code | ||
UpgradeCode | nvarchar | 1024 | Upgrade Code | ||
FileVersion | nvarchar | 1024 | File Version | ||
MD5 | nvarchar | 32 | MD5 Hash | 3279476E39DE235B426D69CFE8DEBF55 | |
UserSID | nvarchar | 200 | User SID | S-1-21-123456789-123456789-1635717638-1072059836 | |
UserName | nvarchar | 1024 | User Name | EGUser1 | |
UserDomainSID | nvarchar | 200 | User Domain SID | S-1-21-123456789-123456789-1635717638 | |
UserDomainName | nvarchar | 1024 | User Domain | EGDomain | |
UserNameNETBIOS | nvarchar | 15 | User Domain NETBIOS | EGDOMAIN | |
ChassisType | nvarchar | 40 | Chassis Type | Other | |
HostSID | nvarchar | 200 | Host SID | S-1-21-123456789-123456789-1635717638-390614945 | |
HostName | nvarchar | 1024 | Host Name | EGHostWin1 | |
HostNameNETBIOS | nvarchar | 15 | Host NETBIOS | EGHOSTWIN1 | |
OS | nvarchar | 20 | OS Version | 6.3 | |
OSProductType | int | OS Product Type | 1 | ||
HostDomainSID | nvarchar | 200 | Host Domain SID | S-1-21-123456789-123456789-1635717638 | |
HostDomainName | nvarchar | 1024 | Host Domain | EGDomain | |
HostDomainNameNETBIOS | nvarchar | 15 | Host domain NETBIOS | EGDOMAIN | |
FileOwnerUserSID | nvarchar | 200 | File Owner SID | S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 | |
FileOwnerUserName | nvarchar | 1024 | File Owner | NT SERVICE\TrustedInstaller | |
FileOwnerDomainName | nvarchar | 1024 | File Owner Domain | NT SERVICE | |
ApplicationURI | nvarchar | 1024 | URI of a macOS application | com.apple.preference.datetime | |
ApplicationDescription | nvarchar | 2048 | Application description | lusrmgr.msc | |
FirstDiscovered | datetime | First time app was seen | 2017-01-03 10:25:50.110 | ||
FirstExecuted | datetime | First time app was executed | 2017-01-03 10:24:00.000 | ||
PlatformType | nvarchar | 10 | Platform Type | Windows | |
ProductName | nvarchar | 1024 | Product name | ||
ProductVersion | nvarchar | 1024 | Product version | ||
Publisher | nvarchar | 1024 | Publisher | Microsoft Windows | |
TrustedOwner | bit | 1 if a trusted owner, 0 otherwise | 1 |
ExportProcesses
Column_name | Type | Length | Index | Description | Example |
---|---|---|---|---|---|
ProcessID | bigint | 4 | Ascending Identity | 1 | |
ProcessGUID | uniqueidentifier | 2 | UUID of the process | 98C99D96-6DFA-4C95-9A87-C8665C166286 | |
EventNumber | int | Event Number. See List of Events section. | 153 | ||
TimeGenerated | datetime | Event generation date/time | 2017-02-20 13:11:11.217 | ||
TimeReceived | datetime | Event received at ER date/time | 2017-02-20 13:16:28.047 | ||
EventGUID | uniqueidentifier | Event UUID | 9F8EB86C-AA0D-42B9-8720-166FAB91F1ED | ||
PID | int | Process ID | 8723 | ||
ParentPID | int | Parent Process ID | 142916 | ||
CommandLine | nvarchar | 1024 | Command Line | "C:\cygwin64\bin\sh.exe" | |
FileName | nvarchar | 255 | File Name | c:\cygwin64\bin\sh.exe | |
ProcessStartTime | datetime | 1 | Date/Time Process Started | 2017-02-20 13:11:11.217 | |
Reason | nvarchar | 1024 | Reason entered by user | ||
ClientIPV4 | nvarchar | 15 | Client IP Address | 10.0.9.58 | |
ClientName | nvarchar | 1024 | Client Name | L-CNU410DJJ7 | |
UACTriggered | bit | 1 if UAC shown | 0 | ||
ParentProcessUniqueID | uniqueidentifier | Parent process UUID | C404C7F5-3A93-4C0E-81BC-9902D220C21E | ||
COMCLSID | uniqueidentifier | COM CLSID | NULL | ||
COMAppID | uniqueidentifier | COM Application ID | NULL | ||
COMDisplayName | nvarchar | 1024 | COM Display Name | ||
ApplicationType | nvarchar | 4 | Application Type | svc | |
TokenGUID | uniqueidentifier | UUID of token in policy | F30A3824-27AF-4D69-9125-C78E44764AC1 | ||
Executed | bit | 1 if executed, 0 otherwise | 1 | ||
Elevated | bit | 1 if elevated, 0 otherwise | 1 | ||
Blocked | bit | 1 if blocked, 0 otherwise | 0 | ||
Passive | bit | 1 if passive, 0 otherwise | 0 | ||
Cancelled | bit | 1 if cancelled, 0 otherwise | 0 | ||
DropAdmin | bit | 1 if admin rights dropped, 0 otherwise | 0 | ||
EnforceUsersDefault | bit | 1 if user default permissions were enforced, 0 otherwise | 0 | ||
Custom | bit | 1 if Custom Token, 0 otherwise | 0 | ||
SourceURL | nvarchar | 2048 | Source URL | ||
AuthorizationChallenge | nvarchar | 9 | Challenge Response authorization code | ||
WindowsStoreAppName | nvarchar | 200 | Windows Store application name (appx app type only) | ||
WindowsStoreAppPublisher | nvarchar | 200 | Windows Store application publisher (appx app type only) | ||
WindowsStoreAppVersion | nvarchar | 200 | Window Store application version (appx app type only) | ||
DeviceType | nvarchar | 40 | Device Type | Fixed Disk | |
ServiceName | nvarchar | 1024 | Service name (svc events only) | ||
ServiceDisplayName | nvarchar | 1024 | Service Display Name (svc app type only) | ||
PowerShellCommand | nvarchar | 1024 | PowerShell Command (ps1/rpsc/rpss app types only) | ||
ApplicationPolicyDescription | nvarchar | 1024 | Policy Description | ||
SandboxGUID | uniqueidentifier | Sandbox UUID (sandbox events only) | NULL | ||
SandboxName | nvarchar | 1024 | Sandbox Name (sandbox events only) | NULL | |
BrowseSourceURL | nvarchar | 2048 | Sandbox browse source (sandbox events only) | ||
BrowseDestinationURL | nvarchar | 2048 | Sandbox destination source (sandbox events only) | ||
Classification | nvarchar | 200 | Sandbox classification (sandbox events only) | Private (Local) | |
IEZoneTag | nvarchar | 200 | IE Zone Tag | ||
OriginSandbox | nvarchar | 40 | Origin Sandbox | ||
OriginIEZone | nvarchar | 40 | Origin IE Zone | ||
TargetSandbox | nvarchar | 40 | Target Sandbox | ||
TargetIEZone | nvarchar | 40 | Target IE Zone | ||
AuthRequestURI | nvarchar | 1024 | Authorization request URL (osx challenge/response only) | ||
PlatformVersion | nvarchar | 10 | Platform Version | ||
ControlAuthorization | bit | 1 is Endpoint Privilege Management authorized this macOS application | 0 | ||
TrustedApplicationName | nvarchar | 1024 | Name of the trusted application | Microsoft Word | |
TrustedApplicationVersion | nvarchar | 1024 | Version of the trusted application | 11.1715.14393.0 | |
ParentProcessFileName | nvarchar | 1024 | Parent process file name | Google Chrome | |
ApplicationHash | nvarchar | 40 | SHA1 of the application | C22FF10511ECCEA1824A8DE64B678619C21B4BEE | |
ProductCode | nvarchar | 1024 | Product Code | ||
UpgradeCode | nvarchar | 1024 | Upgrade Code | ||
FileVersion | nvarchar | 1024 | File Version | ||
MD5 | nvarchar | 32 | MD5 hash of the app | 6E641CAE42A2A7C89442AF99613FE6D6 | |
TokenAssignmentGUID | uniqueidentifier | UUID of the token assignment in the policy | E7654321-BBBB-5AD2-B954-1234DDC7A89D | ||
TokenAssignmentIsShell | bit | Token assignment is for shell | 1 | ||
UserSID | nvarchar | 200 | User SID | S-1-21-123456789-123456789-16357176381125883508 | |
UserName | nvarchar | 1024 | User Name | EGUser18 | |
UserDomainSID | nvarchar | 200 | User Domain SID | S-1-21-123456789-123456789-1635717638 | |
UserDomainName | nvarchar | 1024 | User Domain | EGDomain | |
UserDomain NameNETBIOS | nvarchar | 15 | User Domain NETBIOS | EGDOMAIN | |
ChassisType | nvarchar | 40 | Chassis Type | Laptop | |
HostSID | nvarchar | 200 | Host SID | S-1-21-123456789-123456789-1635717638775838649 | |
HostName | nvarchar | 1024 | 3* | Host Name | EGHostWin18 |
HostNameNETBIOS | nvarchar | 15 | 3* | Host NETBIOS | EGHOSTWIN18 |
OS | nvarchar | OS Version | 10.0 | ||
OSProductType | int | OS Product Type | |||
HostDomainSID | nvarchar | 200 | Host Domain SID | S-1-21-123456789-123456789-1635717638 | |
HostDomainName | nvarchar | 1024 | Host Domain | EGDomain | |
HostDomain NameNETBIOS | nvarchar | 15 | Host Domain NETBIOS | EGDOMAIN | |
AuthUserSID | nvarchar | 200 | Authorizing User SID | ||
AuthUserName | nvarchar | 1024 | Authorizing User | ||
AuthUserDomainSID | nvarchar | 200 | Authorizing User Domain SID | ||
AuthUserDomainName | nvarchar | 1024 | Authorizing User Domain | ||
AuthUserDomain NameNETBIOS | nvarchar | 15 | Authorizing User Domain NETBIOS | ||
FileOwnerUserSID | nvarchar | 200 | File Owner SID | S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464 | |
FileOwnerUserName | nvarchar | 1024 | File Owner | NT SERVICE\TrustedInstaller | |
FileOwnerDomainSID | nvarchar | 200 | File Owner Domain SID | S-1-5-80 | |
FileOwnerDomainName | nvarchar | 1024 | File Owner Domain | NT SERVICE | |
FileOwnerDomain NameNETBIOS | nvarchar | 15 | File Owner Domain NETBIOS | ||
ApplicationURI | nvarchar | 1024 | URI of the macOS Application | com.apple.preference.datetime | |
ApplicationDescription | nvarchar | 2048 | Application Description | c:\cygwin64\bin\sh.exe | |
FirstDiscovered | datetime | Time application first seen | 2017-02-07 09:14:39.413 | ||
FirstExecuted | datetime | Time application first executed | 2017-02-07 09:07:00.000 | ||
PlatformType | nvarchar | 10 | Platform Type | Windows | |
ProductName | nvarchar | 1024 | Product Name | ADelRCP Dynamic Link Library | |
ProductVersion | nvarchar | 1024 | Product Version | 15.10.20056.167417 | |
Publisher | nvarchar | 1024 | Publisher | Adobe Systems, Incorporated | |
TrustedOwner | bit | 1 if a trusted owner, 0 otherwise | 0 | ||
MessageGUID | uniqueidentifier | UUID of the message in the policy | 00000000-0000-0000-0000-000000000000 | ||
MessageName | nvarchar | 1024 | Name of the message in the policy | Block Message | |
MessageType | nvarchar | 40 | Message Type | Prompt | |
AppGroupGUID | uniqueidentifier | UUID of the Application Group in the Policy | 47E4A204-FC06-428B-8E73-1E36E3A65430 | ||
AppGroupName | nvarchar | 1024 | Application Group Name in the Policy | Test Policy.test | |
PolicyID | bigint | Internal ID of the Policy | 2 | ||
PolicyGUID | uniqueidentifier | UUID of the Policy | E7654321-AAAA-5AD2-B954-12342918D604 | ||
PolicyName | nvarchar | 1024 | Policy Name | EventGen Test Policy | |
WorkstyleName | nvarchar | 1024 | Workstyle Name | EventGen Test Workstyle | |
ContentFileName | nvarchar | 255 | Content File Name | c:\users\user.wp-epo-win7-64\downloads\con29 selectable feestable (1).pdf | |
ContentFileDescription | nvarchar | 1024 | Content File Description | ||
ContentFileVersion | nvarchar | 1024 | Content File Version | ||
ContentOwnerSID | nvarchar | 200 | Content Owner SID | S-1-21-123456789-123456789-1635717638-1072059836 | |
ContentOwnerName | nvarchar | 1024 | Content Owner | EGUser1 | |
ContentOwnerDomainSID | nvarchar | 200 | Content Owner Domain SID | S-1-5-21-2217285736-120021366-3854014904 | |
ContentOwnerDomainName | nvarchar | 1024 | Content Owner Domain | BEYONDTRUSTTEST58\BEYONDTRUSTTEST58.QA | |
ContentOwnerDomain NameNetBIOS | nvarchar | 15 | Content Owner Domain NETBIOS | BEYONDTRUSTTEST58 | |
UninstallAction | nvarchar | 20 | The uninstall action carried out | Change/Modify | |
TokenName | nvarchar | 20 | The name of the event action | Blocked | |
TieStatus | int | Threat Intelligence Exchange status for the reputation of this application | 0 | ||
TieScore | int | Threat Intelligence Exchange score for the application | |||
VtStatus | int | VirusTotal status for the reputation of this application | |||
RuleScriptFileName | nvarchar | 200 | The name in config of the script associated with the rule | Get-McAfeeGTIReputation | |
RuleScriptName | nvarchar | 200 | The name of the script set by interface | Get-McAfeeGTIReputation | |
RuleScriptVersion | nvarchar | 20 | Version number of the script. | 1.1.0 | |
RuleScriptPublisher | nvarchar | 200 | Publisher that signed the script | BeyondTrust | |
RuleScriptRuleAffected | bit | True when the script has set all settable rule properties; otherwise false | True | ||
RuleScriptStatus | nvarchar | 100 | Success OR Why the configured script didn't run or set rule properties | Success | |
RuleScriptResult | nvarchar | 1024 | Result of the script run | Script ran successfully | |
RuleScriptOutput | nvarchar | 1024 | The output of the script | ||
AuthorizationSource | nvarchar | 200 | The Authorizing User Credential Source | ||
AuthMethods | nvarchar | 1024 | The type of authentication method selected in the Policy Editor. | Possible values: Identity Provider, Password, Challenge Response, Smart Card and User Request. Multiple values can be present and will be comma separated. | |
IdPAuthentication | nvarchar | 400 | The credential provided when adding an Identity Provider authorization message in the Policy Editor. |
Updated 3 days ago