In this type of syslog content mapping, provide the CEF Keys field in the format of {CEF Key 1}|{CEF Key 2}|...|{CEF Key n}, separated by a "|".
The following table outlines the syslog content mapping between predefined/custom extension CEF keys and Trend Micro Web Security log output (value).
CEF Key |
Description |
Value |
---|---|---|
Header (logVer) |
CEF format version |
CEF: 0 |
Header (vendor) |
Appliance vendor |
Trend Micro |
Header (pname) |
Appliance product name |
Trend Micro Web Security |
Header (pver) |
Appliance version |
Example: 3.0.0.2042 |
Header (eventid) |
Signature ID |
Example: 100000 |
Header (eventName) |
Description |
Access Log |
Header (severity) |
Risk level |
|
rt |
UTC timestamp |
Example: Jul 05 2018 07:54:15 +0000 |
logType |
Log type |
|
companyID |
Company ID |
Example: 7800fcab-7611-416c-9ab4-721b7bd6b076 |
adDomain |
AD domain |
Example: trendmicro.com.cn |
userName |
User name or client IP |
Example: 10.204.214.188 |
groupName |
Group name |
Example: testgroup1 |
userDepartment |
User department |
Example: finance department |
gatewayName |
Gateway name |
Example: on-premise-2051 |
app |
Protocol used |
|
transportBytes |
Body size of a request or response |
Example: 221030 |
dst |
Destination IP address of a request |
Example: 54.231.184.240 |
src |
Source IP address of a request |
Example: 10.204.214.188 |
upStreamSize |
Upstream payload from Trend Micro Web Security to server, unit bytes |
Example: 501 |
downStreamSize |
Downstream payload from server to Trend Micro Web Security, unit bytes |
Example: 220529 |
domainName |
URL domain |
Example: clients4.google.com |
scanType |
Scan type |
|
policyName |
Policy name |
Example: default |
profileName |
Profile name |
Example: default |
severity |
WRS score threshold |
|
principalName |
Principal name |
Example: testuser@trendmicro.com.cn |
cat |
URL category |
Example: Search Engines/Portals |
appName |
Application name |
Example: Google |
wrsScore |
WRS score |
Example: 81 |
malwareType |
Malware type |
|
malwareName |
Malware name |
Example: HEUR_OLEXP.B |
fname |
File name |
Example: sample_nice_dda_heurb_1177077.ppt-1 |
filehash |
SHA-1 |
Example: 3f21be4521b5278fb14b8f47afcabe08a17dc504 |
act |
Action |
|
httpTrans |
HTTP transaction |
JSON format. Example:{"http_req":{ "method":"GET","scheme":"http","path":"index.html","host":www.sina.com.cn,"headers":{"header_1":"value_1", ...}},"http_response":{"status_code":"200","headers":{...}}} |
macAddress |
MAC address of the Windows endpoint with the Enforcement Agent installed |
Example: 00-50-56-89-02-14 Note:
This CEF key cannot be applied to the on-premises gateway. |
Access log output sample 1:
CEF:0|Trend Micro|Trend Micro Web Security|3.0.0.2040|100000|Access Log|0| wrsScore=81 macAddress=00-50-56-89-02-14 companyID=7800fcab-7611-416c-9ab4-721b7bd6b076 app=2 upStreamSize=1064 userDepartment= scanType=0 malwareType=0 httpTrans={"http_req":{"headers":{"host":"clients4.google.com:443", "proxy-connection":"keep-alive","user-agent":"Chrome WIN 67.0.3396.99 (a337fbf3c2ab8ebc6b64b0bfdce73a20e2e2252b-refs/branch-heads/3396@{#790}) channel(stable)"}, "host":"clients4.google.com","method":"CONNECT","path":"","scheme":"https"}, "http_response":{"headers":{"content-length":"0"},"status_code":200},"ver":"1.0"} malwareName= rt=Jul 29 2018 19:34:11 +0000 policyName=default severity=65 filehash= logType=1 dst=172.217.24.206 appName=Google groupName= fname= adDomain= gatewayName=on-premise-2040 principalName= downStreamSize=4607 profileName= userName=10.204.214.188 src=10.204.214.188 transportBytes=5787 domainName=clients4.google.com cat=Search Engines/Portals act=allow
Access log output sample 2:
CEF:0|Trend Micro|Trend Micro Web Security|3.0.0.2051|100000|Access Log|0| wrsScore=49 macAddress=00-50-56-89-02-14 companyID=7800fcab-7611-416c-9ab4-721b7bd6b076 app=1 upStreamSize=501 userDepartment= scanType=70 malwareType=8 httpTrans={"http_req":{"headers":{"accept-encoding":"gzip,deflate", "host":"s3-us-west-2.amazonaws.com","user-agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36","x-forwarded-for":"10.204.214.188"},"host":"s3-us-west-2.amazonaws.com", "method":"GET","path":"dda-demo-samples/SAMPLE_NICE_DDA_HEURB_1177077.ppt-1", "scheme":"http"},"http_response":{"headers":{"content-length":"220160", "content-type":"binary/octet-stream"},"status_code":200},"ver":"1.0"} malwareName=HEUR_OLEXP.B rt=Aug 06 2018 02:24:15 +0000 policyName=default severity=0 filehash=3f21be4521b5278fb14b8f47afcabe08a17dc504 logType=1 dst=54.231.184.240 appName=Amazon Web Services (AWS) groupName= fname=sample_nice_dda_heurb_1177077.ppt-1 adDomain= gatewayName=on-premise-2051 principalName= downStreamSize=220529 profileName=default userName=10.204.214.188 src=10.204.214.188 transportBytes=221030 domainName=s3-us-west-2.amazonaws.com cat=Malware Accomplice act=analyze
CEF Key |
Description |
Value |
---|---|---|
Header (logVer) |
CEF format version |
CEF: 0 |
Header (vendor) |
Appliance vendor |
Trend Micro |
Header (pname) |
Appliance product name |
Trend Micro Web Security |
Header (pver) |
Appliance version |
Example: 3.4.1.5449 |
Header (eventid) |
Signature ID |
Example: 100001 |
Header (eventName) |
Description |
Audit Log |
Header (severity) |
Risk level |
0 |
rt |
UTC timestamp |
Example: Nov 04 2020 02:15:06 +0000 |
userName |
Email address |
Example: user@example.com |
companyID |
Company ID |
Example: 7800fcab-7611-416c-9ab4-721b7bd6b076 |
logType |
Log type |
3: Audit Log |
act |
Administrative operation |
Example: Administrator Log On |
httpTrans |
Detailed operation information |
See the output samples below |
The other CEF keys not listed in the table are not available for audit logs. Therefore, they will not be in the output if configured in CEF keys.
Audit log output sample 1:
Nov 20 07:59:31 10.206.197.118 CEF: 0|Trend Micro|Trend Micro Web Security| 3.4.1.5478|100001|Audit Log|0|userName=admin@trendmicro.com.cn rt=Nov 20 2020 07:58:15 +0000 companyID=d528b12f-08df-4c1f-be10-8ab6c74bf3e2 httpTrans={"userName": "test2", "role": "admin", "groups": [], "department": "H:5fa006fc-02e0-11eb-8042-005056897f14", "password": "******", "email": "test2@trendmicro.com.cn"} logType=3 act=Add Hosted User
Audit log output sample 2:
Nov 20 07:49:32 10.206.197.118 CEF: 0|Trend Micro|Trend Micro Web Security| 3.4.1.5478|100001|Audit Log|0|userName=admin@trendmicro.com.cn rt=Nov 20 2020 07:47:50 +0000 companyID=d528b12f-08df-4c1f-be10-8ab6c74bf3e2 httpTrans={"password": "******", "userId": "admin@trendmicro.com.cn", "tenantId": "tm"} logType=3 act=Administrator Log On