| CEF Key | Description | Value | 
| Header (logVer) | CEF format version | CEF:0 | 
| Header (vendor) | Appliance vendor | Trend Micro | 
| Header (pname) | Appliance product | Apex Central | 
| Header (pver) | Appliance version | 2019 | 
| Header (eventid) | NCIE:Action | NCIE:Pass | 
| Header (eventName) | Name | Suspicious Connection | 
| Header (severity) | Severity | 3 | 
| deviceExternalId | ID | Example:  1 | 
| cat | Log type | Example:  1756 | 
| deviceFacility | Product | Example:  Apex One | 
| rt | Event trigger time in UTC | Example:  Mar 22 2018 08:23:23 GMT+00:00 | 
| deviceProcessName | Process | Example:  C:\\Windows\\system32\\svchost-1.exe | 
| src | Local IPv4 address | Example:  10.201.86.152 | 
| c6a2Label | Corresponding label for the  c6a2field | Example:  SLF_SourceIP | 
| c6a2 | Local IPv6 address | Example:  2620:101:4003:7a0:fd4b:52ed:53bd:ae3d | 
| spt | Local IP address port | Example:  54594 | 
| dst | Remote IPv4 address | Example:  10.69.81.64 | 
| c6a3Label | Corresponding label for the  c6a3field | Example:  SLF_DestinationIP | 
| c6a3 | Remote IPv6 address | Example:  fe80::38ca:cd15:443c:40bb%11 | 
| dpt | Remote IP address port | Example:  80 | 
| act | Action | Example:  Pass 
 | 
| deviceDirection | Traffic direction | Example:  Inbound 
 | 
| cn1Label | Corresponding label for the  cn1field | Example:  SLF_PatternType | 
| cn1 | Pattern type | Example:  2 
 | 
| cs2Label | Corresponding label for the  cs2field | Example:  NCIE_ThreatName | 
| cs2 | Threat name | Example:  Malicious_identified_CnC_querying_on_UDP_detected | 
| reason | Critical threat type | Example:  E 
 | 
| dvchost | Host name | Example: "localhost" | 
| deviceNtDomain | Active Directory domain | Example: APEXTMCM | 
| dntdom | Apex One domain hierarchy | Example: OSCEDomain1 | 
| TMCMLogDetectedHost | Endpoint name where the log event occurred | Example: MachineHostName | 
| TMCMLogDetectedIP | IP address where the log event occurred | Example: 10.1.2.3 | 
| ApexCentralHost | Apex Central host name | Example: TW-CHRIS-W2019 | 
| devicePayloadId | Unique message GUID | Example: 1C00290C0360-9CDE11EB-D4B8-F51F-C697 | 
| TMCMdevicePlatform | Endpoint operating system | Example: Windows 7 6.1 (Build 7601) Service Pack 1 | 
Log sample:
CEF:0|Trend Micro|Apex Central|2019|NCIE:Pass|Suspicious Connection|3|deviceExternalId=1 rt=Oct 11 2017 06:34:06 GMT+0 0:00 cat=1756 deviceFacility=Apex One deviceProcessName=C:\\W indows\\system32\\svchost-1.exe act=Pass src=10.201.86.152 ds t=10.69.81.64 spt=54594 dpt=80 deviceDirection=None cn1Label= SLF_PatternType cn1=2 cs2Label=NCIE_ThreatName cs2=Malicious_ identified_CnC_querying_on_UDP_detected reason=F deviceNtDoma in=APEXTMCM dntdom=OSCEDomain1 dvchost=shost1 TMCMLogDetected Host=shost1 TMCMLogDetectedIP=10.1.2.3ApexCentralHost=TW-CHRI S-W2019 devicePayloadId=1C00290C0360-9CDE11EB-D4B8-F51F-C697 TMCMdevicePlatform=Windows 7 6.1 (Build 7601) Service Pack 1
 
		