|  | NoteSandbox Detection logs are called Virtual Analyzer Detections on the Apex Central
                                 console. | 
| CEF Key | Description | Value | 
| Header (logVer) | CEF format version | CEF:0 | 
| Header (vendor) | Appliance vendor | Trend Micro | 
| Header (pname) | Appliance product | Apex Central | 
| Header (pver) | Appliance version | 2019 | 
| Header (eventid) | Device event class ID | VAD | 
| Header (eventName) | Event name | Virtual Analyzer detection name | 
| Header (severity) | Severity | 3 | 
| deviceExternalId | ID | Example:  2 | 
| rt | Event trigger time in UTC | Example:  Mar 22 2018 08:23:23 GMT+00:00 | 
| deviceFacility | Product | Example:  Apex One | 
| dvchost | Server name | Example:  OSCE01 | 
| dhost | Endpoint name | Example:  Isolate-ClientA | 
| dst | Endpoint IPv4 address | Example:  10.0.17.6 | 
| c6a3 | Endpoint IPv6 address | Example:  fe80::38ca:cd15:443c:40bb%11 | 
| app | Entry channel | Example:  0 For more information, see Protocol Mapping Table | 
| sourceServiceName | Source | Example:  Test1@tmcm.extbeta.com | 
| destinationServiceName | Destination | Example:  Test2@tmcm.extbeta.com;Test3@tmcm.extbeta.com | 
| sproc | Process name | Example:  VA | 
| fileHash | File SHA-1 hash | Example:  D6712CAE5EC821F910E14945153AE7871AA536CA | 
| fname | File name | Example:  C:\\\\QA_Log.zip | 
| request | URL | Example:  http://127.1.1.1 | 
| cs1 | The name of the security threat determined by Virtual Analyzer | Example:  VAN_RANSOMWARE.umxxhelloransom_abc | 
| cn1 | Displays the risk level assigned by Virtual Analyzer | Example:  0 
 | 
| cs2 | Displays the security threat type | Example:  Anti-security, self-preservation | 
| cs3 | Cloud storage vendor | Example:  Google Drive 
 | 
| reason | Critical threat type | Example:  E 
 | 
| deviceNtDomain | Active Directory domain | Example: APEXTMCM | 
| dntdom | Apex One domain hierarchy | Example: OSCEDomain1 | 
| TMCMLogDetectedHost | Endpoint name where the log event occurred | Example: MachineHostName | 
| TMCMLogDetectedIP | IP address where the log event occurred | Example: 10.1.2.3 | 
| ApexCentralHost | Apex Central host name | Example: TW-CHRIS-W2019 | 
| devicePayloadId | Unique message GUID | Example: 1C00290C0360-9CDE11EB-D4B8-F51F-C697 | 
| TMCMdevicePlatform | Endpoint operating system | Example: Windows 7 6.1 (Build 7601) Service Pack 1 | 
Log sample:
CEF: 0|Trend Micro|Apex Central|2019|VAD|VAN_RANSOMWARE.um xxhelloransom_abc|3|deviceExternalId=2 rt=Mar 22 2018 08:23: 23 GMT+00:00 deviceFacility=Apex One dvchost=OSCE01 dhost= Isolate-ClientA dst=0.0.0.0 app=1 sourceServiceNameTest1@tre nd.com.tw destinationServiceName=Test2@tmcm.extbeta.com;Test 3@tmcm.extbeta.com sproc=VA fileHash=3395856CE81F2B7382DEE72 602F798B642F14140 fname=C:\\\\QA_Log.zip request=http://127. 1.1.1 cs1Label=Security_Threat cs1=VAN_RANSOMWARE.umxxhellor ansom_abc cn1Label=Risk_Level cn1=0 cs2Label=Threat_Categori es cs2=Anti-security, self-preservation cs3Label=Cloud_Servi ce_Vendor cs3=Google Drive reason=E deviceNtDomain=APEXTMCM dntdom=OSCEDomain1 TMCMLogDetectedHost=OSCEClient TMCMLogDe tectedIP=0.0.0.0 ApexCentralHost=TW-CHRIS-W2019 devicePaylo adId=1C00290C0360-9CDE11EB-D4B8-F51F-C697 TMCMdevicePlatfor m=Windows 7 6.1 (Build 7601) Service Pack 1
 
		