Change log for OBSERVEIT
| Date | Changes |
|---|---|
| 2025-10-31 | Enhancement:
- `event.idm.read_only_udm.additional.fields`: Newly mapped `Event.endpoint.id`,`Event.activity.trigger`, `Event.activity.categories`, `Event.activity.signals`, `Event.activity.clumps.primary.item.designations`, `Event.activity.clumps.primary.id`, `Event.rver`, `Event.session.id`, `Event.annotations.workflow.state.disposition.status.id`, `Event.annotations.workflow.state.status`, `Event.ui.layout.h`, `Event.ui.layout.id`, `Event.ui.layout.w`, `Event.ui.layout.displays`, `Event.activity.primaryCategory`, `Event.context`, `Event.Event.occurredAt`, `Event.Event.observedAt`, `Event.Event.timezone.offset`, `Event.Event.kind`, `Event.Event.clock.offset`, `Event.Event.expiresAt`, `Event.Event.observed.offline`, `Event.Event.sequence.id`, `Event.agent.pid`, `Event.agent.kind`, `Event.endpoint.os.name`, `Event.endpoint.os.multiuser`, `Event.endpoint.os.version`, `Event.endpoint.os.kind`, `Event.endpoint.alias`, `Event.endpoint.location.geo.coordinates.lat`, `Event.endpoint.location.geo.coordinates.lon`, `Event.endpoint.location.geo.address.area1.code`, `Event.endpoint.location.geo.address.country.name`, `Event.endpoint.location.geo.address.area2.code`, `Event._sys.processing.catalog.identity.enabled`, `Event.Event.trace.context.transactionId`, `Event.Event.trace.context.correlationId`, `Event.Event.inspectedAt`, `Event.Event.ingestedAt`, `Event.Event.id`, `Event.Event.time.utc.secondOfDay`, `Event.Event.time.local.date`, `Event.Event.time.local.sec`, `Event.Event.time.local.min`, `Event.Event.time.local.dayOfWeek`, `Event.Event.time.local.month`, `Event.Event.time.local.hour`, `Event.Event.time.local.year`, `Event.Event.time.local.dayOfYear`, `Event.Event.time.local.day`, `Event.retention`, `Event.process.uid`, `Event.process.egid`, `Event.process.gid`, `Event.process.isRoot`, `Event.process.euid`, `Event.process.application.description`, `Event.process.application.vendor`, `Event.process.executable.name`, `Event.process.sid`, `Event.sver`, `Event.resources`, `Event.indicators`, `Event.contextId`, `Event.processing.actions`, `Event._sys.processing.actions`, `Event.organization.tenant.pfpt.oit.id`, `Event.organization.tenant.kind`, `Event.organization.tenant.id`, `Event.organization.customer.name`, `Event.organization.customer.alias`, `Event.organization.customer.id`, `Event.organization.customer.details.verticals`, `Event.organization.instances`, `Event._sys.processing.rule.artifacts`, `Event._sys.processing.modules`, `Event._sys.processing.rule.notification`, `Event.incident.severity`, `Event.incident.kind`, `Event.incident.name`, `Event.incident.description`, `Event.incident.id`, `Event.incident.status`, `Event.incident.reasons`, `Event.user.groups`, `Event.user.directory.manager.catalog.id`, `Event.user.directory.manager.email`, `Event.user.directory.ou`, `Event.user.directory.company.name`, `Event.user.directory.department.name`, `Event.user.directory.attributes`, `Event.user.intelligence.risk.overall.level`, `Event.user.intelligence.risk.overall.score`, `Event.user.intelligence.risk.threat.level`, `Event.user.intelligence.risk.threat.score`, `Event.user.intelligence.risk.data.level`, `Event.user.intelligence.risk.data.score`, `Event.user.intelligence.risk.awareness.level`, `Event.user.intelligence.risk.awareness.score`, `Event.user.uid`, `Event.user.netbiosDomain`, `Event.user.intelligence.assessments`, `Event.entity.name`, `Event.entity.suite`, `Event.entity.provider`, `Event.entity.kind`, `Event.entity.vendor`, `Event.user.gid`, `Event.user.aliases`, `Event.user.catalog.id`, `Event.user.catalog.iver`, `Event.user.identifiers`, `Event.site.path`, `Event.site.categorization.match.url.stem`, `Event.site.categorization.details.matchedurl`, `Event.site.categorization.details.categories`, `Event.site.categorization.details.status`, `Event.site.categorization.categories`, `Event.site.reputation.level`, `Event.site.reputation.score`, `Event.site.reputation.details.threatHistory`, `Event.site.reputation.details.country`, `Event.site.reputation.details.matchedurl`, `Event.site.reputation.details.popularity`, `Event.site.reputation.details.age`, `Event.site.reputation.details.url`, `Event.site.reputation.details.status`, `Event.createdBy.principal.id`, `Event.intelligence.findings`, `Event.tags`, `Event.feed.product`, `Event.feed.instance`, `Event.feed.data.realm.id`, `Event.feed.data.source.kind`, `Event.feed.kind`, `Event.feed.vendor`, `Event.feed.channel`, `Event.feed.realm`, `Event.feed.connection.source.geo.coordinates.lat`, `Event.feed.connection.source.geo.coordinates.lon`, `Event.feed.connection.source.geo.address.area1.code`, `Event.feed.connection.source.geo.address.country.name`, `Event.feed.connection.source.geo.address.country.code`, `Event.feed.connection.source.geo.address.area2.code`, `Event.feed.connection.source.ip`, `Event.feed.details.tenant.alias`, `Event.feed.id`, `Event.feed.region`, `Event.feed.tenant`, `Event.components.version`, `Event.activity.policies` raw log fields to `event.idm.read_only_udm.additional.fields`. - `event.idm.read_only_udm.security_result.detection_fields`: Newly mapped `Event.fqid` raw log field to `event.idm.read_only_udm.security_result.detection_fields`. - `event.idm.read_only_udm.metadata.product_version`: Newly mapped `Event.agent.version` raw log field to `event.idm.read_only_udm.metadata.product_version`. - `event.idm.read_only_udm.target.administrative_domain`: Newly mapped `Event.endpoint.fqdn` raw log field to `event.idm.read_only_udm.target.administrative_domain`. - `event.idm.read_only_udm.target.location.country_or_region`: Newly mapped `Event.endpoint.location.geo.address.country.code` raw log field to `event.idm.read_only_udm.target.location.country_or_region`. - `event.idm.read_only_udm.target.hostname`: Newly mapped `Event.site.host` raw log field to `event.idm.read_only_udm.target.hostname`. - `event.idm.read_only_udm.target.asset.hostname`: Newly mapped `Event.site.host` raw log field to `event.idm.read_only_udm.target.asset.hostname`. - `event.idm.read_only_udm.target.port`: Newly mapped `Event.site.port` raw log field to `event.idm.read_only_udm.target.port`. - `event.idm.read_only_udm.target.process.product_specific_process_id`: Newly mapped `Event.process.id` raw log field to `event.idm.read_only_udm.target.process.product_specific_process_id`. - `event.idm.read_only_udm.target.file.full_path`: Newly mapped `Event.process.executable.path` raw log field to `event.idm.read_only_udm.target.file.full_path`. - `event.idm.read_only_udm.target.process.parent_process.pid`: Newly mapped `Event.process.ppid` raw log field to `event.idm.read_only_udm.target.process.parent_process.pid`. - `event.idm.read_only_udm.metadata.url_back_to_product`: Newly mapped `Event.esUrl` raw log field to `event.idm.read_only_udm.metadata.url_back_to_product`. - `event.idm.read_only_udm.network.session_id`: Newly mapped `Event.sessionId` raw log field to `event.idm.read_only_udm.network.session_id`. - `event.idm.read_only_udm.target.nat_ip`: Newly mapped `Event.endpoint.location.ip` raw log field to `event.idm.read_only_udm.target.nat_ip`. - `event.idm.read_only_udm.principal.administrative_domain`: Newly mapped `Event.user.directory.domain` raw log field to `event.idm.read_only_udm.principal.administrative_domain`. - `event.idm.read_only_udm.principal.user.product_object_id`: Newly mapped `Event.user.id` raw log field to `event.idm.read_only_udm.principal.user.product_object_id`. - `event.idm.read_only_udm.principal.user.email_addresses`: Newly mapped `Event.user.email` raw log field to `event.idm.read_only_udm.principal.user.email_addresses`. - `event.idm.read_only_udm.principal.user.user_display_name`: Newly mapped `Event.user.fullname` raw log field to `event.idm.read_only_udm.principal.user.user_display_name`. - `event.idm.read_only_udm.principal.user.userid`: Newly mapped `Event.user.name` raw log field to `event.idm.read_only_udm.principal.user.userid`. - `event.idm.read_only_udm.principal.user.title`: Newly mapped `Event.user.directory.title` raw log field to `event.idm.read_only_udm.principal.user.title`. - `event.idm.read_only_udm.principal.hostname`: Newly mapped `Event.endpoint.hostname` raw log field to `event.idm.read_only_udm.principal.hostname`. - `event.idm.read_only_udm.target.ip`: Newly mapped `Event.endpoint.net.interfaces.ip` raw log field to `event.idm.read_only_udm.target.ip`. - `event.idm.read_only_udm.target.asset.ip`: Newly mapped `Event.endpoint.net.interfaces.ip` raw log field to `event.idm.read_only_udm.target.asset.ip`. - `event.idm.read_only_udm.target.process.pid`: Newly mapped `Event.process.pid` raw log field to `event.idm.read_only_udm.target.process.pid`. - `event.idm.read_only_udm.principal.application`: Newly mapped `Event.process.application.name` raw log field to `event.idm.read_only_udm.principal.application`. - `event.idm.read_only_udm.target.url`: Newly mapped `Event.site.url` raw log field to `event.idm.read_only_udm.target.url`. - `event.idm.read_only_udm.network.dns.answers`: Newly mapped `Event.ttl` raw log field to `event.idm.read_only_udm.network.dns.answers`. - `event.idm.read_only_udm.target.resource.attribute.labels`: Newly mapped `Event.components.id` raw log field to `event.idm.read_only_udm.target.resource.attribute.labels`. - `event.idm.read_only_udm.target.resource.attribute.labels`: Newly mapped `Event.components.kind` raw log field to `event.idm.read_only_udm.target.resource.attribute.labels`. |
| 2025-07-17 | Enhancement:
- Added a grok pattern to parse the raw log. - Modified gsub on "kv_data" to replace "([a-zA-Z0-9_-]+)=" with "#$1=" - Added a gsub to replace "type" with "Type" , ", " with " " , - event.idm.read_only_udm.principal.process.file.sha256: Newly mapped "sha256" raw log field to "event.idm.read_only_udm.principal.process.file.sha256" - event.idm.read_only_udm.target.resource.product_object_id: Newly mapped "id" raw log field to "event.idm.read_only_udm.target.resource.product_object_id". - event.idm.read_only_udm.principal.process.file.size: Newly mapped "size" raw log field to "event.idm.read_only_udm.principal.process.file.size". - event.idm.read_only_udm.principal.file.file_type: Newly mapped "Type" raw log field to "event.idm.read_only_udm.principal.file.file_type". - event.idm.read_only_udm.security_result.priority_details: Newly mapped "pri" raw log field to "event.idm.read_only_udm.security_result.priority_details". - Added a grok pattern to extract "tar_host" and "tar_ip" from "relay raw log field. - event.idm.read_only_udm.target.hostname,event.idm.read_only_udm.target.asset.hostname: Newly mapped "tar_host" raw log field to "event.idm.read_only_udm.target.hostname", "event.idm.read_only_udm.target.asset.hostname". - event.idm.read_only_udm.target.ip,event.idm.read_only_udm.target.asset.ip: Newly mapped "tar_ip" raw log field to event.idm.read_only_udm.target.ip", "event.idm.read_only_udm.target.asset.ip". - event.idm.read_only_udm.security_result.summary: Newly mapped "stat" raw log field to "event.idm.read_only_udm.security_result.summary". - Modified already existing mapping of "proto" to map "event.idm.read_only_udm.network.application_protocol" correctly. - Added a regex conditional check before already existing of "to", "from","rcpt". - event.idm.read_only_udm.security_result.detection_fields: Newly mapped "corrupted", "protected", "duration", "mailer", "tls_verify", and "dsn" raw log fields to event.idm.read_only_udm.security_result.detection_fields. - event.idm.read_only_udm.additional.fields: Newly mapped "m", "omime", "oext", "lang", "url_count", "virtual", "a", "delay", and "xdelay" raw log fields to event.idm.read_only_udm.additional.fields. |
| 2024-12-13 | Enhancement:
- Mapped "_derivatives.direction.source.name" to "target.resource.attribute.labels". |
| 2024-12-09 | Enhancement:
-Changed mapping of "reason.name" from "security_result.detection_fields" to "security_result.description". |
| 2024-11-21 | Enhancement:
Mapped "resource.target" to "target.resource.attribute.labels". - Mapped"resource.classification.labels" to "security_result.detection_fields" - Mapped "partitionKey" to "security_result.detection_fields" - Mapped "fqid" to "security_result.detection_fields" - Mapped "context.contextId" to "principal.labels" - Mapped "context.partitionKey" to "principal.labels" - Mapped "entity" to "security_result.detection_fields" - Mapped "feed.instance" to "principal.asset.product_object_id" - Mapped "incident.reasons" to "security_result.detection_fields" - Mapped "recipient.id" to "target.user.userid" - Mapped "recipient.kind" to "target.user.role_description" - Mapped "recipient.email" to "target.user.email_addresses" - Mapped "esUrl" to "metadata.url_back_to_product" - Mapped "policyRoutes" to "security_result.detection_fields" - Mapped "organization.tenant" to "security_result.detection_fields" |
| 2024-10-17 | Enhancement:
- Modified the mapping of "additional.fields" for "value.verticals.key". - Mapped "remote.host.ip.address" to "principal.ip". |
| 2023-12-15 | Enhancement:
- Added support for CEF format logs. |
| 2023-11-03 | Enhancement:
- Mapped the fields in "processing.actions" to "security_result.detection_fields". - Mapped the fields in "organization.customer" to "additional fields". - Mapped the fields in "organization.instances" to "target.resource.attribute.labels". - Mapped the fields in "_sys.processing.modules" to "target.resource.attribute.labels". - Mapped the fields in "_sys.processing.rule.artifacts" to "target.resource.attribute.labels". - Mapped the fields in "event" to "additional fields". - Mapped the fields in "activity" to "additional fields". - Mapped the fields in "endpoint.os" to "additional fields". - Mapped the fields in "ui.windows.os" to "target.resource.attribute.labels". - Mapped the "_sys.operation" to "additional fields". - Mapped "ttl" to "network.dns.answer". - Mapped "site.url" to "target.url". - Mapped "site.port" to "target.port". - Mapped "site.host" to "target.hostname". - Mapped "site.scheme" to "network.application_protocol". - Mapped the fields in "site.resource" to "target.resource.attribute.labels". - Mapped "activity.primaryCategory" to "metadata.product_event_type". |
| 2023-07-28 | Enhancement:
- Mapped "feed.region" to "principal.asset.location.country_or_region" from "entity.asset.location.country_or_region". - Mapped "feed.connection.source.ip" to "principal.asset.ip" from "entity.asset.ip". - Mapped "feed.id" to "principal.asset.asset_id" from "entity.asset.hostname". - Mapped "feed.instance" to "principal.asset.product_object_id" from "entity.asset.product_object_id". - Mapped "principal.asset.category" to "WORKSTATION" when "feed.realm" contains "WORKSTATION". - Mapped "principal.asset.type" to "WORKSTATION" when "feed.realm" contains "WORKSTATION". |
| 2023-07-21 | Enhancement:
- Modified the logic to fetch the file related information from the JSON array instead of always fetching from the first element of the array. |
| 2023-05-08 | Bug-fix:
- Mapped "observedAt" to "metadata.event_timestamp". |
| 2023-01-21 | Enhancement:
- Mapped "session.id" to "network.session_id". - Mapped "endpoint.location.geo.coordinates.lon.double" to "target.location.region_longitude". - Mapped "endpoint.location.geo.coordinates.lat.double" to "target.location.region_latitude". - Mapped "agent.version" to "metadata.product_version". - Mapped "agent.kind" to "additional.fields". - Mapped "context.createdAt" to "metadata.collected_timestamp". - Mapped "context.sortKey" to "security_result.detection_fields". - Mapped "user.name" to "principal.user.userid". - Mapped "resources.0.size.int" to "principal.process.file.size". - Mapped "host" to "principal.hostname". - Added conditional check for "time", "proc", "device", and "pid". |