Cisco Secure Email Gateway
editCisco Secure Email Gateway
editVersion |
1.24.2 (View all) |
Compatible Kibana version(s) |
8.11.0 or higher |
Supported Serverless project types |
Security |
Subscription level |
Basic |
Level of support |
Elastic |
The Cisco Email Security Appliance integration collects and parses data from Cisco Secure Email Gateway using TCP/UDP and logfile.
Compatibility
editThis module has been tested against Cisco Secure Email Gateway server version 14.0.0 Virtual Gateway C100V with the below given logs pattern.
Configurations
edit-
Sign-in to Cisco Secure Email Gateway Portal and follow the below steps for configurations:
- In Cisco Secure Email Gateway Administrator Portal, go to System Administration > Log Subscriptions.
- Click Add Log Subscription.
- Enter all the Required Details.
-
Set Log Name as below for the respective category:
- AMP Engine Logs → amp
- Anti-Spam Logs → antispam
- Antivirus Logs → antivirus
- Authentication Logs → authentication
- Bounce Logs → bounces
- Consolidated Event Logs → consolidated_event
- Content Scanner Logs → content_scanner
- HTTP Logs → gui_logs
- IronPort Text Mail Logs → error_logs
- Text Mail Logs → mail_logs
- Status Logs → status
- System Logs → system
- Select Log Level as Information.
- Select Retrieval Method.
- Click Submit and commit the Changes.
Note
edit-
Retrieval Method Supported:
- FTP Push to Remote Server for the below categories: AMP Engine Logs, Anti-Spam Logs, Antivirus Logs, Authentication Logs, Bounce Logs, Consolidated Event Logs, Content Scanner Logs, HTTP Logs, IronPort Text Mail Logs, Text Mail Logs, Status Logs and System Logs.
- Syslog Push for the below categories: AMP Engine Logs, Anti-Spam Logs, Antivirus Logs, Consolidated Event Logs, Content Scanner Logs, HTTP Logs, IronPort Text Mail Logs, Text Mail Logs, Status Logs and System Logs.
Below are the samples logs of respective category:
AMP Engine Logs:
editFile reputation query initiating. File Name = 'mod-6.exe', MID = 5, File Size = 1673216 bytes, File Type = application/x-dosexec Response received for file reputation query from Cloud. FileName = 'mod-6.exe', MID = 5, Disposition = MALICIOUS, Malware = W32.061DEF69B5-100.SBX.TG,Reputation Score = 73, sha256 =061def69b5c100e9979610fa5675bd19258b19a7ff538b5c2d230b467c312f19, upload_action = 2 File Analysis complete. SHA256: 16454aff5082c2e9df43f3e3b9cdba3c6ae1766416e548c30a971786db570bfc, Submit Timestamp: 1475825466, Update Timestamp: 1475825953, Disposition: 3 Score: 100, run_id: 194926004 Details: Analysis is completed for the File SHA256[16454aff5082c2e9df43f3e3b9cdba3c6ae1766416e548c30a971786db570bfc] Spyname:[W32.16454AFF50-100.SBX.TG] File not uploaded for analysis. MID = 0 File SHA256[a5f28f1fed7c2fe88bcdf403710098977fa12c32d13bfbd78bbe27e95b245f82] file mime[text/plain] Reason: No active/dynamic contents exists File analysis upload skipped. SHA256: b5c7e26491983baa713c9a2910ee868efd891661c6a0553b28f17b8fdc8cc3ef,Timestamp[1454782976] details[File SHA256[b5c7e26491983baa713c9a2910ee868efd891661c6a0553b28f17b8fdc8cc3ef] file mime[application/pdf], upload priority[Low] not uploaded, re-tries[3], backoff[986] discarding ...] SHA256: 69e17e213732da0d0cbc48ae7030a4a18e0c1289f510e8b139945787f67692a5,Timestamp[1454959409] details[Server Response HTTP code:[502]] Retrospective verdict received. SHA256: 16454aff5082c2e9df43f3e3b9cdba3c6ae1766416e548c30a971786db570bfc, Timestamp: 1475832815.7, Verdict: MALICIOUS, Reputation Score: 0, Spyname: W32.16454AFF50-100.SBX.
Anti-Spam Logs
editcase antispam - engine (72324) : case-daemon: Initializing Child case antispam - engine (15703) : case-daemon: all children killed, exitting case antispam - engine (15703) : case-daemon: server killed by SIGHUP, shutting down
Antivirus Logs
editsophos antivirus - MID 69391938 - Result 'CLEAN' () sophos antivirus - MID 68431780 0 - Error - 'Encrypted' '0x8004021' sophos antivirus - MID 66842418 0 - Virus 'CXmail/Phish-O' 'body.scan/Payment.html' 1 0 sophos antivirus - MID 66784457 0 - Virus 'CXmail/MalPE-HB' 'body.scan/242426.cab/rockro9046.exe' 1 0 sophos antivirus - MID 68016096 0 - Virus 'CXmail/MalPE-FL' 'body.scan/redactedFileName.rar/redactedFileName.exe' 1 0 sophos antivirus - MID 68016096 0 - Virus 'CXmail/MalPE-AC' 'body.scan/redactedFileName.rar' 1 0 sophos antivirus - MID 66301278 0 - Virus 'Mal/DrodRar-AIC' 'body.scan/anotherFileName.arj' 1 0 sophos antivirus - MID 67753636 0 - Virus 'Troj/MSIL-TAR' 'body.scan/otherFileName.exe' 1 0 sophos antivirus - MID 66710307 7 - Limit - 'Max Files Exceeded' sophos antivirus - MID 66708787 - timed out on message
Authentication Logs
editThe user admin successfully logged on from 1.128.3.4 with privilege admin using an HTTPS connection. CLI: User admin logged out from 1.128.3.4 because of inactivity timeout GUI: User admin logged out from session d0PfzQa02E8NwMiah2jx because of inactivity timeout logout:1.128.3.4 user:admin session:wKV0AK29Ggdhztfl4Sal User admin logged out of SSH session 1.128.3.4 An authentication attempt by the user admin from 1.128.3.4 failed using an HTTPS connection. User admin was authenticated successfully. User joe failed authentication.
Bounce Logs
editBounced: DCID 2 MID 15232 From:<example.com> To:<example.com> RID 0 - 5.1.0 - Unknown address error ('550', ['5.1.1 The email account that you tried to reach does not exist. Please try', "5.1.1 double-checking the recipient's email address for typos or", '5.1.1 unnecessary spaces. Learn more at', '5.1.1 xxxxx ay44si12078156oib.94 - gsmtp']) Bounced: 123:123 From:<example.com> To:<example.com>
Consolidated Event Logs
editCEF:0|Cisco|C100V Email Security Virtual Appliance|14.0.0-657|ESA_CONSOLIDATED_LOG_EVENT|Consolidated Log Event|5|deviceExternalId=42127C7DDEE76852677B-F80CE8074CD3 ESAMID=1053 ESAICID=134 ESAAMPVerdict=UNKNOWN ESAASVerdict=NEGATIVE ESAAVVerdict=NEGATIVE ESACFVerdict=MATCH endTime=Thu Mar 18 08:04:46 2021 ESADLPVerdict=NOT_EVALUATED dvc=1.128.3.4 ESAAttachmentDetails={'test.txt': {'AMP': {'Verdict': 'FILE UNKNOWN', 'fileHash': '7f843d263304fb0516d6210e9de4fa7f01f2f623074aab6e3ee7051f7b785cfa'}, 'BodyScanner': {'fsize': 10059}}} ESAFriendlyFrom=example.com ESAGMVerdict=NEGATIVE startTime=Thu Mar 18 08:04:29 2021 deviceInboundInterface=Incomingmail deviceDirection=0 ESAMailFlowPolicy=ACCEPT suser=example.com cs1Label=MailPolicy cs1=DEFAULT ESAMFVerdict=NOT_EVALUATED act=QUARANTINED ESAFinalActionDetails=To POLICY cs4Label=ExternalMsgID cs4='<example.com>' ESAMsgSize=11873 ESAOFVerdict=POSITIVE duser=example.com ESAHeloIP=1.128.3.4 cfp1Label=SBRSScore cfp1=None ESASDRDomainAge=27 years 2 months 15 days cs3Label=SDRThreatCategory cs3=N/A cs6Label=SDRRepScore cs6=Weak ESASPFVerdict={'mailfrom': {'result': 'None', 'sender': 'example.com'}, 'helo': {'result': 'None', 'sender': 'postmaster'}, 'pra': {'result': 'None', 'sender': 'example.com'}} sourceHostName=unknown ESASenderGroup=UNKNOWNLIST sourceAddress=1.128.3.4 msg='Testing'
Content Scanner Logs
editPF: Starting multi-threaded Perceptive server (pid=17729) PF: Restarting content_scanner service.
IronPort Text Mail Logs
editQuarantine: Failed to connect to quarantine Internal SMTP giving up on message to example.com with subject 'Warning <System> example.com: Your "IronPort Email Encryption" key will expire in under 60...': Unrecoverable error. Error while sending alert: Unable to send System/Warning alert to example.com with subject "Warning <System> example.com: Your "IronPort Email Encryption" key will expire in under 60...". Internal SMTP system attempting to send a message to example.com with subject 'Critical <System> example.com: Log Error: Subscription error_logs: Failed to connect to 10....' (attempt #0).
HTTP Logs
editreq:1.128.3.4 user:admin id:2v10z5fEuDsvhdbVE6Ck 200 GET xxx.png HTTP/1.1 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.51 Safari/537.36 req:1.128.3.4 user:- id:2v10z5fEuDsvhdbVE6Ck 200 GET xxx.png HTTP/1.1 - Action: User admin logged out from session 5GPz0QDlfxUYQ0Y3PgYN beacuse of inactivity timeout Session fRK3TSjzhHhoI9CV5Kvt user:admin expired Session fRK3TSjzhHhoI9CV5Kvt from 1.128.3.4 not found Destination:/mail_policies/email_security_manager/incoming_mail_policies SourceIP:1.128.3.4 Destination:/login Username:admin Privilege:admin session:5GPz0QDlfxUYQ0Y3PgYN Action: The HTTPS session has been established successfully. PERIODIC REPORTS: No root directory for Periodic Reports Archive. Probably, running first time... Could not fetch current Virus Threat Level: OS error opening URL 'http://example.com/xxxxx/xxxxx.txt' SSL error with client 1.128.3.4:000 - (336151574, 'error:14094416:SSL routines:ssl3_read_bytes:sslv3 alert certificate unknown') Error in https connection from host 1.128.3.4 port 000 - [Errno 54] Connection reset by peer Passphrase has been changed for user admin
Text Mail Logs
editMID 111 DLP violation. Severity: LOW (Risk Factor: 15). DLP policy match: 'PCI-DSS (Payment Card Industry Data Security Standard)'. graymail [CONFIG] Starting graymail configuration handler URL_REP_CLIENT: Configuration changed. Triggering restart of URL Reputation client service. A System/Warning alert was sent to example.com with subject "Warning <System> cisco.esa: URL category definitions have changed.; Added new category '...". New SMTP ICID 5 interface Management (1.128.3.4) address 1.128.3.4 reverse dns host example.com verified yes Start MID 6 ICID 5 MID 6 ICID 5 From: <example.com> MID 6 ICID 5 RID 0 To: <example.com> MID 6 ready 100 bytes from <example.com> ICID 5 close New SMTP DCID 8 interface 1.128.3.4 address 1.128.3.4 Delivery start DCID 8 MID 6 to RID [0] Message done DCID 8 MID 6 to RID [0] DCID 8 close URL category definitions have changed. Please check and update your filters to use the new definitions Error while sending alert: Unable to send System/Warning alert to example.com with subject "Warning <System> example.com: Your "IronPort Email Encryption" key will expire in under 60...". Your "IronPort Anti-Spam" key will expire in under 60 day(s). Please contact your authorized Cisco sales representative. Internal SMTP system successfully sent a message to example.com with subject 'Warning <System> cisco.esa: Your "Sophos Anti-Virus" key will expire in under 60 day(s)....'. Internal SMTP giving up on message to example.com with subject 'Warning <System> example.com: Your "IronPort Email Encryption" key will expire in under 60...': Unrecoverable error. Internal SMTP Error: Failed to send message to host 1.128.3.4:000 for recipient example: Unexpected SMTP response "553", expecting code starting with "2", response was ['#5.1.8 Domain of sender address <example.xxx> does not exist']. MID 68119155 RID [0] Response '2.0.0 OK 1687954632 redactedstring - gsmtp' MID 68119155 Subject "redacted subject" MID 68119155 queued for delivery Message finished MID 68119155 done MID 68119155 interim verdict using engine: CASE bulk MID 68119155 interim AV verdict using Sophos CLEAN MID 68119155 using engine: GRAYMAIL positive MID 68119155 Outbreak Filters: verdict negative MID 68119155 using engine: SPF Verdict Cache using cached verdict MID 68119155 Message-ID '<redacted@redactedMailFrom.com>' MID 68119155 DMARC: Verification passed MID 68119155 SPF: mailfrom identity no-reply@redactedMailFrom.com Pass (v=spf1) MID 68119155 matched all recipients for per-recipient policy DEFAULT in the inbound table MID 68119155 SDR: Tracker Header : redactedTrackerHeader MID 68119155 SDR: Domains for which SDR is requested: reverse DNS host: redacted.redactedMailFrom.com, helo: redacted.redactedMailFrom.com, env-from: redactedMailFrom.com, header-from: redactedMailFrom.com, reply-to: redactedMailFrom.com MID 68119155 SDR: Consolidated Sender Threat Level: Neutral, Threat Category: N/A, Suspected Domain(s) : N/A (other reasons for verdict). Sender Maturity: 30 days (or greater) for domain: redacted.redactedMailFrom.com MID 68119155 DMARC: Message from domain redactedMailFrom.com, DMARC pass (SPF aligned True, DKIM aligned True) MID 68119155 DKIM: pass signature verified (d=redactedMailFrom.com s=srsa2048 i=@redactedMailFrom.com) MID 68119155 AMP file reputation verdict : SKIPPED (no attachment in message)
Status Logs
editStatus: CPULd 0 DskIO 0 RAMUtil 1 QKUsd 0 QKFre 8388608 CrtMID 0 CrtICID 0 CrtDCID 1 InjMsg 0 InjRcp 0 GenBncRcp 0 RejRcp 0 DrpMsg 0 SftBncEvnt 0 CmpRcp 0 HrdBncRcp 0 DnsHrdBnc 0 5XXHrdBnc 0 FltrHrdBnc 0 ExpHrdBnc 0 OtrHrdBnc 0 DlvRcp 0 DelRcp 0 GlbUnsbHt 0 ActvRcp 0 UnatmptRcp 0 AtmptRcp 0 CrtCncIn 0 CrtCncOut 0 DnsReq 0 NetReq 0 CchHit 0 CchMis 0 CchEct 0 CchExp 0 CPUTTm 91 CPUETm 32182 MaxIO 487 RAMUsd 125195690 MMLen 0 DstInMem 3 ResCon 0 WorkQ 0 QuarMsgs 0 QuarQKUsd 0 LogUsd 5 SophLd 99 BMLd 0 CASELd 0 TotalLd 47 LogAvail 148G EuQ 0 EuqRls 0 CmrkLd 0 McafLd 0 SwIn 338 SwOut 681 SwPgIn 2123 SwPgOut 7156 SwapUsage 0% RptLd 0 QtnLd 0 EncrQ 0 InjBytes 0
System Logs
editPID 1237: User admin commit changes: Added a second CLI log for examples lame DNS referral: qname:example.net ns_name:example.net zone:example.net ref_zone:example.net referrals:[(524666183436709L, 0, 'insecure', 'example.net'), (524666183436709L, 0, 'insecure', 'example.net')] Failed to bootstrap the DNS resolver. Unable to contact root servers. DNS query network error '[Errno 51] Network is unreachable' to 'dummy_ip' looking up ' ' Received an invalid DNS Response: '' to IP dummy_ip looking up example.de
Logs
editlog
editThis is the log
dataset.
Example
An example event for log
looks as following:
{ "@timestamp": "2023-03-17T18:24:37.000Z", "agent": { "ephemeral_id": "7dbab520-f89c-42fb-93be-e46d1ec05fb8", "id": "0949f27e-3199-48ba-af2b-55e717cda399", "name": "docker-fleet-agent", "type": "filebeat", "version": "8.7.1" }, "cisco_secure_email_gateway": { "log": { "category": { "name": "amp" }, "message": "File reputation query initiating. File Name = 'mod-6.exe', MID = 5, File Size = 1673216 bytes, File Type = application/x-dosexec" } }, "data_stream": { "dataset": "cisco_secure_email_gateway.log", "namespace": "ep", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "0949f27e-3199-48ba-af2b-55e717cda399", "snapshot": false, "version": "8.7.1" }, "email": { "attachments": { "file": { "name": "mod-6.exe", "size": 1673216 } }, "content_type": "application/x-dosexec", "message_id": "5" }, "event": { "agent_id_status": "verified", "dataset": "cisco_secure_email_gateway.log", "ingested": "2023-10-31T06:24:58Z", "kind": "event", "timezone": "UTC" }, "input": { "type": "udp" }, "log": { "level": "info", "source": { "address": "192.168.254.4:57187" }, "syslog": { "priority": 166 } }, "tags": [ "forwarded", "cisco_secure_email_gateway-log" ] }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cisco_secure_email_gateway.log.5xx_hard_bounces |
5XX Hard Bounces. |
long |
cisco_secure_email_gateway.log.act |
keyword |
|
cisco_secure_email_gateway.log.action |
keyword |
|
cisco_secure_email_gateway.log.active_recipients |
Active Recipients. |
long |
cisco_secure_email_gateway.log.address |
ip |
|
cisco_secure_email_gateway.log.alert_category |
keyword |
|
cisco_secure_email_gateway.log.antivirus_result |
keyword |
|
cisco_secure_email_gateway.log.appliance.product |
keyword |
|
cisco_secure_email_gateway.log.appliance.vendor |
keyword |
|
cisco_secure_email_gateway.log.appliance.version |
keyword |
|
cisco_secure_email_gateway.log.attempted_recipients |
Attempted Recipients. |
long |
cisco_secure_email_gateway.log.backoff |
The number of (x) seconds before the email gateway needs to wait before it makes an attempt to upload the file to the file analysis server. This occurs when the email gateway reaches the daily upload limit. |
long |
cisco_secure_email_gateway.log.bmld |
long |
|
cisco_secure_email_gateway.log.bounce_type |
Bounced or delayed (for example, hard or soft-bounce). |
keyword |
cisco_secure_email_gateway.log.cache.exceptions |
Cache Exceptions. |
long |
cisco_secure_email_gateway.log.cache.expired |
Cache Expired. |
long |
cisco_secure_email_gateway.log.cache.hits |
Cache Hits. |
long |
cisco_secure_email_gateway.log.cache.misses |
Cache Misses. |
long |
cisco_secure_email_gateway.log.case_id |
keyword |
|
cisco_secure_email_gateway.log.case_ld |
Percent CPU used by CASE scanning. |
long |
cisco_secure_email_gateway.log.category.name |
keyword |
|
cisco_secure_email_gateway.log.cef_format_version |
keyword |
|
cisco_secure_email_gateway.log.cfp1 |
double |
|
cisco_secure_email_gateway.log.cfp1_label |
keyword |
|
cisco_secure_email_gateway.log.cmrkld |
long |
|
cisco_secure_email_gateway.log.command |
text |
|
cisco_secure_email_gateway.log.commit_changes |
text |
|
cisco_secure_email_gateway.log.completed_recipients |
Completed Recipients. |
long |
cisco_secure_email_gateway.log.connection |
keyword |
|
cisco_secure_email_gateway.log.connection_status |
keyword |
|
cisco_secure_email_gateway.log.cpu.elapsed_time |
Elapsed time since the application started. |
long |
cisco_secure_email_gateway.log.cpu.total_time |
Total CPU time used by the application. |
long |
cisco_secure_email_gateway.log.cpu.utilization |
CPU Utilization. |
long |
cisco_secure_email_gateway.log.crt.delivery_connection_id |
Delivery Connection ID (DCID). |
keyword |
cisco_secure_email_gateway.log.crt.injection_connection_id |
Injection Connection ID (ICID). |
keyword |
cisco_secure_email_gateway.log.cs1 |
keyword |
|
cisco_secure_email_gateway.log.cs1_label |
keyword |
|
cisco_secure_email_gateway.log.cs2 |
keyword |
|
cisco_secure_email_gateway.log.cs2_label |
keyword |
|
cisco_secure_email_gateway.log.cs3 |
keyword |
|
cisco_secure_email_gateway.log.cs3_label |
keyword |
|
cisco_secure_email_gateway.log.cs4 |
keyword |
|
cisco_secure_email_gateway.log.cs4_label |
keyword |
|
cisco_secure_email_gateway.log.cs5 |
keyword |
|
cisco_secure_email_gateway.log.cs5_label |
keyword |
|
cisco_secure_email_gateway.log.cs6 |
keyword |
|
cisco_secure_email_gateway.log.cs6_label |
keyword |
|
cisco_secure_email_gateway.log.current.inbound_connections |
Current Inbound Connections. |
long |
cisco_secure_email_gateway.log.current.outbound_connections |
Current Outbound Connections. |
long |
cisco_secure_email_gateway.log.data.ip |
ip |
|
cisco_secure_email_gateway.log.deleted_recipients |
Deleted Recipients. |
long |
cisco_secure_email_gateway.log.delivered_recipients |
Delivered Recipients. |
long |
cisco_secure_email_gateway.log.delivery_connection_id |
Delivery Connection ID. This is a numerical identifier for an individual SMTP connection to another server, for delivery of 1 to thousands of messages, each with some or all of their RIDs being delivered in a single message transmission. |
keyword |
cisco_secure_email_gateway.log.description |
text |
|
cisco_secure_email_gateway.log.destination |
text |
|
cisco_secure_email_gateway.log.destination_memory |
Number of destination objects in memory. |
long |
cisco_secure_email_gateway.log.details |
Additional information. |
text |
cisco_secure_email_gateway.log.device_direction |
keyword |
|
cisco_secure_email_gateway.log.disk_io |
Disk I/O Utilization. |
long |
cisco_secure_email_gateway.log.disposition |
The file reputation disposition values are: MALICIOUS CLEAN FILE UNKNOWN - When the reputation score is zero. VERDICT UNKNOWN - When the disposition is FILE UNKNOWN and score is non-zero. LOW RISK - When no dynamic content is found in a file after file analysis, the verdict is Low Risk. The file is not sent for file analysis, and the message continues through the email pipeline. |
keyword |
cisco_secure_email_gateway.log.dkim_aligned |
Protocol DKIM aligned is true or false. |
boolean |
cisco_secure_email_gateway.log.dns.hard_bounces |
DNS Hard Bounces. |
long |
cisco_secure_email_gateway.log.dns.requests |
DNS Requests. |
long |
cisco_secure_email_gateway.log.domain |
keyword |
|
cisco_secure_email_gateway.log.dropped_messages |
Dropped Messages. |
long |
cisco_secure_email_gateway.log.email |
keyword |
|
cisco_secure_email_gateway.log.email_participants |
All the participants in the email. |
keyword |
cisco_secure_email_gateway.log.email_tracker_header |
Header consisting of (but not typically displaying) critical information for efficient email tracking and delivery. |
keyword |
cisco_secure_email_gateway.log.encrypted_hash |
keyword |
|
cisco_secure_email_gateway.log.encryption_queue |
Messages in the Encryption Queue. |
long |
cisco_secure_email_gateway.log.engine |
Engine used by the interim verdict. |
keyword |
cisco_secure_email_gateway.log.env |
keyword |
|
cisco_secure_email_gateway.log.error_code |
keyword |
|
cisco_secure_email_gateway.log.esa.amp_verdict |
keyword |
|
cisco_secure_email_gateway.log.esa.as_verdict |
keyword |
|
cisco_secure_email_gateway.log.esa.attachment_details |
text |
|
cisco_secure_email_gateway.log.esa.av_verdict |
keyword |
|
cisco_secure_email_gateway.log.esa.content_filter_verdict |
keyword |
|
cisco_secure_email_gateway.log.esa.dane.host |
keyword |
|
cisco_secure_email_gateway.log.esa.dane.ip |
ip |
|
cisco_secure_email_gateway.log.esa.dane.status |
keyword |
|
cisco_secure_email_gateway.log.esa.delivery_connection_id |
keyword |
|
cisco_secure_email_gateway.log.esa.dha_source |
ip |
|
cisco_secure_email_gateway.log.esa.dkim_verdict |
keyword |
|
cisco_secure_email_gateway.log.esa.dlp_verdict |
keyword |
|
cisco_secure_email_gateway.log.esa.dmarc_verdict |
keyword |
|
cisco_secure_email_gateway.log.esa.final_action_details |
text |
|
cisco_secure_email_gateway.log.esa.friendly_from |
keyword |
|
cisco_secure_email_gateway.log.esa.graymail_verdict |
keyword |
|
cisco_secure_email_gateway.log.esa.helo.domain |
keyword |
|
cisco_secure_email_gateway.log.esa.helo.ip |
ip |
|
cisco_secure_email_gateway.log.esa.injection_connection_id |
keyword |
|
cisco_secure_email_gateway.log.esa.mail_auto_remediation_action |
text |
|
cisco_secure_email_gateway.log.esa.mail_flow_policy |
keyword |
|
cisco_secure_email_gateway.log.esa.mar_action |
keyword |
|
cisco_secure_email_gateway.log.esa.mf_verdict |
keyword |
|
cisco_secure_email_gateway.log.esa.msg_size |
long |
|
cisco_secure_email_gateway.log.esa.msg_too_big |
keyword |
|
cisco_secure_email_gateway.log.esa.msg_too_big_from_sender |
boolean |
|
cisco_secure_email_gateway.log.esa.outbreak_filter_verdict |
keyword |
|
cisco_secure_email_gateway.log.esa.rate_limited_ip |
keyword |
|
cisco_secure_email_gateway.log.esa.reply_to |
keyword |
|
cisco_secure_email_gateway.log.esa.sdr_consolidated_domain_age |
text |
|
cisco_secure_email_gateway.log.esa.sender_group |
keyword |
|
cisco_secure_email_gateway.log.esa.spf_verdict |
keyword |
|
cisco_secure_email_gateway.log.esa.tls.domain |
keyword |
|
cisco_secure_email_gateway.log.esa.tls.in.cipher |
keyword |
|
cisco_secure_email_gateway.log.esa.tls.in.connection_status |
keyword |
|
cisco_secure_email_gateway.log.esa.tls.in.protocol |
keyword |
|
cisco_secure_email_gateway.log.esa.tls.out.cipher |
keyword |
|
cisco_secure_email_gateway.log.esa.tls.out.connection_status |
keyword |
|
cisco_secure_email_gateway.log.esa.tls.out.protocol |
keyword |
|
cisco_secure_email_gateway.log.esa.url_details |
text |
|
cisco_secure_email_gateway.log.estimated.quarantine |
Estimated number of messages in the Spam quarantine. |
long |
cisco_secure_email_gateway.log.estimated.quarantine_release_queue |
Estimated number of messages in the Spam quarantine release queue. |
long |
cisco_secure_email_gateway.log.event.name |
keyword |
|
cisco_secure_email_gateway.log.event_class_id |
keyword |
|
cisco_secure_email_gateway.log.expired_hard_bounces |
Expired Hard Bounces. |
long |
cisco_secure_email_gateway.log.filter_hard_bounces |
Filter Hard Bounces. |
long |
cisco_secure_email_gateway.log.generated_bounce_recipients |
Generated Bounce Recipients. |
long |
cisco_secure_email_gateway.log.global_unsubscribe_hits |
Global Unsubscribe Hits. |
long |
cisco_secure_email_gateway.log.hard_bounce_recipients |
Hard Bounced Recipients. |
long |
cisco_secure_email_gateway.log.helo |
keyword |
|
cisco_secure_email_gateway.log.host |
The hostname or serial of the host sending the log. Configured in the Cisco Secure Email Gateway log subscription dashboard. |
keyword |
cisco_secure_email_gateway.log.injected.bytes |
Total Injected Message Size in Bytes. |
long |
cisco_secure_email_gateway.log.injected.messages |
Injected Messages. |
long |
cisco_secure_email_gateway.log.injected.recipients |
Injected Recipients. |
long |
cisco_secure_email_gateway.log.injection_connection_id |
Injection Connection ID. This is a numerical identifier for an individual SMTP connection to the system, over which 1 to thousands of individual messages may be sent. |
keyword |
cisco_secure_email_gateway.log.interface |
keyword |
|
cisco_secure_email_gateway.log.listener.name |
keyword |
|
cisco_secure_email_gateway.log.log_available |
Amount of disk space available for log files. |
keyword |
cisco_secure_email_gateway.log.log_used |
Percent of log partition used. |
long |
cisco_secure_email_gateway.log.malware |
The name of the malware threat. |
keyword |
cisco_secure_email_gateway.log.maturity |
Sender maturity time. |
keyword |
cisco_secure_email_gateway.log.max_io |
Maximum disk I/O operations per second for the mail process. |
long |
cisco_secure_email_gateway.log.mcafee_ld |
Percent CPU used by McAfee anti-virus scanning. |
long |
cisco_secure_email_gateway.log.message |
text |
|
cisco_secure_email_gateway.log.message_filters_verdict |
keyword |
|
cisco_secure_email_gateway.log.message_status |
keyword |
|
cisco_secure_email_gateway.log.messages_length |
Total number of messages in the system. |
long |
cisco_secure_email_gateway.log.name |
keyword |
|
cisco_secure_email_gateway.log.network_requests |
Network Requests. |
long |
cisco_secure_email_gateway.log.ns_name |
keyword |
|
cisco_secure_email_gateway.log.object |
keyword |
|
cisco_secure_email_gateway.log.object_attr |
keyword |
|
cisco_secure_email_gateway.log.object_category |
keyword |
|
cisco_secure_email_gateway.log.other_hard_bounces |
Other Hard Bounces. |
long |
cisco_secure_email_gateway.log.outcome |
keyword |
|
cisco_secure_email_gateway.log.policy |
Per-recipient policy defined in the inbound table. |
keyword |
cisco_secure_email_gateway.log.privilege |
keyword |
|
cisco_secure_email_gateway.log.qname |
keyword |
|
cisco_secure_email_gateway.log.quarantine.load |
CPU load during the Quarantine process. |
long |
cisco_secure_email_gateway.log.quarantine.messages |
Number of individual messages in policy, virus, or outbreak quarantine (messages present in multiple quarantines are counted only once). |
long |
cisco_secure_email_gateway.log.quarantine.queue_kilobytes_used |
KBytes used by policy, virus, and outbreak quarantine messages. |
long |
cisco_secure_email_gateway.log.queue_kilobytes_free |
Queue Kilobytes Free. |
long |
cisco_secure_email_gateway.log.queue_kilobytes_usd |
Queue Kilobytes Used. |
long |
cisco_secure_email_gateway.log.ram.used |
Allocated memory in bytes. |
long |
cisco_secure_email_gateway.log.ram.utilization |
RAM Utilization. |
long |
cisco_secure_email_gateway.log.rank |
long |
|
cisco_secure_email_gateway.log.read_bytes |
long |
|
cisco_secure_email_gateway.log.recepients |
keyword |
|
cisco_secure_email_gateway.log.recipient_id |
Recipient ID. |
keyword |
cisco_secure_email_gateway.log.ref_zone |
keyword |
|
cisco_secure_email_gateway.log.referrals |
text |
|
cisco_secure_email_gateway.log.rejected_recipients |
Rejected Recipients. |
long |
cisco_secure_email_gateway.log.reporting_load |
CPU load during the Reporting process. |
long |
cisco_secure_email_gateway.log.reputation_score |
The reputation score assigned to the file by the file reputation server. |
keyword |
cisco_secure_email_gateway.log.resource_conservation |
Resource conservation tarpit value. Acceptance of incoming mail is delayed by this number of seconds due to heavy system load. |
long |
cisco_secure_email_gateway.log.response |
SMTP response code and message from recipient host. |
text |
cisco_secure_email_gateway.log.result |
text |
|
cisco_secure_email_gateway.log.retries |
The number of upload attempts performed on a given file. |
long |
cisco_secure_email_gateway.log.risk_factor |
long |
|
cisco_secure_email_gateway.log.run_id |
The numeric value (ID) assigned to the file by the file analysis server for a particular file analysis. |
keyword |
cisco_secure_email_gateway.log.score |
The analysis score assigned to the file by the file analysis server. |
long |
cisco_secure_email_gateway.log.server_error_details |
text |
|
cisco_secure_email_gateway.log.session |
keyword |
|
cisco_secure_email_gateway.log.severity |
keyword |
|
cisco_secure_email_gateway.log.soft_bounced_events |
Soft Bounced Events. |
long |
cisco_secure_email_gateway.log.sophos_ld |
Percent CPU used by Sophos anti-virus scanning. |
long |
cisco_secure_email_gateway.log.spf_aligned |
Protocol SPF aligned is true or false. |
boolean |
cisco_secure_email_gateway.log.spy_name |
The name of the threat, if a malware is found in the file during file analysis. |
keyword |
cisco_secure_email_gateway.log.start_time |
keyword |
|
cisco_secure_email_gateway.log.subject |
text |
|
cisco_secure_email_gateway.log.submit.timestamp |
The date and time at which the file is uploaded to the file analysis server by the email gateway. |
date |
cisco_secure_email_gateway.log.suspected_domains |
keyword |
|
cisco_secure_email_gateway.log.swap_usage |
keyword |
|
cisco_secure_email_gateway.log.swapped.in |
Memory swapped in. |
long |
cisco_secure_email_gateway.log.swapped.out |
Memory swapped out. |
long |
cisco_secure_email_gateway.log.swapped.page.in |
Memory paged in. |
long |
cisco_secure_email_gateway.log.swapped.page.out |
Memory paged out. |
long |
cisco_secure_email_gateway.log.threat_category |
Category of the threat. |
keyword |
cisco_secure_email_gateway.log.threat_level |
Threat level. |
keyword |
cisco_secure_email_gateway.log.total_ld |
Total CPU consumption. |
long |
cisco_secure_email_gateway.log.type |
keyword |
|
cisco_secure_email_gateway.log.unattempted_recipients |
Unattempted Recipients. |
long |
cisco_secure_email_gateway.log.update.timestamp |
The date and time at which the file analysis for the file is complete. |
date |
cisco_secure_email_gateway.log.upload.action |
The upload action value recommended by the file reputation server to take on the given file 0 - Need not send for upload. 1 - Send file for upload. Note The email gateway uploads the file when the upload action value is ‘1.’. 2 - Do not send file for upload. 3 - Send only metadata for upload. |
keyword |
cisco_secure_email_gateway.log.upload.priority |
Upload priority values are: High - For all selected file types, except PDF file type. Low - For only PDF file types. |
keyword |
cisco_secure_email_gateway.log.vendor_action |
keyword |
|
cisco_secure_email_gateway.log.verdict |
The file retrospective verdict value is malicious or clean. |
keyword |
cisco_secure_email_gateway.log.verdict_scale |
Verdict is negative or positive. |
keyword |
cisco_secure_email_gateway.log.verdict_source |
Verdict source. |
keyword |
cisco_secure_email_gateway.log.verified |
keyword |
|
cisco_secure_email_gateway.log.work_queue |
This is the number of messages currently in the work queue. |
long |
cisco_secure_email_gateway.log.zone |
keyword |
|
client.ip |
IP address of the client (IPv4 or IPv6). |
ip |
cloud.account.id |
The cloud account or organization id used to identify different entities in a multi-tenant environment. Examples: AWS account id, Google Cloud ORG Id, or other unique identifier. |
keyword |
cloud.availability_zone |
Availability zone in which this host is running. |
keyword |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
cloud.instance.id |
Instance ID of the host machine. |
keyword |
cloud.instance.name |
Instance name of the host machine. |
keyword |
cloud.machine.type |
Machine type of the host machine. |
keyword |
cloud.project.id |
Name of the project in Google Cloud. |
keyword |
cloud.provider |
Name of the cloud provider. Example values are aws, azure, gcp, or digitalocean. |
keyword |
cloud.region |
Region in which this host is running. |
keyword |
container.id |
Unique container id. |
keyword |
container.image.name |
Name of the image the container was built on. |
keyword |
container.labels |
Image labels. |
object |
container.name |
Container name. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
destination.ip |
IP address of the destination (IPv4 or IPv6). |
ip |
destination.port |
Port of the destination. |
long |
dns.question.name |
The name being queried. If the name field contains non-printable characters (below 32 or above 126), those characters should be represented as escaped base 10 integers (\DDD). Back slashes and quotes should be escaped. Tabs, carriage returns, and line feeds should be converted to \t, \r, and \n respectively. |
keyword |
ecs.version |
ECS version this event conforms to. |
keyword |
email.attachments.file.hash.sha256 |
SHA256 hash. |
keyword |
email.attachments.file.mime_type |
The MIME media type of the attachment. This value will typically be extracted from the |
keyword |
email.attachments.file.name |
Name of the attachment file including the file extension. |
keyword |
email.attachments.file.size |
Attachment file size in bytes. |
long |
email.content_type |
Information about how the message is to be displayed. Typically a MIME type. |
keyword |
email.direction |
The direction of the message based on the sending and receiving domains. |
keyword |
email.from.address |
The email address of the sender, typically from the RFC 5322 |
keyword |
email.message_id |
Identifier from the RFC 5322 |
wildcard |
email.subject |
A brief summary of the topic of the message. |
keyword |
email.subject.text |
Multi-field of |
match_only_text |
email.to.address |
The email address of recipient |
keyword |
event.dataset |
Event dataset. |
constant_keyword |
event.end |
|
date |
event.id |
Unique ID to describe the event. |
keyword |
event.module |
Event module. |
constant_keyword |
event.outcome |
This is one of four ECS Categorization Fields, and indicates the lowest level in the ECS category hierarchy. |
keyword |
event.reason |
Reason why this event happened, according to the source. This describes the why of a particular action or outcome captured in the event. Where |
keyword |
event.start |
|
date |
file.extension |
File extension, excluding the leading dot. Note that when the file name has multiple extensions (example.tar.gz), only the last one should be captured ("gz", not "tar.gz"). |
keyword |
file.hash.sha256 |
SHA256 hash. |
keyword |
file.name |
Name of the file including the extension, without the directory. |
keyword |
host.architecture |
Operating system architecture. |
keyword |
host.containerized |
If the host is a container. |
boolean |
host.domain |
Name of the domain of which the host is a member. For example, on Windows this could be the host’s Active Directory domain or NetBIOS domain name. For Linux this could be the domain of the host’s LDAP provider. |
keyword |
host.hostname |
Hostname of the host. It normally contains what the |
keyword |
host.id |
Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of |
keyword |
host.ip |
Host ip addresses. |
ip |
host.mac |
Host mac addresses. |
keyword |
host.name |
Name of the host. It can contain what |
keyword |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
host.os.family |
OS family (such as redhat, debian, freebsd, windows). |
keyword |
host.os.kernel |
Operating system kernel version as a raw string. |
keyword |
host.os.name |
Operating system name, without the version. |
keyword |
host.os.name.text |
Multi-field of |
text |
host.os.platform |
Operating system platform (such centos, ubuntu, windows). |
keyword |
host.os.version |
Operating system version as a raw string. |
keyword |
host.type |
Type of host. For Cloud providers this can be the machine type like |
keyword |
http.request.method |
HTTP request method. The value should retain its casing from the original event. For example, |
keyword |
http.response.status_code |
HTTP response status code. |
long |
http.version |
HTTP version. |
keyword |
input.type |
Input type. |
keyword |
log.file.path |
File path from which the log event was read / sent from. |
keyword |
log.level |
Original log level of the log event. If the source of the event provides a log level or textual severity, this is the one that goes in |
keyword |
log.offset |
Log offset. |
long |
log.source.address |
Source address from which the log event was read / sent from. |
keyword |
log.syslog.priority |
Syslog numeric priority of the event, if available. According to RFCs 5424 and 3164, the priority is 8 * facility + severity. This number is therefore expected to contain a value between 0 and 191. |
long |
network.protocol |
In the OSI Model this would be the Application Layer protocol. For example, |
keyword |
observer.vendor |
Vendor name of the observer. |
keyword |
process.pid |
Process id. |
long |
related.hash |
All the hashes seen on your event. Populating this field, then using it to search for hashes can help in situations where you’re unsure what the hash algorithm is (and therefore which key name to search). |
keyword |
related.ip |
All of the IPs seen on your event. |
ip |
related.user |
All the user names or other user identifiers seen on the event. |
keyword |
source.domain |
The domain name of the source system. This value may be a host name, a fully qualified domain name, or another host naming format. The value may derive from the original event or be added from enrichment. |
keyword |
source.ip |
IP address of the source (IPv4 or IPv6). |
ip |
source.port |
Port of the source. |
long |
tags |
List of keywords used to tag each event. |
keyword |
url.path |
Path of the request, such as "/search". |
wildcard |
user.name |
Short name or login of the user. |
keyword |
user.name.text |
Multi-field of |
match_only_text |
user_agent.device.name |
Name of the device. |
keyword |
user_agent.name |
Name of the user agent. |
keyword |
user_agent.original |
Unparsed user_agent string. |
keyword |
user_agent.original.text |
Multi-field of |
match_only_text |
user_agent.os.full |
Operating system name, including the version or code name. |
keyword |
user_agent.os.full.text |
Multi-field of |
match_only_text |
user_agent.os.name |
Operating system name, without the version. |
keyword |
user_agent.os.name.text |
Multi-field of |
match_only_text |
user_agent.os.version |
Operating system version as a raw string. |
keyword |
user_agent.version |
Version of the user agent. |
keyword |
Changelog
editChangelog
Version | Details | Kibana version(s) |
---|---|---|
1.24.2 |
Bug fix (View pull request) |
8.11.0 or higher |
1.24.1 |
Bug fix (View pull request) |
8.11.0 or higher |
1.24.0 |
Enhancement (View pull request) |
8.11.0 or higher |
1.23.3 |
Bug fix (View pull request) |
8.7.1 or higher |
1.23.2 |
Bug fix (View pull request) |
8.7.1 or higher |
1.23.1 |
Bug fix (View pull request) |
8.7.1 or higher |
1.23.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.22.2 |
Bug fix (View pull request) |
8.7.1 or higher |
1.22.1 |
Enhancement (View pull request) |
8.7.1 or higher |
1.22.0 |
Bug fix (View pull request) Bug fix (View pull request) Enhancement (View pull request) |
8.7.1 or higher |
1.21.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.20.1 |
Bug fix (View pull request) |
8.7.1 or higher |
1.20.0 |
Bug fix (View pull request) Enhancement (View pull request) |
8.7.1 or higher |
1.19.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.18.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.17.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.16.0 |
Enhancement (View pull request) Bug fix (View pull request) Bug fix (View pull request) |
8.7.1 or higher |
1.15.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.14.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.13.1 |
Bug fix (View pull request) |
8.7.1 or higher |
1.13.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.12.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.11.2 |
Bug fix (View pull request) |
8.7.1 or higher |
1.11.1 |
Bug fix (View pull request) |
8.7.1 or higher |
1.11.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.10.1 |
Bug fix (View pull request) |
8.7.1 or higher |
1.10.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.9.0 |
Enhancement (View pull request) |
7.17.0 or higher |
1.8.2 |
Bug fix (View pull request) |
7.17.0 or higher |
1.8.1 |
Bug fix (View pull request) |
7.17.0 or higher |
1.8.0 |
Enhancement (View pull request) |
7.17.0 or higher |
1.7.1 |
Bug fix (View pull request) |
7.17.0 or higher |
1.7.0 |
Enhancement (View pull request) |
7.17.0 or higher |
1.6.2 |
Bug fix (View pull request) |
7.17.0 or higher |
1.6.1 |
Enhancement (View pull request) |
7.17.0 or higher |
1.6.0 |
Enhancement (View pull request) |
7.17.0 or higher |
1.5.1 |
Enhancement (View pull request) |
7.17.0 or higher |
1.5.0 |
Enhancement (View pull request) |
7.17.0 or higher |
1.4.0 |
Enhancement (View pull request) |
7.17.0 or higher |
1.3.1 |
Bug fix (View pull request) |
7.17.0 or higher |
1.3.0 |
Enhancement (View pull request) |
7.17.0 or higher |
1.2.0 |
Enhancement (View pull request) |
7.17.0 or higher |
1.1.0 |
Enhancement (View pull request) Bug fix (View pull request) |
7.17.0 or higher |
1.0.1 |
Bug fix (View pull request) |
7.17.0 or higher |
1.0.0 |
Enhancement (View pull request) |
7.17.0 or higher |
0.3.0 |
Enhancement (View pull request) |
— |
0.2.1 |
Enhancement (View pull request) |
— |
0.2.0 |
Enhancement (View pull request) |
— |
0.1.0 |
Enhancement (View pull request) |
— |