CyberArk EPM

edit

Version

0.1.0 [beta] This functionality is in beta and is subject to change. The design and code is less mature than official GA features and is being provided as-is with no warranties. Beta features are not subject to the support SLA of official GA features. (View all)

Compatible Kibana version(s)

8.16.0 or higher

Supported Serverless project types
What’s this?

Security
Observability

Subscription level
What’s this?

Basic

Level of support
What’s this?

Elastic

CyberArk Endpoint Privilege Manager (EPM) enforces least privilege and enables organizations to block and contain attacks on endpoint computers, reducing the risk of information being stolen or encrypted and held for ransom. A combination of privilege security, application control and credential theft prevention reduces the risk of malware infection.

The CyberArk EPM integration collects events (raw and aggregated), policy audit events (raw and aggregated), and admin audit logs using the REST API.

Compatibility

edit

This module has been tested against the CyberArk EPM version 24.12.0.4372.

Data streams

edit

This integration collects the following logs:

  • Raw Event - This method enables users to retrieve raw events from EPM.
  • Policy Audit Raw Event - This method enables users to retrieve policy audit raw events from EPM.
  • Aggregated Event - This method enables users to retrieve aggregated events from EPM.
  • Policy Audit Aggregated Event - This method enables users to retrieve aggregated policy audit events from EPM.
  • Admin Audit - This method enables users to retrieve the full list of actions carried out by EPM administrators in a specific set.

Requirements

edit

Elastic Agent must be installed. For more details and installation instructions, please refer to the Elastic Agent Installation Guide.

Installing and managing an Elastic Agent:
edit

There are several options for installing and managing Elastic Agent:

Install a Fleet-managed Elastic Agent (recommended):
edit

With this approach, you install Elastic Agent and use Fleet in Kibana to define, configure, and manage your agents in a central location. We recommend using Fleet management because it makes the management and upgrade of your agents considerably easier.

Install Elastic Agent in standalone mode (advanced users):
edit

With this approach, you install Elastic Agent and manually configure the agent locally on the system where it’s installed. You are responsible for managing and upgrading the agents. This approach is reserved for advanced users only.

Install Elastic Agent in a containerized environment:
edit

You can run Elastic Agent inside a container, either with Fleet Server or standalone. Docker images for all versions of Elastic Agent are available from the Elastic Docker registry, and we provide deployment manifests for running on Kubernetes.

Please note, there are minimum requirements for running Elastic Agent. For more information, refer to the Elastic Agent Minimum Requirements.

Setup

edit
To collect data from the CyberArk EPM API:
edit
  • Navigate to Administration > Account Management and create a user. While creating the user, check the Allow to manage Sets option and provide ViewOnlySetAdmin for all the required sets.
  • Log in with the newly created user and navigate to Administration > Account Configuration. Update the Timeout for inactive session parameter, which is a prerequisite for creating an integration in Elastic.

    • Note: It is recommended to set a high value for the Timeout for inactive session parameter to minimize multiple authentication calls.
Enabling the integration in Elastic:
edit
  1. In Kibana navigate to Management > Integrations.
  2. In "Search for integrations" top bar, search for CyberArk EPM.
  3. Select the "CyberArk EPM" integration from the search results.
  4. Select "Add CyberArk EPM" to add the integration.
  5. Add all the required integration configuration parameters, including the URL, Username, Password, API Version, Session Timeout, Interval, and Initial Interval, to enable data collection.
  6. Select "Save and continue" to save the integration.

NOTE:

  • The default URL is https://login.epm.cyberark.com, but this may vary depending on your region. Please refer to the Documentation to find the correct URL for your region.
  • If you encounter an error indicating that the usage limit has been reached, consider lowering the "Resource Rate Limit" parameter in the advanced section. For more details, please refer to the documentation.

Logs reference

edit
Raw Event
edit

This is the raw_event dataset.

Example

An example event for raw_event looks as following:

{
    "@timestamp": "2024-11-28T05:24:15.693Z",
    "agent": {
        "ephemeral_id": "b2114da7-4d06-4236-a161-456e590812c4",
        "id": "ffd91dcb-1e39-4e3d-a0ca-06e5b5d75873",
        "name": "elastic-agent-96710",
        "type": "filebeat",
        "version": "8.16.0"
    },
    "cyberark_epm": {
        "raw_event": {
            "access_action": "false",
            "access_target_type": "Internet",
            "agent_event_count": 1,
            "agent_id": "109f521d-2ee1-450b-9f71-3cc56d8ebf37",
            "arrival_time": "2024-11-28T05:24:15.693Z",
            "company": "Microsoft Corporation",
            "computer_name": "TEST-PC",
            "count": 1,
            "deception_type": 0,
            "display_name": "Windows host process (Rundll32) (rundll32.exe)",
            "file_description": "Windows host process (Rundll32)",
            "file_name": "rundll32.exe",
            "file_owner_domain": "NT SERVICE",
            "file_owner_name": "TrustedInstaller",
            "file_path": "C:\\Windows\\System32\\rundll32.exe",
            "file_path_without_filename": "C:\\Windows\\System32\\",
            "file_qualifier": "-6929158130464282036",
            "file_size": 71168,
            "file_version": "10.0.17763.1697",
            "first_event_date": "2024-11-28T05:03:10.094Z",
            "hash": "A40886F98905F3D9DBDD61DA1D59CCB4F4854758",
            "last_event_date": "2024-11-28T05:03:10.094Z",
            "logon_attempt_type_id": 5,
            "logon_attempt_value": "Service (Service startup)",
            "logon_status_id": 3221225779,
            "logon_status_value": "Clocks between DC and other computer too far out of sync",
            "modification_time": "2024-10-29T05:24:15.618Z",
            "operating_system_type": "Windows",
            "original_file_name": "RUNDLL32.EXE",
            "package_name": "Windows host process (Rundll32) (rundll32.exe)",
            "policy_name": "test-rule2",
            "process_command_line": "Startupscan.dll,SusRunTask",
            "product_name": "Microsoft® Windows® Operating System",
            "product_version": "10.0.17763.1697",
            "publisher": "Microsoft Windows",
            "skipped_count": 0,
            "source_name": "Microsoft Windows",
            "source_type": "Windows",
            "threat_protection_action": "ALL",
            "threat_protection_action_id": "0",
            "type": "Launch",
            "user_domain": "TEST-PC",
            "user_is_admin": true,
            "user_name": "Administrator",
            "win_event_record_id": 0,
            "win_event_type": 0
        }
    },
    "data_stream": {
        "dataset": "cyberark_epm.raw_event",
        "namespace": "33414",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "ffd91dcb-1e39-4e3d-a0ca-06e5b5d75873",
        "snapshot": false,
        "version": "8.16.0"
    },
    "event": {
        "action": "all",
        "agent_id_status": "verified",
        "category": [
            "process"
        ],
        "dataset": "cyberark_epm.raw_event",
        "end": "2024-11-28T05:03:10.094Z",
        "ingested": "2025-01-06T05:28:21Z",
        "kind": "event",
        "original": "{\"accessAction\":\"false\",\"accessTargetName\":null,\"accessTargetType\":\"Internet\",\"agentEventCount\":1,\"agentId\":\"109f521d-2ee1-450b-9f71-3cc56d8ebf37\",\"applicationSubType\":null,\"arrivalTime\":\"2024-11-28T05:24:15.693Z\",\"authorizationRights\":null,\"bundleId\":null,\"bundleName\":null,\"bundleVersion\":null,\"company\":\"Microsoft Corporation\",\"computerName\":\"TEST-PC\",\"deceptionType\":0,\"displayName\":\"Windows host process (Rundll32) (rundll32.exe)\",\"eventCount\":1,\"eventType\":\"Launch\",\"evidences\":null,\"exposedUsers\":null,\"fatherProcess\":null,\"fileAccessPermission\":null,\"fileDescription\":\"Windows host process (Rundll32)\",\"fileName\":\"rundll32.exe\",\"filePath\":\"C:\\\\\Windows\\\\\System32\\\\\rundll32.exe\",\"filePathWithoutFilename\":\"C:\\\\\Windows\\\\\System32\\\\\\",\"fileQualifier\":\"-6929158130464282036\",\"fileSize\":71168,\"fileVersion\":\"10.0.17763.1697\",\"firstEventDate\":\"2024-11-28T05:03:10.094Z\",\"hash\":\"A40886F98905F3D9DBDD61DA1D59CCB4F4854758\",\"interpreter\":null,\"justification\":null,\"justificationEmail\":null,\"lastEventDate\":\"2024-11-28T05:03:10.094Z\",\"logonAttemptTypeId\":5,\"logonStatusId\":3221225779,\"lureUser\":null,\"modificationTime\":\"2024-10-29T05:24:15.618Z\",\"operatingSystemType\":\"Windows\",\"originUserUID\":null,\"originalFileName\":\"RUNDLL32.EXE\",\"owner\":\"NT SERVICE\\\\\TrustedInstaller\",\"packageName\":\"Windows host process (Rundll32) (rundll32.exe)\",\"policyCategory\":null,\"policyName\":\"test-rule2\",\"processCertificateIssuer\":null,\"processCommandLine\":\"Startupscan.dll,SusRunTask\",\"productCode\":null,\"productName\":\"Microsoft® Windows® Operating System\",\"productVersion\":\"10.0.17763.1697\",\"publisher\":\"Microsoft Windows\",\"runAsUsername\":null,\"skippedCount\":0,\"sourceName\":\"Microsoft Windows\",\"sourceProcessCertificateIssuer\":null,\"sourceProcessCommandLine\":null,\"sourceProcessHash\":null,\"sourceProcessPublisher\":null,\"sourceProcessSigner\":null,\"sourceProcessUsername\":null,\"sourceType\":\"Windows\",\"sourceWSIp\":null,\"sourceWSName\":null,\"symLink\":null,\"threatProtectionAction\":\"ALL\",\"threatProtectionActionId\":0,\"upgradeCode\":null,\"userIsAdmin\":true,\"userName\":\"TEST-PC\\\\\Administrator\",\"winEventRecordId\":0,\"winEventType\":0,\"workingDirectory\":null}",
        "start": "2024-11-28T05:03:10.094Z",
        "type": [
            "info"
        ]
    },
    "file": {
        "directory": "C:\\Windows\\System32\\",
        "hash": {
            "sha1": "A40886F98905F3D9DBDD61DA1D59CCB4F4854758"
        },
        "mtime": "2024-10-29T05:24:15.618Z",
        "name": "rundll32.exe",
        "owner": "TrustedInstaller",
        "path": "C:\\Windows\\System32\\rundll32.exe",
        "size": 71168
    },
    "host": {
        "name": "TEST-PC",
        "os": {
            "type": "windows"
        }
    },
    "input": {
        "type": "cel"
    },
    "observer": {
        "product": "Endpoint Privilege Manager",
        "vendor": "CyberArk"
    },
    "organization": {
        "name": "Microsoft Corporation"
    },
    "package": {
        "checksum": "A40886F98905F3D9DBDD61DA1D59CCB4F4854758",
        "name": "Windows host process (Rundll32) (rundll32.exe)",
        "size": 71168,
        "version": "10.0.17763.1697"
    },
    "related": {
        "hash": [
            "A40886F98905F3D9DBDD61DA1D59CCB4F4854758"
        ],
        "hosts": [
            "TEST-PC"
        ],
        "user": [
            "TrustedInstaller",
            "Administrator"
        ]
    },
    "rule": {
        "name": "test-rule2"
    },
    "tags": [
        "preserve_original_event",
        "preserve_duplicate_custom_fields",
        "forwarded",
        "cyberark_epm-raw_event"
    ],
    "user": {
        "domain": "TEST-PC",
        "name": "Administrator"
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

cyberark_epm.raw_event.access_action

Whether the restrict event action is allow or restrict.

keyword

cyberark_epm.raw_event.access_target_name

The location of the accessed resource.

keyword

cyberark_epm.raw_event.access_target_type

Accessed resource type.

keyword

cyberark_epm.raw_event.agent_event_count

The number of identical events that happened during the aggregation period.

long

cyberark_epm.raw_event.agent_id

AgentId that is used to determine the computerName from the GetComputers API.

keyword

cyberark_epm.raw_event.application_sub_type

The sub-type of the application that triggers the event.

keyword

cyberark_epm.raw_event.arrival_time

The date and time when the event audit was received by the EPM service.

date

cyberark_epm.raw_event.authorization_right

The authorization rights that are needed during runtime to run the specified executable on macOS.

keyword

cyberark_epm.raw_event.authorization_rights

keyword

cyberark_epm.raw_event.bundle_id

Bundle id of the file that triggered the event.

keyword

cyberark_epm.raw_event.bundle_name

Bundle name of the file that triggered the event.

keyword

cyberark_epm.raw_event.bundle_version

Bundle version of the file that triggered the event.

keyword

cyberark_epm.raw_event.command_info

File command information.

keyword

cyberark_epm.raw_event.company

Company name of the file that triggered the event.

keyword

cyberark_epm.raw_event.computer_name

keyword

cyberark_epm.raw_event.count

The total number of raw events, including skipped events.

long

cyberark_epm.raw_event.deception_type

The type of deception policy.

long

cyberark_epm.raw_event.deception_type_value

keyword

cyberark_epm.raw_event.defence_action_id

The defense action ID of the last event.

long

cyberark_epm.raw_event.defence_action_value

keyword

cyberark_epm.raw_event.display_name

The file display name.

keyword

cyberark_epm.raw_event.evidences

The evidence related to a Threat Protection event.

keyword

cyberark_epm.raw_event.exposed_users

The users who were exposed in the threat protection event.

keyword

cyberark_epm.raw_event.file_access_permission

The file access permission.

keyword

cyberark_epm.raw_event.file_description

File description of the file that triggered the event.

keyword

cyberark_epm.raw_event.file_name

The name of the event file that triggered the event.

keyword

cyberark_epm.raw_event.file_owner_domain

keyword

cyberark_epm.raw_event.file_owner_name

Owner of the file that triggered the event.

keyword

cyberark_epm.raw_event.file_path

File path of the file that triggered the event.

keyword

cyberark_epm.raw_event.file_path_without_filename

keyword

cyberark_epm.raw_event.file_qualifier

keyword

cyberark_epm.raw_event.file_size

The size of the file.

long

cyberark_epm.raw_event.file_version

File version of the file that triggered the event.

keyword

cyberark_epm.raw_event.first_event_date

The first time that the event was triggered.

date

cyberark_epm.raw_event.hash

Hash value (SHA1) of the application that triggered the event.

keyword

cyberark_epm.raw_event.interpreter

keyword

cyberark_epm.raw_event.justification

Justification provided by the user.

keyword

cyberark_epm.raw_event.justification_email

keyword

cyberark_epm.raw_event.last_event_computer_name

The name of the computer where the most recent event was detected.

keyword

cyberark_epm.raw_event.last_event_date

The last time that the event was triggered.

date

cyberark_epm.raw_event.logon_attempt_type_id

Type of logon attempt.

long

cyberark_epm.raw_event.logon_attempt_value

keyword

cyberark_epm.raw_event.logon_status_id

The reason why the logon attempt failed.

long

cyberark_epm.raw_event.logon_status_value

keyword

cyberark_epm.raw_event.lure_user

The lure user used for the attack attempt.

keyword

cyberark_epm.raw_event.modification_time

Last time the file that triggered the event was changed.

date

cyberark_epm.raw_event.operating_system_type

keyword

cyberark_epm.raw_event.origin_user_uid

The unique name of the user.

keyword

cyberark_epm.raw_event.original_file_name

The original name of the event file that triggered the event.

keyword

cyberark_epm.raw_event.package_name

Installation package or executable that created the file that triggered the event.

keyword

cyberark_epm.raw_event.policy_category

keyword

cyberark_epm.raw_event.policy_name

The policy that triggered the event.

keyword

cyberark_epm.raw_event.process_certificate_issuer

keyword

cyberark_epm.raw_event.process_command_line

The process creation command line.

keyword

cyberark_epm.raw_event.product_code

The product code of the file that triggered the most recent event.

keyword

cyberark_epm.raw_event.product_name

Product name of the file that triggered the event.

keyword

cyberark_epm.raw_event.product_version

Product version of the file that triggered the event.

keyword

cyberark_epm.raw_event.publisher

Digital signature of the application that triggered the event (if applicable).

keyword

cyberark_epm.raw_event.run_as_username

The name of the user that was used to run the executable/command.

keyword

cyberark_epm.raw_event.skipped_count

The number of skipped events.

long

cyberark_epm.raw_event.source_name

Point of origin from which the file that triggered the event was acquired.

keyword

cyberark_epm.raw_event.source_process_certificate_issuer

keyword

cyberark_epm.raw_event.source_process_command_line

The initiating process creation command line from which the event was triggered.

keyword

cyberark_epm.raw_event.source_process_hash

The hash of the initiating process from which the event was triggered.

keyword

cyberark_epm.raw_event.source_process_publisher

The publisher of the initiating process from which the event was triggered.

keyword

cyberark_epm.raw_event.source_process_signer

The signer of the initiating process from which the event was triggered.

keyword

cyberark_epm.raw_event.source_process_username

The username of the initiating process from which the event was triggered.

keyword

cyberark_epm.raw_event.source_type

The type of origin from where the file that triggered the event was acquired.

keyword

cyberark_epm.raw_event.source_ws_ip

Source workstation IPv4/v6 address.

ip

cyberark_epm.raw_event.source_ws_name

Source workstation from where the attack attempt/login attempt originated.

keyword

cyberark_epm.raw_event.sym_link

The Linux/UNIX link that points to another file or folder.

keyword

cyberark_epm.raw_event.threat_protection_action

The action was performed by EPM when the event occurred - Block or Detect.

keyword

cyberark_epm.raw_event.threat_protection_action_id

keyword

cyberark_epm.raw_event.type

Type of event.

keyword

cyberark_epm.raw_event.upgrade_code

The upgrade code of the file that triggered the most recent event.

keyword

cyberark_epm.raw_event.user_domain

keyword

cyberark_epm.raw_event.user_is_admin

Whether the user who triggered the event is a local administrator.

boolean

cyberark_epm.raw_event.user_name

User who triggered the event.

keyword

cyberark_epm.raw_event.win_event_record_id

Microsoft Windows event viewer report number that indicates the logged OS event.

long

cyberark_epm.raw_event.win_event_type

Microsoft Windows Event viewer event type.

long

cyberark_epm.raw_event.working_directory

The working directory of the event.

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

event.dataset

Event dataset.

constant_keyword

event.module

Event module.

constant_keyword

input.type

Type of filebeat input.

keyword

log.offset

Log offset.

long

Policy Audit Raw Event
edit

This is the policyaudit_raw_event dataset.

Example

An example event for policyaudit_raw_event looks as following:

{
    "@timestamp": "2024-11-25T14:27:54.054Z",
    "agent": {
        "ephemeral_id": "1a61d14a-fd5a-4285-8fa6-044656c01031",
        "id": "204b047e-1c2d-4330-9821-2d3b668edf6b",
        "name": "elastic-agent-60258",
        "type": "filebeat",
        "version": "8.16.0"
    },
    "cyberark_epm": {
        "policyaudit_raw_event": {
            "access_target_name": "C:\\Oracle\\oemmw\\OPatch\\version.txt",
            "access_target_type": "ransomware",
            "agent_event_count": 2,
            "agent_id": "48b4bf28-5257-4460-a384-9aac70fb7db2",
            "arguments": "status sshd",
            "arrival_time": "2024-11-25T14:27:54.054Z",
            "computer_name": "k8sworker1-50-2-19",
            "display_name": "systemctl",
            "file_access_permission": "-rwxr-xr-x",
            "file_description": "systemctl",
            "file_name": "systemctl",
            "file_owner_name": "root",
            "file_path": "/usr/bin/systemctl",
            "file_qualifier": "2375697114193346955",
            "file_size": 1115760,
            "first_event_date": "2024-11-25T10:31:12.018Z",
            "hash": "5f344897632b50114a8ff649054599c6f7fa8a69",
            "last_event_date": "2024-11-25T10:37:58.431Z",
            "modification_time": "2024-10-26T14:27:54.041Z",
            "operating_system_type": "Linux",
            "origin_user_uid": "0",
            "package_name": "systemctl",
            "policy_action": "Elevate",
            "policy_name": "Test-elastic",
            "product_name": "SQL*PLUS",
            "run_as_username": "root",
            "skipped_count": 0,
            "source_name": "/usr/bin/systemctl",
            "source_type": "LocalDisk",
            "type": "StartElevated",
            "user_is_admin": true,
            "user_name": "root",
            "working_directory": "/home/serviceuser"
        }
    },
    "data_stream": {
        "dataset": "cyberark_epm.policyaudit_raw_event",
        "namespace": "49746",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "204b047e-1c2d-4330-9821-2d3b668edf6b",
        "snapshot": false,
        "version": "8.16.0"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "iam"
        ],
        "dataset": "cyberark_epm.policyaudit_raw_event",
        "end": "2024-11-25T10:37:58.431Z",
        "ingested": "2025-01-06T05:27:15Z",
        "kind": "event",
        "original": "{\"accessTargetName\":\"C:\\\\\Oracle\\\\\oemmw\\\\\OPatch\\\\\version.txt\",\"accessTargetType\":\"ransomware\",\"agentEventCount\":2,\"agentId\":\"48b4bf28-5257-4460-a384-9aac70fb7db2\",\"applicationSubType\":null,\"arguments\":\"status sshd\",\"arrivalTime\":\"2024-11-25T14:27:54.054Z\",\"authorizationRights\":null,\"bundleName\":\"\",\"bundleVersion\":\"\",\"codeURL\":\"\",\"commandInfo\":\"\",\"company\":\"\",\"computerName\":\"k8sworker1-50-2-19\",\"displayName\":\"systemctl\",\"eventType\":\"StartElevated\",\"fileAccessPermission\":\"-rwxr-xr-x\",\"fileDescription\":\"systemctl\",\"fileName\":\"systemctl\",\"filePath\":\"/usr/bin/systemctl\",\"fileQualifier\":\"2375697114193346955\",\"fileSize\":1115760,\"fileVersion\":\"\",\"firstEventDate\":\"2024-11-25T10:31:12.018Z\",\"hash\":\"5f344897632b50114a8ff649054599c6f7fa8a69\",\"interpreter\":\"\",\"justification\":\"\",\"justificationEmail\":\"\",\"lastEventDate\":\"2024-11-25T10:37:58.431Z\",\"mimeType\":\"\",\"modificationTime\":\"2024-10-26T14:27:54.041Z\",\"operatingSystemType\":\"Linux\",\"originUserUID\":\"0\",\"originalFileName\":\"\",\"owner\":\"root\",\"packageName\":\"systemctl\",\"parentProcess\":\"\",\"policyAction\":\"Elevate\",\"policyName\":\"Test-elastic\",\"productCode\":\"\",\"productName\":\"SQL*PLUS\",\"productVersion\":\"\",\"publisher\":\"\",\"runAsUsername\":\"root\",\"skippedCount\":0,\"sourceName\":\"/usr/bin/systemctl\",\"sourceType\":\"LocalDisk\",\"symLink\":\"\",\"upgradeCode\":\"\",\"userIsAdmin\":true,\"userName\":\"root\",\"workingDirectory\":\"/home/serviceuser\"}",
        "start": "2024-11-25T10:31:12.018Z",
        "type": [
            "info"
        ]
    },
    "file": {
        "hash": {
            "sha1": "5f344897632b50114a8ff649054599c6f7fa8a69"
        },
        "mode": "755",
        "mtime": "2024-10-26T14:27:54.041Z",
        "name": "systemctl",
        "owner": "root",
        "path": "/usr/bin/systemctl",
        "size": 1115760
    },
    "host": {
        "name": "k8sworker1-50-2-19",
        "os": {
            "type": "linux"
        }
    },
    "input": {
        "type": "cel"
    },
    "observer": {
        "product": "Endpoint Privilege Manager",
        "vendor": "CyberArk"
    },
    "package": {
        "checksum": "5f344897632b50114a8ff649054599c6f7fa8a69",
        "name": "systemctl",
        "size": 1115760
    },
    "process": {
        "working_directory": "/home/serviceuser"
    },
    "related": {
        "hash": [
            "5f344897632b50114a8ff649054599c6f7fa8a69"
        ],
        "hosts": [
            "k8sworker1-50-2-19"
        ],
        "user": [
            "0",
            "root"
        ]
    },
    "rule": {
        "name": "Test-elastic"
    },
    "tags": [
        "preserve_original_event",
        "preserve_duplicate_custom_fields",
        "forwarded",
        "cyberark_epm-policyaudit_raw_event"
    ],
    "user": {
        "id": "0",
        "name": "root"
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

cyberark_epm.policyaudit_raw_event.access_target_name

keyword

cyberark_epm.policyaudit_raw_event.access_target_type

The type of the accessed resource.

keyword

cyberark_epm.policyaudit_raw_event.agent_event_count

The number of identical events happened during the aggregation period.

long

cyberark_epm.policyaudit_raw_event.agent_id

AgentId that is used to determine the computerName from the GetComputers API.

keyword

cyberark_epm.policyaudit_raw_event.application_sub_type

The sub-type of the application that triggers the event.

keyword

cyberark_epm.policyaudit_raw_event.arguments

A list of the file arguments.

keyword

cyberark_epm.policyaudit_raw_event.arrival_time

The date and time when the event audit was received by the EPM service. This is not the time when the event occurred, but the time when the EPM service received the event audit.

date

cyberark_epm.policyaudit_raw_event.authorization_right

The authorization rights that are needed during runtime to run the specified executable on macOS.

keyword

cyberark_epm.policyaudit_raw_event.authorization_rights

keyword

cyberark_epm.policyaudit_raw_event.bundle_name

Bundle name of the file that triggered the event.

keyword

cyberark_epm.policyaudit_raw_event.bundle_version

Bundle version of the file that triggered the event.

keyword

cyberark_epm.policyaudit_raw_event.code_url

The code URL of the file that triggered the most recent event.

keyword

cyberark_epm.policyaudit_raw_event.command_info

Details of the file command.

keyword

cyberark_epm.policyaudit_raw_event.company

Company name of the file that triggered the event.

keyword

cyberark_epm.policyaudit_raw_event.computer_name

The name of the computer where the event was detected.

keyword

cyberark_epm.policyaudit_raw_event.count

The total number of events.

long

cyberark_epm.policyaudit_raw_event.display_name

The file display name.

keyword

cyberark_epm.policyaudit_raw_event.file_access_permission

Details of the file access permissions.

keyword

cyberark_epm.policyaudit_raw_event.file_description

File description of the file that triggered the event.

keyword

cyberark_epm.policyaudit_raw_event.file_name

The name of the event file that triggered the event (files with the same hash can have different names).

keyword

cyberark_epm.policyaudit_raw_event.file_owner_domain

keyword

cyberark_epm.policyaudit_raw_event.file_owner_name

Owner of the file that triggered the event.

keyword

cyberark_epm.policyaudit_raw_event.file_path

File path of the file that triggered the event.

keyword

cyberark_epm.policyaudit_raw_event.file_qualifier

The unique file identifier.

keyword

cyberark_epm.policyaudit_raw_event.file_size

The file size. If the size is zero, consider not returning this parameter.

long

cyberark_epm.policyaudit_raw_event.file_version

File version of the file that triggered the event.

keyword

cyberark_epm.policyaudit_raw_event.first_event_date

The first time that the event was triggered.

date

cyberark_epm.policyaudit_raw_event.hash

Hash value (SHA1) of the application that triggered the event.

keyword

cyberark_epm.policyaudit_raw_event.interpreter

The file interpreter.

keyword

cyberark_epm.policyaudit_raw_event.justification

Justification provided by the user.

keyword

cyberark_epm.policyaudit_raw_event.justification_email

The email of the requester.

keyword

cyberark_epm.policyaudit_raw_event.last_event_date

The last time that the event was triggered.

date

cyberark_epm.policyaudit_raw_event.mime_type

The mime type of the file that triggered the most recent event.

keyword

cyberark_epm.policyaudit_raw_event.modification_time

Last time the file that triggered the event was changed.

date

cyberark_epm.policyaudit_raw_event.operating_system_type

The operating system type of the file.

keyword

cyberark_epm.policyaudit_raw_event.origin_user_uid

The user’s unique name.

keyword

cyberark_epm.policyaudit_raw_event.original_file_name

The name of the original file.

keyword

cyberark_epm.policyaudit_raw_event.package_name

Installation package or executable that created the file that triggered the event.

keyword

cyberark_epm.policyaudit_raw_event.parent_process

keyword

cyberark_epm.policyaudit_raw_event.policy_action

The detected policy action.

keyword

cyberark_epm.policyaudit_raw_event.policy_name

The name of the policy that triggered the event.

keyword

cyberark_epm.policyaudit_raw_event.product_code

The product code of the file that triggered the most recent event.

keyword

cyberark_epm.policyaudit_raw_event.product_name

Product name of the file that triggered the event.

keyword

cyberark_epm.policyaudit_raw_event.product_version

Product version of the file that triggered the event.

keyword

cyberark_epm.policyaudit_raw_event.publisher

Digital signature of the application that triggered the event (if applicable).

keyword

cyberark_epm.policyaudit_raw_event.run_as_username

The username that was used to run the executable/command.

keyword

cyberark_epm.policyaudit_raw_event.set_id

The ID of the Set where this event was detected.

keyword

cyberark_epm.policyaudit_raw_event.skipped_count

The number of skipped events.

long

cyberark_epm.policyaudit_raw_event.source_name

Point of origin from which the file that triggered the event was acquired.

keyword

cyberark_epm.policyaudit_raw_event.source_type

The type of origin from where the file that triggered the event was acquired.

keyword

cyberark_epm.policyaudit_raw_event.sym_link

A Linux/UNIX link that points to another file or folder.

keyword

cyberark_epm.policyaudit_raw_event.type

Type of event.

keyword

cyberark_epm.policyaudit_raw_event.upgrade_code

The upgrade code of the file that triggered the most recent event.

keyword

cyberark_epm.policyaudit_raw_event.user_domain

keyword

cyberark_epm.policyaudit_raw_event.user_is_admin

Whether the user who triggered the event is a local administrator.

boolean

cyberark_epm.policyaudit_raw_event.user_name

User who triggered the event.

keyword

cyberark_epm.policyaudit_raw_event.working_directory

The directory where the file ran.

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

event.dataset

Event dataset.

constant_keyword

event.module

Event module.

constant_keyword

input.type

Type of filebeat input.

keyword

log.offset

Log offset.

long

Aggregated Event
edit

This is the aggregated_event dataset.

Example

An example event for aggregated_event looks as following:

{
    "@timestamp": "2024-11-25T11:25:18.712Z",
    "agent": {
        "ephemeral_id": "41121a9e-2b78-42e1-b4ee-97279ee58824",
        "id": "497e924b-d605-4c9d-a197-8e5804077321",
        "name": "elastic-agent-46395",
        "type": "filebeat",
        "version": "8.16.0"
    },
    "cyberark_epm": {
        "aggregated_event": {
            "affected_computers": 1,
            "affected_users": 1,
            "agent_id": "109f521d-2ee1-450b-9f71-3cc56d8ebf37",
            "aggregated_by": "0E4B8652719D84B66BFBFCF195C43513AF8459D8,2048",
            "application_type": "Executable",
            "application_type_id": 3,
            "arrival_time": "2024-11-25T11:25:18.712Z",
            "deception_type": 0,
            "defence_action_id": 0,
            "defence_action_value": "No action",
            "exposed_users": 0,
            "file_location": "C:\\Oracle\\oemmw\\oracle_common\\ccr\\bin\\",
            "file_qualifier": "-1035712369269809536",
            "file_size": 13312,
            "first_event_computer_name": "TEST",
            "first_event_date": "2024-11-25T11:25:17.114Z",
            "first_event_user_domain": "TEST",
            "first_event_user_name": "Administrator",
            "hash": "SHA1##0E4B8652719D84B66BFBFCF195C43513AF8459D8",
            "last_agent_id": "109f521d-2ee1-450b-9f71-3cc56d8ebf37",
            "last_event_computer_name": "TEST",
            "last_event_date": "2024-11-25T11:25:17.114Z",
            "last_event_display_name": "setupCCR.exe -a -d -S...",
            "last_event_exposed_users_count": 0,
            "last_event_file_name": "setupCCR.exe",
            "last_event_id": "ZpURY5MBdDBWucfdnK1j",
            "last_event_source_name": "ouiSFX (setup_em13200p1_win64.exe)",
            "last_event_source_type": "LocalDisk",
            "last_event_user_domain": "TEST",
            "last_event_user_name": "Administrator",
            "operating_system_type": "Windows",
            "package_name": "ouiSFX (setup_em13200p1_win64.exe)",
            "skipped": false,
            "skipped_count": 0,
            "total_events": 1,
            "type": "Launch",
            "type_id": 2048
        }
    },
    "data_stream": {
        "dataset": "cyberark_epm.aggregated_event",
        "namespace": "99704",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "497e924b-d605-4c9d-a197-8e5804077321",
        "snapshot": false,
        "version": "8.16.0"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "process"
        ],
        "dataset": "cyberark_epm.aggregated_event",
        "end": "2024-11-25T11:25:17.114Z",
        "ingested": "2025-01-06T05:25:15Z",
        "kind": "event",
        "original": "{\"CLSID\":\"\",\"affectedComputers\":1,\"affectedUsers\":1,\"agentId\":\"109f521d-2ee1-450b-9f71-3cc56d8ebf37\",\"aggregatedBy\":\"0E4B8652719D84B66BFBFCF195C43513AF8459D8,2048\",\"appPackageDisplayName\":\"\",\"applicationType\":\"Executable\",\"applicationTypeId\":3,\"arrivalTime\":\"2024-11-25T11:25:18.712Z\",\"deceptionType\":0,\"defenceActionId\":0,\"eventType\":\"Launch\",\"eventTypeId\":2048,\"exposedUsers\":0,\"fileLocation\":\"C:\\\\\Oracle\\\\\oemmw\\\\\oracle_common\\\\\ccr\\\\\bin\\\\\\",\"fileQualifier\":\"-1035712369269809536\",\"fileSize\":13312,\"firstEventComputerName\":\"TEST\",\"firstEventDate\":\"2024-11-25T11:25:17.114Z\",\"firstEventUserName\":\"TEST\\\\\Administrator\",\"hash\":\"SHA1##0E4B8652719D84B66BFBFCF195C43513AF8459D8\",\"lastAgentId\":\"109f521d-2ee1-450b-9f71-3cc56d8ebf37\",\"lastEventAccessTargetName\":\"\",\"lastEventAccessTargetType\":null,\"lastEventAgentId\":null,\"lastEventAuthorizationRights\":\"\",\"lastEventComputerName\":\"TEST\",\"lastEventDate\":\"2024-11-25T11:25:17.114Z\",\"lastEventDisplayName\":\"setupCCR.exe -a -d -S...\",\"lastEventExposedUsers\":null,\"lastEventExposedUsersCount\":0,\"lastEventFileName\":\"setupCCR.exe\",\"lastEventId\":\"ZpURY5MBdDBWucfdnK1j\",\"lastEventInitiatedProcess\":null,\"lastEventInitiatedProcessLocation\":null,\"lastEventJustification\":\"\",\"lastEventOriginalFileName\":\"\",\"lastEventPackageName\":null,\"lastEventSourceName\":\"ouiSFX (setup_em13200p1_win64.exe)\",\"lastEventSourceType\":\"LocalDisk\",\"lastEventSymLink\":\"\",\"lastEventUserName\":\"TEST\\\\\Administrator\",\"mimeType\":\"\",\"operatingSystemType\":\"Windows\",\"packageName\":\"ouiSFX (setup_em13200p1_win64.exe)\",\"productCode\":null,\"publisher\":\"\",\"skipped\":false,\"skippedCount\":0,\"threatDetectionAction\":\"\",\"totalEvents\":1,\"upgradeCode\":null,\"url\":\"\"}",
        "start": "2024-11-25T11:25:17.114Z",
        "type": [
            "info"
        ]
    },
    "file": {
        "directory": "C:\\Oracle\\oemmw\\oracle_common\\ccr\\bin\\",
        "hash": {
            "sha1": "0E4B8652719D84B66BFBFCF195C43513AF8459D8"
        },
        "name": "setupCCR.exe",
        "size": 13312
    },
    "host": {
        "os": {
            "type": "windows"
        }
    },
    "input": {
        "type": "cel"
    },
    "observer": {
        "product": "Endpoint Privilege Manager",
        "vendor": "CyberArk"
    },
    "package": {
        "checksum": "0E4B8652719D84B66BFBFCF195C43513AF8459D8",
        "name": "ouiSFX (setup_em13200p1_win64.exe)",
        "size": 13312
    },
    "related": {
        "hash": [
            "0E4B8652719D84B66BFBFCF195C43513AF8459D8"
        ],
        "hosts": [
            "TEST"
        ],
        "user": [
            "Administrator"
        ]
    },
    "tags": [
        "preserve_original_event",
        "preserve_duplicate_custom_fields",
        "forwarded",
        "cyberark_epm-aggregated_event"
    ]
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

cyberark_epm.aggregated_event.affected_computers

long

cyberark_epm.aggregated_event.affected_users

long

cyberark_epm.aggregated_event.agent_id

The agent id of the first event, taken from the first event aggregation.

keyword

cyberark_epm.aggregated_event.aggregated_by

The aggregatedBy value of the hash and eventType. Each type has its own aggregation logic.

keyword

cyberark_epm.aggregated_event.app_package_display_name

Microsoft Universal Windows Platform app package display name.

keyword

cyberark_epm.aggregated_event.application_type

The type of application that triggers the event.

keyword

cyberark_epm.aggregated_event.application_type_id

long

cyberark_epm.aggregated_event.arrival_time

The date and time when the event audit was received by the EPM service. This is not the time when the event occurred, but the time when the EPM service received the event audit.

date

cyberark_epm.aggregated_event.authorization_right

The authorization rights that are needed during runtime to run the specified executable on macOS.

keyword

cyberark_epm.aggregated_event.clsid

keyword

cyberark_epm.aggregated_event.deception_type

Deception type of the last event.

long

cyberark_epm.aggregated_event.deception_type_value

keyword

cyberark_epm.aggregated_event.defence_action_id

Defence action ID of the last event.

long

cyberark_epm.aggregated_event.defence_action_value

keyword

cyberark_epm.aggregated_event.exposed_users

long

cyberark_epm.aggregated_event.file_location

Location of the last event.

keyword

cyberark_epm.aggregated_event.file_qualifier

Unique file identifier.

keyword

cyberark_epm.aggregated_event.file_size

The file size.

long

cyberark_epm.aggregated_event.first_event_computer_name

keyword

cyberark_epm.aggregated_event.first_event_date

The first date of the first event in the aggregation.

date

cyberark_epm.aggregated_event.first_event_user_domain

keyword

cyberark_epm.aggregated_event.first_event_user_name

Name of the first user who triggered first event in the aggregation.

keyword

cyberark_epm.aggregated_event.hash

Hash value (SHA1) of the application that triggered the event.

keyword

cyberark_epm.aggregated_event.last_agent_id

Last event in the aggregation agent id.

keyword

cyberark_epm.aggregated_event.last_event_access_target_name

keyword

cyberark_epm.aggregated_event.last_event_access_target_type

Accessed resource type for the most recent detected event.

keyword

cyberark_epm.aggregated_event.last_event_agent_id

keyword

cyberark_epm.aggregated_event.last_event_authorization_rights

keyword

cyberark_epm.aggregated_event.last_event_computer_name

The name of the computer where the most recent event was detected.

keyword

cyberark_epm.aggregated_event.last_event_date

The last time that the event was triggered.

date

cyberark_epm.aggregated_event.last_event_display_name

Display name of the event.

keyword

cyberark_epm.aggregated_event.last_event_exposed_users

A list of the top five users who were exposed in the most recent detected event.

keyword

cyberark_epm.aggregated_event.last_event_exposed_users_count

The number of users who were exposed in the most recent detected event.

long

cyberark_epm.aggregated_event.last_event_file_name

The name of the event file that triggered the most recent detected event. Files with the same hash can have different names.

keyword

cyberark_epm.aggregated_event.last_event_id

Event unique identifier (used to create policies).

keyword

cyberark_epm.aggregated_event.last_event_initiated_process

The name of the process where the most recent event was detected.

keyword

cyberark_epm.aggregated_event.last_event_initiated_process_location

The path of the process where the most recent event was detected.

keyword

cyberark_epm.aggregated_event.last_event_justification

Justification provided by the user in the last event.

keyword

cyberark_epm.aggregated_event.last_event_original_file_name

The original name of the event file that triggered the most recent detected event.

keyword

cyberark_epm.aggregated_event.last_event_package_name

Installation package or executable that created the file which triggered the last event.

keyword

cyberark_epm.aggregated_event.last_event_source_name

Point of origin from where the file that triggered the last event was acquired.

keyword

cyberark_epm.aggregated_event.last_event_source_type

The type of origin from where the file that triggered the last event was acquired.

keyword

cyberark_epm.aggregated_event.last_event_sym_link

A Linux/UNIX link that points to another file or folder.

keyword

cyberark_epm.aggregated_event.last_event_user_domain

keyword

cyberark_epm.aggregated_event.last_event_user_name

User who triggered the last event.

keyword

cyberark_epm.aggregated_event.mime_type

The type of the file. (i.e., application, media, etc.).

keyword

cyberark_epm.aggregated_event.operating_system_type

The endpoint operating system.

keyword

cyberark_epm.aggregated_event.package_name

keyword

cyberark_epm.aggregated_event.policy_name

The name of the policy that triggers the event.

keyword

cyberark_epm.aggregated_event.product_code

The product code of the file that triggered the detected events.

keyword

cyberark_epm.aggregated_event.publisher

Digital signature of the application that triggered the event (if applicable).

keyword

cyberark_epm.aggregated_event.skipped

Indicates whether this is a skipped event.

boolean

cyberark_epm.aggregated_event.skipped_count

The number of skipped events.

long

cyberark_epm.aggregated_event.threat_detection_action

The action performed by EPM when the event occurred - Block or Detect.

keyword

cyberark_epm.aggregated_event.total_events

The number of events that occurred in the given time period (per aggregation).

long

cyberark_epm.aggregated_event.type

Type of event.

keyword

cyberark_epm.aggregated_event.type_id

long

cyberark_epm.aggregated_event.upgrade_code

The upgrade code of the file that triggered the detected events.

keyword

cyberark_epm.aggregated_event.url

The URL of the ActiveX code. This field is only returned when the applicationType is ActiveX.

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

event.dataset

Event dataset.

constant_keyword

event.module

Event module.

constant_keyword

input.type

Type of filebeat input.

keyword

log.offset

Log offset.

long

Policy Audit Aggregated Event
edit

This is the policyaudit_aggregated_event dataset.

Example

An example event for policyaudit_aggregated_event looks as following:

{
    "@timestamp": "2022-12-19T05:51:06.024Z",
    "agent": {
        "ephemeral_id": "4a9c2d55-8e03-42ee-9d25-55164bff9092",
        "id": "f1613af9-3456-4b63-b774-f20eda58a491",
        "name": "elastic-agent-46379",
        "type": "filebeat",
        "version": "8.16.0"
    },
    "cyberark_epm": {
        "policyaudit_aggregated_event": {
            "affected_computers": 1,
            "affected_users": 1,
            "aggregated_by": "C340EFFBAED989E7F8FFC6F7574856CD8ED0D18B,QQQ",
            "application_type": "Executable",
            "arrival_time": "2022-12-19T05:51:06.024Z",
            "authorization_right": "com.apple.AOSNotification.FindMyMac.modify",
            "file_location": "C:\\Program Files (x86)\\Google\\Update\\1.3.36.152\\",
            "file_qualifier": "-5566271857083130002",
            "file_size": 408536,
            "first_event_agent_id": "b074b7d4-664a-40d1-b929-69e89bbd254c",
            "first_event_date": "2022-12-14T21:06:44.756Z",
            "first_event_user_domain": "NT AUTHORITY",
            "first_event_user_name": "SYSTEM",
            "hash": "SHA1##C340EFFBAED989E7F8FFC6F7574856CD8ED0D18B",
            "last_event_access_target_type": "Registry",
            "last_event_agent_id": "b074b7d4-664a-40d1-b929-69e89bbd254c",
            "last_event_date": "2022-12-19T01:04:47.284Z",
            "last_event_display_name": "Google Crash Handler (GoogleCrashHandler64.exe)",
            "last_event_file_name": "GoogleCrashHandler64.exe",
            "last_event_id": "QtvvKIUB8k35oa3KjVf7",
            "last_event_package_name": "Google Update (GoogleUpdate.exe)",
            "last_event_source_name": "Updater (Google Updater)",
            "last_event_source_type": "Updater",
            "last_event_user_domain": "NT AUTHORITY",
            "last_event_user_name": "SYSTEM",
            "operating_system_type": "Windows",
            "policy_id": "11161",
            "policy_name": "QQQ",
            "publisher": "Google LLC",
            "skipped": false,
            "skipped_count": 0,
            "total_events": 8,
            "type": "Launch"
        }
    },
    "data_stream": {
        "dataset": "cyberark_epm.policyaudit_aggregated_event",
        "namespace": "90464",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "f1613af9-3456-4b63-b774-f20eda58a491",
        "snapshot": false,
        "version": "8.16.0"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "process"
        ],
        "dataset": "cyberark_epm.policyaudit_aggregated_event",
        "end": "2022-12-19T01:04:47.284Z",
        "ingested": "2025-01-06T05:26:14Z",
        "kind": "event",
        "original": "{\"CLSID\":\"\",\"adminTaskId\":\"\",\"affectedComputers\":1,\"affectedUsers\":1,\"aggregatedBy\":\"C340EFFBAED989E7F8FFC6F7574856CD8ED0D18B,QQQ\",\"appPackageDisplayName\":\"\",\"applicationType\":\"Executable\",\"arrivalTime\":\"2022-12-19T05:51:06.024Z\",\"authorizationRight\":\"com.apple.AOSNotification.FindMyMac.modify\",\"eventType\":\"Launch\",\"fileLocation\":\"C:\\\\\Program Files (x86)\\\\\Google\\\\\Update\\\\\1.3.36.152\\\\\\",\"fileQualifier\":\"-5566271857083130002\",\"fileSize\":408536,\"firstEventAgentId\":\"b074b7d4-664a-40d1-b929-69e89bbd254c\",\"firstEventDate\":\"2022-12-14T21:06:44.756Z\",\"firstEventUserName\":\"NT AUTHORITY\\\\\SYSTEM\",\"hash\":\"SHA1##C340EFFBAED989E7F8FFC6F7574856CD8ED0D18B\",\"lastEventAccessTarget\":null,\"lastEventAccessTargetType\":\"Registry\",\"lastEventAgentId\":\"b074b7d4-664a-40d1-b929-69e89bbd254c\",\"lastEventDate\":\"2022-12-19T01:04:47.284Z\",\"lastEventDisplayName\":\"Google Crash Handler (GoogleCrashHandler64.exe)\",\"lastEventFileName\":\"GoogleCrashHandler64.exe\",\"lastEventId\":\"QtvvKIUB8k35oa3KjVf7\",\"lastEventJustification\":\"\",\"lastEventPackageName\":\"Google Update (GoogleUpdate.exe)\",\"lastEventSourceName\":\"Updater (Google Updater)\",\"lastEventSourceType\":\"Updater\",\"lastEventSymlink\":\"\",\"lastEventUserName\":\"NT AUTHORITY\\\\\SYSTEM\",\"mimeType\":\"\",\"operatingSystemType\":\"Windows\",\"policyAction\":null,\"policyId\":11161,\"policyName\":\"QQQ\",\"productCode\":null,\"publisher\":\"Google LLC\",\"skipped\":false,\"skippedCount\":0,\"totalEvents\":8,\"upgradeCode\":null,\"url\":\"\"}",
        "start": "2022-12-14T21:06:44.756Z",
        "type": [
            "info"
        ]
    },
    "file": {
        "directory": "C:\\Program Files (x86)\\Google\\Update\\1.3.36.152\\",
        "hash": {
            "sha1": "C340EFFBAED989E7F8FFC6F7574856CD8ED0D18B"
        },
        "name": "GoogleCrashHandler64.exe",
        "size": 408536
    },
    "host": {
        "os": {
            "type": "windows"
        }
    },
    "input": {
        "type": "cel"
    },
    "observer": {
        "product": "Endpoint Privilege Manager",
        "vendor": "CyberArk"
    },
    "package": {
        "checksum": "C340EFFBAED989E7F8FFC6F7574856CD8ED0D18B",
        "name": "Google Update (GoogleUpdate.exe)",
        "size": 408536
    },
    "related": {
        "hash": [
            "C340EFFBAED989E7F8FFC6F7574856CD8ED0D18B"
        ],
        "user": [
            "SYSTEM"
        ]
    },
    "rule": {
        "id": "11161",
        "name": "QQQ"
    },
    "tags": [
        "preserve_original_event",
        "preserve_duplicate_custom_fields",
        "forwarded",
        "cyberark_epm-policyaudit_aggregated_event"
    ]
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

cyberark_epm.policyaudit_aggregated_event.admin_task_id

Id of an application that needs administrator permission to run, from the last policy audit event.

keyword

cyberark_epm.policyaudit_aggregated_event.affected_computers

Count of affected computers in the event.

long

cyberark_epm.policyaudit_aggregated_event.affected_users

Count of affected users in the event.

long

cyberark_epm.policyaudit_aggregated_event.aggregated_by

The aggregatedBy value of the last policy audit event.

keyword

cyberark_epm.policyaudit_aggregated_event.app_package_display_name

Name of the Microsoft Windows internal app in the last policy audit event.

keyword

cyberark_epm.policyaudit_aggregated_event.application_type

The type of application that triggered the event.

keyword

cyberark_epm.policyaudit_aggregated_event.arrival_time

The date and time when the event audit was received by the EPM service.

date

cyberark_epm.policyaudit_aggregated_event.authorization_right

The authorization rights that are needed during runtime to run the specified executable on macOS.

keyword

cyberark_epm.policyaudit_aggregated_event.clsid

clsid of last policy audit event.

keyword

cyberark_epm.policyaudit_aggregated_event.file_location

Location of the file of the last policy audit event.

keyword

cyberark_epm.policyaudit_aggregated_event.file_qualifier

Unique file identifier.

keyword

cyberark_epm.policyaudit_aggregated_event.file_size

The file size of the last policy audit event.

long

cyberark_epm.policyaudit_aggregated_event.first_event_agent_id

The agentId specified in the first policy audit event.

keyword

cyberark_epm.policyaudit_aggregated_event.first_event_date

The first time that the event was triggered.

date

cyberark_epm.policyaudit_aggregated_event.first_event_user_domain

keyword

cyberark_epm.policyaudit_aggregated_event.first_event_user_name

Name of the first user who triggered the event.

keyword

cyberark_epm.policyaudit_aggregated_event.hash

Hash value (SHA1) of the application that triggered the event.

keyword

cyberark_epm.policyaudit_aggregated_event.interpreter

keyword

cyberark_epm.policyaudit_aggregated_event.last_event_access_target

keyword

cyberark_epm.policyaudit_aggregated_event.last_event_access_target_type

Accessed resource type for the most recent event that was detected.

keyword

cyberark_epm.policyaudit_aggregated_event.last_event_agent_id

The agentId specified in the last policy audit event.

keyword

cyberark_epm.policyaudit_aggregated_event.last_event_authorization_rights

keyword

cyberark_epm.policyaudit_aggregated_event.last_event_computer_name

The name of the computer where the most recent event was detected.

keyword

cyberark_epm.policyaudit_aggregated_event.last_event_date

The last time that the event was triggered.

date

cyberark_epm.policyaudit_aggregated_event.last_event_display_name

Display name of the event.

keyword

cyberark_epm.policyaudit_aggregated_event.last_event_file_name

The name of the event file that triggered the event (files with the same hash can have different names).

keyword

cyberark_epm.policyaudit_aggregated_event.last_event_id

Event unique identifier (used to create policies).

keyword

cyberark_epm.policyaudit_aggregated_event.last_event_justification

Justification provided by the user in the last event.

keyword

cyberark_epm.policyaudit_aggregated_event.last_event_package_name

keyword

cyberark_epm.policyaudit_aggregated_event.last_event_source_name

Point of origin from where the file that triggered the last event was acquired.

keyword

cyberark_epm.policyaudit_aggregated_event.last_event_source_type

The type of origin from where the file that triggered the last event was acquired.

keyword

cyberark_epm.policyaudit_aggregated_event.last_event_symlink

A Linux/UNIX link that points to another file or folder.

keyword

cyberark_epm.policyaudit_aggregated_event.last_event_user_domain

keyword

cyberark_epm.policyaudit_aggregated_event.last_event_user_name

User who triggered the event.

keyword

cyberark_epm.policyaudit_aggregated_event.mime_type

The type of the file (i.e., application, media etc.) of the last policy audit event.

keyword

cyberark_epm.policyaudit_aggregated_event.operating_system_type

The endpoint operating system.

keyword

cyberark_epm.policyaudit_aggregated_event.parent_process

keyword

cyberark_epm.policyaudit_aggregated_event.policy_action

The policy action that triggered the last event.

keyword

cyberark_epm.policyaudit_aggregated_event.policy_id

The ID of the policy that triggered the event.

keyword

cyberark_epm.policyaudit_aggregated_event.policy_name

The name of the policy that triggered the event.

keyword

cyberark_epm.policyaudit_aggregated_event.product_code

The product code of the file that triggered the most recent event.

keyword

cyberark_epm.policyaudit_aggregated_event.product_version

The product version of the file that triggered the most recent event.

keyword

cyberark_epm.policyaudit_aggregated_event.publisher

Digital signature of the application that triggered the event (if applicable).

keyword

cyberark_epm.policyaudit_aggregated_event.skipped

boolean

cyberark_epm.policyaudit_aggregated_event.skipped_count

The number of skipped events.

long

cyberark_epm.policyaudit_aggregated_event.total_events

The number of events that occurred in the given time period (per aggregation).

long

cyberark_epm.policyaudit_aggregated_event.type

Type of event.

keyword

cyberark_epm.policyaudit_aggregated_event.upgrade_code

The upgrade code of the file that triggered the most recent event.

keyword

cyberark_epm.policyaudit_aggregated_event.url

The URL of the last policy audit event.

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

event.dataset

Event dataset.

constant_keyword

event.module

Event module.

constant_keyword

input.type

Type of filebeat input.

keyword

log.offset

Log offset.

long

Admin Audit
edit

This is the admin_audit dataset.

Example

An example event for admin_audit looks as following:

{
    "@timestamp": "2024-11-25T05:37:28.373Z",
    "agent": {
        "ephemeral_id": "31a04b1e-c4a5-4d72-9a1d-1c5aea2eaa42",
        "id": "a15af379-3ffb-49ce-b759-f12c44c6a9e0",
        "name": "elastic-agent-82404",
        "type": "filebeat",
        "version": "8.16.0"
    },
    "cyberark_epm": {
        "admin_audit": {
            "administrator": "bob@example.com",
            "description": "Enter Set Elastic/test",
            "event_time": "2024-11-25T05:37:28.373Z",
            "feature": "Sets",
            "internal_session_id": "876",
            "logged_at": "2024-11-25T05:25:13.167Z",
            "logged_from": "175.16.199.1",
            "permission_description": "None",
            "role": "SetAdmin",
            "set_name": "Elastic/test"
        }
    },
    "data_stream": {
        "dataset": "cyberark_epm.admin_audit",
        "namespace": "66939",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "a15af379-3ffb-49ce-b759-f12c44c6a9e0",
        "snapshot": false,
        "version": "8.16.0"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "iam"
        ],
        "dataset": "cyberark_epm.admin_audit",
        "ingested": "2025-01-06T05:24:02Z",
        "kind": "event",
        "original": "{\"Administrator\":\"bob@example.com\",\"Description\":\"Enter Set Elastic/test\",\"EventTime\":\"2024-11-25T05:37:28.373Z\",\"Feature\":\"Sets\",\"InternalSessionId\":876,\"LoggedAt\":\"2024-11-25T05:25:13.167Z\",\"LoggedFrom\":\"175.16.199.1\",\"PermissionDescription\":\"None\",\"Role\":\"SetAdmin\",\"SetName\":\"Elastic/test\"}",
        "type": [
            "admin"
        ]
    },
    "input": {
        "type": "cel"
    },
    "message": "Enter Set Elastic/test",
    "observer": {
        "product": "Endpoint Privilege Manager",
        "vendor": "CyberArk"
    },
    "related": {
        "ip": [
            "175.16.199.1"
        ],
        "user": [
            "bob@example.com"
        ]
    },
    "source": {
        "geo": {
            "city_name": "Changchun",
            "continent_name": "Asia",
            "country_iso_code": "CN",
            "country_name": "China",
            "location": {
                "lat": 43.88,
                "lon": 125.3228
            },
            "region_iso_code": "CN-22",
            "region_name": "Jilin Sheng"
        },
        "ip": "175.16.199.1"
    },
    "tags": [
        "preserve_original_event",
        "preserve_duplicate_custom_fields",
        "forwarded",
        "cyberark_epm-admin_audit"
    ],
    "user": {
        "email": "bob@example.com",
        "name": "bob@example.com",
        "roles": [
            "SetAdmin"
        ]
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

cyberark_epm.admin_audit.administrator

The administrator’s user name.

keyword

cyberark_epm.admin_audit.description

The activity carried out by the administrator.

keyword

cyberark_epm.admin_audit.event_time

The audit time.

date

cyberark_epm.admin_audit.feature

The activity grouping.

keyword

cyberark_epm.admin_audit.internal_session_id

The administrator login session id that is used for grouping activities in the session.

keyword

cyberark_epm.admin_audit.logged_at

The time when the administrator logged on.

date

cyberark_epm.admin_audit.logged_from

The IP address of the machine where the request was initiated.

ip

cyberark_epm.admin_audit.permission_description

The permission needed by the admin in order to perform the activity.

keyword

cyberark_epm.admin_audit.role

The role assigned to the administrator in this Set.

keyword

cyberark_epm.admin_audit.set_name

Set Name.

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

event.dataset

Event dataset.

constant_keyword

event.module

Event module.

constant_keyword

input.type

Type of filebeat input.

keyword

log.offset

Log offset.

long

Changelog

edit
Changelog
Version Details Kibana version(s)

0.1.0

Enhancement (View pull request)
Initial release.