Mimecast Integration

edit

Mimecast Integration

edit

Version

2.4.1 (View all)

Compatible Kibana version(s)

8.15.0 or higher

Supported Serverless project types
What’s this?

Security
Observability

Subscription level
What’s this?

Basic

Level of support
What’s this?

Partner

The Mimecast integration collects events from the Mimecast API.

Configuration

edit

v1 API Endpoints

edit

Authorization parameters for the Mimecast API (Application Key, Application ID, Access Key, and Secret Key) should be provided by a Mimecast representative for this integration. Under Advanced options you can set the time interval between two API requests as well as the API URL. A Mimecast representative should also be able to give you this information in case you need to change the defaults.

Rate limit quotas may require you to set up different credentials for the different available log types.

v2 API Endpoints

edit

Authorization parameters for the Mimecast API (Client ID and Client Key) should be provided by a Mimecast representative for this integration. Under Advanced options you can set the time interval between two API requests as well as the API URL. A Mimecast representative should also be able to give you this information in case you need to change the defaults.

Rate limit quotas may require you to set up different credentials for the different available log types.

Logs

edit

Archive Search Logs

edit

This is the mimecast.archive_search_logs dataset. These logs contain Mimecast archive search logs with the following details: search source, description and detailed information about the search performed. More information about these logs is available here.

Example

An example event for archive_search looks as following:

{
    "@timestamp": "2024-11-12T16:21:27.000Z",
    "agent": {
        "ephemeral_id": "d3b97519-7fb6-43c4-8b77-64243fb1a1a3",
        "id": "c25a1c6b-6203-415b-8548-b4a1b5c845e0",
        "name": "elastic-agent-14690",
        "type": "filebeat",
        "version": "8.14.0"
    },
    "data_stream": {
        "dataset": "mimecast.archive_search_logs",
        "namespace": "34146",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "c25a1c6b-6203-415b-8548-b4a1b5c845e0",
        "snapshot": false,
        "version": "8.14.0"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "api"
        ],
        "created": "2024-11-12T16:21:27.000Z",
        "dataset": "mimecast.archive_search_logs",
        "ingested": "2024-12-05T00:48:50Z",
        "kind": "event",
        "original": "{\"createTime\":\"2024-11-12T16:21:27+0000\",\"description\":\"Message Tracking Search\",\"emailAddr\":\"\\u003c\\u003e\",\"searchReason\":\"\",\"searchText\":\"[User : dhamilton@mimecast.local]\",\"source\":\"archive\"}",
        "type": [
            "admin"
        ]
    },
    "input": {
        "type": "cel"
    },
    "mimecast": {
        "search_details": {
            "description": "Message Tracking Search",
            "source": "archive",
            "text": "[User : dhamilton@mimecast.local]"
        }
    },
    "related": {
        "user": [
            "<>"
        ]
    },
    "tags": [
        "preserve_original_event",
        "forwarded",
        "mimecast-archive-search-logs"
    ],
    "user": {
        "email": "<>"
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

cloud.image.id

Image ID for the cloud instance.

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

event.dataset

Event dataset

constant_keyword

event.module

Event module

constant_keyword

host.containerized

If the host is a container.

boolean

host.os.build

OS build information.

keyword

host.os.codename

OS codename, if any.

keyword

input.type

Input type

keyword

log.offset

Log offset

long

mimecast.email.address

The email address of the user who performed the search.

keyword

mimecast.search_details.description

The description of the search if any.

keyword

mimecast.search_details.path

The search path if any.

keyword

mimecast.search_details.reason

The search reason entered when the search was executed if any.

keyword

mimecast.search_details.source

The search source context

keyword

mimecast.search_details.text

The text used in the search.

keyword

Audit Events

edit

This is the mimecast.audit_events dataset. These logs contain Mimecast audit events with the following details: audit type, event category and detailed information about the event. More information about these logs.

Example

An example event for audit_events looks as following:

{
    "@timestamp": "2024-10-17T02:06:50.000Z",
    "agent": {
        "ephemeral_id": "d3d233d7-62b7-40f6-8de7-d3c2937d6dae",
        "id": "b6346117-4ee0-428a-9d74-6580e405feeb",
        "name": "elastic-agent-20780",
        "type": "filebeat",
        "version": "8.14.0"
    },
    "client": {
        "ip": "203.59.201.168"
    },
    "data_stream": {
        "dataset": "mimecast.audit_events",
        "namespace": "54489",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "b6346117-4ee0-428a-9d74-6580e405feeb",
        "snapshot": false,
        "version": "8.14.0"
    },
    "event": {
        "action": "api-application-updated",
        "agent_id_status": "verified",
        "category": [
            "email"
        ],
        "created": "2024-10-17T02:06:50.000Z",
        "dataset": "mimecast.audit_events",
        "id": "eNoVzk0PgiAAgOH_wrUO4SizrYOasxUzs6jWLYURfqEg6Wr99-z-bs_7AZplRjFBwQp4E3y5t3G7w1SVz9KxwxtJj7mVNripeP7WV3N2-3AohNUFGw0DmMY2aqOeq7MZfCKqyME1jeUMv_qAdVub6MJdnprZIYz2PS3u-bNuB54kfA2m4GGo6ErJ_zZCi4UD51OQGd3JiqlMUjYu-eTkIdey0di_mNJC1mAFvz-isz1f",
        "ingested": "2024-12-05T00:52:32Z",
        "original": "{\"auditType\":\"API Application Updated\",\"category\":\"account_logs\",\"eventInfo\":\"API Gateway Application testing Updated. Application Program Interface Addendum (22 September 2022) acknowledged, Date: 2024-10-17, Time: 02:06:50+0000, IP: 203.59.201.168, Application: Administration Console\",\"eventTime\":\"2024-10-17T02:06:50+0000\",\"id\":\"eNoVzk0PgiAAgOH_wrUO4SizrYOasxUzs6jWLYURfqEg6Wr99-z-bs_7AZplRjFBwQp4E3y5t3G7w1SVz9KxwxtJj7mVNripeP7WV3N2-3AohNUFGw0DmMY2aqOeq7MZfCKqyME1jeUMv_qAdVub6MJdnprZIYz2PS3u-bNuB54kfA2m4GGo6ErJ_zZCi4UD51OQGd3JiqlMUjYu-eTkIdey0di_mNJC1mAFvz-isz1f\",\"user\":\"user.name@company.mime-api.com\"}"
    },
    "input": {
        "type": "cel"
    },
    "mimecast": {
        "application": "Administration Console",
        "category": "account_logs",
        "eventInfo": "API Gateway Application testing Updated. Application Program Interface Addendum (22 September 2022) acknowledged, Date: 2024-10-17, Time: 02:06:50+0000, IP: 203.59.201.168, Application: Administration Console"
    },
    "related": {
        "ip": [
            "203.59.201.168"
        ],
        "user": [
            "user.name",
            "user.name@company.mime-api.com"
        ]
    },
    "tags": [
        "preserve_original_event",
        "forwarded",
        "mimecast-audit-events"
    ],
    "user": {
        "domain": "company.mime-api.com",
        "email": "user.name@company.mime-api.com",
        "name": "user.name"
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

cloud.image.id

Image ID for the cloud instance.

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

event.dataset

Event dataset

constant_keyword

event.module

Event module

constant_keyword

host.containerized

If the host is a container.

boolean

host.os.build

OS build information.

keyword

host.os.codename

OS codename, if any.

keyword

input.type

Input type

keyword

log.offset

Log offset

long

mimecast.2FA

Info about two-factor authentication.

keyword

mimecast.application

The Mimecast unique id of the event.

keyword

mimecast.category

The category of the event.

keyword

mimecast.email.address

Email address from event info.

keyword

mimecast.email.metadata

The email meta data from audit info.

keyword

mimecast.eventInfo

The detailed event information.

keyword

mimecast.method

Method which triggers audit events.

keyword

mimecast.remote

Info about remote IP trying to access the API.

keyword

mimecast.remote_ip

Remote IP.

ip

mimecast.timezone

Timezone reported in the event message.

keyword

Cloud Integrated Logs

edit

This is the mimecast.cloud_integrated_logs dataset. These logs contain Mimecast threats and security events with the following details: entities, mail flows and URL protected events. More information about these logs.

Example

An example event for cloud_integrated looks as following:

{
    "@timestamp": "2024-11-21T18:03:26.960Z",
    "agent": {
        "ephemeral_id": "d0571978-95ee-4d4e-9fc1-2c0b57f47a64",
        "id": "27a1a18b-9cc1-424a-8573-425423e11318",
        "name": "elastic-agent-77334",
        "type": "filebeat",
        "version": "8.15.0"
    },
    "data_stream": {
        "dataset": "mimecast.cloud_integrated_logs",
        "namespace": "67059",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "27a1a18b-9cc1-424a-8573-425423e11318",
        "snapshot": false,
        "version": "8.15.0"
    },
    "email": {
        "message_id": "<2ae37333-38e7-89ff-dc36-c8d48c6e3df3@demovation-ci.b41.one>"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "email"
        ],
        "created": "2024-11-21T18:03:26.960Z",
        "dataset": "mimecast.cloud_integrated_logs",
        "ingested": "2024-12-09T23:17:44Z",
        "original": "{\"_offset\":1803841,\"_partition\":53,\"accountId\":\"AUS2474\",\"aggregateId\":\"4XvR1B4m7BzFB8L-qk59b4szrgayciaagczc977rzb_1732212206\",\"authResults\":[{\"aligned\":true,\"result\":\"pass\",\"type\":\"SPF\"},{\"aligned\":false,\"result\":\"none\",\"type\":\"DKIM\"},{\"aligned\":null,\"result\":\"pass\",\"type\":\"DMARC\"}],\"messageId\":\"\\u003c2ae37333-38e7-89ff-dc36-c8d48c6e3df3@demovation-ci.b41.one\\u003e\",\"processingId\":\"c40337e6860db0301575d8d09362bff214c0b010d6c4d41da9d770759ff54d10_1732212206\",\"subtype\":null,\"timestamp\":1732212206960,\"type\":\"mailflow\"}"
    },
    "input": {
        "type": "cel"
    },
    "mimecast": {
        "accountId": "AUS2474",
        "aggregateId": "4XvR1B4m7BzFB8L-qk59b4szrgayciaagczc977rzb_1732212206",
        "authResults": [
            {
                "aligned": true,
                "result": "pass",
                "type": "SPF"
            },
            {
                "aligned": false,
                "result": "none",
                "type": "DKIM"
            },
            {
                "result": "pass",
                "type": "DMARC"
            }
        ],
        "log_type": "mailflow",
        "processingId": "c40337e6860db0301575d8d09362bff214c0b010d6c4d41da9d770759ff54d10_1732212206"
    },
    "tags": [
        "preserve_original_event",
        "forwarded",
        "mimecast-cloud-integrated-logs"
    ]
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

cloud.image.id

Image ID for the cloud instance.

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

event.dataset

Event dataset

constant_keyword

event.module

Event module

constant_keyword

host.containerized

If the host is a container.

boolean

host.os.build

OS build information.

keyword

host.os.codename

OS codename, if any.

keyword

input.type

Input type

keyword

log.offset

Log offset

long

mimecast.accountId

The Mimecast account code for your account.

keyword

mimecast.action

The action taken for this message.

keyword

mimecast.aggregateId

Unique identifier that allows you to correlate/group related events.

keyword

mimecast.attachments

The filenames of all attachments on the emai.

keyword

mimecast.authResults.aligned

boolean

mimecast.authResults.result

keyword

mimecast.authResults.type

keyword

mimecast.direction

The direction of the email based on the sending and receiving domains.

keyword

mimecast.historicalMail

Identifies whether the scan was from historical email (prior to Mimecast).

boolean

mimecast.log_type

keyword

mimecast.messageId

The internet message id of the email.

keyword

mimecast.originalUrl

The original URL Clicked.

keyword

mimecast.policiesApplied.action

keyword

mimecast.policiesApplied.mode

keyword

mimecast.policiesApplied.name

keyword

mimecast.processingId

Unique identifier that allows you to correlate/group related events.

keyword

mimecast.recipients

The recipient of the email.

keyword

mimecast.redirectUrl

The redirect URL, following original URL click.

keyword

mimecast.senderEnvelope

The sender of the email.

keyword

mimecast.senderHeader

The sender address found in the from header of the email.

keyword

mimecast.senderIp

The source IP of the sending mail server.

keyword

mimecast.source

keyword

mimecast.sourceIp

The source IP of the original message.

keyword

mimecast.subject

The subject of the email, limited to 150 characters.

keyword

mimecast.subtype

keyword

mimecast.tags

The determination if the email was untrustworthy.

keyword

mimecast.threatState

The action taken.

keyword

mimecast.threatType

The type of threat identified where applicable. no detections= allowed.

keyword

mimecast.timestamp

The date and time of event.

keyword

DLP Logs

edit

This is the mimecast.dlp_logs dataset. These logs contain information about messages that triggered a DLP or Content Examination policy. More information about these logs.

Example

An example event for dlp looks as following:

{
    "@timestamp": "2024-11-17T19:47:39.000Z",
    "agent": {
        "ephemeral_id": "6a8bd8fb-21cf-4c1e-a294-35bddf3ebeba",
        "id": "890bb494-8ddc-489b-8bfe-48aea81e2d36",
        "name": "elastic-agent-24674",
        "type": "filebeat",
        "version": "8.14.0"
    },
    "data_stream": {
        "dataset": "mimecast.dlp_logs",
        "namespace": "14088",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "890bb494-8ddc-489b-8bfe-48aea81e2d36",
        "snapshot": false,
        "version": "8.14.0"
    },
    "email": {
        "direction": "inbound",
        "from": {
            "address": [
                "webmaster@empirepartners.b41.one"
            ]
        },
        "message_id": "<ae9f2f0678ed116f-152138@hapi.b41.one>",
        "subject": "New CERA.com Coming Soon! - CERA Alert",
        "to": {
            "address": [
                "vkamins@demo-int.elastic.mime-api.com"
            ]
        }
    },
    "event": {
        "action": "hold",
        "agent_id_status": "verified",
        "category": [
            "email"
        ],
        "created": "2024-11-17T19:47:39+0000",
        "dataset": "mimecast.dlp_logs",
        "ingested": "2024-12-05T00:57:34Z",
        "original": "{\"action\":\"hold\",\"eventTime\":\"2024-11-17T19:47:39+0000\",\"messageId\":\"\\u003cae9f2f0678ed116f-152138@hapi.b41.one\\u003e\",\"policy\":\"Confidential\",\"recipientAddress\":\"vkamins@demo-int.elastic.mime-api.com\",\"route\":\"inbound\",\"senderAddress\":\"webmaster@empirepartners.b41.one\",\"subject\":\"New CERA.com Coming Soon! - CERA Alert\"}"
    },
    "input": {
        "type": "cel"
    },
    "rule": {
        "name": "Confidential"
    },
    "tags": [
        "preserve_original_event",
        "forwarded",
        "mimecast-dlp-logs"
    ]
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

cloud.image.id

Image ID for the cloud instance.

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

event.dataset

Event dataset

constant_keyword

event.module

Event module

constant_keyword

host.containerized

If the host is a container.

boolean

host.os.build

OS build information.

keyword

host.os.codename

OS codename, if any.

keyword

input.type

Input type

keyword

log.offset

Log offset

long

Message Release Logs

edit

This is the mimecast.message_release_logs dataset. These logs contain information about messages that were either released to the recipient, with details about the user that processed the release. More information about these logs.

Example

An example event for message_release looks as following:

{
    "@timestamp": "2024-10-28T14:16:51.000Z",
    "agent": {
        "ephemeral_id": "7afd67cc-d1eb-44e6-9ae3-d6cdd6a2930a",
        "id": "019f79cd-9e55-4eaf-863d-78181137d95d",
        "name": "elastic-agent-60936",
        "type": "filebeat",
        "version": "8.14.0"
    },
    "data_stream": {
        "dataset": "mimecast.message_release_logs",
        "namespace": "39938",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "019f79cd-9e55-4eaf-863d-78181137d95d",
        "snapshot": false,
        "version": "8.14.0"
    },
    "email": {
        "direction": "inbound",
        "from": {
            "address": [
                "yahoo-delivers@evaluation-fuzz.b41.one"
            ]
        },
        "local_id": "eNoNjt0KgjAYQN9ltwlNMVZBF...",
        "subject": "Yahoo! Newsletter, November 2001",
        "to": {
            "address": [
                "monika.causholli@demo-int.elastic.mime-api.com"
            ]
        }
    },
    "event": {
        "action": "rejected",
        "agent_id_status": "verified",
        "dataset": "mimecast.message_release_logs",
        "id": "eNoNjt0KgjAYQN9ltwlNMVZBF...",
        "ingested": "2024-11-21T02:12:00Z",
        "kind": "event",
        "original": "{\"attachments\":true,\"detectionLevel\":\"relaxed\",\"fromEnv\":{\"emailAddress\":\"yahoo-delivers@evaluation-fuzz.b41.one\"},\"fromHdr\":{\"emailAddress\":\"yahoo-delivers@evaluation-fuzz.b41.one\"},\"heldReason\":\"Default Spam Scanning Definition\",\"id\":\"eNoNjt0KgjAYQN9ltwlNMVZBF...\",\"messageInfo\":\"Graymail\",\"operator\":{\"emailAddress\":\"monika.causholli@demo-int.elastic.mime-api.com\"},\"policy\":\"Default Spam Scanning Definition\",\"rejectReason\":\"Message goes against email policies\",\"released\":\"2024-10-28T14:16:51+0000\",\"route\":\"inbound\",\"size\":3670056,\"spamProcessingDetail\":{\"dkim\":{\"allow\":true,\"info\":\"unknown\"},\"dmarc\":{\"allow\":true,\"info\":\"allow\"},\"greyEmail\":false,\"managedSender\":{\"allow\":true,\"info\":\"unknown\"},\"permittedSender\":{\"allow\":true,\"info\":\"none\"},\"rbl\":{\"allow\":true,\"info\":\"\"},\"spf\":{\"allow\":true,\"info\":\"allow\"},\"verdict\":{\"categories\":[{\"name\":\"spam\",\"risk\":\"high\",\"subcategories\":[{\"augmentations\":[],\"name\":\"technology_feed\",\"risk\":\"high\"},{\"augmentations\":[{\"name\":\"body\",\"risk\":\"negligible\"}],\"name\":\"content\",\"risk\":\"negligible\"}]},{\"name\":\"graymail\",\"risk\":\"negligible\",\"subcategories\":[]}],\"decision\":\"spam\",\"description\":\"\",\"risk\":\"high\"}},\"spamScore\":20,\"status\":\"rejected\",\"subject\":\"Yahoo! Newsletter, November 2001\",\"to\":[{\"emailAddress\":\"monika.causholli@demo-int.elastic.mime-api.com\"}]}",
        "reason": "Message goes against email policies",
        "risk_score": 20,
        "type": [
            "info"
        ]
    },
    "input": {
        "type": "cel"
    },
    "mimecast": {
        "message_release_logs": {
            "attachments": true,
            "detectionLevel": "relaxed",
            "fromEnv": {
                "emailAddress": "yahoo-delivers@evaluation-fuzz.b41.one"
            },
            "fromHdr": {
                "emailAddress": "yahoo-delivers@evaluation-fuzz.b41.one"
            },
            "heldReason": "Default Spam Scanning Definition",
            "id": "eNoNjt0KgjAYQN9ltwlNMVZBF...",
            "messageInfo": "Graymail",
            "operator": "monika.causholli@demo-int.elastic.mime-api.com",
            "policy": "Default Spam Scanning Definition",
            "rejectReason": "Message goes against email policies",
            "released": "2024-10-28T14:16:51+0000",
            "route": "inbound",
            "size": 3670056,
            "spamProcessingDetail": {
                "dkim": {
                    "allow": true,
                    "info": "unknown"
                },
                "dmarc": {
                    "allow": true,
                    "info": "allow"
                },
                "greyEmail": false,
                "managedSender": {
                    "allow": true,
                    "info": "unknown"
                },
                "permittedSender": {
                    "allow": true,
                    "info": "none"
                },
                "rbl": {
                    "allow": true
                },
                "spamVerdict": {
                    "categories": [
                        {
                            "name": "spam",
                            "risk": "high",
                            "subcategories": [
                                {
                                    "name": "technology_feed",
                                    "risk": "high"
                                },
                                {
                                    "augmentations": [
                                        {
                                            "name": "body",
                                            "risk": "negligible"
                                        }
                                    ],
                                    "name": "content",
                                    "risk": "negligible"
                                }
                            ]
                        },
                        {
                            "name": "graymail",
                            "risk": "negligible"
                        }
                    ],
                    "decision": "spam",
                    "risk": "high"
                },
                "spf": {
                    "allow": true,
                    "info": "allow"
                }
            },
            "spamScore": 20,
            "status": "rejected",
            "subject": "Yahoo! Newsletter, November 2001",
            "to": [
                {
                    "emailAddress": "monika.causholli@demo-int.elastic.mime-api.com"
                }
            ]
        }
    },
    "related": {
        "hosts": [
            "demo-int.elastic.mime-api.com",
            "evaluation-fuzz.b41.one"
        ],
        "user": [
            "monika.causholli",
            "monika.causholli@demo-int.elastic.mime-api.com",
            "yahoo-delivers",
            "yahoo-delivers@evaluation-fuzz.b41.one"
        ]
    },
    "tags": [
        "preserve_original_event",
        "forwarded",
        "mimecast-message-release-logs"
    ],
    "user": {
        "email": [
            "monika.causholli@demo-int.elastic.mime-api.com"
        ]
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

cloud.image.id

Image ID for the cloud instance.

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

event.dataset

Event dataset

constant_keyword

event.module

Event module

constant_keyword

host.containerized

If the host is a container.

boolean

host.os.build

OS build information.

keyword

host.os.codename

OS codename, if any.

keyword

input.type

Input type

keyword

log.offset

Log offset

long

mimecast.message_release_logs.attachments

Indicates whether the message contains attachments.

boolean

mimecast.message_release_logs.detectionLevel

Spam detection level, if held by a spam policy. Possible values are: relaxed, moderate, aggressive, cluster or whitelisted_cluster.

keyword

mimecast.message_release_logs.fromEnv.displayableName

Display name of the user address from the "from" envelope. If none exists, this field will be empty.

keyword

mimecast.message_release_logs.fromEnv.emailAddress

The routable email address of the user from the "from" envelope.

keyword

mimecast.message_release_logs.fromHdr.displayableName

Display name of the user address from the "from" header. If none exists, this field will be empty.

keyword

mimecast.message_release_logs.fromHdr.emailAddress

The routable email address of the user from the "from" header.

keyword

mimecast.message_release_logs.heldGroup

The recipient group of the held message, if message was sent to a group.

keyword

mimecast.message_release_logs.heldReason

Detail around the reason the message was initially held. If held by a specific policy definition, this will be the name of the policy definition that triggered the message to be held.

keyword

mimecast.message_release_logs.id

The Mimecast secure ID of the specific message release log.

keyword

mimecast.message_release_logs.messageInfo

Additional information around the release reason.

text

mimecast.message_release_logs.operator

Email address of the user that released the message.

keyword

mimecast.message_release_logs.policy

Name of the policy definition that triggered the message to be held.

keyword

mimecast.message_release_logs.rejectReason

Detail on the reason a message was rejected, if message was rejected.

keyword

mimecast.message_release_logs.released

Timestamp of the message release action in ISO 8601 format.

keyword

mimecast.message_release_logs.route

Message direction. Possible values are: inbound or outbound.

keyword

mimecast.message_release_logs.size

Total size of the message, in bytes.

long

mimecast.message_release_logs.spamProcessingDetail.dkim.allow

Indicates checks for whether the message passed DKIM checks are performed.

boolean

mimecast.message_release_logs.spamProcessingDetail.dkim.info

Details about the check result.

keyword

mimecast.message_release_logs.spamProcessingDetail.dmarc.allow

Indicates checks for whether the message passed DMARC checks are performed.

boolean

mimecast.message_release_logs.spamProcessingDetail.dmarc.info

Details about the check result.

keyword

mimecast.message_release_logs.spamProcessingDetail.grayEmail

Indicates with the spam was classified as graymail or bulk. Note that this API uses graymail and greymail interchangeably.

boolean

mimecast.message_release_logs.spamProcessingDetail.greyEmail

Indicates with the spam was classified as graymail or bulk. Note that this API uses graymail and greymail interchangeably.

boolean

mimecast.message_release_logs.spamProcessingDetail.managedSender.allow

Indicates checks for whether the sender has been permitted by a Managed Sender entry are performed.

boolean

mimecast.message_release_logs.spamProcessingDetail.managedSender.info

Details about the check result.

keyword

mimecast.message_release_logs.spamProcessingDetail.permittedSender.allow

Indicates checks for whether the sender has been permitted by policy are performed.

boolean

mimecast.message_release_logs.spamProcessingDetail.permittedSender.info

Details about the check result.

keyword

mimecast.message_release_logs.spamProcessingDetail.rbl.allow

Indicates checks for whether the message passed RBL checks are performed.

boolean

mimecast.message_release_logs.spamProcessingDetail.rbl.info

Details about the check result.

keyword

mimecast.message_release_logs.spamProcessingDetail.spamVerdict.categories

Spam detection type categories.

flattened

mimecast.message_release_logs.spamProcessingDetail.spamVerdict.decision

Indicating what the ultimate verdict was for the message.

keyword

mimecast.message_release_logs.spamProcessingDetail.spamVerdict.description

Description of the spam verdict decision.

keyword

mimecast.message_release_logs.spamProcessingDetail.spamVerdict.risk

Identified risk level within the spam detection. Possible values are: negligible, low, high.

keyword

mimecast.message_release_logs.spamProcessingDetail.spf.allow

Indicates checks for whether the message passed SPF checks are performed.

boolean

mimecast.message_release_logs.spamProcessingDetail.spf.info

Details about the check result.

keyword

mimecast.message_release_logs.spamScore

The message spam score, based on the applied spam scanning policy definition.

double

mimecast.message_release_logs.status

Status of the message. Possible values are released or rejected.

keyword

mimecast.message_release_logs.subject

The released message’s subject line.

keyword

mimecast.message_release_logs.to.displayableName

Display name of the user address from the "to" header. If none exists, this field will be empty.

keyword

mimecast.message_release_logs.to.emailAddress

The routable email address of the user from the "to" header.

keyword

SIEM Logs

edit

This is the mimecast.siem_logs dataset. These logs contain information about messages that contains MTA (message transfer agent) log – all inbound, outbound, and internal messages. More about these logs.

Example

An example event for siem looks as following:

{
    "@timestamp": "2024-11-12T18:52:07.130Z",
    "agent": {
        "ephemeral_id": "3d21ae78-86cd-4666-84a7-c6309a29e2e5",
        "id": "260b2d28-beb4-4e1e-83aa-9fd450347db8",
        "name": "elastic-agent-64770",
        "type": "filebeat",
        "version": "8.15.0"
    },
    "data_stream": {
        "dataset": "mimecast.siem_logs",
        "namespace": "18433",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "260b2d28-beb4-4e1e-83aa-9fd450347db8",
        "snapshot": false,
        "version": "8.15.0"
    },
    "email": {
        "direction": "outbound",
        "from": {
            "address": [
                "chris.germany@demo-int.elastic.mime-api.com"
            ]
        },
        "message_id": "<23b9843f48f8d349-99325@hapi.b41.one>",
        "subject": "Out of office",
        "to": {
            "address": [
                "dkinney@pacific-concept.b41.one"
            ]
        }
    },
    "event": {
        "action": "Acc",
        "agent_id_status": "verified",
        "category": [
            "email"
        ],
        "created": "2024-11-12T18:52:07.130Z",
        "dataset": "mimecast.siem_logs",
        "ingested": "2024-12-08T21:06:17Z",
        "original": "{\"_offset\":70595,\"_partition\":60,\"accountId\":\"CUSB4A274\",\"action\":\"Acc\",\"aggregateId\":\"q1h3LjgrN46b12GlX0By9Q_1731437523\",\"direction\":\"Outbound\",\"messageId\":\"\\u003c23b9843f48f8d349-99325@hapi.b41.one\\u003e\",\"numberAttachments\":\"0\",\"processingId\":\"X7OQopo8177ryv7KXWXxytbksk3qv0Ct8NSYWcQkhJM_1731437523\",\"receiptErrors\":null,\"recipients\":\"dkinney@pacific-concept.b41.one\",\"rejectionCode\":null,\"rejectionInfo\":null,\"rejectionType\":null,\"senderEnvelope\":\"chris.germany@demo-int.elastic.mime-api.com\",\"senderHeader\":\"chris.germany@demo-int.elastic.mime-api.com\",\"senderIp\":\"54.236.186.184\",\"spamDetectionLevel\":\"28\",\"spamInfo\":\"[]\",\"spamProcessingDetail\":null,\"spamScore\":\"0\",\"subject\":\"Out of office\",\"subtype\":\"Acc\",\"timestamp\":1731437527130,\"tlsCipher\":\"TLS_AES_256_GCM_SHA384\",\"tlsVersion\":\"TLSv1.3\",\"type\":\"receipt\",\"virusFound\":null}",
        "outcome": "unknown"
    },
    "input": {
        "type": "cel"
    },
    "mimecast": {
        "accountId": "CUSB4A274",
        "aggregateId": "q1h3LjgrN46b12GlX0By9Q_1731437523",
        "log_type": "receipt",
        "numberAttachments": "0",
        "processingId": "X7OQopo8177ryv7KXWXxytbksk3qv0Ct8NSYWcQkhJM_1731437523",
        "senderHeader": "chris.germany@demo-int.elastic.mime-api.com",
        "spamDetectionLevel": "28",
        "spamInfo": "[]",
        "spamScore": "0",
        "subtype": "Acc",
        "tlsVersion": "TLSv1.3"
    },
    "related": {
        "user": [
            "chris.germany@demo-int.elastic.mime-api.com",
            "dkinney@pacific-concept.b41.one"
        ]
    },
    "source": {
        "ip": "54.236.186.184"
    },
    "tags": [
        "preserve_original_event",
        "forwarded",
        "mimecast-siem-logs"
    ],
    "tls": {
        "cipher": "TLS_AES_256_GCM_SHA384"
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

cloud.image.id

Image ID for the cloud instance.

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

event.dataset

Event dataset

constant_keyword

event.module

Event module

constant_keyword

host.containerized

If the host is a container.

boolean

host.os.build

OS build information.

keyword

host.os.codename

OS codename, if any.

keyword

input.type

Input type

keyword

log.offset

Log offset

long

mimecast.AttCnt

The number of attachments on the email.

long

mimecast.AttNames

The filenames of all attachments on the email.

keyword

mimecast.Attempt

The count of attempts that the Mimecast MTA has made to deliver the email.

long

mimecast.CustomName

The message has matched a custom name.

keyword

mimecast.CustomThreatDictionary

The content of the email was detected to contain words in a custom threat dictionary.

keyword

mimecast.CustomerIP

The source IP is one of the accounts authorised IPs or one of the authorised IPs belonging to an Umbrella Account, if the Account uses an Umbrella Account.

keyword

mimecast.Hits

Number of items flagged for the message.

keyword

mimecast.Hostname

keyword

mimecast.IPInternalName

For emails subject to Targeted Threat Protection - Impersonation Protect, if the email was detected to be from an internal user name.

keyword

mimecast.IPNewDomain

For emails subject to Targeted Threat Protection - Impersonation Protect, if the email was detected to be from a new domain.

keyword

mimecast.IPReplyMismatch

For emails subject to Targeted Threat Protection - Impersonation Protect, if the email was detetced to have a mismatch in the reply to address.

keyword

mimecast.IPSimilarDomain

For emails subject to Targeted Threat Protection - Impersonation Protect, if the email was detetced to be from a similar domain to any domain you have registered as an Internal Domain.

keyword

mimecast.IPThreadDict

For emails subject to Targeted Threat Protection - Impersonation Protect, if the content of the email was detected to contain words in the Mimecast threat dictionary.

keyword

mimecast.InternalName

The email was detected to be from an internal user name.

keyword

mimecast.Latency

The time in milliseconds that the delivery attempt took.

long

mimecast.MimecastIP

The source IP is one of the Mimecast' IPs e.g. Mimecast Personal Portal.

keyword

mimecast.MsgId

The internet message id of the email.

keyword

mimecast.MsgSize

The total size of the email.

long

mimecast.RcptActType

Action after reception.

keyword

mimecast.RcptHdrType

Type of the receipt header.

keyword

mimecast.ReceiptAck

The receipt acknowledgment message received by Mimecast from the receiving mail server.

keyword

mimecast.Recipient

The recipient of the original message.

keyword

mimecast.ReplyMismatch

The reply address does not correspond to the senders address.

keyword

mimecast.Route

Email route.

keyword

mimecast.ScanResultInfo

The reason that the click was blocked.

keyword

mimecast.SenderDomainInternal

The sender domain is a registered internal domain.

keyword

mimecast.SimilarCustomExternalDomain

The senders domain is similar to a custom external domain list.

keyword

mimecast.SimilarInternalDomain

The senders domain is similar to a registered internal domain.

keyword

mimecast.SimilarMimecastExternalDomain

The senders domain is similar to a Mimecast managed list of domains.

keyword

mimecast.Snt

The amount of data in bytes that were delivered.

long

mimecast.SpamInfo

Information from Mimecast Spam scanners for messages found to be Spam.

keyword

mimecast.SpamLimit

The Spam limit defined for the given sender and recipient.

long

mimecast.SpamProcessingDetail

The Spam processing details for DKIM, SPF, DMARC.

flattened

mimecast.SpamScore

The Spam score the email was given.

long

mimecast.Subject

The subject of the email, limited to 150 characters.

keyword

mimecast.TaggedExternal

The message has been tagged as originating from a external source.

keyword

mimecast.TaggedMalicious

The message has been tagged as malicious.

keyword

mimecast.ThreatDictionary

The content of the email was detected to contain words in the Mimecast threat dictionary.

keyword

mimecast.UrlCategory

The category of the URL that was clicked.

keyword

mimecast.Virus

The name of the virus found on the email, if applicable.

keyword

mimecast.acc

The Mimecast account code for your account.

keyword

mimecast.accountId

The Mimecast account code for your account

keyword

mimecast.action

The action taken at the receipt stage. Receipt logs:(Rej; Acc; Ign; Bnc), Process logs:(Acc; Hld; Bnc; Sdbx; Rty), Impersonation Protect logs:(None; Hold), URL Protect logs:(Block).

keyword

mimecast.aggregateId

Unique identifier that allows you to correlate/group related events.

keyword

mimecast.analysis

The senders domain is similar to a custom external domain list.

keyword

mimecast.attachments

The filenames of all attachments on the email

keyword

mimecast.blockReason

The reason click was blocked. (Unknown; File Detected; Clean; Malicious; Suspicious)

keyword

mimecast.credentialTheft

The info about credential theft.

keyword

mimecast.customNameMatch

The message has matched a custom name. True; False

keyword

mimecast.customThreatDictionary

The content of the email was detected to contain words in the client custom threat dictionary. (True; False)

keyword

mimecast.customerIp

The source IP is one of the accounts authorised IPs or one of the authorised IPs belonging to an Umbrella Account, if the Account uses an Umbrella Account.

keyword

mimecast.delivered

* If the email was delivered successfully or not. False; True

keyword

mimecast.delivery

Attempts The count of attempts that the Mimecast MTA has made to deliver the email.

keyword

mimecast.deliveryAttempts

keyword

mimecast.deliveryErrors

Information about any errors that occurred on the delivery attempt.

keyword

mimecast.deliveryTime

The time in milliseconds that the delivery attempt took.

keyword

mimecast.destinationIp

The destination IP address for the delivery attempt.

keyword

mimecast.direction

The direction of the email based on the sending and receiving domains. (Inbound; Outbound; Internal; External)

keyword

mimecast.emailSize

The amount of data in bytes that were delivered.

keyword

mimecast.fileExtension

The file extension.

keyword

mimecast.fileName

The name of file.

keyword

mimecast.holdReason

The reason the email was held for review (quarantined), if applicable. (Spm; Att; RcptLimit; Exp; Imp; Sbx; Oth; Url; Ctnt; Dpp; RBL; (absent))

keyword

mimecast.internalUserName

The email was detected to be from an internal user name. (Hit; No Hit)

keyword

mimecast.ipNewDomain

For emails subject to Targeted Threat Protection: Impersonation Protect, if the email was detected to be from a new domain.

keyword

mimecast.ipReplyMismatch

For emails subject to Targeted Threat Protection: Impersonation Protect, if the email was detetced to have a mismatch in the reply to address.

keyword

mimecast.ipSimilarDomain

For emails subject to Targeted Threat Protection: Impersonation Protect, if the email was detetced to be from a similar domain to any domain you have registered as an Internal Domain.

keyword

mimecast.ipThreatDictionary

For emails subject to Targeted Threat Protection: Impersonation Protect, if the content of the email was detected to contain words in the Mimecast threat dictionary.

keyword

mimecast.ipUserName

For emails subject to Targeted Threat Protection: Impersonation Protect, if the email was detected to be from an internal user name.

keyword

mimecast.itemsDetected

Number of items flagged for the message.

keyword

mimecast.log_type

String to get type of SIEM log.

keyword

mimecast.md5

MD5 Hash.

keyword

mimecast.messageId

The internet message id of the email.

keyword

mimecast.mimecastThreatDictionary

The content of the email was detected to contain words in the Mimecast threat dictionary. (True; False)

keyword

mimecast.monitoredDomainSource

the source of the URL match based on Mimecast’s heuristic scanning techniques

keyword

mimecast.msgid

The internet message id of the email.

keyword

mimecast.newDomain

The email was detected to be from a new domain (True; False)

keyword

mimecast.numberAttachments

The number of attachments on the email.

keyword

mimecast.policyDefinition

The definition of policy triggered.

keyword

mimecast.processingId

Unique identifier that allows you to correlate/group related events.

keyword

mimecast.receiptErrors

Information about any errors that occurred during receipt.

keyword

mimecast.recipients

The recipient of the email.

keyword

mimecast.rejectionCode

The rejection code, for messages rejected by the receiving mail server.

keyword

mimecast.rejectionInfo

The rejection information if the email was rejected at the receipt stage.

keyword

mimecast.rejectionType

The rejection type, for messages rejected by the receiving mail server.

keyword

mimecast.replyMismatch

The reply address does not correspond to the senders address. (True; False)

keyword

mimecast.route

The route of the message. (Inbound; Outbound; Internal; External)

keyword

mimecast.scanResults

The reason that the click was blocked.

keyword

mimecast.senderDomain

The sender domain.

keyword

mimecast.senderDomainInternal

The sender domain is a registered internal domain.

keyword

mimecast.senderEnvelope

The sender of the email.

keyword

mimecast.senderHeader

Sender address found in the from header of the email.

keyword

mimecast.senderIp

The source IP of the original message or sending mail server.

keyword

mimecast.sha1

SHA1 hash.

keyword

mimecast.sha256

SHA256 hash.

keyword

mimecast.similarCustomExternalDomain

The senders domain is similar to a custom external domain list. (True; False)

keyword

mimecast.similarDomain

The domain is similar to a registered domain.

keyword

mimecast.similarInternalDomain

The senders domain is similar to a registered internal domain. (True; False)

keyword

mimecast.similarMimecastExternalDomain

The senders domain is similar to a Mimecast managed list of domains. (True; False)

keyword

mimecast.similarMimecastExternalDomainResults

Advanced phishing detection results from scanners

keyword

mimecast.sizeAttachment

The size (in bytes) of the malicious file.

keyword

mimecast.sourceIp

The source IP of the original message.

keyword

mimecast.spamDetectionLevel

The detection level defined for the given sender and recipient.

keyword

mimecast.spamInfo

Information from Mimecast Spam scanners for messages found to be Spam.

keyword

mimecast.spamProcessingDetail

The Spam processing details for DKIM, SPF, DMARC

keyword

mimecast.spamScore

The metric that measures the likelihood of the event being considered spam.

keyword

mimecast.subject

The subject of the email.

keyword

mimecast.subtype

keyword

mimecast.taggedExternal

The message has been tagged as originating from a external source. (True; False)

keyword

mimecast.taggedMalicious

The message has been tagged as malicious. (True; False)

keyword

mimecast.timestamp

The date and time of event.

keyword

mimecast.tlsCipher

The TLS Cipher used if the email was delivered or received using TLS.

keyword

mimecast.tlsUsed

If the message was delivered using TLS or not. (Yes; No)

keyword

mimecast.tlsVersion

The TLS version used if the email was delivered or received using TLS.

keyword

mimecast.totalSizeAttachments

The total size of all attachments on the email.

keyword

mimecast.url

URL Clicked

keyword

mimecast.urlCategory

The category of the URL that was clicked.

keyword

mimecast.virusFound

The name or signature of the virus found on the email, if applicable.

keyword

Threat Intel Feed Malware: Customer

edit

This is the mimecast.threat_intel_malware_customer dataset. These logs contain information about messages that return identified malware threats at a customer level. Learn more about these logs.

Example

An example event for threat_intel_malware_customer looks as following:

{
    "@timestamp": "2024-11-18T16:08:27.231Z",
    "agent": {
        "ephemeral_id": "d1f430e4-51c4-4477-b0c8-c09935910589",
        "id": "2f4dbe4d-f9d3-4bb4-b16e-cc670095357a",
        "name": "elastic-agent-69346",
        "type": "filebeat",
        "version": "8.14.0"
    },
    "data_stream": {
        "dataset": "mimecast.threat_intel_malware_customer",
        "namespace": "60530",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "2f4dbe4d-f9d3-4bb4-b16e-cc670095357a",
        "snapshot": false,
        "version": "8.14.0"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "threat",
            "email",
            "malware"
        ],
        "dataset": "mimecast.threat_intel_malware_customer",
        "ingested": "2024-12-05T01:02:33Z",
        "kind": "enrichment",
        "original": "{\"created\":\"2024-11-18T16:08:27.231Z\",\"id\":\"indicator--dd9dd839-2362-4e60-9685-7d0b3b8e9497\",\"labels\":[\"malicious-activity\"],\"modified\":\"2024-11-18T16:08:27.231Z\",\"pattern\":\"[file:hashes.'SHA-256' = '275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f']\",\"type\":\"indicator\",\"valid_from\":\"2024-11-18T16:08:27.231Z\"}",
        "type": [
            "indicator"
        ]
    },
    "input": {
        "type": "cel"
    },
    "mimecast": {
        "id": "indicator--dd9dd839-2362-4e60-9685-7d0b3b8e9497",
        "labels": [
            "malicious-activity"
        ],
        "pattern": "[file:hashes.'SHA-256' = '275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f']",
        "type": "indicator"
    },
    "related": {
        "hash": [
            "275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f"
        ]
    },
    "tags": [
        "preserve_original_event",
        "forwarded",
        "mimecast-threat-intel-feed-malware-customer",
        "malicious-activity"
    ],
    "threat": {
        "indicator": {
            "file": {
                "hash": {
                    "sha256": "275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f"
                }
            },
            "first_seen": "2024-11-18T16:08:27.231Z",
            "modified_at": "2024-11-18T16:08:27.231Z",
            "type": "file"
        }
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

cloud.image.id

Image ID for the cloud instance.

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

event.dataset

Event dataset

constant_keyword

event.module

Event module

constant_keyword

host.containerized

If the host is a container.

boolean

host.os.build

OS build information.

keyword

host.os.codename

OS codename, if any.

keyword

input.type

Input type

keyword

log.offset

Log offset

long

mimecast.created

When the indicator was last created.

date

mimecast.hashtype

The hash type.

keyword

mimecast.id

The ID of the indicator.

keyword

mimecast.labels

The labels related to the indicator.

keyword

mimecast.log_type

String to get type of Threat intel feed.

keyword

mimecast.modified

When the indicator was last modified.

date

mimecast.name

Name of the file.

keyword

mimecast.pattern

The pattern.

keyword

mimecast.relationship_type

Type of the relationship.

keyword

mimecast.source_ref

Source of the reference.

keyword

mimecast.target_ref

Reference target.

keyword

mimecast.type

The indicator type, can for example be "domain, email, FileHash-SHA256".

keyword

mimecast.valid_from

The valid from date.

date

mimecast.value

The value of the indicator.

keyword

Threat Intel Feed Malware: Grid

edit

This is the mimecast.threat_intel_malware_grid dataset. These logs contain information about messages that return identified malware threats at a regional grid level. More about these logs.

Example

An example event for threat_intel_malware_grid looks as following:

{
    "@timestamp": "2024-11-18T23:45:40.537Z",
    "agent": {
        "ephemeral_id": "5324b627-0cb0-4c9c-ade5-b381ee81af8f",
        "id": "e14a2fc5-d58b-4d98-a9ee-46df63eab758",
        "name": "elastic-agent-94233",
        "type": "filebeat",
        "version": "8.14.0"
    },
    "data_stream": {
        "dataset": "mimecast.threat_intel_malware_grid",
        "namespace": "50567",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "e14a2fc5-d58b-4d98-a9ee-46df63eab758",
        "snapshot": false,
        "version": "8.14.0"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "threat",
            "email",
            "malware"
        ],
        "dataset": "mimecast.threat_intel_malware_grid",
        "ingested": "2024-12-05T01:20:52Z",
        "kind": "enrichment",
        "original": "{\"created\":\"2024-11-18T23:45:40.537Z\",\"id\":\"indicator--9633476b-0235-41cb-b9fb-6cc48b15391f\",\"labels\":[\"malicious-activity\"],\"modified\":\"2024-11-18T23:45:40.537Z\",\"pattern\":\"[file:hashes.'SHA-256' = '838c3483b20a3f81a199c49e7dc30b39d8d23a9810608f2bb7bb5ca059d42a72']\",\"type\":\"indicator\",\"valid_from\":\"2024-11-18T23:45:40.537Z\"}",
        "type": [
            "indicator"
        ]
    },
    "input": {
        "type": "cel"
    },
    "mimecast": {
        "id": "indicator--9633476b-0235-41cb-b9fb-6cc48b15391f",
        "labels": [
            "malicious-activity"
        ],
        "pattern": "[file:hashes.'SHA-256' = '838c3483b20a3f81a199c49e7dc30b39d8d23a9810608f2bb7bb5ca059d42a72']",
        "type": "indicator"
    },
    "related": {
        "hash": [
            "838c3483b20a3f81a199c49e7dc30b39d8d23a9810608f2bb7bb5ca059d42a72"
        ]
    },
    "tags": [
        "preserve_original_event",
        "forwarded",
        "mimecast-threat-intel-feed-malware-grid",
        "malicious-activity"
    ],
    "threat": {
        "indicator": {
            "file": {
                "hash": {
                    "sha256": "838c3483b20a3f81a199c49e7dc30b39d8d23a9810608f2bb7bb5ca059d42a72"
                }
            },
            "first_seen": "2024-11-18T23:45:40.537Z",
            "modified_at": "2024-11-18T23:45:40.537Z",
            "type": "file"
        }
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

cloud.image.id

Image ID for the cloud instance.

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

event.dataset

Event dataset

constant_keyword

event.module

Event module

constant_keyword

host.containerized

If the host is a container.

boolean

host.os.build

OS build information.

keyword

host.os.codename

OS codename, if any.

keyword

input.type

Input type

keyword

log.offset

Log offset

long

mimecast.created

When the indicator was last created.

date

mimecast.hashtype

The hash type.

keyword

mimecast.id

The ID of the indicator.

keyword

mimecast.labels

The labels related to the indicator.

keyword

mimecast.log_type

String to get type of Threat intel feed.

keyword

mimecast.modified

When the indicator was last modified.

date

mimecast.name

Name of the file.

keyword

mimecast.pattern

The pattern.

keyword

mimecast.relationship_type

Type of the relationship.

keyword

mimecast.source_ref

Source of the reference.

keyword

mimecast.target_ref

Reference target.

keyword

mimecast.type

The indicator type, can for example be "domain, email, FileHash-SHA256".

keyword

mimecast.valid_from

The valid from date.

date

mimecast.value

The value of the indicator.

keyword

TTP Attachment Logs

edit

This is the mimecast.ttp_ap_logs dataset. These logs contain Mimecast TTP attachment protection logs with the following details: result of attachment analysis (if it is malicious or not etc.), date when file is released, sender and recipient address, filename and type, action triggered for the attachment, the route of the original email containing the attachment and details. Learn more about these logs.

Example

An example event for ttp_ap looks as following:

{
    "@timestamp": "2024-11-17T00:52:30.000Z",
    "agent": {
        "ephemeral_id": "10879bb9-44da-4174-a9f3-9c7a620c6a1b",
        "id": "e12e39dc-5a8b-4aef-864e-fe617a5507e2",
        "name": "elastic-agent-80555",
        "type": "filebeat",
        "version": "8.14.0"
    },
    "data_stream": {
        "dataset": "mimecast.ttp_ap_logs",
        "namespace": "21632",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "e12e39dc-5a8b-4aef-864e-fe617a5507e2",
        "snapshot": false,
        "version": "8.14.0"
    },
    "email": {
        "attachments": {
            "file": {
                "extension": "xlsx",
                "hash": {
                    "sha256": "168dde02cf41aed3bf31ad831b75d8ee0b738304baa6957c40e29b2487f15116"
                },
                "mime_type": "application/vnd.openxmlformats-officedocument.spreadsheetml.sheet",
                "name": "Sandbox Test.xlsx"
            }
        },
        "direction": "internal",
        "from": {
            "address": [
                "eric.boyt@demo-int.elastic.mime-api.com"
            ]
        },
        "message_id": "<675ddc8ccedda6a7-363046@hapi.b41.one>",
        "subject": "RE",
        "to": {
            "address": [
                "charles.weldon@demo-int.elastic.mime-api.com"
            ]
        }
    },
    "event": {
        "action": "none",
        "agent_id_status": "verified",
        "category": [
            "email"
        ],
        "created": "2024-11-17T00:52:30+0000",
        "dataset": "mimecast.ttp_ap_logs",
        "ingested": "2024-12-05T01:08:12Z",
        "original": "{\"actionTriggered\":\"none\",\"date\":\"2024-11-17T00:52:30+0000\",\"definition\":\"Default Internal Attachment Protect Definition\",\"details\":\"Malicious                                         \\r\\nTime taken: 0 hrs, 0 min, 1 sec\",\"fileHash\":\"168dde02cf41aed3bf31ad831b75d8ee0b738304baa6957c40e29b2487f15116\",\"fileName\":\"Sandbox Test.xlsx\",\"fileType\":\"application/vnd.openxmlformats-officedocument.spreadsheetml.sheet\",\"messageId\":\"\\u003c675ddc8ccedda6a7-363046@hapi.b41.one\\u003e\",\"recipientAddress\":\"charles.weldon@demo-int.elastic.mime-api.com\",\"result\":\"malicious\",\"route\":\"internal\",\"senderAddress\":\"eric.boyt@demo-int.elastic.mime-api.com\",\"subject\":\"RE\"}"
    },
    "input": {
        "type": "cel"
    },
    "mimecast": {
        "details": "Malicious                                         \r\nTime taken: 0 hrs, 0 min, 1 sec",
        "result": "malicious"
    },
    "related": {
        "hash": [
            "168dde02cf41aed3bf31ad831b75d8ee0b738304baa6957c40e29b2487f15116"
        ]
    },
    "rule": {
        "name": "Default Internal Attachment Protect Definition"
    },
    "tags": [
        "preserve_original_event",
        "forwarded",
        "mimecast-ttp-ap"
    ]
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

cloud.image.id

Image ID for the cloud instance.

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

event.dataset

Event dataset

constant_keyword

event.module

Event module

constant_keyword

host.containerized

If the host is a container.

boolean

host.os.build

OS build information.

keyword

host.os.codename

OS codename, if any.

keyword

input.type

Input type

keyword

log.offset

Log offset

long

mimecast.actionTriggered

The action triggered for the attachment.

keyword

mimecast.definition

The definition.

keyword

mimecast.details

Detailed output of the attachment sandbox processing.

keyword

mimecast.fileHash

The hash of the attachment.

keyword

mimecast.fileName

The file name of the original attachment.

keyword

mimecast.fileType

The file type of the attachment.

keyword

mimecast.messageId

The internet message id of the email.

keyword

mimecast.recipientAddress

The address of the user that received the attachment.

keyword

mimecast.result

The result of the attachment analysis - clean, malicious, unknown, or timeout.

keyword

mimecast.route

The route of the original email containing the attachment, either - inbound, outbound, internal, or external.

keyword

mimecast.senderAddress

The sender of the attachment.

keyword

mimecast.subject

The subject of the email.

keyword

TTP Impersonation Logs

edit

This is the mimecast.ttp_ip_logs dataset. These logs contain information about messages containing information flagged by an Impersonation Protection configuration. Learn more about [these logs] (https://integrations.mimecast.com/documentation/endpoint-reference/logs-and-statistics/get-ttp-impersonation-protect-logs/).

Example

An example event for ttp_ip looks as following:

{
    "@timestamp": "2021-11-12T15:27:14.000Z",
    "agent": {
        "ephemeral_id": "7b14936f-f3a2-4c0d-84ca-343382ff527a",
        "id": "628d55fb-6e16-49d4-a0ba-b6db1b4d2281",
        "name": "elastic-agent-89042",
        "type": "filebeat",
        "version": "8.14.0"
    },
    "data_stream": {
        "dataset": "mimecast.ttp_ip_logs",
        "namespace": "61588",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "628d55fb-6e16-49d4-a0ba-b6db1b4d2281",
        "snapshot": false,
        "version": "8.14.0"
    },
    "email": {
        "from": {
            "address": [
                "johndoe@example.com"
            ]
        },
        "message_id": "<2-MN2PR16MB2719879CA4DB60C265F7FD8FB0959@MN2PR16MB2719.namprd16.example.outlook.com>",
        "subject": "Don't read, just fill out!",
        "to": {
            "address": [
                "johndoejr@exampple.com"
            ]
        }
    },
    "event": {
        "action": "none",
        "agent_id_status": "verified",
        "category": [
            "email"
        ],
        "created": "2021-11-12T15:27:14+0000",
        "dataset": "mimecast.ttp_ip_logs",
        "id": "MTOKEN:eNqrVkouLS7Jz00tSs5PSVWyUnI2MXM0N1XSUcpMUbIyMjM3MzCw0FEqSy0qzszPU7Iy1FEqyQMrNDAwV6oFAGP7Ehc",
        "ingested": "2024-12-05T01:13:21Z",
        "original": "{\"action\":\"none\",\"definition\":\"IP - 1 hit (Tag email)\",\"eventTime\":\"2021-11-12T15:27:14+0000\",\"hits\":1,\"id\":\"MTOKEN:eNqrVkouLS7Jz00tSs5PSVWyUnI2MXM0N1XSUcpMUbIyMjM3MzCw0FEqSy0qzszPU7Iy1FEqyQMrNDAwV6oFAGP7Ehc\",\"identifiers\":[\"internal_user_name\"],\"impersonationResults\":[{\"checkerResult\":\"hit\",\"impersonationDomainSource\":\"internal_user_name\",\"similarDomain\":\"John Doe \\u003cjohndoe_nu@example.com\\u003e\",\"stringSimilarToDomain\":\"John Doe\"}],\"messageId\":\"\\u003c2-MN2PR16MB2719879CA4DB60C265F7FD8FB0959@MN2PR16MB2719.namprd16.example.outlook.com\\u003e\",\"recipientAddress\":\"johndoejr@exampple.com\",\"senderAddress\":\"johndoe@example.com\",\"senderIpAddress\":\"8.8.8.8\",\"subject\":\"Don't read, just fill out!\",\"taggedExternal\":false,\"taggedMalicious\":true}"
    },
    "input": {
        "type": "cel"
    },
    "mimecast": {
        "hits": 1,
        "identifiers": [
            "internal_user_name"
        ],
        "impersonationResults": [
            {
                "checkerResult": "hit",
                "impersonationDomainSource": "internal_user_name",
                "similarDomain": "John Doe <johndoe_nu@example.com>",
                "stringSimilarToDomain": "John Doe"
            }
        ],
        "taggedExternal": false,
        "taggedMalicious": true
    },
    "related": {
        "ip": [
            "8.8.8.8"
        ]
    },
    "rule": {
        "name": "IP - 1 hit (Tag email)"
    },
    "source": {
        "ip": "8.8.8.8"
    },
    "tags": [
        "preserve_original_event",
        "forwarded",
        "mimecast-ttp-ip"
    ]
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

cloud.image.id

Image ID for the cloud instance.

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

event.dataset

Event dataset

constant_keyword

event.module

Event module

constant_keyword

host.containerized

If the host is a container.

boolean

host.os.build

OS build information.

keyword

host.os.codename

OS codename, if any.

keyword

input.type

Input type

keyword

log.offset

Log offset

long

mimecast.action

The action triggered by the email.

keyword

mimecast.definition

The name of the policy definition that triggered the log.

keyword

mimecast.hits

The number of identifiers that the message triggered.

long

mimecast.id

A token that can be used to retrieve this log again.

keyword

mimecast.identifiers

The properties of the message that triggered the action - similar_internal_domain, newly_observed_domain, internal_user_name, reply_address_mismatch, and/or targeted_threat_dictionary.

keyword

mimecast.impersonationResults.checkerResult

Result checker.

keyword

mimecast.impersonationResults.impersonationDomainSource

Impersonation domain source.

keyword

mimecast.impersonationResults.similarDomain

Similar domain.

keyword

mimecast.impersonationResults.stringSimilarToDomain

The string that is suspiciously similar to a known value within the Mimecast configuration. Multiple triggers will be comma-separated.

keyword

mimecast.messageId

The message-id of the identified message.

keyword

mimecast.recipientAddress

The email address of the recipient of the email.

keyword

mimecast.senderAddress

The email address of the sender of the message.

keyword

mimecast.senderIpAddress

The source IP address of the message.

keyword

mimecast.subject

The subject of the email.

keyword

mimecast.taggedExternal

Whether the message was tagged as coming from an external address.

boolean

mimecast.taggedMalicious

Whether the message was tagged as malicious.

boolean

TTP URL Logs

edit

This is the mimecast.ttp_url_logs dataset. These logs contain Mimecast TTP attachment protection logs with the following details: the category of the URL clicked, the email address of the user who clicked the link, the url clicked, the action taken by the user if user awareness was applied, the route of the email that contained the link, the action defined by the administrator for the URL, the date that the URL was clicked, url scan result, the action that was taken for the click, the description of the definition that triggered the URL to be rewritten by Mimecast, the action requested by the user, an array of components of the message where the URL was found. More about these logs.

Example

An example event for ttp_url looks as following:

{
    "@timestamp": "2024-11-13T13:03:11.000Z",
    "agent": {
        "ephemeral_id": "675bf199-2969-46bf-a9c1-8f880acc18f4",
        "id": "d0b37a9a-11c1-4a25-898d-0ddb211b9fd2",
        "name": "elastic-agent-71893",
        "type": "filebeat",
        "version": "8.14.0"
    },
    "data_stream": {
        "dataset": "mimecast.ttp_url_logs",
        "namespace": "65054",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "d0b37a9a-11c1-4a25-898d-0ddb211b9fd2",
        "snapshot": false,
        "version": "8.14.0"
    },
    "email": {
        "direction": "inbound",
        "from": {
            "address": [
                "gregoryhunt@thejunglegroup.b41.one"
            ]
        },
        "message_id": "<cc11f61d32d018de-152846@hapi.b41.one>",
        "subject": "Re",
        "to": {
            "address": [
                "mike.a.roberts@demo-int.elastic.mime-api.com"
            ]
        }
    },
    "event": {
        "action": "N/A",
        "agent_id_status": "verified",
        "category": [
            "email"
        ],
        "created": "2024-11-13T13:03:11+0000",
        "dataset": "mimecast.ttp_url_logs",
        "ingested": "2024-12-05T01:17:02Z",
        "original": "{\"action\":\"warn\",\"actions\":\"Block\",\"adminOverride\":\"N/A\",\"category\":\"Dangerous file extension\",\"creationMethod\":\"Entry Scan\",\"date\":\"2024-11-13T13:03:11+0000\",\"emailPartsDescription\":[\"Attachment\"],\"fromUserEmailAddress\":\"gregoryhunt@thejunglegroup.b41.one\",\"messageId\":\"\\u003ccc11f61d32d018de-152846@hapi.b41.one\\u003e\",\"route\":\"inbound\",\"scanResult\":\"malicious\",\"sendingIp\":\"54.243.138.179\",\"subject\":\"Re\",\"tagMap\":{\"DangerousFileExt\":{\"ContentCheck:ContentScannersBlocked\":[\".exe\"],\"ContentCheck:DangerousExtsUrlFileDownload\":[\"dll\"],\"ContentCheck:DangerousMimetypesUrlFileDownload\":[\"application/x-msdownload\"],\"Inspect:FileExts\":[\"[exe]\"],\"Inspect:MimeTypes\":[\"[]\"],\"Status\":[\"CustomerSpecific\",\"VerdictBlock\"]}},\"ttpDefinition\":\"Default Inbound URL Protect Definition\",\"url\":\"https://oneclient.sfx.ms/Win/Preview/OneDriveSetup.exe\",\"userAwarenessAction\":\"N/A\",\"userEmailAddress\":\"mike.a.roberts@demo-int.elastic.mime-api.com\",\"userOverride\":\"None\"}"
    },
    "input": {
        "type": "cel"
    },
    "mimecast": {
        "action": "warn",
        "actions": "Block",
        "adminOverride": "N/A",
        "category": "Dangerous file extension",
        "creationMethod": "Entry Scan",
        "emailPartsDescription": [
            "Attachment"
        ],
        "scanResult": "malicious",
        "tagMap": {
            "DangerousFileExt": {
                "ContentCheck_ContentScannersBlocked": [
                    ".exe"
                ],
                "ContentCheck_DangerousExtsUrlFileDownload": [
                    "dll"
                ],
                "ContentCheck_DangerousMimetypesUrlFileDownload": [
                    "application/x-msdownload"
                ],
                "Inspect_FileExts": [
                    "[exe]"
                ],
                "Inspect_MimeTypes": [
                    "[]"
                ],
                "Status": [
                    "CustomerSpecific",
                    "VerdictBlock"
                ]
            }
        },
        "userOverride": "None"
    },
    "related": {
        "ip": [
            "54.243.138.179"
        ],
        "user": [
            "gregoryhunt@thejunglegroup.b41.one",
            "mike.a.roberts@demo-int.elastic.mime-api.com"
        ]
    },
    "rule": {
        "name": "Default Inbound URL Protect Definition"
    },
    "source": {
        "ip": "54.243.138.179"
    },
    "tags": [
        "preserve_original_event",
        "forwarded",
        "mimecast-ttp-url"
    ],
    "url": {
        "domain": "oneclient.sfx.ms",
        "extension": "exe",
        "original": "https://oneclient.sfx.ms/Win/Preview/OneDriveSetup.exe",
        "path": "/Win/Preview/OneDriveSetup.exe",
        "scheme": "https"
    },
    "user": {
        "email": [
            "mike.a.roberts@demo-int.elastic.mime-api.com"
        ]
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

cloud.image.id

Image ID for the cloud instance.

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

event.dataset

Event dataset

constant_keyword

event.module

Event module

constant_keyword

host.containerized

If the host is a container.

boolean

host.os.build

OS build information.

keyword

host.os.codename

OS codename, if any.

keyword

input.type

Input type

keyword

log.offset

Log offset

long

mimecast.action

The action that was taken for the click.

keyword

mimecast.actions

The actions that were taken.

keyword

mimecast.adminOverride

The action defined by the administrator for the URL.

keyword

mimecast.category

The category of the URL clicked.

keyword

mimecast.creationMethod

The description how event occurred.

keyword

mimecast.emailPartsDescription

An array of components of the messge where the URL was found.

keyword

mimecast.fromUserEmailAddress

The email of user who triggers the event.

keyword

mimecast.messageId

The message-id value of the message.

keyword

mimecast.route

The route of the email that contained the link.

keyword

mimecast.scanResult

The result of the URL scan.

keyword

mimecast.sendingIp

The IP of user who triggers the event.

keyword

mimecast.subject

The subject of the email.

keyword

mimecast.tagMap.DangerousFileExt.ContentCheck_ContentScannersBlocked

keyword

mimecast.tagMap.DangerousFileExt.ContentCheck_DangerousExtsUrlFileDownload

keyword

mimecast.tagMap.DangerousFileExt.ContentCheck_DangerousMimetypesUrlFileDownload

keyword

mimecast.tagMap.DangerousFileExt.Inspect_FileExts

keyword

mimecast.tagMap.DangerousFileExt.Inspect_MimeTypes

keyword

mimecast.tagMap.DangerousFileExt.Status

keyword

mimecast.tagMap.UrlReputationScan.Status

keyword

mimecast.tagMap.UrlReputationScan.Type

keyword

mimecast.tagMap.UrlReputationScan.Url

keyword

mimecast.tagMap.UrlReputationScan.UrlBlock

keyword

mimecast.ttpDefinition

The description of the definition that triggered the URL to be rewritten by Mimecast.

keyword

mimecast.url

The url clicked.

keyword

mimecast.userAwarenessAction

The action taken by the user if user awareness was applied.

keyword

mimecast.userEmailAddress

The email address of the user who clicked the link.

keyword

mimecast.userOverride

The action requested by the user.

keyword

Changelog

edit
Changelog
Version Details Kibana version(s)

2.4.1

Bug fix (View pull request)
Remove invalid remove processor.

8.15.0 or higher

2.4.0

Enhancement (View pull request)
Do not remove event.original in main ingest pipeline.

8.15.0 or higher

2.3.0

Enhancement (View pull request)
Add cloud_integrated_logs data stream.

8.15.0 or higher

2.2.0

Enhancement (View pull request)
Add "preserve_original_event" tag to documents with event.kind set to "pipeline_error".

8.15.0 or higher

2.1.0

Enhancement (View pull request)
Add v2 API client for siem_logs.

8.15.0 or higher

2.0.0

Breaking change (View pull request)
Migrate message release logs data stream to Mimecast v2 API.

Enhancement (View pull request)
Add v2 API clients for archive_search_logs, audit_events, dlp_logs, threat_intel_malware_customer, threat_intel_malware_grid, ttp_ap_logs, ttp_ip_logs, and ttp_url_logs.

8.14.0 or higher

1.27.4

Bug fix (View pull request)
Fix handling of time values with short timezone IDs.

8.14.0 or higher

1.27.3

Bug fix (View pull request)
Fix parsing of "logon-authentication-failed" events.

8.14.0 or higher

1.27.2

Bug fix (View pull request)
Use triple-brace Mustache templating when referencing variables in ingest pipelines.

8.14.0 or higher

1.27.1

Bug fix (View pull request)
Use triple-brace Mustache templating when referencing variables in ingest pipelines.

8.14.0 or higher

1.27.0

Enhancement (View pull request)
Add support for message release logs.

8.14.0 or higher

1.26.1

Bug fix (View pull request)
Fix handling of email addresses with comma in quoted name.

8.13.0 or higher

1.26.0

Enhancement (View pull request)
Update the kibana constraint to ^8.13.0. Modified the field definitions to remove ECS fields made redundant by the ecs@mappings component template.

8.13.0 or higher

1.25.0

Enhancement (View pull request)
Improve handling of empty responses.

8.12.0 or higher

1.24.0

Enhancement (View pull request)
Log processing stage and improve document fingerprinting.

8.12.0 or higher

1.23.0

Enhancement (View pull request)
Set sensitive values as secret.

8.12.0 or higher

1.22.1

Enhancement (View pull request)
Changed owners

8.7.1 or higher

1.22.0

Enhancement (View pull request)
Limit request tracer log count to five.

8.7.1 or higher

1.21.0

Enhancement (View pull request)
ECS version updated to 8.11.0.

8.7.1 or higher

1.20.0

Enhancement (View pull request)
Improve event.original check to avoid errors if set.

8.7.1 or higher

1.19.0

Enhancement (View pull request)
Set partner owner type.

8.7.1 or higher

1.18.0

Enhancement (View pull request)
ECS version updated to 8.10.0.

8.7.1 or higher

1.17.0

Enhancement (View pull request)
The format_version in the package manifest changed from 2.11.0 to 3.0.0. Removed dotted YAML keys from package manifest. Added owner.type: elastic to package manifest.

8.7.1 or higher

1.16.0

Enhancement (View pull request)
Add tags.yml file so that integration’s dashboards and saved searches are tagged with "Security Solution" and displayed in the Security Solution UI.

8.7.1 or higher

1.15.0

Enhancement (View pull request)
Add support for Archive Search Logs

8.7.1 or higher

1.14.0

Enhancement (View pull request)
Update package to ECS 8.9.0.

8.7.1 or higher

1.13.0

Enhancement (View pull request)
Update package-spec to 2.9.0.

8.7.1 or higher

1.12.0

Enhancement (View pull request)
Document valid duration units.

8.7.1 or higher

1.11.0

Enhancement (View pull request)
Ensure event.kind is correctly set for pipeline errors.

8.7.1 or higher

1.10.0

Enhancement (View pull request)
Update package to ECS 8.8.0.

8.7.1 or higher

1.9.1

Bug fix (View pull request)
Fix parsing of Logon Authentication Failed audit event.

8.7.1 or higher

1.9.0

Enhancement (View pull request)
Change Request trace filename

8.7.1 or higher

1.8.1

Bug fix (View pull request)
Check ttp URL source IP values for type conformity.

8.5.0 or higher

1.8.0

Enhancement (View pull request)
Add toggle to enable request tracing.

8.5.0 or higher

1.7.0

Enhancement (View pull request)
Update package to ECS 8.7.0.

8.3.0 or higher

1.6.5

Enhancement (View pull request)
Added categories and/or subcategories.

8.3.0 or higher

1.6.4

Bug fix (View pull request)
Define mimecast.SpamProcessingDetail as flattened.

8.3.0 or higher

1.6.3

Bug fix (View pull request)
Fingerprint events to prevent duplicate document ingestion.

8.3.0 or higher

1.6.2

Bug fix (View pull request)
Fix mimecast template config

8.3.0 or higher

1.6.1

Bug fix (View pull request)
Drop empty event sets in data streams.

8.3.0 or higher

1.6.0

Enhancement (View pull request)
Fingerprint audit events on their ID.

8.3.0 or higher

1.5.0

Enhancement (View pull request)
Update package to ECS 8.6.0.

8.3.0 or higher

1.4.3

Bug fix (View pull request)
Fix timezone format in httpjson input in multiple datastreams

8.3.0 or higher

1.4.2

Enhancement (View pull request)
Migrate the visualizations to by value in dashboards to minimize the saved object clutter and reduce time to load

8.3.0 or higher

1.4.1

Bug fix (View pull request)
Remove duplicate fields.

8.3.0 or higher

1.4.0

Enhancement (View pull request)
Update package to ECS 8.5.0.

8.3.0 or higher

1.3.0

Enhancement (View pull request)
Update package to ECS 8.4.0

8.3.0 or higher

1.2.1

Bug fix (View pull request)
Fix compression for SIEM logs.

8.3.0 or higher

1.2.0

Enhancement (View pull request)
Update categories to include threat_intel.

8.3.0 or higher

1.1.2

Enhancement (View pull request)
Tidy up Markdown syntax in readme.

8.3.0 or higher

1.1.1

Enhancement (View pull request)
Update package name and description to align with standard wording

8.3.0 or higher

1.1.0

Enhancement (View pull request)
Update package to ECS 8.3.0.

8.3.0 or higher

1.0.0

Enhancement (View pull request)
Make ga with zip support for SIEM events.

Enhancement (View pull request)
Move auth vars to the common manifest.

8.3.0 or higher

0.0.12

Enhancement (View pull request)
Add more use cases for parsing audit events.

0.0.11

Enhancement (View pull request)
Update integration description for consistency with other integrations.

Bug fix (View pull request)
Add missing ECS event.* field mappings.

0.0.10

Enhancement (View pull request)
Add more use cases to audit_events pipeline

Enhancement (View pull request)
Implement geo.ip for siem logs

Enhancement (View pull request)
Remove user part for ttp-url logs and add email.to.address for recipient

0.0.9

Enhancement (View pull request)
Update ecs to version 8.2.0 and implement better practice for email ECS fields.

0.0.8

Enhancement (View pull request)
Add documentation for multi-fields

0.0.7

Bug fix (View pull request)
Add content-disposition to test mock to properly create sample event from SIEM logs.

0.0.6

Enhancement (View pull request)
Add use cases for audit events and update sample events and docs

0.0.5

Bug fix (View pull request)
Fix typo

Bug fix (View pull request)
Add 8.0.0 compatibility, fix team name in manifest, and remove redundant event.ingested from pipelines.

0.0.4

Bug fix (View pull request)
Regenerate test files using the new GeoIP database

0.0.3

Bug fix (View pull request)
Change test public IPs to the supported subset

0.0.2

Enhancement (View pull request)
Tweaking the dashboards

0.0.1

Enhancement (View pull request)
Initial draft of the package