Kaspersky Unified Monitoring and Analysis Platform

Contents

[Topic 217737]

Commands for components manual starting and installing

This section contains the parameters of KUMA's executable file /opt/kaspersky/kuma/kuma that can be used to manually start or install KUMA services. This may be useful for when you need to see output in the server operating system console.

Commands parameters

Commands

Description

tools

Start KUMA administration tools.

collector

Install, start, or remove a collector service.

core

Install, start, or uninstall a Core service.

correlator

Install, start, or remove a correlator service.

agent

Install, start, or remove an agent service.

help

Get information about available commands and parameters.

license

Get information about license.

storage

Start or install a Storage.

version

Get information about version of the application.

Flags:

-h, --h are used to get help about any kuma command. For example, kuma <component> --help.

Examples:

  • kuma version is used to get version of the KUMA installer.
  • kuma core -h is used to get help about core command of KUMA installer.
  • kuma collector --core <address of the server where the collector should obtain its settings> --id <ID of the installed service> --api.port <port> is used to start collector service installation.
Page top
[Topic 217766]

Integrity check of KUMA files

You can check the integrity of KUMA components in the following ways:

  • Manually, by running the script below
  • On a schedule or automatically at application startup, with results recorded in the system log

Manual integrity check

The integrity of KUMA components is checked using a set of scripts based on the integrity_checker tool and located in the/opt/kaspersky/kuma/integrity/bin directory. An integrity check uses manifest xml files in the/opt/kaspersky/kuma/integrity/manifest/* directory, protected by a Kaspersky cryptographic signature.

Running the integrity check tool requires a user account with permissions at least matching those of the KUMA account.

The integrity check tool processes each KUMA component individually, and it must be run on servers that has the appropriate components installed. An integrity check also checks the xml file that was used.

To check the integrity of component files:

  1. Run the following command to navigate to the directory that contains the set of scripts:

    cd /opt/kaspersky/kuma/integrity/bin

  2. Then run one of the following commands that matches the KUMA component you want to check:
    • ./check_all.sh for KUMA Core and Storage components.
    • ./check_core.sh for KUMA Core components.
    • ./check_collector.sh for KUMA collector components.
    • ./check_collector.sh for KUMA correlator components.
    • ./check_storage.sh for storage components.
    • ./check_event_router.sh for event router components.
    • ./check_kuma_exe.sh <full path to kuma.exe omitting file name> for KUMA Agent for Windows. The standard location of the agent executable file on the Windows device is: C:\Program Files\Kaspersky Lab\KUMA\.

The integrity of the component files is checked.

The result of checking each component is displayed in the following format:

  • The Summary section describes the number of scanned objects along with the scan status: integrity not confirmed / object skipped / integrity confirmed:
    • Manifests – the number of manifest files processed.
    • Files – the number of KUMA files processed.
    • Directories – not used when KUMA integrity checking is performed.
    • Registries – not used when KUMA integrity checking is performed.
    • Registry values – not used when KUMA integrity checking is performed.
  • Component integrity check result:
    • SUCCEEDED – integrity confirmed.
    • FAILED – integrity violated.

On a schedule or automatically at application startup

KUMA is a distributed, multi-component solution, and the location of its components on hosts is not known before the installation stage, therefore the configuration of the automatic integrity check of the components cannot be provided with the distribution kit and must be configured at the deployment stage.

We recommend checking the integrity of KUMA components when starting the application and on a schedule. We recommend scheduling an integrity check once a day. You can do this using scripts included in the distribution kit:

  • manual_integrity_check.sh

    The script checks the integrity of all components or selected components. You can configure the scheduled integrity check with third-party applications and utilities, such as the cron utility. You can also run this script to manually check the integrity of components.

  • systemd_integrity_check.sh

    Use this script to self-test the integrity of application components at startup. To add automatic integrity checking, run this script on each host where KUMA components are installed. The script should be run once. The integrity of the component is checked every time the KUMA service is started or restarted.

    If, after deployment, you add new KUMA services (for example, a new collector), run the systemd_integrity_check.sh script on the hosts with the new services. Otherwise, the integrity of the new components will not be checked at startup.

    If the check cannot verify the integrity of the component, the component does not run. KUMA will keep trying to start the service after checking its integrity. The results of the check are recorded in the system audit log. In this situation, either stop the service or eliminate the cause of the integrity violation.

Prerequisites

Before running the scripts:

  • Move the script files to the /opt/kaspersky/kuma/integrity/bin/ directory.
  • Grant the necessary permissions to run scripts to the 'kuma' user. To do so, run the following commands:

    chown kuma:kuma ./systemd_integrity_check.sh

    chmod +x ./systemd_integrity_check.sh

    chown kuma:kuma ./manual_integrity_check.sh

    chmod +x ./manual_integrity_check.sh

Running scripts

manual_integrity_check.sh

To check the integrity of the components, run the script on the host where the KUMA components are installed:

/opt/kaspersky/kuma/integrity/bin# ./manual_integrity_check.sh --core --collector --eventRouter --correlator --storage

This script checks the integrity of components which you specify in command line options. If you do not specify any components, the script checks all components.

systemd_integrity_check.sh

To add an automatic integrity check of application components at startup or on restart of the KUMA service, run the following command:

/opt/kaspersky/kuma/integrity/bin# ./systemd_integrity_check.sh

Both scripts log the results of component integrity checks in the system audit log. To view the log, use the dmesg command:

sudo dmesg

Page top
[Topic 238733]

Normalized event data model

This section presents the KUMA normalized event data model. All events that are processed by KUMA Correlator to detect alerts must be compliant to this model. The maximum size of an event that can be processed by the KUMA collector is 4 MB.

Events that are not compliant to this data model must be converted to this format (or normalized) using Collectors.

Normalized event data model

Field name

Data type

Field size

Description

The name of a field reflects its purpose. The fields can be modified.

 

ApplicationProtocol

String

31 characters

Name of the application layer protocol. For example, HTTPS, SSH, Telnet.

BytesIn

Number

From -9223372036854775808 to 9223372036854775807

Number of bytes received.

BytesOut

Number

From -9223372036854775808 to 9223372036854775807

Number of bytes sent.

DestinationAddress

String

45 characters

IPv4 or IPv6 address of the asset that the action will be performed on. For example, 0.0.0.0 or xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx

DestinationCity

String

1,023 characters

City corresponding to the IP address from the DestinationAddress field.

DestinationCountry

String

1023 characters

Country corresponding to the IP address from the DestinationAddress field.

DestinationDnsDomain

String

255 characters

The DNS portion of the fully qualified domain name of the destination.

DestinationHostName

String

1023 characters

Host name of the destination. FQDN of the destination, if available.

DestinationLatitude

Floating point number

+/- 1.7E-308 to 1.7E+308

Longitude corresponding to the IP address from the DestinationAddress field.

DestinationLongitude

Floating point number

+/- 1.7E-308 to 1.7E+308

Latitude corresponding to the IP address from the DestinationAddress field.

DestinationMacAddress

String

17 characters

MAC address of the destination. For example, aa:bb:cc:dd:ee:00

DestinationNtDomain

String

255 characters

Windows Domain Name of the destination.

DestinationPort

Number

From -9223372036854775808 to 9223372036854775807

Port number of the destination.

DestinationProcessID

Number

From -9223372036854775808 to 9223372036854775807

System process ID registered on the destination.

DestinationProcessName

String

1023 characters

Name of the system process registered on the destination. For example, sshd, telnet.

DestinationRegion

String

1023 characters

Region corresponding to the IP address from the DestinationAddress field.

DestinationServiceName

String

1023 characters

Name of the service on the destination side. For example, sshd.

DestinationTranslatedAddress

String

45 characters

Translated IPv4 or IPv6 address of the destination. For example, 0.0.0.0 or xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx

DestinationTranslatedPort

Number

From -9223372036854775808 to 9223372036854775807

Port number at the destination after translation.

DestinationUserID

String

1023 characters

User ID of the destination.

DestinationUserName

String

1023 characters

User name of the destination.

DestinationUserPrivileges

String

1023 characters

Names of roles that identify user privileges at the destination. For example, User, Guest, Administrator, etc.

DeviceAction

String

63 characters

Action that was taken by the event source. For example, blocked, detected.

DeviceAddress

String

45 characters

IPv4 or IPv6 address of the device from which the event was received. For example, 0.0.0.0 or xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx

DeviceCity

String

1023 characters

City corresponding to the IP address from the DeviceAddress field.

DeviceCountry

String

1023 characters

Country corresponding to the IP address from the DeviceAddress field.

DeviceDnsDomain

String

255 characters

DNS part of the fully qualified domain name of the device from which the event was received.

DeviceEventClassID

String

1023 characters

Event type ID assigned by the event source.

DeviceExternalID

String

255 characters

ID of the device or product assigned by the event source.

DeviceFacility

String

1023 characters

Value of the facility parameter set by the event source.

DeviceHostName

String

100 characters

Name of the device from which the event was received. FQDN of the device, if available.

DeviceInboundinterface

String

128 characters

Name of the incoming connection interface.

DeviceLatitude

Floating point number

+/- 1.7E-308 to 1.7E+308

Longitude corresponding to the IP address from the DeviceAddress field.

DeviceLongitude

Floating point number

+/- 1.7E-308 to 1.7E+308

Latitude corresponding to the IP address from the DeviceAddress field

DeviceMacAddress

String

17 characters

MAC address of the asset from which the event was received. For example, aa:bb:cc:dd:ee:00

DeviceNtDomain

String

255 characters

Windows Domain Name of the device.

DeviceOutboundinterface

String

128 characters

Name of the outgoing connection interface.

DevicePayloadID

String

128 characters

The payload's unique ID that is associated with the raw event.

DeviceProcessID

Number

From -9223372036854775808 to 9223372036854775807

ID of the system process on the device that generated the event.

DeviceProcessName

String

1023 characters

Name of the process.

DeviceProduct

String

63 characters

Name of the product that generated the event. The DeviceVendor, DeviceProduct, and DeviceVersion all uniquely identify the log source.

DeviceReceiptTime

Number

From -9223372036854775808 to 9223372036854775807

Time when the device received the event.

DeviceRegion

String

1023 characters

Region corresponding to the IP address from the DeviceAddress field.

DeviceTimeZone

String

255 characters

Time zone of the device on which the event was generated.

DeviceTranslatedAddress

String

45 characters

Re-translated IPv4 or IPv6 address of the device from which the event was received. For example, 0.0.0.0 or xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx

DeviceVendor

String

63 characters

Vendor name of the event source. The DeviceVendor, DeviceProduct, and DeviceVersion all uniquely identify the log source.

DeviceVersion

String

31 characters

Product version of the event source. The DeviceVendor, DeviceProduct, and DeviceVersion all uniquely identify the log source.

EndTime

Number

From -9223372036854775808 to 9223372036854775807

Date and time (timestamp) when the event ended.

EventOutcome

String

63 characters

Result of the operation. For example, success, failure.

ExternalID

String

40 characters

Field in which the ID can be saved.

FileCreateTime

Number

From -9223372036854775808 to 9223372036854775807

File creation time.

FileHash

String

255 characters

Hash of the file. Example: CA737F1014A48F4C0B6DD43CB177B0AFD9E5169367544C494011E3317DBF9A509CB1E5DC1E85A941BBEE3D7F2AFBC9B1

FileID

String

1023 characters

ID of the file.

FileModificationTime

Number

From -9223372036854775808 to 9223372036854775807

Time when the file was last modified.

FileName

String

1023 characters

Filename without specifying the file path.

FilePath

String

1023 characters

File path, including the file name.

FilePermission

String

1023 characters

List of file permissions.

FileSize

Number

From -9223372036854775808 to 9223372036854775807

File size.

FileType

String

1023 characters

File type.

Message

String

1023 characters

Brief description of the event.

Name

String

512 characters

Name of the event.

OldFileCreateTime

Number

From -9223372036854775808 to 9223372036854775807

Time when the OLD file was created from the event. The time is specified in UTC0. In the KUMA web interface, the value is displayed based in the timezone of the user's browser.

OldFileHash

String

255 characters

Hash of the OLD file. Example: CA737F1014A48F4C0B6DD43CB177B0AFD9E5169367544C494011E3317DBF9A509CB1E5DC1E85A941BBEE3D7F2AFBC9B1

OldFileID

String

1023 characters

ID of the OLD file.

OldFileModificationTime

Number

From -9223372036854775808 to 9223372036854775807

Time when the OLD file was last modified.

OldFileName

String

1023 characters

Name of the OLD file (without the file path).

OldFilePath

String

1023 characters

Path to the OLD file, including the file name.

OldFilePermission

String

1023 characters

List of permissions of the OLD file.

OldFileSize

Number

From -9223372036854775808 to 9223372036854775807

Size of the OLD file.

OldFileType

String

1023 characters

Type of the OLD file.

Reason

String

1023 characters

Information about the reason for the event.

RequestClientApplication

String

1023 characters

Value of the "user-agent" parameter of the http request.

RequestContext

String

2,048 characters

Description of the http request context.

RequestCookies

String

1023 characters

Cookies associated with the http request.

RequestMethod

String

1023 characters

Method used when making the http request.

RequestUrl

String

1023 characters

Requested URL.

Severity

String

1023 characters

Priority. This can be the Severity field or the Level field of the raw event.

SourceAddress

String

45 characters

IPv4 or IPv6 address of the source. Example format: 0.0.0.0 or xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx

SourceCity

String

1023 characters

City corresponding to the IP address from the SourceAddress field.

SourceCountry

String

1023 characters

Country corresponding to the IP address from the SourceAddress field.

SourceDnsDomain

String

255 characters

The DNS portion of the fully qualified domain name of the source.

SourceHostName

String

1023 characters

Windows Domain Name of the event source device.

SourceLatitude

Floating point number

+/- 1.7E-308 to 1.7E+308

Longitude corresponding to the IP address from the SourceAddress field.

SourceLongitude

Floating point number

+/- 1.7E-308 to 1.7E+308

Latitude corresponding to the IP address from the SourceAddress field.

SourceMacAddress

String

17 characters

MAC address of the source. Format example: aa:bb:cc:dd:ee:00

SourceNtDomain

String

255 characters

Windows Domain Name of the source.

SourcePort

Number

From -9223372036854775808 to 9223372036854775807

Source port number.

SourceProcessID

Number

From -9223372036854775808 to 9223372036854775807

System process ID.

SourceProcessName

String

1023 characters

Name of the system process at the source. For example, sshd, telnet, etc.

SourceRegion

String

1023 characters

Region corresponding to the IP address from the SourceAddress field.

SourceServiceName

String

1023 characters

Name of the service on the source side. For example, sshd.

SourceTranslatedAddress

String

45 characters

Translated IPv4 or IPv6 address of the source. Example format: 0.0.0.0 or xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx

SourceTranslatedPort

Number

From -9223372036854775808 to 9223372036854775807

Port number of the source after translation.

SourceUserID

String

1023 characters

User ID of the source.

SourceUserName

String

1023 characters

User name of the source.

SourceUserPrivileges

String

1023 characters

Names of roles that identify user privileges of the source. For example, User, Guest, Administrator, etc.

StartTime

Number

From -9223372036854775808 to 9223372036854775807

Date and time (timestamp) when the activity associated with the event began.

Tactic

String

128 characters

Name of the tactic from the MITRE ATT&CK matrix.

Technique

String

128 characters

Name of the technique from the MITRE ATT&CK matrix.

TransportProtocol

String

31 characters

Name of the Transport layer protocol of the OSI model (TCP, UDP, etc).

Type

Number

From -9223372036854775808 to 9223372036854775807

Event type: 1 - basic, 2 - aggregated, 3 - correlation, 4 - audit, 5 - monitoring.

Fields the purpose of which can be defined by the user. The fields can be modified.

DeviceCustomDate1

Number, timestamp

From -9223372036854775808 to 9223372036854775807

Field for mapping a date and time value (timestamp). The time is specified in UTC0. In the KUMA web interface, the value is displayed based in the timezone of the user's browser.

DeviceCustomDate1Label

String

1023 characters

Field for describing the purpose of the DeviceCustomDate1 field.

DeviceCustomDate2

Number, timestamp

From -9223372036854775808 to 9223372036854775807

Field for mapping a date and time value (timestamp). The time is specified in UTC0. In the KUMA web interface, the value is displayed based in the timezone of the user's browser.

DeviceCustomDate2Label

String

1023 characters

Field for describing the purpose of the DeviceCustomDate2 field.

DeviceCustomFloatingPoint1

Floating point number

+/- 1.7E-308 to 1.7E+308

Field for mapping floating point numbers.

DeviceCustomFloatingPoint1Label

String

1023 characters

Field for describing the purpose of the DeviceCustomFloatingPoint1 field.

DeviceCustomFloatingPoint2

Floating point number

+/- 1.7E-308 to 1.7E+308

Field for mapping floating point numbers.

DeviceCustomFloatingPoint2Label

String

1023 characters

Field for describing the purpose of the DeviceCustomFloatingPoint2 field.

DeviceCustomFloatingPoint3

Floating point number

+/- 1.7E-308 to 1.7E+308

Field for mapping floating point numbers.

DeviceCustomFloatingPoint3Label

String

1023 characters

Field for describing the purpose of the DeviceCustomFloatingPoint3 field.

DeviceCustomFloatingPoint4

Floating point number

+/- 1.7E-308 to 1.7E+308

Field for mapping floating point numbers.

DeviceCustomFloatingPoint4Label

String

1023 characters

Field for describing the purpose of the DeviceCustomFloatingPoint4 field.

DeviceCustomIPv6Address1

String

45 characters

Field for mapping an IPv6 address value. Format example: y:y:y:y:y:y:y:y

DeviceCustomIPv6Address1Label

String

1023 characters

Field for describing the purpose of the DeviceCustomIPv6Address1 field.

DeviceCustomIPv6Address2

String

45 characters

Field for mapping an IPv6 address value. Format example: y:y:y:y:y:y:y:y

DeviceCustomIPv6Address2Label

String

1023 characters

Field for describing the purpose of the DeviceCustomIPv6Address2 field.

DeviceCustomIPv6Address3

String

45 characters

Field for mapping an IPv6 address value. Format example: y:y:y:y:y:y:y:y

DeviceCustomIPv6Address3Label

String

1023 characters

Field for describing the purpose of the DeviceCustomIPv6Address3 field.

DeviceCustomIPv6Address4

String

45 characters

Field for mapping an IPv6 address value. For example, y:y:y:y:y:y:y:y

DeviceCustomIPv6Address4Label

String

1023 characters

Field for describing the purpose of the DeviceCustomIPv6Address4 field.

DeviceCustomNumber1

Number

From -9223372036854775808 to 9223372036854775807

Field for mapping an integer value.

DeviceCustomNumber1Label

String

1023 characters

Field for describing the purpose of the DeviceCustomNumber1 field.

DeviceCustomNumber2

Number

From -9223372036854775808 to 9223372036854775807

Field for mapping an integer value.

DeviceCustomNumber2Label

String

1023 characters

Field for describing the purpose of the DeviceCustomNumber2 field.

DeviceCustomNumber3

Number

From -9223372036854775808 to 9223372036854775807

Field for mapping an integer value.

DeviceCustomNumber3Label

String

1023 characters

Field for describing the purpose of the DeviceCustomNumber3 field.

DeviceCustomString1

String

4,000 characters

Field for mapping a string value.

DeviceCustomString1Label

String

1,023 characters

Field for describing the purpose of the DeviceCustomString1 field.

DeviceCustomString2

String

4,000 characters

Field for mapping a string value.

DeviceCustomString2Label

String

1023 characters

Field for describing the purpose of the DeviceCustomString2 field.

DeviceCustomString3

String

4,000 characters

Field for mapping a string value.

DeviceCustomString3Label

String

1023 characters

Field for describing the purpose of the DeviceCustomString3 field.

DeviceCustomString4

String

4,000 characters

Field for mapping a string value.

DeviceCustomString4Label

String

1023 characters

Field for describing the purpose of the DeviceCustomString4 field.

DeviceCustomString5

String

4,000 characters

Field for mapping a string value.

DeviceCustomString5Label

String

1023 characters

Field for describing the purpose of the DeviceCustomString5 field.

DeviceCustomString6

String

4,000 characters

Field for mapping a string value.

DeviceCustomString6Label

String

1023 characters

Field for describing the purpose of the DeviceCustomString6 field.

DeviceDirection

Number

From -9223372036854775808 to 9223372036854775807

Field for describing the direction of connection for an event. "0" - incoming connection, "1" - outgoing connection.

DeviceEventCategory

String

1023 characters

Event category assigned by the device that sent the event to SIEM.

FlexDate1

Number, timestamp

From -9223372036854775808 to 9223372036854775807

Field for mapping a date and time value (timestamp). The time is specified in UTC0. In the KUMA web interface, the value is displayed based in the timezone of the user's browser.

FlexDate1Label

String

128 characters

Field for describing the purpose of the FlexDate1Label field.

FlexNumber1

Number

From -9223372036854775808 to 9223372036854775807

Field for mapping an integer value.

FlexNumber1Label

String

128 characters

Field for describing the purpose of the FlexNumber1Label field.

FlexNumber2

Number

From -9223372036854775808 to 9223372036854775807

Field for mapping an integer value.

FlexNumber2Label

String

128 characters

Field for describing the purpose of the FlexNumber2Label field.

FlexString1

String

1023 characters

Field for mapping a string value.

FlexString1Label

String

128 characters

Field for describing the purpose of the FlexString1Label field.

FlexString2

String

1023 characters

Field for mapping a string value.

FlexString2Label

String

128 characters

Field for describing the purpose of the FlexString2Label field.

Service fields. Cannot be edited.

AffectedAssets

Nested [Affected] structure

-

Nested structure from which you can query alert-related assets and user accounts, and find out the number of times they appear in alert events.

AggregationRuleID

String

-

ID of the aggregation rule.

AggregationRuleName

String

-

Name of the aggregation rule that processed the event.

BaseEventCount

Number

-

For an aggregated base event, this is the number of base events that were processed by the aggregation rule. For a correlation event, this is the number of base events that were processed by the correlation rule that generated the correlation event.

BaseEvents

Nested [Event] list

-

Nested structure containing a list of base events. This field can be filled in for correlation events.

Code

String

-

In a base event, this is the code of a process, function or operation return from the source.

CorrelationRuleID

String

-

ID of the correlation rule.

CorrelationRuleName

String

-

Name of the correlation rule that triggered the creation of the correlation event. Filled only for correlation events.

DestinationAccountID

String

-

This field stores the user ID.

DestinationAssetID

String

-

This field stores the asset ID of the destination.

DeviceAssetID

String

-

This field stores the ID of the asset that sent the event to SIEM.

Extra

Nested [string:string] dictionary

-

During normalization of a raw event, this field can be used to place those fields that have not been mapped to KUMA event fields. This field can be filled in only for base events. The maximum size of the field is 4 MB.

GroupedBy

String

-

List of names of the fields that were used for grouping in the correlation rule. It is filled in only for the correlation event.

ID

String

-

Unique event ID of UUID type. For a base event that is generated on the collector, the ID is generated by the collector. The correlator generates the ID of a correlation event. The ID never changes its value.

Raw

String

-

Non-normalized text of the original raw event. Maximum field size is 16,384 bytes.

ReplayID

String

-

ID of the retroscan that generated the event.

ServiceID

String

-

ID of the service instance: correlator, collector, storage.

ServiceName

String

-

Name of the microservice instance that the KUMA administrator assigns when creating the microservice.

SourceAccountID

String

-

This field stores the user ID.

SourceAssetID

String

-

This field stores the asset ID of the event source.

SpaceID

String

-

ID of the space.

TenantID

String

-

This field stores the ID of the tenant.

TI

Nested [string:string] dictionary

-

Field that contains categories in a dictionary format received from an external Threat Intelligence source based on indicators from an event.

TICategories

map[string]

-

This field contains categories received from an external TI provider based on the indicators contained in the event.

Timestamp

Number

-

Timestamp of the base event created in the collector. Creation time of the correlation event created by the collector. The time is specified in UTC0. In the KUMA web interface, the value is displayed based in the timezone of the user's browser.

Nested Affected structure

Field

Data type

Description

Assets

Nested [AffectedRecord] list

List and number of assets associated with the alert.

Accounts

Nested [AffectedRecord] list

List and number of user accounts associated with the alert.

Nested AffectedRecord structure

Field

Data type

Description

Value

String

ID of the asset or user account.

Count

Number

The number of times an asset or user account appears in alert-related events.

Fields generated by KUMA

KUMA generates the following fields that cannot be modified: BranchID, BranchName, DestinationAccountName, DestinationAssetName, DeviceAssetName, SourceAccountName, SourceAssetName, TenantID (the field displays the name of the tenant, an enriched value, while the tenant ID is used for searching the database).

Page top
[Topic 217941]

Configuring the data model of a normalized event from KATA EDR

To investigate the information, the IDs of the event and the KATA/EDR process must go to certain fields of the normalized event. To build a process tree for events coming from KATA/EDR, you must configure the copying of data from the fields of the raw events to the fields of the normalized event in KUMA normalizers as follows:

  1. For any KATA/EDR events, you must configure normalization with copying of the following fields:
    • The EventType field of the KATA/EDR event must be copied to the DeviceEventCategory field of the normalized KUMA event.
    • The HostName field of the KATA/EDR event must be copied to the DeviceHostName field of the normalized KUMA event.
  2. For any event where DeviceProduct = 'KATA', normalization must be configured in accordance with the table below.

    Normalization of event fields from KATA/EDR

    KATA/EDR event field

    Normalized event field

    IOATag

     

    DeviceCustomIPv6Address2

    IOATag

    IOAImportance

     

    DeviceCustomIPv6Address1

    IOAImportance

    FilePath

    FilePath

    FileName

    FileName

    Md5

    FileHash

    FileSize

    FileSize

  3. For events listed in the table below, additional normalization with field copying must be configured in accordance with the table.

    Additional normalization with copying of event fields from KATA/EDR

    Event

    Raw event field

    Normalized event field

    Process

     

    UniqueParentPid

    FlexString1

    UniquePid

    FlexString2

    HostName

    DeviceHostName

    FileName

    FileName

    AppLock

     

    UniquePid

    FlexString2

    HostName

    DeviceHostName

    FileName

    FileName

    BlockedDocument

     

    UniquePid

    FlexString2

    HostName

    DeviceHostName

    FileName

    FileName

    Module

     

    UniquePid

    FlexString2

    HostName

    DeviceHostName

    FileName

    FileName

    FileChange

     

    UniquePid

    FlexString2

    HostName

    DeviceHostName

    FileName

    FileName

    Driver

     

    HostName

    DeviceHostName

    FileName

    FileName

    ProductName

     

    DeviceCustomString5,

    ProductName

    ProductVendor

     

    DeviceCustomString6

    ProductVendor

    Connection

     

    UniquePid

    FlexString2

    HostName

    DeviceHostName

    URI

    RequestURL

    RemoteIP

    DestinationAddress

    RemotePort

    DestinationPort

    PortListen

     

    UniquePid

    FlexString2

    HostName

    DeviceHostName

    LocalIP

    SourceAddress

    LocalPort

    SourcePort

    Registry

     

    UniquePid

    FlexString2

    HostName

    DeviceHostName

    ValueName

     

    DeviceCustomString5

    New Value Name

    KeyName

     

    DeviceCustomString4

    New Key Name

    PreviousKeyName

     

    FlexString2

    Old Key Name

    ValueData

     

    DeviceCustomString6

    New Value Data

    PreviousValueData

     

    FlexString1

    Old Value Data

    ValueType

     

    FlexNumber1

    Value Type

    PreviousValueType

     

    FlexNumber2

    Previous Value Type

    SystemEventLog

     

    UniquePid

    FlexString2

    HostName

    DeviceHostName

    OperationResult

    EventOutcome

    EventId

     

    DeviceCustomNumber3

    EventId

    EventRecordId

     

    DeviceCustomNumber2

    EventRecordId

    Channel

     

    DeviceCustomString6

    Channel

    ProviderName

    SourceUserID

    ThreatDetect

     

    UniquePid

    FlexString2

    HostName

    DeviceHostName

    VerdictName

    EventOutcome

    DetectedObjectType

    OldFileType

    isSilent

     

    FlexString1

    Is Silent

    RecordId

     

    DeviceCustomString5

    Record ID

    DatabaseTimestamp

     

    DeviceCustomDate2

    Database Timestamp

    ThreatDetectProcessingResult

     

    UniquePid

    FlexString2

    HostName

    DeviceHostName

    ThreatStatus

     

    DeviceCustomString5

    Threat Status

    PROCESS_INTERPRET_FILE_RUN

     

    UniquePid

    FlexString2

    HostName

    DeviceHostName

    FileName

    FileName

    InterpretedFilePath

    OldFilePath

    InterpretedFileSize

    OldFileSize

    InterpretedFileHash

    OldFileHash

    PROCESS_CONSOLE_INTERACTIVE_INPUT

     

    UniquePid

    FlexString2

    HostName

    DeviceHostName

    InteractiveInputText

     

    DeviceCustomString4

    Command Line

    AMSI SCAN

     

    UniquePid

    FlexString2

    HostName

    DeviceHostName

    ObjectContent

     

    DeviceCustomString5

    Object Content

Page top
[Topic 265667]

Alert data model

This section describes the KUMA alert data model. Alerts are created by correlators whenever information security threats are detected using correlation rules. Alerts must be investigated to eliminate these threats.

Alert field

Data type

Description

ID

String

Unique ID of the alert.

TenantID

String

ID of the tenant that owns the alert. The value is inherited from the correlator that generated the alert.

TenantName

String

Tenant name.

CorrelationRuleID

String

ID of the rule used as the basis for generating the alert.

CorrelationRuleName

String

Name of the correlation rule used as the basis for generating the alert.

Status

String

Alert status. Possible values:

  • New—new alert.
  • Assigned—the alert is assigned to a user.
  • Closed—the alert was closed.
  • Exported to IRP—the alert was exported to the IRP system for further investigation.
  • Escalated—an incident was generated based on this alert.

Priority

Number

Alert severity. Possible values:

  • 1–4 — Low.
  • 5–8 — Medium.
  • 9–12 — High.
  • 13–16 — Critical.

ManualPriority

TRUE/FALSE string

Parameter showing how the alert severity level was determined. Possible values:

  • true—defined by the user.
  • false (default value)—calculated automatically.

FirstSeen

Number

Time when the first correlation event was created from the alert.

LastSeen

Number

Time when the last correlation event was created from the alert.

UpdatedAt           

Number

Date of the last modification to the alert parameters.

UserID               

String

ID of the KUMA user assigned to examine the alert.

UserName 

String

Name of the KUMA user assigned to examine the alert.
 

GroupedBy

Nested list of strings

List of event fields used to group events in the correlation rule.

ClosingReason

String

Reason for closing the alert. Possible values:

  • Incorrect Correlation Rule—the alert was a false positive and the received events do not indicate a real security threat. The correlation rule may need to be updated.
  • Incorrect Data—the alert was a false positive and the received events do not indicate a real security threat.
  • Responded—the appropriate measures were taken to eliminate the security threat.

Overflow             

TRUE/FALSE string

Indicator that the alert is overflowed, which means that the size of the alert and the events associated with it exceeds 16 MB. Possible values:

  • true
  • false

MaxAssetsWeightStr   

String

Maximum severity of the asset categories associated with the alert.

IntegrationID

String

ID of the alert in the IRP / SOAR application, if integration with such an application is configured in KUMA.

ExternalReference

String

Link to a section in the IRP / SOAR application that displays information about an alert imported from KUMA.

IncidentID 

String

ID of the incident to which the alert is linked.

IncidentName

String

Name of the incident to which the alert is linked.

SegmentationRuleName

String

Name of the segmentation rule used to group correlation events in the alert.

BranchID      

String

ID of the hierarchy branch in which the alert was generated. Indicated for a hierarchical deployment of KUMA.

BranchName  

String

Name of the hierarchy branch in which the alert was generated. Indicated for a hierarchical deployment of KUMA.

Actions

Nested [Action] structure

Nested structure with lines indicating changes to alert statuses and assignments, and user comments.

Events

Nested [EventWrapper] structure

Nested structure from which you can query the correlation events associated with the alert.

Assets

Nested [Asset] structure

Nested structure from which you can query assets associated with the alert.

Accounts

Nested [Account] structure

Nested structure from which you can query the user accounts associated with the alert.

AffectedAssets

Nested [Affected] structure

Nested structure from which you can query alert-related assets and user accounts, and find out the number of times they appear in alert events.

Nested Affected structure

Field

Data type

Description

Assets

Nested [AffectedRecord] list

List and number of assets associated with the alert.

Accounts

Nested [AffectedRecord] list

List and number of user accounts associated with the alert.

Nested AffectedRecord structure

Field

Data type

Description

Value

String

ID of the asset or user account.

Count

Number

The number of times an asset or user account appears in alert-related events.

Nested EventWrapper structure

Field

Data type

Description

Event

Nested [Event] structure

Event fields.

Comment

String

Comment added when events were added to the alert.

LinkedAt

Number

Date when events were added to the alert.

Nested Action structure

Field

Data type

Description

CreatedAt

Number

Date when the action was taken on the alert.

UserID

String

User ID.

Kind

String

Type of action.

Value

String

Value.

Event

Nested [Event] structure

Event fields.

ClusterID

String

Cluster ID.

Page top
[Topic 233888]

Asset data model

The structure of an asset is represented by fields that contain values. Fields can also contain nested structures.

Asset field

Value type

Description

ID

String

Asset ID.

TenantName

String

Tenant name.

DeletedAt

Number

Asset deletion date.

CreatedAt

Number

Asset creation date.

TenantID

String

Tenant ID.

DirectCategories

Nested list of strings

Asset categories.

CategoryModels

Nested [Category] structure

Changes asset categories.

AffectedByIncidents

Nested dictionary:

[string:string TRUE/FALSE]

IDs of incidents.

IPAddress

Nested list of strings

Asset IP addresses.

FQDN

String

Asset FQDN.

Weight

Number

Asset importance.

Deleted

String with TRUE/FALSE values

Indicator of whether the asset has been marked for deletion from KUMA.

UpdatedAt

Number

Date of last update of the asset.

MACAddress

Nested list of strings

Asset MAC addresses.

IPAddressInt

Nested list of numbers

IP address in number format.

Owner

Nested [OwnerInfo] structure

Asset owner information.

OS

Nested [OS] structure

Asset operating system information.

displayName

String

Asset name.

APISoft

Nested [Software] structure

Software installed on the asset.

APIVulns

Nested [Vulnerability] structure

Asset vulnerabilities.

KICSServerIp

String

KICS/KATA server IP address.

KICSConnectorID

Number

KICS/KATA connector ID.

KICSDeviceID

Number

KICS/KATA asset ID.

KICSStatus

String

KICS/KATA asset status.

KICSHardware

Nested [KICSSystemInfo] structure

Asset hardware information received from KICS/KATA.

KICSSoft

Nested [KICSSystemInfo] structure

Asset software information received from KICS/KATA.

KICSRisks

Nested [KICSRisk] structure

Asset vulnerability information received from KICS/KATA.

Sources

Nested [Sources] structure

Basic information about the asset from various sources.

FromKSC

String with TRUE/FALSE values

Indicator that asset details have been imported from KSC.

NAgentID

String

ID of the KSC Agent from which the asset information was received.

KSCServerFQDN

String

FQDN of the KSC Server.

KSCInstanceID

String

KSC instance ID.

KSCMasterHostname

String

KSC Server host name.

KSCGroupID

Number

KSC group ID.

KSCGroupName

String

KSC group name.

LastVisible

Number

Date when information about the asset was last received from KSC.

Products

Nested dictionary:

[string:nested [ProductInfo] structure]

Information about Kaspersky applications installed on the asset received from KSC.

Hardware

Nested [Hardware] structure

Asset hardware information received from KSC.

KSCSoft

Nested [Software] structure

Asset software information received from KSC.

KSCVulns

Nested [Vulnerability] structure

Asset vulnerability information received from KSC.

Nested Category structure

Field

Value type

Description

ID

String

Category ID.

TenantID

String

Tenant ID.

TenantName

String

Tenant name.

Parent

String

Parent category.

Path

Nested list of strings

Structure of categories.

Name

String

Category name.

UpdatedAt

Number

Last update of the category.

CreatedAt

Number

Category creation date.

Description

String

Category description.

Weight

Number

Category importance.

CategorizationKind

String

Asset category assignment type.

CategorizationAt

Number

Categorization date.

CategorizationInterval

String

Category assignment interval.

Nested OwnerInfo structure

Field

Value type

Description

displayName

String

Name of the asset owner.

Nested OS structure

Field

Value type

Description

Name

String

Name of the operating system.

BuildNumber

Number

Operating system version.

Nested Software structure

Field

Value type

Description

displayName

String

Software name.

DisplayVersion

String

Software version.

Publisher

String

Software publisher.

InstallDate

String

Installation date.

HasMSIInstaller

TRUE/FALSE string

Indicates whether the software has an MSI installer.

Nested Vulnerability structure

Field

Value type

Description

KasperskyID

String

Vulnerability ID assigned by Kaspersky.

ProductName

String

Software name.

DescriptionURL

String

URL containing the vulnerability description.

RecommendedMajorPatch

String

Recommended update.

RecommendedMinorPatch

String

Recommended update.

SeverityStr

String

Vulnerability severity.

Severity

Number

Vulnerability severity.

CVE

Nested list of strings

CVE vulnerability ID.

ExploitExists

TRUE/FALSE string

Indicates whether an exploit exists.

MalwareExists

TRUE/FALSE string

Indicates whether malware exists.

Nested KICSSystemInfo structure

Field

Value type

Description

Model

String

Device model.

Version

String

Device version.

Vendor

String

Vendor.

Nested KICSRisk structure

Field

Value type

Description

ID

Number

KICS/KATA risk ID.

Name

String

Risk name.

Category

String

Risk type.

Description

String

Risk description.

DescriptionURL

String

Link to risk description.

Severity

Number

Risk severity.

Cvss

Number

CVSS score.

Nested Sources structure

Field

Value type

Description

KSC

Nested [SourceInfo] structure

Asset information received from KSC.

API

Nested [SourceInfo] structure

Asset information received through the REST API.

Manual

Nested [SourceInfo] structure

Manually entered information about the asset.

KICS

Nested [SourceInfo] structure

Asset information received from KICS/KATA.

Nested Sources structure

Field

Value type

Description

MACAddress

Nested list of strings

Asset MAC addresses.

IPAddressInt

Nested list of numbers

IP address in number format.

Owner

Nested [OwnerInfo] structure

Asset owner information.

OS

Nested [OS] structure

Asset operating system information.

displayName

String

Asset name.

IPAddress

Nested list of strings

Asset IP addresses.

FQDN

String

Asset FQDN.

Weight

Number

Asset importance.

Deleted

String with TRUE/FALSE values

Indicator of whether the asset has been marked for deletion from KUMA.

UpdatedAt

Number

Date of last update of the asset.

Nested structure ProductInfo

Field

Value type

Description

ProductVersion

String

Software version.

ProductName

String

Software name.

Nested Hardware structure

Field

Value type

Description

NetCards

Nested [NetCard] structure

List of network cards of the asset.

CPU

Nested [CPU] structure

List of asset processors.

RAM

Nested [RAM] structure

Asset RAM list.

Disk

Nested [Disk] structure

List of asset drives.

Nested NetCard structure

Field

Value type

Description

ID

String

Network card ID.

MACAddresses

Nested list of strings

MAC addresses of the network card.

Name

String

Network card name.

Manufacture

String

Network card manufacture.

DriverVersion

String

Driver version.

Nested RAM structure

Field

Value type

Description

Frequency

String

RAM frequency.

TotalBytes

Number

Amount of RAM, in bytes.

Nested CPU structure

Field

Value type

Description

ID

String

CPU ID.

Name

String

CPU name.

CoreCount

String

Number of cores.

CoreSpeed

String

Frequency.

Nested Disk structure

Field

Value type

Description

FreeBytes

Number

Available disk space.

TotalBytes

Number

Total disk space.

Page top
[Topic 234818]

User account data model

User account fields can be addressed from email templates and during event correlation.

Field

Value type

Description

ID

String

User account ID.

ObjectGUID

String

Active Directory attribute. User account ID in Active Directory.

TenantID

String

Tenant ID.

TenantName

String

Tenant name.

UpdatedAt

Number

Last update of user account.

Domain

String

Domain.

CN

String

Active Directory attribute. User name.

displayName

String

Active Directory attribute. Displayed user name.

DistinguishedName

String

Active Directory attribute. LDAP object name.

employeeID

String

Active Directory attribute. Employee ID.

Mail

String

Active Directory attribute. User email address.

mailNickname

String

Active Directory attribute. Alternate email address.

Mobile

String

Active Directory attribute. Mobile phone number.

ObjectSID

String

Active Directory attribute. Security ID.

SAMAccountName

String

Active Directory attribute. Login.

TelephoneNumber

String

Active Directory attribute. Phone number.

UserPrincipalName

String

Active Directory attribute. User principal name (UPN).

Archived

TRUE/FALSE string

Indicator that determines whether a user account is obsolete.

MemberOf

List of strings

Active Directory attribute. AD groups joined by the user.

This attribute can be used for an event search during correlation.

PreliminarilyArchived

TRUE/FALSE string

Indicator that determines whether a user account should be designated as obsolete.

CreatedAt

Number

User account creation date.

SN

String

Active Directory attribute. Last name of the user.

SAMAccountType

String

Active Directory attribute. User account type.

Title

String

Active Directory attribute. Job title of the user.

Division

String

Active Directory attribute. User's department.

Department

String

Active Directory attribute. User's division.

Manager

String

Active Directory attribute. User's supervisor.

Location

String

Active Directory attribute. User's location.

Company

String

Active Directory attribute. User's company.

StreetAddress

String

Active Directory attribute. Company address.

PhysicalDeliveryOfficeName

String

Active Directory attribute. Delivery address.

managedObjects

List of strings

Active Directory attribute. Objects under control of the user.

UserAccountControl

Number

Active Directory attribute. AD account type.

WhenCreated

Number

Active Directory attribute. User account creation date.

WhenChanged

Number

Active Directory attribute. User account modification date.

AccountExpires

Number

Active Directory attribute. User account expiration date.

BadPasswordTime

Number

Active Directory attribute. Date of last unsuccessful login attempt.

Page top
[Topic 234819]

KUMA audit events

Audit events are created when certain security-related actions are completed in KUMA. These events are used to ensure system integrity.

To view audit events, go to the Events section in KUMA and add "SELECT * FROM 'events' WHERE Type=4" to the query.

As a result of executing the query, audit events are displayed in the Events section if the user role allows viewing audit events.

In this section

Event fields with general information

User was successfully signed in or failed to sign in

User login successfully changed

User role was successfully changed

Other data of the user was successfully changed

User successfully logged out

User password was successfully changed

User was successfully created

User role was successfully assigned

User role was successfully revoked

The user has successfully edited the set of fields settings to define sources

User access token was successfully changed

Changed the set of spaces to differentiate access to events

Service was successfully created

Service was successfully deleted

Service was successfully reloaded

Service was successfully restarted

Service was successfully started

Service was successfully paired

Service status was changed

Storage partition was deleted by user

Storage partition was deleted automatically due to expiration

Storage partition was deleted automatically or moved due to exceeding the storage capacity.

Active list was successfully cleared or operation failed

Active list item was successfully changed, or operation was unsuccessful

Active list item was successfully deleted or operation was unsuccessful

Active list was successfully imported or operation failed

Active list was exported successfully

Resource was successfully added

Resource was successfully deleted

Resource was successfully updated

Asset was successfully created

Asset was successfully deleted

Asset category was successfully added

Asset category was deleted successfully

Settings were updated successfully

Tenant was successfully created

Tenant was successfully enabled

Tenant was successfully disabled

Other tenant data was successfully changed

Updated data retention policy after changing drives

The dictionary was successfully updated on the service or operation was unsuccessful

Response in Active Directory

Query sent to KIRA

KICS/KATA response

Kaspersky Automated Security Awareness Platform response

KEDR response

Importing MITRE ATT&CK techniques and tactics

Page top
[Topic 217744]

Event fields with general information

Every audit event has the event fields described below.

Event field name

Field value

ID

Unique event ID in the form of an UUID.

Timestamp

Event time.

DeviceHostName

The event source host. For audit events, it is the hostname where kuma-core is installed, because it is the source of events.

DeviceTimeZone

Timezone of the system time of the server hosting the KUMA Core in the format +-hh:mm.

Type

Type of the audit event. For audit event the value is 4.

TenantID

ID of the main tenant.

DeviceVendor

Kaspersky

DeviceProduct

KUMA

EndTime

Event creation time.

Page top
[Topic 217865]

User was successfully signed in or failed to sign in

Event field name

Field value

DeviceAction

user login

EventOutcome

succeeded or failed—the status depends on the success or failure of the operation.

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login.

SourceUserID

User ID.

Message

Description of the error; appears only if an error occurred during login. Otherwise, the field will be empty.

Page top
[Topic 218034]

User login successfully changed

Event field name

Field value

DeviceAction

user login changed

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to change data.

SourceUserID

User ID that was used to change data.

DestinationUserName

User login whose data was changed.

DestinationUserID

User ID whose data was changed.

DeviceCustomString1

Current value of the login.

DeviceCustomString1Label

new login

DeviceCustomString2

Value of the login before it was changed.

DeviceCustomString2Label

old login

Page top
[Topic 218028]

User role was successfully changed

Event field name

Field value

DeviceAction

user role changed

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to change data.

SourceUserID

User ID that was used to change data.

DestinationUserName

User login whose data was changed.

DestinationUserID

User ID whose data was changed.

DeviceCustomString1

Current value of the role.

DeviceCustomString1Label

new role

DeviceCustomString2

Value of the role before it was changed.

DeviceCustomString2Label

old role

Page top
[Topic 218030]

Other data of the user was successfully changed

Event field name

Field value

DeviceAction

user other info changed

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to change data.

SourceUserID

User ID that was used to change data.

DestinationUserName

User login whose data was changed.

DestinationUserID

User ID whose data was changed.

Page top
[Topic 217947]

User successfully logged out

This event appears only when the user pressed the logout button.

This event will not appear if the user is logged out due to the end of the session or if the user logs in again from another browser.

Event field name

Field value

DeviceAction

user logout

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login.

SourceUserID

User ID.

Page top
[Topic 218032]

User password was successfully changed

Event field name

Field value

DeviceAction

user password changed

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to change data.

SourceUserID

User ID that was used to change data.

DestinationUserName

User login whose data was changed.

DestinationUserID

User ID whose data was changed.

Page top
[Topic 218029]

User was successfully created

Event field name

Field value

DeviceAction

user created

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to create the user account.

SourceUserID

User ID that was used to create the user account.

DestinationUserName

User login for which the user account was created.

DestinationUserID

User ID for which the user account was created.

DeviceCustomString1

Role of the created user.

DeviceCustomString1Label

role

Page top
[Topic 218033]

User role was successfully assigned

Event field name

Field value

DeviceAction

granted access

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

Login of the user for whom the data changes were made.

SourceUserID

ID of the user for whom the data changes were made.

DestinationUserPrivileges

Role name. Available values: general admin, admin, analyst, operator.

DeviceCustomString5

ID of the tenant used to assign the role.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 241703]

User role was successfully revoked

Event field name

Field value

DeviceAction

revoked access

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

Login of the user who makes the changes.

SourceUserID

ID of the user who makes the changes.

DestinationUserName

Login of the user for whom the changes are made.

DestinationUserID

ID of the user for whom the changes are made.

DestinationUserPrivileges

Role name. Available values: general admin, admin, analyst, operator.

DeviceCustomString5

ID of the tenant used to assign the role.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 241712]

The user has successfully edited the set of fields settings to define sources

Event field name

Field value

DeviceAction

settings updated

DeviceFacility

eventSourceIdentity

EventOutcome

succeeded

SourceUserName

Login of the user who makes the changes.

SourceUserID

ID of the user who makes the changes.

DeviceCustomString5

Updated set of fields, | is used as the delimiter.

Page top
[Topic 276306]

User access token was successfully changed

Event field name

Field value

DeviceAction

user access token changed

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to change data.

SourceUserID

User ID that was used to change the data.

DestinationUserName

User login whose data was changed.

DestinationUserID

ID of the user whose data was changed.

Page top
[Topic 218027]

Changed the set of spaces to differentiate access to events

Event field name

Field value

DeviceAction

  • space set was created
  • space set was deleted
  • space set was updated (including granting and revoking access permissions)

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to edit settings.

DeviceCustomString2

ID of the space set.

DeviceCustomString2Label

set ID

DeviceCustomString3

Name of the space set.

DeviceCustomString3Label

set name

Page top
[Topic 294388]

Service was successfully created

Event field name

Field value

DeviceAction

service created

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to create the service.

SourceUserID

User ID that was used to create the service.

DeviceExternalID

Service ID.

DeviceProcessName

Service name.

DeviceFacility

Service type.

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 217997]

Service was successfully deleted

Event field name

Field value

DeviceAction

service deleted

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to delete the service.

SourceUserID

User ID that was used to delete the service.

DeviceExternalID

Service ID.

DeviceProcessName

Service name.

DeviceFacility

Service type.

DestinationAddress

Address of the device that was used to start the service. If the service has never been started before, the field will be empty.

DestinationHostName

The FQDN of the machine that was used to start the service. If the service has never been started before, the field will be empty.

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 217998]

Service was successfully reloaded

Event field name

Field value

DeviceAction

service reloaded

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to reset the service.

SourceUserID

User ID that was used to restart the service.

DeviceExternalID

Service ID.

DeviceProcessName

Service name.

DeviceFacility

Service type.

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 218000]

Service was successfully restarted

Event field name

Field value

DeviceAction

service restarted

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to restart the service.

SourceUserID

User ID that was used to restart the service.

DeviceExternalID

Service ID.

DeviceProcessName

Service name.

DeviceFacility

Service type.

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 218001]

Service was successfully started

Event field name

Field value

DeviceAction

service started

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

Address that reported information about service start. It may be a proxy address if the information passed through a proxy.

SourcePort

Port that reported information about service start. It may be a proxy port if the information passed through a proxy.

DeviceExternalID

Service ID.

DeviceProcessName

Service name.

DeviceFacility

Service type.

DestinationAddress

Address of the device where the service was started.

DestinationHostName

FQDN of the device where the service was started.

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 218002]

Service was successfully paired

Event field name

Field value

DeviceAction

service paired

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

Address that sent a service pairing request. It may be a proxy address if the request passed through a proxy.

SourcePort

Port that sent a service pairing request. It may be a proxy port if the request passed through a proxy.

DeviceExternalID

Service ID.

DeviceProcessName

Service name.

DeviceFacility

Service type.

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 217999]

Service status was changed

Event field name

Field value

DeviceAction

service status changed

DeviceExternalID

Service ID.

DeviceProcessName

Service name.

DeviceFacility

Service type.

DestinationAddress

Address of the device where the service was started.

DestinationHostName

FQDN of the device where the service was started.

DeviceCustomString1

green, yellow, or red

DeviceCustomString1Label

new status

DeviceCustomString2

green, yellow, or red

DeviceCustomString2Label

old status

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 217996]

Storage partition was deleted by user

Event field name

Field value

DeviceAction

partition deleted

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to delete partition.

SourceUserID

User ID that was used to delete partition.

Name

Storage name | Tenant of the partition being moved or deleted | Name of the space to which the partition belongs.

Message

deleted by user

Page top
[Topic 218012]

Storage partition was deleted automatically due to expiration

Event field name

Field value

DeviceAction

applied retention policy by days.

EventOutcome

succeeded or failed

Name

Storage name | Tenant of the partition being moved or deleted | Name of the space to which the partition belongs.

DeviceCustomDate1

Partition creation date.

DeviceCustomDate1Label

date of partition

SourceServiceName

scheduler

DeviceCustomString1

Node ID.

DeviceCustomString1Label

nodeID

Message

If moved:

  • If EventOutcome = succeeded, the moved partition data to cold storage message is displayed.
  • If EventOutcome = failed, the move partition data to cold storage failed: error description> error message is displayed.

If deleted:

  • If EventOutcome = succeeded , the deleted partition data message is displayed.
  • If EventOutcome = failed, the delete partition data failed: error description> error message is displayed.

DeviceCustomNumber1

Storage partition size in bytes.

DeviceCustomNumber1Label

size

DeviceCustomNumber2

Number of events in the storage partition.

DeviceCustomNumber2Label

events

Page top
[Topic 218014]

Storage partition was deleted automatically or moved due to exceeding the storage capacity.

In KUMA, you can set a condition for storage partitions to have the disk partition automatically moved or deleted if the configured maximum size of such a partition is reached or exceeded. The maximum storage capacity can be configured in one of the following ways:

  • Specify a percentage of the entire disk partition where the storage is installed.
  • Set the size of the disk partition in GB.

If the condition is checked and it is found that the size of the storage is equal to or greater than the configured size in percent or GB, an audit event is generated and the storage partition is moved or deleted.

Event field name

Field value

DeviceAction

If the storage partition size is specified as a percentage of the disk size, the value is applied retention policy by percent.

If the storage partition size is specified in GB, the value is applied retention policy by GB.

EventOutcome

succeeded or failed

Name

Storage name | Tenant of the partition being moved or deleted | Name of the space to which the partition belongs.

DeviceCustomDate1

Partition creation date.

DeviceCustomDate1Label

date of partition

SourceServiceName

scheduler

DeviceCustomString1

Node ID.

DeviceCustomString1Label

nodeID

Message

If moved:

  • If EventOutcome = succeeded, the moved partition data to cold storage message is displayed.
  • If EventOutcome = failed, the move partition data to cold storage failed: error description> error message is displayed.

If deleted:

  • If EventOutcome = succeeded , the deleted partition data message is displayed.
  • If EventOutcome = failed, the delete partition data failed: error description> error message is displayed.

DeviceCustomNumber1

Storage partition size in bytes.

DeviceCustomNumber1Label

size

DeviceCustomNumber2

Number of events in the storage partition.

DeviceCustomNumber2Label

events

Page top
[Topic 300065]

Active list was successfully cleared or operation failed

Audit events for active lists are created only for actions performed by users. Audit events are not generated when the active lists are modified using correlation rules. If you need to track such changes, you can do so using alerts.

If an active list is modified using a correlation rule of the simple type, in which the Output and Loop actions are defined, an active list modification alert will be created each time the rule is triggered.

The event can be assigned the succeeded or failed status.

Since the request to clear an active list is made over a remote connection, a data transfer error may occur at any moment: both before and after deletion.

This means that the active list may be cleared successfully, but the event is assigned the failed status, because EventOutcome returns the TCP/IP connection status of the request, but not the succeeded or failed status of the active list clearing.

Event field name

Field value

DeviceAction

active list cleared

EventOutcome

succeeded or failed

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to clear the active list.

SourceUserID

User ID that was used to clear the active list.

DeviceExternalID

Service ID whose active list was cleared.

ExternalID

Active list ID.

Name

Active list name.

Message

If EventOutcome = failed, an error message can be found here.

DeviceCustomString5

Service tenant ID. Some errors prevent adding tenant information to the event.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 217705]

Active list item was successfully changed, or operation was unsuccessful

Audit events for active lists are created only for actions performed by users. Audit events are not generated when the active lists are modified using correlation rules. If you need to track such changes, you can do so using alerts.

If an active list is modified using a correlation rule of the simple type, in which the Output and Loop actions are defined, an active list modification alert will be created each time the rule is triggered.

The event can be assigned the succeeded or failed status.

Since the request to change an active list item is made over a remote connection, a data transfer error may occur at any moment: both before and after the change.

This means that the active list item may be changed successfully, but the event is assigned the failed status, because EventOutcome returns the TCP/IP connection status of the request, but not the succeeded or failed status of the active list item change.

Event field name

Field value

DeviceAction

active list item changed

EventOutcome

succeeded or failed

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login used to change the active list item.

SourceUserID

User ID used to change the active list item.

DeviceExternalID

Service ID for which the active list is changed.

ExternalID

Active list ID.

Name

Active list name.

DeviceCustomString1

Key name.

DeviceCustomString1Label

key

Message

If EventOutcome = failed, an error message can be found here.

DeviceCustomString5

Service tenant ID. Some errors prevent adding tenant information to the event.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name

DeviceCustomString6Label

tenant name

Page top
[Topic 241746]

Active list item was successfully deleted or operation was unsuccessful

Audit events for active lists are created only for actions performed by users. Audit events are not generated when the active lists are modified using correlation rules. If you need to track such changes, you can do so using alerts.

If an active list is modified using a correlation rule of the simple type, in which the Output and Loop actions are defined, an active list modification alert will be created each time the rule is triggered.

The event can be assigned the succeeded or failed status.

Since the request to delete an active list item is made over a remote connection, a data transfer error may occur at any moment: both before and after deletion.

This means that the active list item may be deleted successfully, but the event is assigned the failed status, because EventOutcome returns the TCP/IP connection status of the request, but not the succeeded or failed status of the active list item deletion.

Event field name

Field value

DeviceAction

active list item deleted

EventOutcome

succeeded or failed

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to delete the item from the active list.

SourceUserID

User ID that was used to delete the item from the active list.

DeviceExternalID

Service ID whose active list was cleared.

ExternalID

Active list ID.

Name

Active list name.

DeviceCustomString1

Key name.

DeviceCustomString1Label

key

Message

If EventOutcome = failed, an error message can be found here.

DeviceCustomString5

Service tenant ID. Some errors prevent adding tenant information to the event.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 217703]

Active list was successfully imported or operation failed

Audit events for active lists are created only for actions performed by users. Audit events are not generated when the active lists are modified using correlation rules. If you need to track such changes, you can do so using alerts.

If an active list is modified using a correlation rule of the simple type, in which the Output and Loop actions are defined, an active list modification alert will be created each time the rule is triggered.

Active list items are imported in parts via a remote connection.

Since the import is performed via a remote connection, a data transfer error can occur at any time: when the data is imported partially or completely. EventOutcome returns the connection status, not the import status.

Event field name

Field value

DeviceAction

active list imported

EventOutcome

succeeded or failed

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to perform the import.

SourceUserID

User ID that was used to perform the import.

DeviceExternalID

Service ID for which an import was performed.

ExternalID

Active list ID.

Name

Active list name.

Message

If EventOutcome = failed, an error message can be found here.

DeviceCustomString5

Service tenant ID. Some errors prevent adding tenant information to the event.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name

DeviceCustomString6Label

tenant name

Page top
[Topic 217706]

Active list was exported successfully

Audit events for active lists are created only for actions performed by users. Audit events are not generated when the active lists are modified using correlation rules. If you need to track such changes, you can do so using alerts.

If an active list is modified using a correlation rule of the simple type, in which the Output and Loop actions are defined, an active list modification alert will be created each time the rule is triggered.

Event field name

Field value

DeviceAction

active list exported

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to perform the export.

SourceUserID

User ID that was used to perform the export.

DeviceExternalID

Service ID for which an export was performed.

ExternalID

Active list ID.

Name

Active list name.

DeviceCustomString5

Service tenant ID. Some errors prevent adding tenant information to the event.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name

DeviceCustomString6Label

tenant name

Page top
[Topic 217704]

Resource was successfully added

Event field name

Field value

DeviceAction

resource added

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to add the resource.

SourceUserID

User ID that was used to add the resource.

DeviceExternalID

Resource ID.

DeviceProcessName

Resource name.

DeviceFacility

Resource type:

  • activeList
  • agent
  • aggregationRule
  • collector
  • connection
  • connector
  • correlationRule
  • correlator
  • destination
  • dictionary
  • enrichmentRule
  • filter
  • normalizer
  • proxy
  • responseRule
  • storage

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 217968]

Resource was successfully deleted

Event field name

Field value

DeviceAction

resource deleted

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to delete the resource.

SourceUserID

User ID that was used to delete the resource.

DeviceExternalID

Resource ID.

DeviceProcessName

Resource name.

DeviceFacility

Resource type:

  • activeList
  • agent
  • aggregationRule
  • collector
  • connection
  • connector
  • correlationRule
  • correlator
  • destination
  • dictionary
  • enrichmentRule
  • filter
  • normalizer
  • proxy
  • responseRule
  • storage

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 217969]

Resource was successfully updated

Event field name

Field value

DeviceAction

resource updated

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to update the resource.

SourceUserID

User ID that was used to update the resource.

DeviceExternalID

Resource ID.

DeviceProcessName

Resource name.

DeviceFacility

Resource type:

  • activeList
  • agent
  • aggregationRule
  • collector
  • connection
  • connector
  • correlationRule
  • correlator
  • destination
  • dictionary
  • enrichmentRule
  • filter
  • normalizer
  • proxy
  • responseRule
  • storage

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 217970]

Asset was successfully created

Event field name

Field value

DeviceAction

asset created

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to add the asset.

SourceUserID

User ID that was used to add the asset.

DeviceAssetID

Asset ID.

SourceHostName

Asset ID.

Name

Asset name.

DeviceCustomString1

Comma-separated IP addresses of the asset.

DeviceCustomString1Label

addresses

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 217742]

Asset was successfully deleted

Event field name

Field value

DeviceAction

asset deleted

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to add the asset.

SourceUserID

User ID that was used to add the asset.

DeviceAssetID

Asset ID.

SourceHostName

Asset ID.

Name

Asset name.

DeviceCustomString1

Comma-separated IP addresses of the asset.

DeviceCustomString1Label

addresses

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 217741]

Asset category was successfully added

Event field name

Field value

DeviceAction

category created

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to add the category.

SourceUserID

User ID that was used to add the category.

DeviceExternalID

Category ID.

Name

Category name.

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 217740]

Asset category was deleted successfully

Event field name

Field value

DeviceAction

category deleted

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to delete the category.

SourceUserID

User ID that was used to delete the category.

DeviceExternalID

Category ID.

Name

Category name.

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 217739]

Settings were updated successfully

Event field name

Field value

DeviceAction

settings updated

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to update the settings.

SourceUserID

User ID that was used to update the settings.

DeviceFacility

Type of settings.

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 218005]

Tenant was successfully created

Event field name

Field value

DeviceAction

tenant created

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login used to create the tenant.

SourceUserID

User ID used to create the tenant.

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 241753]

Tenant was successfully enabled

Event field name

Field value

DeviceAction

tenant enabled

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login used to enable the tenant.

SourceUserID

User ID used to enable the tenant.

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 241764]

Tenant was successfully disabled

Event field name

Field value

DeviceAction

tenant disabled

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login used to disable the tenant.

SourceUserID

User ID used to disable the tenant.

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 241766]

Other tenant data was successfully changed

Event field name

Field value

DeviceAction

tenant other info changed

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to change the tenant data.

SourceUserID

User ID that was used to change the tenant data.

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 241767]

Updated data retention policy after changing drives

Event field name

Field value

DeviceAction

storage policy modified

EventOutcome

succeeded or failed

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to change the tenant data.

SourceUserID

User ID that was used to change the tenant data.

Page top
[Topic 241770]

The dictionary was successfully updated on the service or operation was unsuccessful

Event field name

Field value

DeviceAction

service created

EventOutcome

succeeded

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to create the service.

SourceUserID

User ID that was used to create the service.

DeviceExternalID

Service ID.

ExternalID

Dictionary ID.

DeviceProcessName

Service name.

DeviceFacility

Service type.

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Message

If EventOutcome = failed, an error message can be found here.

Page top
[Topic 241769]

Response in Active Directory

Event field name

Field value

DeviceAction

ad response

DeviceFacility

manual response or automatic response

EventOutcome

succeeded or failed

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

User login that was used to change the tenant data.

SourceUserID

User ID that was used to change the tenant data.

DeviceCustomString3

Response rule name: CHANGE_PASSWORD, ADD_TO_GROUP, REMOVE_FROM_GROUP, BLOCK_USER.

DeviceCustomString3Label

response rule name

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

DestinationUserName

The Active Directory user account to which the response is invoked (sAMAccountName).

DestinationNtDomain

Domain of the Active Directory user account to which the response is invoked.

DestinationUserID

Account UUID in KUMA.

FlexString1

Information about the group where the user was added or deleted.

FlexString1Label

group DN

Page top
[Topic 241775]

Request sent to KIRA

Event field name

Field value

DeviceAction

KIRA task

EventOutcome

succeeded/failed

SourceUserName

User login used to send the request.

SourceUserID

User ID used to send the request.

DeviceCustomString1

The resulting string that was sent.

DeviceCustomString1Label

cmd

DeviceCustomString2

ID of the event from which the request was sent.

DeviceCustomString2Label

event

DeviceCustomString3

ID of the task created to send the request.

DeviceCustomString3Label

task

Page top
[Topic 294917]

KICS/KATA response

Event field name

Field value

DeviceAction

KICS response

DeviceFacility

manual response or automatic response

EventOutcome

succeeded or failed

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

Login of the user who sent the request.

SourceUserID

ID of the user who sent the request.

DeviceCustomString3

Response rule name: Authorized, Not Authorized.

DeviceCustomString3Label

response rule name

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

DeviceAssetID

Asset ID.

SourceHostName

Asset FQDN.

Name

Asset name.

DeviceCustomString1

List of IP addresses for the asset.

DeviceCustomString1Label

addresses

Page top
[Topic 245019]

Kaspersky Automated Security Awareness Platform response

Event field name

Field value

DeviceAction

KASAP response

DeviceFacility

manual response

EventOutcome

succeeded or failed

Message

Description of the error, if an error occurred, otherwise the field is empty.

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

Login of the user who sent the request.

SourceUserID

ID of the user who sent the request.

DeviceCustomString1

The manager of the user to whom the course is assigned.

DeviceCustomString1Label

manager

DeviceCustomString3

Information about the group where the user belonged. Not available for failed.

DeviceCustomString3Label

manager

DeviceCustomString4

Information about the group where the user was added.

DeviceCustomString4Label

new kasap group

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

DestinationUserID

ID of the Active Directory user account which causes the response.

DestinationUserName

Account name (sAMAccountName).

DestinationNtDomain

Domain of the Active Directory user account which causes the response.

Page top
[Topic 245020]

KEDR response

Event field name

Field value

DeviceAction

KEDR response

DeviceFacility

manual response or automatic response

EventOutcome

succeeded or failed

Message

Description of the error, if an error occurred, otherwise the field is empty.

SourceTranslatedAddress

This field contains the value of the HTTP header x-real-ip or x-forwarded-for. If these headers are absent, the field will be empty.

SourceAddress

The address from which the user logged in. If the user logged in using a proxy, there will be a proxy address.

SourcePort

Port from which the user logged in. If the user logged in using a proxy, there will be a port on the proxy side.

SourceUserName

Login of the user who sent the request.

SourceUserID

ID of the user who sent the request.

SourceAssetID

KUMA asset ID which causes the response. The value is not specified if the response is based on a hash or for all assets.

DeviceExternalID

The external ID assigned to KUMA in KEDR. If there is only one external ID, it is not filled in when started on user hosts.

DeviceCustomString1

List of IP/FQDN addresses of the asset for the host prevention rule based on the selected hash from the event card.

DeviceCustomString1Label

user defined list of ips or hostnames

DeviceCustomString2

Sensor ID parameter in KEDR (UUIDv4 | 'all' | 'custom').

DeviceCustomString2Label

sensor id of asset in KATA/EDR

ServiceID

ID of the service that caused the response. Filled in only in case of automatic response.

DeviceCustomString3

Task type name: enable_network_isolation, disable_network_isolation, enable_prevention, disable_prevention, run_process.

DeviceCustomString3Label

kedr response kind

DeviceCustomString5

Tenant ID.

DeviceCustomString5Label

tenant ID

DeviceCustomString6

Tenant name.

DeviceCustomString6Label

tenant name

Page top
[Topic 245021]

Correlation rules

The file that can be downloaded by clicking the link describes the correlation rules that are included in the distribution kit of Kaspersky Unified Monitoring and Analysis Platform version 3.4. It provides the scenarios covered by rules, the conditions of their use, and the necessary sources of events.

The correlation rules described in this document are contained in the KUMA distribution in the SOC_package and Network_package files and are protected by passwords: SOC_package1 and Network_package1. Only one of the following versions of the SOC rule set can be used at a time: [OOTB] SOC Content - RU, [OOTB] SOC Content - ENG, [OOTB] SOC Content - RU for KUMA 3.4 or [OOTB] SOC Content - ENG for KUMA 3.4, [OOTB] Network Package - RU, or [OOTB] Network Package - ENG.

You can import correlation rules into KUMA. See the Importing resources section of the Online Help: https://support.kaspersky.com/KUMA/3.4/en-US/242787.htm.

You can add imported correlation rules to correlators that your organization uses. See the Online Help section Step 3. Correlation: https://support.kaspersky.com/KUMA/3.4/en-US/221168.htm.

Download a description of correlation rules

Description of correlation rule packages

The distribution kit of Kaspersky Unified Monitoring and Analysis Platform 3.2 includes the correlation rule packages listed in the table below.

Correlation rule packages

Package name

Description

[OOTB] SOC Content - RU

Correlation rule package for KUMA version 2.1 or later with Russian localization. This package is no longer supported.

[OOTB] SOC Content - ENG

Correlation rule package for KUMA version 2.1 or later with English localization. This package is no longer supported.

[OOTB] SOC Content - RU for KUMA 3.2

Correlation rule package for KUMA version 3.2 or later with Russian localization. The rules contain information about MITRE ATT&CK matrix coverage.

[OOTB] SOC Content - ENG for KUMA 3.2

Correlation rule package for KUMA version 3.2 or later with English localization. The rules contain information about the MITRE ATT&CK matrix coverage.

[OOTB] Network Package - RU

Package of correlation rules aimed at detecting network activity anomalies, for KUMA version 3.2 and later with Russian localization. The rules contain information about MITRE ATT&CK matrix coverage.

[OOTB] Network Package - ENG

Package of correlation rules aimed at detecting network activity anomalies, for KUMA version 3.2 and later with English localization. The rules contain information about the MITRE ATT&CK matrix coverage.

Automatic rule suppression

The SOC_package correlation rules package allows automatically suppressing the triggering of rules if the triggering frequency exceeds thresholds.

The automatic suppression option works as follows: if a rule is triggered more than 100 times in 1 minute and this behavior occurs at least 5 times in the span of 10 minutes, the rule is added to the stop list.

  • When placed in the stop list for the first time, the rule is disabled for 1 hour.
  • If this happens again, it is placed in the list for 24 hours.
  • All subsequent occurrences place it in the list for 7 days.

The logic is described in the resources: rules, active lists, and dictionaries, which are located in the "SOC_package/System/Rule disabling by condition" directory.

You can customize settings and thresholds in accordance with your requirements.

To enable the automatic suppression option, set the enable setting to 1 in the "SOC_package/Integration/Rule disabling configuration" dictionary.

To disable the automatic suppression option, set the enable setting to 0 in the "SOC_package/Integration/Rule disabling configuration" dictionary.

By default, automatic suppression is enabled and the enable setting is set to 1.

Audit events

Correlation rules from the "[OOTB] SOC Content" resource set use the audit events that are listed in the table below.

Audit events

Event source

Audit events

CheckPoint

Anti Malware, Threat Emulation

Cisco ASA, FTD, PIX

106021, 320001, 322001, 322002, 322003, 405001, 405002

CyberTrace

alert

DNS

query

KATA

TAA has tripped on events database

KSC

GNRL_EV_ATTACK_DETECTED, GNRL_EV_SUSPICIOUS_OBJECT_FOUND, GNRL_EV_VIRUS_FOUND, GNRL_EV_WEB_URL_BLOCKED, KLSRV_HOST_STATUS_CRITICAL, KLSRV_HOST_STATUS_OK, KLSRV_HOST_STATUS_WARNING

KSMG

LMS_EV_SCAN_LOGIC_AV_STATUS, LMS_EV_SCAN_LOGIC_KT_STATUS, LMS_EV_SCAN_LOGIC_CF_STATUS, LMS_EV_SCAN_LOGIC_AP_STATUS

KUMA

Correlation rule

Windows Event Log Powershell

4103, 4104

Windows Event Log Security

1102, 4624, 4625, 4656, 4657, 4662, 4663, 4672, 4688, 4697, 4720, 4722, 4723, 4724, 4725, 4726, 4727, 4728, 4729, 4730, 4731, 4732, 4733, 4734, 4735, 4737, 4738, 4768, 4769, 4771, 5136, 5140, 5145

Windows Event Log System

7036, 7045

Windows Event Log Defender

1006, 1015, 1116, 1117, 5001, 5010, 5012, 5101

Netflow, FW

Traffic log

Palo Alto

virus

auditd

ADD_USER, DEL_USER, PATH, SYSCALL, USER_AUTH, USER_LOGIN, execve

Page top
[Topic 250594]

Sending test events to KUMA

KUMA allows sending test events to the system. Use the option of sending test events to KUMA to test rules, reports, dashboards, and also to check the resource consumption of the collector with different event streams. Events can only be sent to a collector that receives events over TCP or HTTP.

To send test events, you need:

  • The 'kuma' file started with certain options.

    In the following instructions, the file with raw events is named send_test_events.txt as an example. You can use your own file name.

  • A configuration file in which you define the parameters for running the executable file.

    In the following instructions, the configuration file is named config_for_test_events as an example. You can use your own file name.

To send test events:

  1. Get sample events to send to KUMA:
    1. In the KUMA web interface, in the Events section, in the upper right corner, click the gear icon and in the displayed window, on the Event fields columns tab, select the check box for the Raw field. The 'Raw' column is displayed in the Events window.
    2. Search for events.
    3. Export your search results: in the Events window, in the upper right corner, click more and select Export TSV.
    4. Go to the KUMA Task manager section and click the Export events task; in the context menu, select Download.

      The <name of file with exported events>.tsv file is displayed in the Downloads section.

      If you are not collecting raw events, enable collection for a short time by setting the Keep raw event setting of the normalizer to Always. After the collection is completed, restore the previous value of the Keep raw event setting.

    5. Create a text file named send_test_events.txt and copy the contents of the Raw field from <name of file with exported events>.tsv to a text file named send_test_events.txt.
    6. Save send_test_events.txt.
  2. Create a config_for_test_events configuration file and add the following lines to the file:

    {

    "kind": "<tcp or http>",

    "name": "-",

    "connection": {

    "name": "-",

    "kind": "<tcp or http>",

    "urls": ["<IP address of the KUMA collector for receiving events over TCP>:<port of the KUMA collector for receiving event over TCP>"]

    }

    }

    Save the config_for_test_events configuration file.

  3. Ensure that network connectivity exists between the server sending events and the server on which the collector is installed.
  4. To send the contents of the test event file to the KUMA collector, run the following command:

    /opt/kaspersky/kuma/kuma tools load --raw --events /home/events/send_test_events.txt --cfg home/events/config_for_test_events --limit 1500 --replay 100000

    Available settings

    Setting

    Description

    --events

    Full path to the file containing raw events.

    Required setting. If the full path is not specified, the command does not run.

    --cfg

    Path to the configuration file.

    Required setting. If the full path is not specified, the command does not run.

    --limit

    Stream to be sent to the collector, in events per second (EPS).

    Required setting. If no value is specified, the command does not run.

    --replay

    Number of events to send.

    Required setting. If no value is specified, the command does not run.

    The step for --replay is 10000. The minimum value is 10000.

    --replay 16 sends 10000 events.

    --replay 16000 sends 20000 events.

As a result of running the command, test events are successfully sent to the KUMA collector. You can verify the arrival of test events by searching for related events in the KUMA web interface.

Page top
[Topic 260684]

Time format

KUMA supports processing information passed to the fields of the event data model with the timestamp type (EndTime, StartTime, DeviceCustomDate1, etc) in the following formats:

  • "May 8, 2009 5:57:51 PM",
  • "oct 7, 1970",
  • "oct 7, '70",
  • "oct. 7, 1970",
  • "oct. 7, 70",
  • "Mon Jan 2 15:04:05 2006",
  • "Mon Jan 2 15:04:05 MST 2006",
  • "Mon Jan 02 15:04:05 -0700 2006",
  • "Monday, 02-Jan-06 15:04:05 MST",
  • "Mon, 02 Jan 2006 15:04:05 MST",
  • "Tue, 11 Jul 2017 16:28:13 +0200 (CEST)",
  • "Mon, 02 Jan 2006 15:04:05 -0700",
  • "Mon 30 Sep 2018 09:09:09 PM UTC",
  • "Mon Aug 10 15:44:11 UTC+0100 2015",
  • "Thu, 4 Jan 2018 17:53:36 +0000",
  • "Fri Jul 03 2015 18:04:07 GMT+0100 (GMT Daylight Time)",
  • "Sun, 3 Jan 2021 00:12:23 +0800 (GMT+08:00)",
  • "September 17, 2012 10:09am",
  • "September 17, 2012 at 10:09am PST-08",
  • "September 17, 2012, 10:10:09",
  • "October 7, 1970",
  • "October 7th, 1970",
  • "12 Feb 2006, 19:17",
  • "12 Feb 2006 19:17",
  • "14 May 2019 19:11:40.164",
  • "7 oct 70",
  • "7 oct 1970",
  • "03 February 2013",
  • "1 July 2013",
  • "2013-Feb-03".

dd/Mon/yyyy format

  • "06/Jan/2008:15:04:05 -0700",
  • "06/Jan/2008 15:04:05 -0700".

mm/dd/yyyy format

  • "3/31/2014",
  • "03/31/2014",
  • "08/21/71",
  • "8/1/71",
  • "4/8/2014 22:05",
  • "04/08/2014 22:05",
  • "4/8/14 22:05",
  • "04/2/2014 03:00:51",
  • "8/8/1965 12:00:00 AM",
  • "8/8/1965 01:00:01 PM",
  • "8/8/1965 01:00 PM",
  • "8/8/1965 1:00 PM",
  • "8/8/1965 12:00 AM",
  • "4/02/2014 03:00:51",
  • "03/19/2012 10:11:59",
  • "03/19/2012 10:11:59.3186369".

yyyy/mm/dd format

  • "2014/3/31",
  • "2014/03/31",
  • "2014/4/8 22:05",
  • "2014/04/08 22:05",
  • "2014/04/2 03:00:51",
  • "2014/4/02 03:00:51",
  • "2012/03/19 10:11:59",
  • "2012/03/19 10:11:59.3186369".

yyyy:mm:dd format

  • "2014:3:31",
  • "2014:03:31",
  • "2014:4:8 22:05",
  • "2014:04:08 22:05",
  • "2014:04:2 03:00:51",
  • "2014:4:02 03:00:51",
  • "2012:03:19 10:11:59",
  • "2012:03:19 10:11:59.3186369".

Format containing Chinese characters

"2014年04月08日"

yyyy-mm-ddThh format

  • "2006-01-02T15:04:05+0000",
  • "2009-08-12T22:15:09-07:00",
  • "2009-08-12T22:15:09",
  • "2009-08-12T22:15:09.988",
  • "2009-08-12T22:15:09Z",
  • "2017-07-19T03:21:51:897+0100",
  • "2019-05-29T08:41-04" without seconds, 2-character TZ.

yyyy-mm-dd hh:mm:ss format

  • "2014-04-26 17:24:37.3186369",
  • "2012-08-03 18:31:59.257000000",
  • "2014-04-26 17:24:37.123",
  • "2013-04-01 22:43",
  • "2013-04-01 22:43:22",
  • "2014-12-16 06:20:00 UTC",
  • "2014-12-16 06:20:00 GMT",
  • "2014-04-26 05:24:37 PM",
  • "2014-04-26 13:13:43 +0800",
  • "2014-04-26 13:13:43 +0800 +08",
  • "2014-04-26 13:13:44 +09:00",
  • "2012-08-03 18:31:59.257000000 +0000 UTC",
  • "2015-09-30 18:48:56.35272715 +0000 UTC",
  • "2015-02-18 00:12:00 +0000 GMT",
  • "2015-02-18 00:12:00 +0000 UTC",
  • "2015-02-08 03:02:00 +0300 MSK m=+0.000000001",
  • "2015-02-08 03:02:00.001 +0300 MSK m=+0.000000001",
  • "2017-07-19 03:21:51+00:00",
  • "2014-04-26",
  • "2014-04",
  • "2014",
  • "2014-05-11 08:20:13,787".

yyyy-mm-dd-07:00 format

"2020-07-20+08:00"

mm.dd.yyyy format

  • "3.31.2014",
  • "03.31.2014",
  • "08.21.71".

yyyy.mm.dd format

  • "2014.03.30"

yyyymmdd format and similar

  • "20140601",
  • "20140722105203".

yymmdd hh:mm:yy format

"171113 14:14:20"

Unix timestamp format

  • "1332151919",
  • "1384216367189",
  • "1384216367111222",
  • "1384216367111222333".
Page top
[Topic 266242]

Mapping fields of predefined normalizers

The file available via the download link contains a description of the field mapping of preset normalizers.

Download Description of field mapping of preset normalizers.

Page top
[Topic 267237]

Deprecated resources

List of deprecated resources

Name

Resource type

Description

[Deprecated][OOTB] Microsoft SQL Server xml

Normalizer

This normalizer was removed from the resource set in KUMA 3.2.

If you were using this normalizer, you must migrate to the [OOTB] Microsoft Products for KUMA 3 normalizer.

[Deprecated][OOTB] Windows Basic

Normalizer

This normalizer was removed from the resource set in KUMA 3.2.

If you were using this normalizer, you must migrate to the [OOTB] Microsoft Products for KUMA 3 normalizer.

[Deprecated][OOTB] Windows Extended v.0.3

Normalizer

This normalizer was removed from the resource set in KUMA 3.2.

If you were using this normalizer, you must migrate to the [OOTB] Microsoft Products for KUMA 3 normalizer.

[Deprecated][OOTB] Cisco ASA Extended v 0.1

Normalizer

This normalizer was removed from the resource set in KUMA 3.2.

If you were using this normalizer, you must migrate to the [OOTB] Cisco ASA and IOS syslog normalizer.

[Deprecated][OOTB] Cisco Basic

Normalizer

This normalizer was removed from the resource set in KUMA 3.2.

If you were using this normalizer, you must migrate to the [OOTB] Cisco ASA and IOS syslog normalizer.

[Deprecated][OOTB] Linux audit and iptables syslog

Normalizer

This normalizer was removed from the resource set in KUMA 3.4.

In KUMA 3.2, we recommend using the [OOTB] Linux auditd syslog for KUMA 3.2 normalizer.

[Deprecated][OOTB] Linux audit.log file

Normalizer

This normalizer was removed from the resource set in KUMA 3.4.

In KUMA 3.2, we recommend using the [OOTB] Linux auditd file for KUMA 3.2 normalizer.

[OOTB] Checkpoint Syslog CEF by CheckPoint

Normalizer

This normalizer was removed from the resource set in KUMA 3.4.

In KUMA 3.4 and newer versions, we recommend using the [OOTB] Checkpoint syslog normalizer.

[OOTB] Eltex MES Switches

Normalizer

This normalizer was removed from the resource set in KUMA 3.4.

In KUMA 3.4 and newer versions, we recommend using the [OOTB] Eltex MES syslog, [OOTB] Eltex ESR syslog normalizers.

[OOTB] PTsecurity NAD

Normalizer

This normalizer was removed from the resource set in KUMA 3.4.

In KUMA 3.4 and newer versions, we recommend using the [OOTB] PTsecurity NAD json normalizer.

[OOTB][AD] Granted TGS without TGT (Golden Ticket)

Rule

The rule was removed from the KUMA 3.4 resource set.

[OOTB][AD] Possible Kerberoasting attack

Rule

The rule was removed from the KUMA 3.4 resource set.

[OOTB][AD][Technical] 4768. TGT Requested

Rule

The rule was removed from the KUMA 3.4 resource set.

[OOTB][AD] List of requested TGT. EventID 4768

Active list

The list was removed from the KUMA 3.4 resource set.

Page top
[Topic 269359]

Generating events for testing a normalizer

If necessary, you can generate your own example events to test your normalizer. Such testing makes it easier to write regular expressions and lets you see which values end up in the KUMA event fields.

Keep in mind the following special considerations:

  • This tests simulates event processing. Example events in the Example event field are intended for displaying examples in the Field mapping section. Examples of the parent normalizer are used to generate examples of child normalizers, taking into account the Field to pass into normalizer setting.
  • Mutations cannot be applied.

To test the normalizer, you need to add an example event to the Event examples field in the selected normalizer and start generating events by using the relevant command. As a result of running the command, KUMA takes the example event from the Example event field and sends events to the normalizer with the specified interval. If necessary, you can specify multiple examples to get events for multiple examples.

To test the normalizer:

  1. Select the collector that you want to use for testing:
    • If the collector is installed on the server and running, stop the collector service:

      sudo systemctl stop kuma-collector-<collector service ID copied from the KUMA web interface>.service

    • If the collector is not running, or is in the process of being created or edited, proceed to the next step.
  2. In the collector creation wizard, if necessary, fill in or edit the required fields at the Connect event sources step and at the Transport step, then proceed to the Parsing step:
    1. Link a normalizer by selecting it from the drop-down list, or create a normalizer.
    2. In the Event examples field, add example events. For example, for a json normalizer, you can add the following value: {"name": "test_events", "address": "10.12.12.31"}. You can specify multiple examples if you want to receive events for multiple examples in the same normalizer. Events are generated for each example.
  3. In the Collector Installation Wizard, go to the Routing step and specify the storage where you want to save test events.
  4. Review the collector settings and click Save.
  5. Go to the Active services section in KUMA and click Add to add a collector. This opens the Choose a service window; in that window, select the collector and click Create service. The collector is displayed in the Active services list.
  6. Check the status of the collector to which events are being sent. The collector status should be red.
  7. Run the event generation command with the necessary parameters:
    • If the collector is not installed on the server, but only added in the Active services section:

      sudo /opt/kaspersky/kuma/kuma collector --core <FQDN of the KUMA Core server>:<port used by the KUMA Core for internal communication (port 7210 is used by default)> --generator.interval <interval in seconds for generating and sending events> --id <collector service ID copied from the KUMA web interface> --api.port <number of a free, unused API port>

      If the value of the event generation and sending interval is not specified or it is set to zero, events are not generated.

    • If the collector is installed on the server:

      sudo /opt/kaspersky/kuma/kuma collector --generator.interval <value of the event generation and sending interval in seconds> --id <collector service ID copied from the KUMA web interface> --api.port <number of a free, unused API port>

      If the value of the event generation and sending interval is not specified or it is set to zero, events are not generated.

As a result, KUMA generates events and sends them to the normalizer, observing the specified interval.

You can verify that events have been created and satisfy your expectations in the Events section. For additional information about the check, see the /etc/systemd/system/multi-user.target.wants/kuma-collector-<collector service ID copied from the KUMA web interface>.service file.

If the result does not meet expectations, modify the example event:

  • If the collector is not installed on the server and has only been in the Active services section, edit the Event examples field in the normalizer of the collector and save the collector settings.
  • If the collector is installed on the server and stopped as a service, edit the Event examples field in the normalizer of the collector, save the collector settings, go to the Active services section, select the collector, and refresh the collector settings by clicking Refresh.

If the result meets expectations:

  1. Disable event generation, for example, by pressing Ctrl+C on the command line.
  2. Start the collector service; if the service is already installed on the server, but has been stopped:

    sudo systemctl start kuma-collector-<collector service ID copied from the KUMA web interface>.service

  3. If the collector has only been added in the Active services section, but has not been installed on the server yet, install the collector on the server using the following command:

    sudo /opt/kaspersky/kuma/kuma collector --core <FQDN of the KUMA Core server>:<port used by KUMA Core server for internal communication (port 7210 by default)> --id <collector service ID copied from the KUMA web interface> --api.port <port used for communication with the installed component> --install

Page top
[Topic 284245]