- Elastic integrations
- Integrations quick reference
- 1Password
- Abnormal Security
- ActiveMQ
- Active Directory Entity Analytics
- Admin By Request EPM integration
- Airflow
- Akamai
- Apache
- API (custom)
- Arbor Peakflow SP Logs
- Arista NG Firewall
- Atlassian
- Auditd
- Auth0
- authentik
- AWS
- Amazon CloudFront
- Amazon DynamoDB
- Amazon EBS
- Amazon EC2
- Amazon ECS
- Amazon EMR
- AWS API Gateway
- Amazon GuardDuty
- AWS Health
- Amazon Kinesis Data Firehose
- Amazon Kinesis Data Stream
- Amazon MQ
- Amazon Managed Streaming for Apache Kafka (MSK)
- Amazon NAT Gateway
- Amazon RDS
- Amazon Redshift
- Amazon S3
- Amazon S3 Storage Lens
- Amazon Security Lake
- Amazon SNS
- Amazon SQS
- Amazon VPC
- Amazon VPN
- AWS Bedrock
- AWS Billing
- AWS CloudTrail
- AWS CloudWatch
- AWS ELB
- AWS Fargate
- AWS Inspector
- AWS Lambda
- AWS Logs (custom)
- AWS Network Firewall
- AWS Route 53
- AWS Security Hub
- AWS Transit Gateway
- AWS Usage
- AWS WAF
- Azure
- Activity logs
- App Service
- Application Gateway
- Application Insights metrics
- Application Insights metrics overview
- Application State Insights metrics
- Azure logs (v2 preview)
- Azure OpenAI
- Billing metrics
- Container instance metrics
- Container registry metrics
- Container service metrics
- Custom Azure Logs
- Custom Blob Storage Input
- Database Account metrics
- Event Hub input
- Firewall logs
- Frontdoor
- Functions
- Microsoft Entra ID
- Monitor metrics
- Network Watcher VNet
- Network Watcher NSG
- Platform logs
- Resource metrics
- Spring Cloud logs
- Storage Account metrics
- Virtual machines metrics
- Virtual machines scaleset metrics
- Barracuda
- BeyondInsight and Password Safe Integration
- BitDefender
- Bitwarden
- blacklens.io
- Blue Coat Director Logs
- BBOT (Bighuge BLS OSINT Tool)
- Box Events
- Bravura Monitor
- Broadcom ProxySG
- Canva
- Cassandra
- CEL Custom API
- Ceph
- Check Point
- Cilium Tetragon
- CISA Known Exploited Vulnerabilities
- Cisco
- Cisco Meraki Metrics
- Citrix
- Claroty CTD
- Cloudflare
- Cloud Asset Inventory
- CockroachDB Metrics
- Common Event Format (CEF)
- Containerd
- CoreDNS
- Corelight
- Couchbase
- CouchDB
- Cribl
- CrowdStrike
- Cyberark
- Cybereason
- CylanceProtect Logs
- Custom Websocket logs
- Darktrace
- Data Exfiltration Detection
- DGA
- Digital Guardian
- Docker
- DomainTools Real Time Unified Feeds
- Elastic APM
- Elastic Fleet Server
- Elastic Security
- Elastic Stack monitoring
- Elasticsearch Service Billing
- Envoy Proxy
- ESET PROTECT
- ESET Threat Intelligence
- etcd
- Falco
- F5
- File Integrity Monitoring
- FireEye Network Security
- First EPSS
- Forcepoint Web Security
- ForgeRock
- Fortinet
- Gigamon
- GitHub
- GitLab
- Golang
- Google Cloud
- Custom GCS Input
- GCP
- GCP Audit logs
- GCP Billing metrics
- GCP Cloud Run metrics
- GCP CloudSQL metrics
- GCP Compute metrics
- GCP Dataproc metrics
- GCP DNS logs
- GCP Firestore metrics
- GCP Firewall logs
- GCP GKE metrics
- GCP Load Balancing metrics
- GCP Metrics Input
- GCP PubSub logs (custom)
- GCP PubSub metrics
- GCP Redis metrics
- GCP Security Command Center
- GCP Storage metrics
- GCP VPC Flow logs
- GCP Vertex AI
- GoFlow2 logs
- Hadoop
- HAProxy
- Hashicorp Vault
- HTTP Endpoint logs (custom)
- IBM MQ
- IIS
- Imperva
- InfluxDb
- Infoblox
- Iptables
- Istio
- Jamf Compliance Reporter
- Jamf Pro
- Jamf Protect
- Jolokia Input
- Journald logs (custom)
- JumpCloud
- Kafka
- Keycloak
- Kubernetes
- LastPass
- Lateral Movement Detection
- Linux Metrics
- Living off the Land Attack Detection
- Logs (custom)
- Lumos
- Lyve Cloud
- Mattermost
- Memcached
- Menlo Security
- Microsoft
- Microsoft 365
- Microsoft Defender for Cloud
- Microsoft Defender for Endpoint
- Microsoft DHCP
- Microsoft DNS Server
- Microsoft Entra ID Entity Analytics
- Microsoft Exchange Online Message Trace
- Microsoft Exchange Server
- Microsoft Graph Activity Logs
- Microsoft M365 Defender
- Microsoft Office 365 Metrics Integration
- Microsoft Sentinel
- Microsoft SQL Server
- Mimecast
- ModSecurity Audit
- MongoDB
- MongoDB Atlas
- MySQL
- Nagios XI
- NATS
- NetFlow Records
- Netskope
- Network Beaconing Identification
- Network Packet Capture
- Nginx
- Okta
- Oracle
- OpenAI
- OpenCanary
- Osquery
- Palo Alto
- pfSense
- PHP-FPM
- PingOne
- PingFederate
- Pleasant Password Server
- PostgreSQL
- Prometheus
- Proofpoint TAP
- Proofpoint On Demand
- Pulse Connect Secure
- Qualys VMDR
- QNAP NAS
- RabbitMQ Logs
- Radware DefensePro Logs
- Rapid7
- Redis
- Rubrik RSC Metrics Integration
- Sailpoint Identity Security Cloud
- Salesforce
- SentinelOne
- ServiceNow
- Slack Logs
- Snort
- Snyk
- SonicWall Firewall
- Sophos
- Spring Boot
- SpyCloud Enterprise Protection
- SQL Input
- Squid Logs
- SRX
- STAN
- Statsd Input
- Sublime Security
- Suricata
- StormShield SNS
- Symantec
- Symantec Endpoint Security
- Sysmon for Linux
- Sysdig
- Syslog Router Integration
- System
- System Audit
- Tanium
- TCP Logs (custom)
- Teleport
- Tenable
- Threat intelligence
- ThreatConnect
- Threat Map
- Thycotic Secret Server
- Tines
- Traefik
- Trellix
- Trend Micro
- TYCHON Agentless
- UDP Logs (custom)
- Universal Profiling
- Vectra Detect
- VMware
- WatchGuard Firebox
- WebSphere Application Server
- Windows
- Wiz
- Zeek
- ZeroFox
- Zero Networks
- ZooKeeper Metrics
- Zoom
- Zscaler
ESET PROTECT
editESET PROTECT
editVersion |
1.6.1 (View all) |
Compatible Kibana version(s) |
8.13.0 or higher |
Supported Serverless project types |
Security |
Subscription level |
Basic |
Level of support |
Elastic |
ESET PROTECT enables you to manage ESET products on workstations and servers in a networked environment with up to 50,000 devices from one central location. Using the ESET PROTECT Web Console, you can deploy ESET solutions, manage tasks, enforce security policies, monitor system status, and quickly respond to problems or threats on remote computers.
Data streams
editThe ESET PROTECT integration collects three types of logs: Detection, Device Task and Event.
Detection is used to retrieve detections via the ESET Connect - Incident Management.
Device Task is used to retrieve device tasks via the ESET Connect - Automation.
Event is used to retrieve Detection, Firewall, HIPS, Audit, and ESET Inspect logs using the Syslog Server.
Requirements
editElastic Agent must be installed. For more information, refer to the link here.
Installing and managing an Elastic Agent:
editYou have a few options for installing and managing an Elastic Agent:
Install a Fleet-managed Elastic Agent (recommended):
editWith this approach, you install Elastic Agent and use Fleet in Kibana to define, configure, and manage your agents in a central location. We recommend using Fleet management because it makes the management and upgrade of your agents considerably easier.
Install Elastic Agent in standalone mode (advanced users):
editWith this approach, you install Elastic Agent and manually configure the agent locally on the system where it’s installed. You are responsible for managing and upgrading the agents. This approach is reserved for advanced users only.
Install Elastic Agent in a containerized environment:
editYou can run Elastic Agent inside a container, either with Fleet Server or standalone. Docker images for all versions of Elastic Agent are available from the Elastic Docker registry, and we provide deployment manifests for running on Kubernetes.
There are some minimum requirements for running Elastic Agent and for more information, refer to the link here.
This module has been tested against the ESET PROTECT (version: 5.0.9.1).
Setup
editTo collect data from ESET Connect, follow the below steps:
edit- Create API User Account
- Retrieve the username and password generated during the creation of an API user account.
- Retrieve the region from the ESET Web Console URL.
To collect data from ESET PROTECT via Syslog, follow the below steps:
edit-
Follow the steps to configure syslog server.
- Set the format of the payload to JSON.
- Set the format of the envelope to Syslog.
- Set the minimal log level to Information to collect all data.
- Select all checkboxes to collect logs for all event types.
- Enter the IP Address or FQDN of the Elastic Agent that is running the integration in the Destination IP field.
Enabling the integration in Elastic:
edit- In Kibana go to Management > Integrations
- In "Search for integrations" search bar, type ESET PROTECT
- Click on the "ESET PROTECT" integration from the search results.
- Click on the "Add ESET PROTECT" button to add the integration.
- Configure all required integration parameters, including username, password, and region, to enable data collection from the ESET Connect REST API. For syslog data collection, provide parameters such as listen address, listen port, and SSL settings.
- Save the integration.
Logs Reference
editDetection
editThis is the Detection
dataset.
Example
An example event for detection
looks as following:
{ "@timestamp": "2023-10-26T13:36:53.000Z", "agent": { "ephemeral_id": "a2da59f5-382d-41e2-be5e-0b06df998911", "id": "930b36c5-0fd6-41c4-83bc-d8547e3fa880", "name": "docker-fleet-agent", "type": "filebeat", "version": "8.12.0" }, "data_stream": { "dataset": "eset_protect.detection", "namespace": "ep", "type": "logs" }, "destination": { "as": { "number": 29518, "organization": { "name": "Bredband2 AB" } }, "geo": { "city_name": "Linköping", "continent_name": "Europe", "country_iso_code": "SE", "country_name": "Sweden", "location": { "lat": 58.4167, "lon": 15.6167 }, "region_iso_code": "SE-E", "region_name": "Östergötland County" }, "ip": "89.160.20.112", "port": 443 }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "930b36c5-0fd6-41c4-83bc-d8547e3fa880", "snapshot": false, "version": "8.12.0" }, "eset_protect": { "detection": { "category": "DETECTION_CATEGORY_NETWORK_INTRUSION", "context": { "circumstances": "Eicar", "device_uuid": "xxx-xxxx-1234-5678-xxxxxxxxxxxx", "process": { "path": "C:\\Windows\\chrome.exe" }, "user_name": "testingpc\\example" }, "network_communication": { "protocol_name": "0", "remote": { "ip_address": "89.160.20.112", "port": 443 } }, "object_hash_sha1": "AAF4C61DDCC5E8A2DABEDE0F3B4820123456789D", "object_type_name": "File", "object_url": "C:\\Temp\\06516f11-xxxx-xxxx-xxxx-37da66b5de99_ccf7464ba6e2e12e984514f694bfb10d03de77358d8a3afd7a2ffed150ec1df8.zip.e99\\ccf7464ba6e2e12e984514f694bfb10d03de77358d8a3afd7a2ffed150ec1df8", "occur_time": "2023-10-26T13:36:53.000Z", "severity_level": "SEVERITY_LEVEL_MEDIUM", "type_name": "TCP Port scanning attack", "uuid": "xxx-xxxx-xxxx-1234-xxxxxxxxxxxx" } }, "event": { "agent_id_status": "verified", "category": [ "intrusion_detection" ], "dataset": "eset_protect.detection", "ingested": "2024-04-16T05:41:07Z", "kind": "alert", "original": "{\"category\":\"DETECTION_CATEGORY_NETWORK_INTRUSION\",\"context\":{\"circumstances\":\"Eicar\",\"deviceUuid\":\"xxx-xxxx-1234-5678-xxxxxxxxxxxx\",\"process\":{\"path\":\"C:\\\\\Windows\\\\\chrome.exe\"},\"userName\":\"testingpc\\\\\example\"},\"networkCommunication\":{\"protocolName\":\"0\",\"remoteIpAddress\":\"89.160.20.112\",\"remotePort\":443},\"objectHashSha1\":\"AAF4C61DDCC5E8A2DABEDE0F3B4820123456789D\",\"objectTypeName\":\"File\",\"objectUrl\":\"C:\\\\\Temp\\\\\06516f11-xxxx-xxxx-xxxx-37da66b5de99_ccf7464ba6e2e12e984514f694bfb10d03de77358d8a3afd7a2ffed150ec1df8.zip.e99\\\\\ccf7464ba6e2e12e984514f694bfb10d03de77358d8a3afd7a2ffed150ec1df8\",\"occurTime\":\"2023-10-26T13:36:53Z\",\"responses\":[{}],\"severityLevel\":\"SEVERITY_LEVEL_MEDIUM\",\"typeName\":\"TCP Port scanning attack\",\"uuid\":\"xxx-xxxx-xxxx-1234-xxxxxxxxxxxx\"}", "type": [ "info" ] }, "file": { "hash": { "sha1": "aaf4c61ddcc5e8a2dabede0f3b4820123456789d" } }, "host": { "id": "xxx-xxxx-1234-5678-xxxxxxxxxxxx" }, "input": { "type": "cel" }, "message": "Eicar", "observer": { "product": "ESET PROTECT", "type": "ids", "vendor": "ESET" }, "process": { "executable": "C:\\Windows\\chrome.exe", "name": "chrome.exe" }, "related": { "hash": [ "aaf4c61ddcc5e8a2dabede0f3b4820123456789d" ], "hosts": [ "xxx-xxxx-1234-5678-xxxxxxxxxxxx" ], "ip": [ "89.160.20.112" ], "user": [ "example" ] }, "rule": { "category": "DETECTION_CATEGORY_NETWORK_INTRUSION" }, "tags": [ "preserve_original_event", "preserve_duplicate_custom_fields", "forwarded", "eset_protect-detection" ], "threat": { "technique": { "name": [ "TCP Port scanning attack" ] } }, "user": { "domain": "testingpc", "name": "example" } }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
eset_protect.detection.category |
Category of detection. |
keyword |
eset_protect.detection.context.circumstances |
Human-friendly description of [detection]'s circumstances. |
keyword |
eset_protect.detection.context.device_uuid |
Reference to [device]. |
keyword |
eset_protect.detection.context.process.path |
Disk path to the executable. |
keyword |
eset_protect.detection.context.user_name |
User name in whose context detection occurred. |
keyword |
eset_protect.detection.display_name |
Human-friendly name of the detection. This value can be used to look up details at http://www.virusradar.com/en/threat_encyclopedia. |
keyword |
eset_protect.detection.network_communication.direction |
Direction of network communication. |
keyword |
eset_protect.detection.network_communication.local.ip_address |
IPv4 or IPv6 address of the device (i.e. the device where detection occurred). |
ip |
eset_protect.detection.network_communication.local.port |
TCP or UDP port on the device (i.e. the device where detection occurred). |
long |
eset_protect.detection.network_communication.protocol_name |
Human readable name of the protocol used to communicate between local and remote hosts. |
keyword |
eset_protect.detection.network_communication.remote.ip_address |
IPv4 or IPv6 address of the remote host (i.e. not the device where detection occurred). |
ip |
eset_protect.detection.network_communication.remote.port |
TCP or UDP port on the remote host (i.e. not the device where detection occurred). |
long |
eset_protect.detection.object_hash_sha1 |
SHA1 hash of content of scanned object. |
keyword |
eset_protect.detection.object_name |
Name/path of scanned object. |
keyword |
eset_protect.detection.object_type_name |
Human-friendly type name of scanned object. |
keyword |
eset_protect.detection.object_url |
URL (uniform resource locator) of scanned object. |
keyword |
eset_protect.detection.occur_time |
Timestamp of detection occurrence. |
date |
eset_protect.detection.responses.description |
Human-readable description of the response. |
keyword |
eset_protect.detection.responses.device_restart_required |
Response needs restart of the device to be completed. |
boolean |
eset_protect.detection.responses.display_name |
Human-friendly name of the response. |
keyword |
eset_protect.detection.responses.protection_name |
Human-readable name of the protection that performed the response. |
keyword |
eset_protect.detection.severity_level |
Severity levels abstracted to cover all the possible GUIs. Vocabulary is leaving interpretation of severity level completely to API client. |
keyword |
eset_protect.detection.type_name |
Human-friendly type of detection. |
keyword |
eset_protect.detection.uuid |
Universally Unique Identifier of detection. |
keyword |
event.dataset |
Event dataset. |
constant_keyword |
event.module |
Event module. |
constant_keyword |
input.type |
Type of Filebeat input. |
keyword |
log.offset |
Log offset. |
long |
Device Task
editThis is the Device Task
dataset.
Example
An example event for device_task
looks as following:
{ "@timestamp": "2024-04-16T05:41:49.641Z", "agent": { "ephemeral_id": "a2da59f5-382d-41e2-be5e-0b06df998911", "id": "930b36c5-0fd6-41c4-83bc-d8547e3fa880", "name": "docker-fleet-agent", "type": "filebeat", "version": "8.12.0" }, "data_stream": { "dataset": "eset_protect.device_task", "namespace": "ep", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "930b36c5-0fd6-41c4-83bc-d8547e3fa880", "snapshot": false, "version": "8.12.0" }, "eset_protect": { "device_task": { "action": { "name": "Shutdown computer", "params": { "@type": "type.googleapis.com/Era.Common.DataDefinition.Task.ESS.OnDemandScan", "cleaning_enabled": true, "custom_profile_name": "DefaultProfile", "scan_profile": "InDepth", "scan_targets": [ "eset://AllTargets" ] } }, "description": "Automatically created via context menu", "display_name": "Reboot Computer - via context menu", "targets": { "devices_uuids": [ "0205321e-XXXX-XXXX-1234-feeb35010ea7", "0205321e-XXXX-XXXX-5678-feeb35010ea7", "0205321e-XXXX-1234-5678-feeb35010ea7" ] }, "triggers": [ { "manual": { "expire_time": "2023-12-01T01:30:00.000Z" } } ], "uuid": "c93070e0-XXXX-1234-5678-c48f0e5e0b7e", "version_id": "1511" } }, "event": { "action": "Shutdown computer", "agent_id_status": "verified", "dataset": "eset_protect.device_task", "ingested": "2024-04-16T05:41:59Z", "kind": "event", "original": "{\"action\":{\"name\":\"Shutdown computer\",\"params\":{\"@type\":\"type.googleapis.com/Era.Common.DataDefinition.Task.ESS.OnDemandScan\",\"cleaningEnabled\":true,\"customProfileName\":\"DefaultProfile\",\"scanProfile\":\"InDepth\",\"scanTargets\":[\"eset://AllTargets\"]}},\"description\":\"Automatically created via context menu\",\"displayName\":\"Reboot Computer - via context menu\",\"targets\":{\"devicesUuids\":[\"0205321e-XXXX-XXXX-1234-feeb35010ea7\",\"0205321e-XXXX-XXXX-5678-feeb35010ea7\",\"0205321e-XXXX-1234-5678-feeb35010ea7\"]},\"triggers\":[{\"manual\":{\"expireTime\":\"2023-12-01T01:30:00Z\"}}],\"uuid\":\"c93070e0-XXXX-1234-5678-c48f0e5e0b7e\",\"versionId\":\"1511\"}", "type": [ "info" ] }, "host": { "id": [ "0205321e-XXXX-XXXX-1234-feeb35010ea7", "0205321e-XXXX-XXXX-5678-feeb35010ea7", "0205321e-XXXX-1234-5678-feeb35010ea7" ] }, "input": { "type": "cel" }, "related": { "hosts": [ "0205321e-XXXX-XXXX-1234-feeb35010ea7", "0205321e-XXXX-XXXX-5678-feeb35010ea7", "0205321e-XXXX-1234-5678-feeb35010ea7" ] }, "tags": [ "preserve_original_event", "preserve_duplicate_custom_fields", "forwarded", "eset_protect-device_task" ] }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
eset_protect.device_task.action.name |
Name of the function to execute. |
keyword |
eset_protect.device_task.action.params.@type |
A URL/resource name that uniquely identifies the type of the serialized protocol buffer message. |
keyword |
eset_protect.device_task.action.params.actions.cancel_action |
boolean |
|
eset_protect.device_task.action.params.actions.postpone |
keyword |
|
eset_protect.device_task.action.params.cleaning_enabled |
boolean |
|
eset_protect.device_task.action.params.custom_profile_name |
keyword |
|
eset_protect.device_task.action.params.restart |
boolean |
|
eset_protect.device_task.action.params.scan_profile |
keyword |
|
eset_protect.device_task.action.params.scan_targets |
keyword |
|
eset_protect.device_task.description |
User’s description. |
keyword |
eset_protect.device_task.display_name |
User friendly name of the task. |
keyword |
eset_protect.device_task.targets.device_groups_uuids |
Task can be assigned to groups of devices. |
keyword |
eset_protect.device_task.targets.devices_uuids |
Task can be assigned to individual devices, for example if task run failed on these devices. |
keyword |
eset_protect.device_task.triggers.manual.create_time |
When the manual trigger has been created. Task can only be triggered after this time. |
date |
eset_protect.device_task.triggers.manual.expire_time |
Task is not triggered after this time. |
date |
eset_protect.device_task.uuid |
Universally Unique Identifier for device task. |
keyword |
eset_protect.device_task.version_id |
Identifier of entity version. |
keyword |
event.dataset |
Event dataset. |
constant_keyword |
event.module |
Event module. |
constant_keyword |
input.type |
Type of Filebeat input. |
keyword |
log.offset |
Log offset. |
long |
Event
editThis is the Event
dataset.
Example
An example event for event
looks as following:
{ "@timestamp": "2021-06-21T03:56:20.000Z", "agent": { "ephemeral_id": "fe2f9827-1823-4a86-8826-b6789530f104", "id": "930b36c5-0fd6-41c4-83bc-d8547e3fa880", "name": "docker-fleet-agent", "type": "filebeat", "version": "8.12.0" }, "data_stream": { "dataset": "eset_protect.event", "namespace": "ep", "type": "logs" }, "destination": { "as": { "number": 29518, "organization": { "name": "Bredband2 AB" } }, "geo": { "city_name": "Linköping", "continent_name": "Europe", "country_iso_code": "SE", "country_name": "Sweden", "location": { "lat": 58.4167, "lon": 15.6167 }, "region_iso_code": "SE-E", "region_name": "Östergötland County" }, "ip": "89.160.20.128" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "930b36c5-0fd6-41c4-83bc-d8547e3fa880", "snapshot": false, "version": "8.12.0" }, "eset_protect": { "event": { "action_taken": "blocked", "group_description": "Lost & found static group", "group_name": "All/Lost & found", "hash": "ABCDAA625E6961037B8904E113FD0C232A7D0EDC", "hostname": "win-test", "ipv4": "192.168.30.30", "is_handled": false, "name": "An attempt to connect to URL", "object_uri": "https://test.com", "occured": "2021-06-21T03:56:20.000Z", "os_name": "Microsoft Windows 11 Pro", "processname": "C:\\Program Files\\Web browser\\brwser.exe", "rule_id": "Blocked by PUA blacklist", "scanner_id": "HTTP filter", "severity": "Warning", "source_uuid": "d9477661-8fa4-4144-b8d4-e37b983bcd69", "target_address": "89.160.20.128", "target_address_type": "IPv4", "type": "FilteredWebsites_Event", "username": "WIN-TEST\\Administrator" } }, "event": { "action": "blocked", "agent_id_status": "verified", "category": [ "web" ], "dataset": "eset_protect.event", "ingested": "2024-04-16T05:42:56Z", "kind": "alert", "original": "{\"event_type\":\"FilteredWebsites_Event\",\"ipv4\":\"192.168.30.30\",\"hostname\":\"win-test\",\"group_name\":\"All/Lost & found\",\"os_name\":\"Microsoft Windows 11 Pro\",\"group_description\":\"Lost & found static group\",\"source_uuid\":\"d9477661-8fa4-4144-b8d4-e37b983bcd69\",\"occured\":\"21-Jun-2021 03:56:20\",\"severity\":\"Warning\",\"event\":\"An attempt to connect to URL\",\"target_address\":\"89.160.20.128\",\"target_address_type\":\"IPv4\",\"scanner_id\":\"HTTP filter\",\"action_taken\":\"blocked\",\"object_uri\":\"https://test.com\",\"hash\":\"ABCDAA625E6961037B8904E113FD0C232A7D0EDC\",\"username\":\"WIN-TEST\\\\\Administrator\",\"processname\":\"C:\\\\\Program Files\\\\\Web browser\\\\\brwser.exe\",\"rule_id\":\"Blocked by PUA blacklist\"}", "type": [ "info" ] }, "group": { "name": "All/Lost & found" }, "host": { "hostname": "win-test", "id": "d9477661-8fa4-4144-b8d4-e37b983bcd69", "ip": [ "192.168.30.30" ], "name": "win-test", "os": { "name": "Microsoft Windows 11 Pro" } }, "input": { "type": "tcp" }, "log": { "source": { "address": "192.168.247.8:59824" }, "syslog": { "appname": "ERAServer", "facility": { "code": 1, "name": "user-level" }, "hostname": "co7", "priority": 15, "procid": "75", "severity": { "code": 7, "name": "Debug" } } }, "message": "An attempt to connect to URL", "process": { "executable": "C:\\Program Files\\Web browser\\brwser.exe", "name": "brwser.exe" }, "related": { "hash": [ "abcdaa625e6961037b8904e113fd0c232a7d0edc" ], "hosts": [ "win-test", "d9477661-8fa4-4144-b8d4-e37b983bcd69" ], "ip": [ "192.168.30.30", "89.160.20.128" ], "user": [ "Administrator" ] }, "rule": { "name": "Blocked by PUA blacklist" }, "tags": [ "preserve_original_event", "preserve_duplicate_custom_fields", "forwarded", "eset_protect-event" ], "threat": { "indicator": { "provider": "ESET PROTECT" } }, "user": { "domain": "WIN-TEST", "name": "Administrator" } }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
eset_protect.event.account |
Name of the user account associated with the event. |
keyword |
eset_protect.event.action |
Action taken. |
keyword |
eset_protect.event.action_error |
Error message if the "action" was not successful. |
keyword |
eset_protect.event.action_taken |
Action taken by the Endpoint. |
keyword |
eset_protect.event.aggregate_count |
How many exact same messages were generated by the endpoint between two consecutive replications between ESET PROTECT Server and managing ESET Management Agent. |
long |
eset_protect.event.application |
Application name associated with the event. |
keyword |
eset_protect.event.cause |
keyword |
|
eset_protect.event.circumstances |
Short description of what caused the event. |
keyword |
eset_protect.event.command_line |
Command line of process which triggered detection. |
keyword |
eset_protect.event.computer_severity_score |
Computer severity score associated with the event. |
long |
eset_protect.event.count |
Number of alerts of this type generated since last alarm. |
long |
eset_protect.event.description |
Description of the blocked file. |
keyword |
eset_protect.event.detail |
Detailed description of the action. |
keyword |
eset_protect.event.detection_uuid |
A detection’s unique identifier can be used to query details via ESET CONNECT API. |
keyword |
eset_protect.event.domain |
Audit log domain. |
keyword |
eset_protect.event.eialarmid |
ID sub-part of the alarm link ($1 in ^http.*/alarm/([0-9]+)$). |
keyword |
eset_protect.event.eiconsolelink |
Link to the alarm in ESET Inspect console. |
keyword |
eset_protect.event.engine_version |
Version of the scanning engine. |
keyword |
eset_protect.event.firstseen |
Time and date when the detection was found for the first time at that machine. |
date |
eset_protect.event.group_description |
Description of the static group. |
keyword |
eset_protect.event.group_name |
The full path to the static group of the computer generating the event. If the path is longer than 255 characters, group_name only contains the static group name. |
keyword |
eset_protect.event.handled |
Indicates whether or not the detection was handled. |
keyword |
eset_protect.event.hash |
SHA1 hash associated with the event. |
keyword |
eset_protect.event.hostname |
Hostname of the computer generating the event. |
keyword |
eset_protect.event.inbound |
Whether or not the connection was inbound. |
boolean |
eset_protect.event.ipv4 |
IPv4 address of the computer generating the event. |
ip |
eset_protect.event.ipv6 |
IPv6 address of the computer generating the event. |
ip |
eset_protect.event.is_handled |
Indicates whether or not the detection was handled. |
boolean |
eset_protect.event.name |
Event name. |
keyword |
eset_protect.event.need_restart |
Whether or not the restart is needed. |
boolean |
eset_protect.event.object_type |
Type of object related to this event. |
keyword |
eset_protect.event.object_uri |
Object URI associated with the event. |
keyword |
eset_protect.event.occured |
UTC time of occurrence of the event. Format is %d-%b-%Y %H:%M:%S. |
date |
eset_protect.event.operation |
Operation associated with the event. |
keyword |
eset_protect.event.os_name |
Information about the computer´s operating system. |
keyword |
eset_protect.event.processname |
Name of the process associated with the event. |
keyword |
eset_protect.event.protocol |
Protocol associated with the event. |
keyword |
eset_protect.event.result |
Result of the action. |
keyword |
eset_protect.event.rule_id |
Rule ID associated with the event. |
keyword |
eset_protect.event.rulename |
Rule name associated with the event. |
keyword |
eset_protect.event.scan_id |
Scan ID associated with the event. |
keyword |
eset_protect.event.scanner_id |
Scanner ID associated with the event. |
keyword |
eset_protect.event.severity |
Severity of the event. Possible values (from least severe to most severe) are: Information, Notice, Warning, Error, Critical, Fatal. |
keyword |
eset_protect.event.severity_score |
Rule severity score associated with the event. |
long |
eset_protect.event.source_address |
Address of the event source. |
ip |
eset_protect.event.source_address_type |
Type of address of the event source. |
keyword |
eset_protect.event.source_port |
Port of the event source. |
long |
eset_protect.event.source_uuid |
UUID of the computer generating the event. |
keyword |
eset_protect.event.target |
Target action is operating on. |
keyword |
eset_protect.event.target_address |
Address of the event destination. |
ip |
eset_protect.event.target_address_type |
Type of address of the event destination. |
keyword |
eset_protect.event.target_port |
Port of the event destination. |
long |
eset_protect.event.threat_flags |
Detection related flags. |
keyword |
eset_protect.event.threat_handled |
Indicates whether or not the detection was handled. |
boolean |
eset_protect.event.threat_name |
Name of the detection. |
keyword |
eset_protect.event.threat_type |
Type of detection. |
keyword |
eset_protect.event.trigger_event |
Description of event which triggered detection. |
keyword |
eset_protect.event.type |
Type of exported events. |
keyword |
eset_protect.event.username |
Name of the user account associated with the event. |
keyword |
event.dataset |
Event dataset. |
constant_keyword |
event.module |
Event module. |
constant_keyword |
input.type |
Type of Filebeat input. |
keyword |
log.offset |
Log offset. |
long |
log.source.address |
Source address from which the log event was read / sent from. |
keyword |
Changelog
editChangelog
Version | Details | Kibana version(s) |
---|---|---|
1.6.1 |
Bug fix (View pull request) |
8.13.0 or higher |
1.6.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.5.1 |
Bug fix (View pull request) |
8.13.0 or higher |
1.5.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.4.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.3.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.2.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.1.1 |
Bug fix (View pull request) |
8.13.0 or higher |
1.1.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.0.0 |
Enhancement (View pull request) |
8.13.0 or higher |
0.5.1 |
Enhancement (View pull request) |
— |
0.5.0 |
Enhancement (View pull request) |
— |
0.4.0 |
Enhancement (View pull request) |
— |
0.3.0 |
Enhancement (View pull request) |
— |
0.2.0 |
Enhancement (View pull request) |
— |
0.1.1 |
Enhancement (View pull request) |
— |
0.1.0 |
Enhancement (View pull request) |
— |
On this page
- Data streams
- Requirements
- Installing and managing an Elastic Agent:
- Install a Fleet-managed Elastic Agent (recommended):
- Install Elastic Agent in standalone mode (advanced users):
- Install Elastic Agent in a containerized environment:
- Setup
- To collect data from ESET Connect, follow the below steps:
- To collect data from ESET PROTECT via Syslog, follow the below steps:
- Enabling the integration in Elastic:
- Logs Reference
- Detection
- Device Task
- Event
- Changelog