You are viewing docs on Elastic's new documentation system, currently in technical preview. For all other Elastic docs, visit elastic.co/guide.

Sophos Central

This Elastic integration collects logs from Sophos Central with Elastic Agent.

Version
1.13.2 (View all)
Compatible Kibana version(s)
8.10.1 or higher
Supported Serverless project types

Security
Observability
Subscription level
Basic
Level of support
Elastic

The Sophos Central integration allows you to monitor Alerts and Events logs. Sophos Central is a cloud-native application with high availability. It is a cybersecurity management platform hosted on public cloud platforms. Each Sophos Central account is hosted in a named region. Sophos Central uses well-known, widely used, and industry-standard software libraries to mitigate common vulnerabilities.

Use the Sophos Central integration to collect logs across Sophos Central managed by your Sophos account. Visualize that data in Kibana, create alerts to notify you if something goes wrong, and reference data when troubleshooting an issue.

Data streams

The Sophos Central integration collects logs for two types of events: alerts and events.

Alerts: See Example Schema here for more information.

Events: See Example Schema here for more information.

Compatibility

The Sophos Central Application does not feature version numbers. This integration has been configured and tested against Sophos Central SIEM Integration API version v1.

Requirements

You need Elasticsearch for storing and searching your data, and Kibana for visualizing and managing it. You can use our hosted Elasticsearch Service on Elastic Cloud, which is recommended, or self-manage the Elastic Stack on your own hardware.

Setup

Elastic Integration for Sophos Central Settings

Follow this link to guide you through the process of generating authentication credentials for Sophos Central.

The Elastic Integration for Sophos Central requires the following Authentication Settings in order to connect to the Target service:

  • Client ID
  • Client Secret
  • Grant Type
  • Scope
  • Tenant ID
  • Token URL

NOTE: Sophos central supports logs only upto last 24 hrs.

Logs reference

Alerts

This is the alerts dataset.

Example

An example event for alert looks as following:

{
    "@timestamp": "2022-11-24T07:07:48.000Z",
    "agent": {
        "ephemeral_id": "f0294025-e37d-4210-bda4-eaf14642e17e",
        "id": "cf659b85-d5b7-4b0d-8b9a-4ea2e187d862",
        "name": "docker-fleet-agent",
        "type": "filebeat",
        "version": "8.7.1"
    },
    "data_stream": {
        "dataset": "sophos_central.alert",
        "namespace": "ep",
        "type": "logs"
    },
    "destination": {
        "ip": "192.168.0.2",
        "port": 789
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "cf659b85-d5b7-4b0d-8b9a-4ea2e187d862",
        "snapshot": false,
        "version": "8.7.1"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "host"
        ],
        "code": "Event::Endpoint::Threat::PuaCleanupFailed",
        "created": "2022-11-24T07:07:52.094Z",
        "dataset": "sophos_central.alert",
        "id": "8bbd989a-6cab-407f-a586-c5064b94f76a",
        "ingested": "2023-05-24T14:37:54Z",
        "kind": [
            "alert"
        ],
        "original": "{\"created_at\":\"2022-11-24T07:07:52.094Z\",\"customer_id\":\"d1271b33-4e24-4cc3-951a-badc38976ca3\",\"data\":{\"certificates\":[],\"core_remedy_items\":{\"items\":[{\"descriptor\":\"C:\\\\foo.dll\",\"processPath\":\"\",\"result\":\"SUCCESS\",\"sophosPid\":\"\",\"suspendResult\":\"NOT_APPLICABLE\",\"type\":\"file\"}],\"totalItems\":1},\"created_at\":1669273672085,\"endpoint_id\":\"0320820b-84b4-41ea-95fd-5893fb17e420\",\"endpoint_java_id\":\"0320820b-84b4-41ea-95fd-5893fb17e420\",\"endpoint_platform\":\"windows\",\"endpoint_type\":\"computer\",\"event_service_id\":{\"data\":\"ASctdeo4TVyAZU0SyIzlJg==\",\"type\":3},\"hmpa_exploit\":{\"family_id\":\"aecab125-0118-4828-a2bb-c0815aa5864d\",\"process_name\":\"Lightning:Notepad++\",\"process_path\":\"C:\\\\Windows\\\\Virus\",\"process_pid\":\"135510845\",\"process_version\":\"21.13.87\",\"thumbprint\":\"d99d375c1e190e6ccc77d22d51e8f9ed881bbb4af1342f618adf9f78358c6488\",\"type\":\"CryptoGuard\",\"uid\":\"344b9a0b-2271-0e14-0c61-0fa89122c6ad\",\"version\":\"2.13.7\"},\"inserted_at\":1669273672085,\"ips_threat\":{\"detection_type\":1,\"executable_name\":\"Bad Program\",\"executable_path\":\"C:\\\\Program Files\\\\Bad Vendor\\\\Bad Program.exe\",\"executable_pid\":\"2468\",\"executable_version\":\"7.6.5\",\"local_port\":\"123\",\"raw_data\":\"Message       OS-WINDOWS Microsoft Windows SMB remote code execution attempt\\nReference     CVE-2017-0146\\nPacket type   TCP\\nLocal IP:     192.168.0.3\\nLocal Port:   123\\nLocal MAC:    00:50:b6:90:9e:e3\\nRemote IP:    192.168.0.2\\nRemote Port:  789\\nRemote MAC:   00:1C:B3:09:85:15\\nPID:          2468\\nExecutable:   C:\\\\Program Files\\\\Bad Vendor\\\\Bad Program.exe\\nVersion:      7.6.5\\nSigner:       PositiveSSL CA 2\\nSHA-256:      19648CE85F07F4DEC80C4B37266C31A1025DAB5318DFF5C1AB1F65A7E7886B3C\",\"remote_ip\":\"192.168.0.2\",\"remote_port\":\"789\",\"tech_support_id\":\"2019052901.77863414.5\"},\"make_actionable_at\":1674533519751,\"policy_type\":30,\"source_app_id\":\"CORE\",\"source_info\":{\"ip\":\"10.1.39.32\"},\"threat_id\":{\"counter\":5044432,\"date\":1669273672000,\"machineIdentifier\":13006844,\"processIdentifier\":3865,\"time\":1669273672000,\"timeSecond\":1669273672,\"timestamp\":1669273672},\"threat_status\":\"NONE\",\"user_match_id\":{\"counter\":5199272,\"date\":1667463333000,\"machineIdentifier\":14271215,\"processIdentifier\":3997,\"time\":1667463333000,\"timeSecond\":1667463333,\"timestamp\":1667463333},\"user_match_uuid\":{\"data\":\"SltcnDmTSoSky+G00P5iTQ==\",\"type\":3}},\"description\":\"Manual PUA cleanup required: 'PUAqsw3kby31j' at 'C:\\\\Program Files (x86)\\\\Trojan Horse\\\\bin\\\\eicar.com'\",\"event_service_event_id\":\"8bbd989a-6cab-407f-a586-c5064b94f76a\",\"id\":\"8bbd989a-6cab-407f-a586-c5064b94f76a\",\"location\":\"Lightning-rvda5c291x\",\"severity\":\"medium\",\"source\":\"Domain\\\\User\",\"threat\":\"PUAqsw3kby31j\",\"threat_cleanable\":false,\"type\":\"Event::Endpoint::Threat::PuaCleanupFailed\",\"when\":\"2022-11-24T07:07:48.000Z\"}",
        "type": [
            "info"
        ]
    },
    "input": {
        "type": "httpjson"
    },
    "message": "Manual PUA cleanup required: 'PUAqsw3kby31j' at 'C:\\Program Files (x86)\\Trojan Horse\\bin\\eicar.com'",
    "organization": {
        "id": "d1271b33-4e24-4cc3-951a-badc38976ca3"
    },
    "process": {
        "executable": "Bad Program",
        "name": "Lightning:Notepad++",
        "pid": 135510845
    },
    "related": {
        "hash": [
            "19648CE85F07F4DEC80C4B37266C31A1025DAB5318DFF5C1AB1F65A7E7886B3C"
        ],
        "ip": [
            "10.1.39.32",
            "192.168.0.2"
        ]
    },
    "sophos_central": {
        "alert": {
            "created_at": "2022-11-24T07:07:52.094Z",
            "customer_id": "d1271b33-4e24-4cc3-951a-badc38976ca3",
            "data": {
                "core_remedy": {
                    "items": [
                        {
                            "descriptor": "C:\\foo.dll",
                            "result": "SUCCESS",
                            "suspend_result": "NOT_APPLICABLE",
                            "type": "file"
                        }
                    ],
                    "total_items": 1
                },
                "created_at": "2022-11-24T07:07:52.085Z",
                "endpoint": {
                    "id": "0320820b-84b4-41ea-95fd-5893fb17e420",
                    "java_id": "0320820b-84b4-41ea-95fd-5893fb17e420",
                    "platform": "windows",
                    "type": "computer"
                },
                "event_service_id": {
                    "data": "ASctdeo4TVyAZU0SyIzlJg==",
                    "type": 3
                },
                "hmpa_exploit": {
                    "family_id": "aecab125-0118-4828-a2bb-c0815aa5864d",
                    "process_name": "Lightning:Notepad++",
                    "process_path": "C:\\Windows\\Virus",
                    "process_pid": 135510845,
                    "process_version": "21.13.87",
                    "thumbprint": "d99d375c1e190e6ccc77d22d51e8f9ed881bbb4af1342f618adf9f78358c6488",
                    "type": "CryptoGuard",
                    "uid": "344b9a0b-2271-0e14-0c61-0fa89122c6ad",
                    "version": "2.13.7"
                },
                "inserted_at": "2022-11-24T07:07:52.085Z",
                "ips_threat": {
                    "detection_type": 1,
                    "executable": {
                        "name": "Bad Program",
                        "path": "C:\\Program Files\\Bad Vendor\\Bad Program.exe",
                        "pid": "2468",
                        "version": "7.6.5"
                    },
                    "local_port": 123,
                    "raw_data": {
                        "executable": "C:\\Program Files\\Bad Vendor\\Bad Program.exe",
                        "local": {
                            "ip": "192.168.0.3",
                            "mac": "00-50-B6-90-9E-E3",
                            "port": 123
                        },
                        "message": "OS-WINDOWS Microsoft Windows SMB remote code execution attempt",
                        "original": "Message       OS-WINDOWS Microsoft Windows SMB remote code execution attempt\nReference     CVE-2017-0146\nPacket type   TCP\nLocal IP:     192.168.0.3\nLocal Port:   123\nLocal MAC:    00:50:b6:90:9e:e3\nRemote IP:    192.168.0.2\nRemote Port:  789\nRemote MAC:   00:1C:B3:09:85:15\nPID:          2468\nExecutable:   C:\\Program Files\\Bad Vendor\\Bad Program.exe\nVersion:      7.6.5\nSigner:       PositiveSSL CA 2\nSHA-256:      19648CE85F07F4DEC80C4B37266C31A1025DAB5318DFF5C1AB1F65A7E7886B3C",
                        "packet_type": "TCP",
                        "pid": "2468",
                        "reference": "CVE-2017-0146",
                        "remote": {
                            "ip": "192.168.0.2",
                            "mac": "00-1C-B3-09-85-15",
                            "port": 789
                        },
                        "sha_256": "19648CE85F07F4DEC80C4B37266C31A1025DAB5318DFF5C1AB1F65A7E7886B3C",
                        "signer": "PositiveSSL CA 2",
                        "version": "7.6.5"
                    },
                    "remote": {
                        "ip": "192.168.0.2",
                        "port": 789
                    },
                    "tech_support_id": "2019052901.77863414.5"
                },
                "make_actionable_at": "2023-01-24T04:11:59.751Z",
                "policy_type": 30,
                "source_app_id": "CORE",
                "source_info_ip": "10.1.39.32",
                "threat_id": {
                    "counter": 5044432,
                    "date": "2022-11-24T07:07:52.000Z",
                    "machine_identifier": 13006844,
                    "process_identifier": 3865,
                    "time": "2022-11-24T07:07:52.000Z",
                    "time_sec": "2022-11-24T07:07:52.000Z",
                    "timestamp": "2022-11-24T07:07:52.000Z"
                },
                "threat_status": "NONE",
                "user_match_id": {
                    "counter": 5199272,
                    "date": "2022-11-03T08:15:33.000Z",
                    "machine_identifier": 14271215,
                    "process_identifier": 3997,
                    "time": "2022-11-03T08:15:33.000Z",
                    "time_sec": "2022-11-03T08:15:33.000Z",
                    "timestamp": "2022-11-03T08:15:33.000Z"
                },
                "user_match_uuid": {
                    "data": "SltcnDmTSoSky+G00P5iTQ==",
                    "type": 3
                }
            },
            "description": "Manual PUA cleanup required: 'PUAqsw3kby31j' at 'C:\\Program Files (x86)\\Trojan Horse\\bin\\eicar.com'",
            "event_service_event_id": "8bbd989a-6cab-407f-a586-c5064b94f76a",
            "id": "8bbd989a-6cab-407f-a586-c5064b94f76a",
            "location": "Lightning-rvda5c291x",
            "severity": "medium",
            "source": {
                "domain": {
                    "name": "Domain"
                },
                "original": "Domain\\User",
                "user": {
                    "name": "User"
                }
            },
            "threat": {
                "cleanable": false,
                "value": "PUAqsw3kby31j"
            },
            "type": "Event::Endpoint::Threat::PuaCleanupFailed",
            "when": "2022-11-24T07:07:48.000Z"
        }
    },
    "source": {
        "ip": "10.1.39.32"
    },
    "tags": [
        "preserve_original_event",
        "preserve_duplicate_custom_fields",
        "forwarded",
        "sophos_central-alert"
    ],
    "user": {
        "domain": "Domain",
        "name": "User"
    }
}

Exported fields

FieldDescriptionType
@timestamp
Event timestamp.
date
data_stream.dataset
Data stream dataset.
constant_keyword
data_stream.namespace
Data stream namespace.
constant_keyword
data_stream.type
Data stream type.
constant_keyword
event.dataset
Event dataset.
constant_keyword
event.module
Event module.
constant_keyword
input.type
Type of Filebeat input.
keyword
log.offset
Log offset.
long
log.source.address
Source address from which the log event was read / sent from.
keyword
sophos_central.alert.created_at
The date at which the alert was created.
date
sophos_central.alert.customer_id
The unique identifier of the customer linked with this record.
keyword
sophos_central.alert.data.app_id
App identifier.
keyword
sophos_central.alert.data.certificates
Certificates of alert.
keyword
sophos_central.alert.data.core_remedy.items.descriptior
Descriptor of items.
keyword
sophos_central.alert.data.core_remedy.items.process_path
Process path of sophos items.
keyword
sophos_central.alert.data.core_remedy.items.result
The following values are allowed: NOT_APPLICABLE, SUCCESS, NOT_FOUND, DELETED, FAILED_TO_DELETE, WHITELISTED, OTHER_ERROR, FAILED_TO_DELETE_SYSTEM_PROTECTED.
keyword
sophos_central.alert.data.core_remedy.items.sophos_pid
Process id of sophos items.
keyword
sophos_central.alert.data.core_remedy.items.suspend_result
Suspend result of sophos items.
keyword
sophos_central.alert.data.core_remedy.items.type
Type of core remedy items.
keyword
sophos_central.alert.data.core_remedy.total_items
Total core remedy items of alert.
long
sophos_central.alert.data.created_at
The timestamp at which the event/alert was received and inserted into the Central datastore.
date
sophos_central.alert.data.endpoint.id
Object_id of the device (endpoint); also used for correlation.
keyword
sophos_central.alert.data.endpoint.java_id
Identifier for endpoint.
keyword
sophos_central.alert.data.endpoint.platform
Endpoint platform of alert.
keyword
sophos_central.alert.data.endpoint.type
The type of endpoint - currently only computer or server.
keyword
sophos_central.alert.data.event_service_id.data
Service id of event data.
keyword
sophos_central.alert.data.event_service_id.type
Service id of event type.
long
sophos_central.alert.data.hmpa_exploit.family_id
Family id of hmpa exploit.
keyword
sophos_central.alert.data.hmpa_exploit.process_name
Process name of hmpa exploit.
keyword
sophos_central.alert.data.hmpa_exploit.process_path
Process path of hmpa exploit.
keyword
sophos_central.alert.data.hmpa_exploit.process_pid
Process Parent ID of hmpa exploit.
long
sophos_central.alert.data.hmpa_exploit.process_version
Process version of hmpa exploit.
keyword
sophos_central.alert.data.hmpa_exploit.thumbprint
Thumbprint of hmpa exploit.
keyword
sophos_central.alert.data.hmpa_exploit.type
Type of hmpa exploit.
keyword
sophos_central.alert.data.hmpa_exploit.uid
Uid of hmpa exploit.
keyword
sophos_central.alert.data.hmpa_exploit.version
Version of hmpa exploits.
keyword
sophos_central.alert.data.inserted_at
When the event was inserted into the Central datastore.
date
sophos_central.alert.data.ips_threat.detection_type
Detection type of ips threat.
long
sophos_central.alert.data.ips_threat.executable.name
Executable name of ips threat.
keyword
sophos_central.alert.data.ips_threat.executable.path
Executable path of ips threat.
keyword
sophos_central.alert.data.ips_threat.executable.pid
Executable process id of ips threat.
keyword
sophos_central.alert.data.ips_threat.executable.version
Executable version of ips threat.
keyword
sophos_central.alert.data.ips_threat.local_port
Local port of ips threat.
long
sophos_central.alert.data.ips_threat.raw_data.executable
Executable raw data of IPS threat.
keyword
sophos_central.alert.data.ips_threat.raw_data.local.ip
local ip in raw data of IPS threat.
ip
sophos_central.alert.data.ips_threat.raw_data.local.mac
local mac in raw data of IPS threat.
keyword
sophos_central.alert.data.ips_threat.raw_data.local.port
local port in raw data of IPS threat.
long
sophos_central.alert.data.ips_threat.raw_data.message
Original raw data of IPS threat.
keyword
sophos_central.alert.data.ips_threat.raw_data.original
Original raw data of IPS threat.
keyword
sophos_central.alert.data.ips_threat.raw_data.packet_type
Packet type in raw data of IPS threat.
keyword
sophos_central.alert.data.ips_threat.raw_data.pid
PID raw data of IPS threat.
keyword
sophos_central.alert.data.ips_threat.raw_data.reference
Original raw data of IPS threat.
keyword
sophos_central.alert.data.ips_threat.raw_data.remote.ip
Remote IP in raw data of IPS threat.
ip
sophos_central.alert.data.ips_threat.raw_data.remote.mac
remote mac in raw data of IPS threat.
keyword
sophos_central.alert.data.ips_threat.raw_data.remote.port
remote port in raw data of IPS threat.
long
sophos_central.alert.data.ips_threat.raw_data.sha_256
sha 256 code of raw data.
keyword
sophos_central.alert.data.ips_threat.raw_data.signer
signer raw data of IPS threat.
keyword
sophos_central.alert.data.ips_threat.raw_data.version
Version raw data of IPS threat.
keyword
sophos_central.alert.data.ips_threat.remote.ip
Remote ip from which ips threat occured.
ip
sophos_central.alert.data.ips_threat.remote.port
Remote port of ips threat.
long
sophos_central.alert.data.ips_threat.tech_support_id
IPS tech support id.
keyword
sophos_central.alert.data.make_actionable_at
Action make date.
date
sophos_central.alert.data.policy_type
Alert policy type.
long
sophos_central.alert.data.source_app_id
Source App id.
keyword
sophos_central.alert.data.source_info_ip
This shows the IPv4 address of an endpoint. If there are multiple IP addresses, this will show the first ip reported.
ip
sophos_central.alert.data.threat_id.counter
Counter of threat.
long
sophos_central.alert.data.threat_id.date
Date of threat.
date
sophos_central.alert.data.threat_id.machine_identifier
Machine identifier of threat.
long
sophos_central.alert.data.threat_id.process_identifier
Process identifier of threat.
long
sophos_central.alert.data.threat_id.time
Time of threat.
date
sophos_central.alert.data.threat_id.time_sec
Second at which threat occured.
date
sophos_central.alert.data.threat_id.timestamp
Time at which threat id of data was created.
date
sophos_central.alert.data.threat_status
Status of threat.
keyword
sophos_central.alert.data.user_match_id.counter
Counter of user.
long
sophos_central.alert.data.user_match_id.date
Date of user match.
date
sophos_central.alert.data.user_match_id.machine_identifier
Machine identifier of user.
long
sophos_central.alert.data.user_match_id.process_identifier
Process identifier of user.
long
sophos_central.alert.data.user_match_id.time
Time of user match.
date
sophos_central.alert.data.user_match_id.time_sec
Second at which user matched.
date
sophos_central.alert.data.user_match_id.timestamp
Time at which user match id of data was created.
date
sophos_central.alert.data.user_match_uuid.data
UUID of user matched data.
keyword
sophos_central.alert.data.user_match_uuid.type
UUID of user matched type.
long
sophos_central.alert.description
The description of the alert that was generated.
keyword
sophos_central.alert.event_service_event_id
Unique identifier of the event.
keyword
sophos_central.alert.id
Unique identifier of the event.
keyword
sophos_central.alert.location
Location of alert.
keyword
sophos_central.alert.severity
The severity of the threat reported by the event; possible values are: None, Low, Medium, High, Critical.
keyword
sophos_central.alert.source.domain.name
Domain name of source.
keyword
sophos_central.alert.source.original
Describes the source from alert was generated.
keyword
sophos_central.alert.source.user.name
Username of source.
keyword
sophos_central.alert.threat.cleanable
Indicate if the threat can be cleaned automatically: True or False.
boolean
sophos_central.alert.threat.value
Name of the threat (as identified by threat_id).
keyword
sophos_central.alert.type
Event type.
keyword
sophos_central.alert.when
The date at which the alert was created.
date
tags
User defined tags.
keyword

Events

This is the events dataset.

Example

An example event for event looks as following:

{
    "@timestamp": "2022-12-06T12:27:28.094Z",
    "agent": {
        "ephemeral_id": "5347e925-6d9e-4a32-bda5-1785fd44709f",
        "id": "cf659b85-d5b7-4b0d-8b9a-4ea2e187d862",
        "name": "docker-fleet-agent",
        "type": "filebeat",
        "version": "8.7.1"
    },
    "data_stream": {
        "dataset": "sophos_central.event",
        "namespace": "ep",
        "type": "logs"
    },
    "destination": {
        "ip": "81.2.69.192",
        "port": 789
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "cf659b85-d5b7-4b0d-8b9a-4ea2e187d862",
        "snapshot": false,
        "version": "8.7.1"
    },
    "event": {
        "action": "Malicious inbound network traffic blocked from remote computer at 192.168.0.2 (Technical Support reference: 2019052901.77863414.5)",
        "agent_id_status": "verified",
        "category": [
            "host"
        ],
        "created": "2022-12-06T12:27:31.310Z",
        "dataset": "sophos_central.event",
        "id": "3dab71db-32c9-426a-8616-1e0fd5c9aab9",
        "ingested": "2023-05-24T14:38:29Z",
        "kind": [
            "event"
        ],
        "original": "{\"created_at\":\"2022-12-06T12:27:31.310Z\",\"customer_id\":\"d1271b33-4e24-4cc3-951a-badc38976ca3\",\"endpoint_id\":\"fb11564b-2882-44ea-ac64-d1bfb041ab49\",\"endpoint_type\":\"computer\",\"group\":\"RUNTIME_DETECTIONS\",\"id\":\"3dab71db-32c9-426a-8616-1e0fd5c9aab9\",\"ips_threat_data\":{\"detectionType\":0,\"executableName\":\"\",\"localPort\":\"123\",\"rawData\":\"Message       OS-WINDOWS Microsoft Windows SMB remote code execution attempt\\nReference     CVE-2017-0146\\nPacket type   TCP\\nLocal IP:     81.2.69.192\\nLocal Port:   123\\nLocal MAC:    00:50:56:81:62:41\\nRemote IP:    81.2.69.192\\nRemote Port:  789\\nRemote MAC:   00:1C:B3:09:85:15\",\"remoteIp\":\"81.2.69.192\",\"remotePort\":\"789\",\"techSupportId\":\"2019052901.77863414.5\"},\"location\":\"Lightning-4naq56bx4j\",\"name\":\"Malicious inbound network traffic blocked from remote computer at 192.168.0.2 (Technical Support reference: 2019052901.77863414.5)\",\"severity\":\"low\",\"source\":\"Lightning-a3i691l7cv\\\\Lightning\",\"source_info\":{\"ip\":\"81.2.69.192\"},\"threat\":\"IPS/Inbound/7777001\",\"type\":\"Event::Endpoint::Threat::IpsInboundDetection\",\"user_id\":\"638f34e1e5d0a20f3d40cf93\",\"when\":\"2022-12-06T12:27:28.094Z\"}",
        "type": [
            "info"
        ]
    },
    "input": {
        "type": "httpjson"
    },
    "organization": {
        "id": "d1271b33-4e24-4cc3-951a-badc38976ca3"
    },
    "related": {
        "ip": [
            "81.2.69.192"
        ]
    },
    "sophos_central": {
        "event": {
            "created_at": "2022-12-06T12:27:31.310Z",
            "customer_id": "d1271b33-4e24-4cc3-951a-badc38976ca3",
            "endpoint": {
                "id": "fb11564b-2882-44ea-ac64-d1bfb041ab49",
                "type": "computer"
            },
            "group": "RUNTIME_DETECTIONS",
            "id": "3dab71db-32c9-426a-8616-1e0fd5c9aab9",
            "ips_threat_data": {
                "detection_type": 0,
                "local_port": 123,
                "raw_data": {
                    "local": {
                        "ip": "81.2.69.192",
                        "mac": "00-50-56-81-62-41",
                        "port": 123
                    },
                    "message": "OS-WINDOWS Microsoft Windows SMB remote code execution attempt",
                    "original": "Message       OS-WINDOWS Microsoft Windows SMB remote code execution attempt\nReference     CVE-2017-0146\nPacket type   TCP\nLocal IP:     81.2.69.192\nLocal Port:   123\nLocal MAC:    00:50:56:81:62:41\nRemote IP:    81.2.69.192\nRemote Port:  789\nRemote MAC:   00:1C:B3:09:85:15",
                    "packet_type": "TCP",
                    "reference": "CVE-2017-0146",
                    "remote": {
                        "ip": "81.2.69.192",
                        "mac": "00-1C-B3-09-85-15",
                        "port": 789
                    }
                },
                "remote": {
                    "ip": "81.2.69.192",
                    "port": 789
                },
                "tech_support_id": "2019052901.77863414.5"
            },
            "location": "Lightning-4naq56bx4j",
            "name": "Malicious inbound network traffic blocked from remote computer at 192.168.0.2 (Technical Support reference: 2019052901.77863414.5)",
            "severity": "low",
            "source": {
                "domain": {
                    "name": "Lightning-a3i691l7cv"
                },
                "original": "Lightning-a3i691l7cv\\Lightning",
                "user": {
                    "name": "Lightning"
                }
            },
            "source_info": {
                "ip": "81.2.69.192"
            },
            "threat": "IPS/Inbound/7777001",
            "type": "Event::Endpoint::Threat::IpsInboundDetection",
            "user_id": "638f34e1e5d0a20f3d40cf93",
            "when": "2022-12-06T12:27:28.094Z"
        }
    },
    "source": {
        "ip": "81.2.69.192",
        "port": 123
    },
    "tags": [
        "preserve_original_event",
        "preserve_duplicate_custom_fields",
        "forwarded",
        "sophos_central-event"
    ],
    "threat": {
        "feed": {
            "name": "IPS/Inbound/7777001"
        }
    },
    "user": {
        "domain": "Lightning-a3i691l7cv",
        "id": "638f34e1e5d0a20f3d40cf93",
        "name": "Lightning"
    }
}

Exported fields

FieldDescriptionType
@timestamp
Event timestamp.
date
data_stream.dataset
Data stream dataset.
constant_keyword
data_stream.namespace
Data stream namespace.
constant_keyword
data_stream.type
Data stream type.
constant_keyword
event.dataset
Event dataset.
constant_keyword
event.module
Event module.
constant_keyword
input.type
Type of Filebeat input.
keyword
log.offset
Log offset.
long
log.source.address
Source address from which the log event was read / sent from.
keyword
sophos_central.event.amsi_threat_data.parent_process.id
Parent process id of amsi_threat_data.
keyword
sophos_central.event.amsi_threat_data.parent_process.path
Parent process path of amsi_threat_data.
keyword
sophos_central.event.amsi_threat_data.process.id
Process ID of amsi_threat_data.
keyword
sophos_central.event.amsi_threat_data.process.name
Process name of amsi_threat_data.
keyword
sophos_central.event.amsi_threat_data.process.path
Process path of amsi_threat_data.
keyword
sophos_central.event.app_certs.signer
Certificate info of the singer with the threat, if available.
keyword
sophos_central.event.app_certs.thumbprint
Certificate info of the thumbprint with the threat, if available.
keyword
sophos_central.event.app_sha256
SHA 256 hash of the application associated with the threat, if available.
keyword
sophos_central.event.core_remedy.items.descriptor
Descriptor of Core remedy items.
keyword
sophos_central.event.core_remedy.items.process_path
Process path of core remedy items.
keyword
sophos_central.event.core_remedy.items.result
The following values are allowed NOT_APPLICABLE, SUCCESS, NOT_FOUND, DELETED, FAILED_TO_DELETE, WHITELISTED, OTHER_ERROR, FAILED_TO_DELETE_SYSTEM_PROTECTED.
keyword
sophos_central.event.core_remedy.items.sophos_pid
Sophos process ID.
keyword
sophos_central.event.core_remedy.items.suspend_result
Suspend result of core remedy items.
keyword
sophos_central.event.core_remedy.items.type
Type of Core remedy items.
keyword
sophos_central.event.core_remedy.total_items
Total items of core remedy.
long
sophos_central.event.created_at
The date at which the event was created.
date
sophos_central.event.customer_id
The identifier of the customer for which record is created.
keyword
sophos_central.event.endpoint.id
The corresponding endpoint id associated with the record.
keyword
sophos_central.event.endpoint.type
The corresponding endpoint type associated with the record.
keyword
sophos_central.event.group
The group associated with the group.
keyword
sophos_central.event.id
The Identifier for the event.
keyword
sophos_central.event.ips_threat_data.detection_type
Detection type of IPS threat.
long
sophos_central.event.ips_threat_data.executable.name
Name of executable ips threat.
keyword
sophos_central.event.ips_threat_data.executable.path
Path of executable ips threat.
keyword
sophos_central.event.ips_threat_data.executable.pid
Process id of executable ips threat.
long
sophos_central.event.ips_threat_data.executable.version
Version of executable ips threat.
keyword
sophos_central.event.ips_threat_data.local_port
Local port of IPS threat.
long
sophos_central.event.ips_threat_data.raw_data.executable
Executable raw data of IPS threat.
keyword
sophos_central.event.ips_threat_data.raw_data.local.ip
Local ip in raw data of IPS threat.
ip
sophos_central.event.ips_threat_data.raw_data.local.mac
Local mac in raw data of IPS threat.
keyword
sophos_central.event.ips_threat_data.raw_data.local.port
Local port in raw data of IPS threat.
long
sophos_central.event.ips_threat_data.raw_data.message
Original raw data of IPS threat.
keyword
sophos_central.event.ips_threat_data.raw_data.original
Original raw data of IPS threat.
keyword
sophos_central.event.ips_threat_data.raw_data.packet_type
Packet type in raw data of IPS threat.
keyword
sophos_central.event.ips_threat_data.raw_data.pid
PID raw data of IPS threat.
keyword
sophos_central.event.ips_threat_data.raw_data.reference
Original raw data of IPS threat.
keyword
sophos_central.event.ips_threat_data.raw_data.remote.ip
Remote IP in raw data of IPS threat.
ip
sophos_central.event.ips_threat_data.raw_data.remote.mac
Remote mac in raw data of IPS threat.
keyword
sophos_central.event.ips_threat_data.raw_data.remote.port
Remote port in raw data of IPS threat.
long
sophos_central.event.ips_threat_data.raw_data.sha_256
SHA 256 code of raw data.
keyword
sophos_central.event.ips_threat_data.raw_data.signer
Signer raw data of IPS threat.
keyword
sophos_central.event.ips_threat_data.raw_data.version
Version raw data of IPS threat.
keyword
sophos_central.event.ips_threat_data.remote.ip
Remote IP of IPS threat.
ip
sophos_central.event.ips_threat_data.remote.port
Remote Port of IPS threat.
long
sophos_central.event.ips_threat_data.tech_support_id
Tech support ID of IPS threat.
keyword
sophos_central.event.location
The location captured for this record.
keyword
sophos_central.event.name
The name of the record created.
keyword
sophos_central.event.origin
Originating component of a detection.
keyword
sophos_central.event.severity
The severity of the threat reported by the event; possible values are None (0), Low (1), Medium (2), High (3), Critical (4).
keyword
sophos_central.event.source.domain.name
Domain name of source.
keyword
sophos_central.event.source.original
Describes the source from alert was generated.
keyword
sophos_central.event.source.user.name
Username of source.
keyword
sophos_central.event.source_info.ip
Detailed source information for IP.
ip
sophos_central.event.threat
The threat associated with the record.
keyword
sophos_central.event.type
The type of this record.
keyword
sophos_central.event.user_id
The identifier of the user for which record is created.
keyword
sophos_central.event.when
The date at which the event was created.
date
tags
User defined tags.
keyword

Changelog

VersionDetailsKibana version(s)

1.13.2

Bug fix View pull request
Ensure from_date parameter is within bounds.

8.10.1 or higher

1.13.1

Enhancement View pull request
Changed owners

8.7.1 or higher

1.13.0

Enhancement View pull request
Limit request tracer log count to five.

8.7.1 or higher

1.12.0

Enhancement View pull request
ECS version updated to 8.11.0.

8.7.1 or higher

1.11.0

Enhancement View pull request
Improve 'event.original' check to avoid errors if set.

8.7.1 or higher

1.10.0

Enhancement View pull request
ECS version updated to 8.10.0.

8.7.1 or higher

1.9.0

Enhancement View pull request
The format_version in the package manifest changed from 2.11.0 to 3.0.0. Removed dotted YAML keys from package manifest. Added 'owner.type: elastic' to package manifest.

8.7.1 or higher

1.8.0

Enhancement View pull request
Add tags.yml file so that integration's dashboards and saved searches are tagged with "Security Solution" and displayed in the Security Solution UI.

8.7.1 or higher

1.7.0

Enhancement View pull request
Update package to ECS 8.9.0.

8.7.1 or higher

1.6.0

Enhancement View pull request
Document duration units.

8.7.1 or higher

1.5.0

Enhancement View pull request
Ensure event.kind is correctly set for pipeline errors.

8.7.1 or higher

1.4.0

Enhancement View pull request
Update package to ECS 8.8.0.

8.7.1 or higher

1.3.0

Bug fix View pull request
Fix timestamp parsing and update package-spec version to 2.7.0.

8.7.1 or higher

1.2.1

Bug fix View pull request
Handle failure for grok pattern.

8.7.1 or higher

1.2.0

Enhancement View pull request
Add a new flag to enable request tracing

8.7.1 or higher

1.1.0

Enhancement View pull request
Update package to ECS 8.7.0.

8.3.0 or higher

1.0.0

Enhancement View pull request
Release Sophos Central as GA.

8.3.0 or higher

0.1.0

Enhancement View pull request
Initial release.

On this page