Palo Alto Prisma Cloud
Collect logs from Prisma Cloud with Elastic Agent.
Version |
1.2.0 (View all) |
Compatible Kibana version(s) |
8.12.0 or higher |
Supported Serverless project types |
Security Observability |
Subscription level |
Basic |
Level of support |
Elastic |
This Prisma Cloud is a cloud infrastructure security solution and a Security Operations Center (SOC) enablement tool that enables you to address risks and secure your workloads in a heterogeneous environment (hybrid and multi cloud) from a single console. It provides complete visibility and control over risks within your public cloud infrastructure—Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), Oracle Cloud Infrastructure (OCI), Alibaba Cloud— and enables you to manage vulnerabilities, detect anomalies, ensure compliance, and provide runtime defense in heterogeneous environments, such as Windows, Linux, Kubernetes, Red Hat OpenShift, AWS Lambda, Azure Functions, and GCP Cloud Functions.
Prisma Cloud Security Posture Management (CSPM)
Single pane of glass for both CSPM (Cloud Security Posture Management) & CWPP (Cloud Workload Protection Platform). Compute (formerly Twistlock, a CWPP solution) is delivered as part of the larger Prisma Cloud system. Palo Alto Networks runs, manages, and updates Compute Console for you. You deploy and manage Defenders in your environment. You access the Compute Console from a tab within the Prisma Cloud user interface.
CSPM uses REST API mode to collect data. Elastic Agent fetches data via API endpoints.
Prisma Cloud Workload Protection (CWP)
Self-hosted, stand-alone, self-operated version of Compute (formerly Twistlock). Download the entire software suite, and run it in any environment. You deploy and manage both Console and Defenders.
CWP can be used in two different modes to collect data:
- REST API mode.
- Syslog mode: This includes TCP and UDP.
Compatibility
This module has been tested against the latest CSPM version v2 and CWP version v30.03.
Data streams
The Prisma Cloud integration collects data for the following five events:
Event Type |
---|
Alert |
Audit |
Host |
Host Profile |
Incident Audit |
NOTE:
- Alert and Audit data-streams are part of CSPM module, whereas Host, Host Profile and Incident Audit are part of CWP module.
- Currently, we are unable to collect logs of Incident Audit datastream via defined API. Hence, we have not added the configuration of Incident Audit data stream via REST API.
Requirements
- Elastic Agent must be installed.
- You can install only one Elastic Agent per host.
- Elastic Agent is required to stream data through the REST API and ship the data to Elastic, where the events will then be processed via the integration's ingest pipelines.
Installing and managing an Elastic Agent:
You have a few options for installing and managing an Elastic Agent:
Install a Fleet-managed Elastic Agent (recommended):
With this approach, you install Elastic Agent and use Fleet in Kibana to define, configure, and manage your agents in a central location. We recommend using Fleet management because it makes the management and upgrade of your agents considerably easier.
Install Elastic Agent in standalone mode (advanced users):
With this approach, you install Elastic Agent and manually configure the agent locally on the system where it’s installed. You are responsible for managing and upgrading the agents. This approach is reserved for advanced users only.
Install Elastic Agent in a containerized environment:
You can run Elastic Agent inside a container, either with Fleet Server or standalone. Docker images for all versions of Elastic Agent are available from the Elastic Docker registry, and we provide deployment manifests for running on Kubernetes.
There are some minimum requirements for running Elastic Agent and for more information, refer to the link here.
The minimum kibana.version required is 8.10.1.
Setup
To collect data through REST API, follow the below steps:
CSPM
- Considering you already have a Prisma Cloud account, to obtain an access key ID and secret access key from the Prisma Cloud system administrator, refer this link.
- The base URL of your CSPM API request depends on the region of your Prisma Cloud tenant and is similar to your Prisma Cloud administrative console URL. Obtain your URL from this link.
CWP
- Assuming you've already generated your access key ID and secret access key from the Prisma Cloud Console; if not, see the section above.
- The base URL of your CWP API request depends on the console path and the API version of your Prisma Cloud Compute console.
- To find your API version, log in to your Prisma Cloud Compute console, click the bell icon in the top right of the page, your API version is displayed.
- To get your console path, navigate to Compute > Manage > System > Downloads. you can find your console path listed under Path to Console.
- Now you can create your base URL in this format:
https://<CONSOLE>/api/v<VERSION>
.
NOTE: You can specify a date and time for the access key validity. If you do not select key expiry, the key is set to never expire; if you select it, but do not specify a date, the key expires in a month.
Enabling the integration in Elastic:
-
In Kibana go to Management > Integrations
-
In "Search for integrations" search bar, type Palo Alto Prisma Cloud.
-
Click on the "Palo Alto Prisma Cloud" integration from the search results.
-
Click on the Add Palo Alto Prisma Cloud Integration button to add the integration.
-
While adding the integration, if you want to collect Alert and Audit data via REST API, then you have to put the following details:
- username
- password
- url
- interval
- time amount
- time unit
- batch size
or if you want to collect Host, Host Profile and Incident Audit data via REST API, then you have to put the following details:
- username
- password
- url
- interval
- offset
- batch size
or if you want to collect Host, Host Profile and Incident Audit data via TCP/UDP, then you have to put the following details:
- listen address
- listen port
NOTE: Your Access key ID is your username and Secret Access key is your password.
Logs Reference
Alert
This is the Alert
dataset.
Example
An example event for alert
looks as following:
{
"@timestamp": "2023-09-06T12:30:41.966Z",
"agent": {
"ephemeral_id": "748799a0-a545-468b-9b86-764414774225",
"id": "47449736-bd61-40ad-89a6-41d7f7acc093",
"name": "docker-fleet-agent",
"type": "filebeat",
"version": "8.10.1"
},
"cloud": {
"account": {
"id": "710002259376"
},
"provider": "aws",
"service": {
"name": "Amazon EC2"
}
},
"data_stream": {
"dataset": "prisma_cloud.alert",
"namespace": "ep",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "47449736-bd61-40ad-89a6-41d7f7acc093",
"snapshot": false,
"version": "8.10.1"
},
"event": {
"agent_id_status": "verified",
"category": [
"threat"
],
"dataset": "prisma_cloud.alert",
"end": "2023-09-06T12:30:41.966Z",
"id": "N-3910",
"ingested": "2023-11-27T09:08:39Z",
"kind": "alert",
"original": "{\"alertAdditionalInfo\":{\"scannerVersion\":\"CS_2.0\"},\"alertAttribution\":{\"attributionEventList\":[{\"event\":\"first_event\",\"event_ts\":1694003441966,\"username\":\"alex123\"}],\"resourceCreatedBy\":\"string\",\"resourceCreatedOn\":0},\"alertRules\":[],\"alertTime\":1694003441966,\"firstSeen\":1694003441966,\"history\":[{\"modifiedBy\":\"alex123\",\"modifiedOn\":\"1694003441966\",\"reason\":\"Reason1\",\"status\":\"OPEN\"}],\"id\":\"N-3910\",\"investigateOptions\":{\"alertId\":\"N-3910\"},\"lastSeen\":1694003441966,\"lastUpdated\":1694003441966,\"metadata\":null,\"policy\":{\"complianceMetadata\":[{\"complianceId\":\"qwer345bv\",\"customAssigned\":true,\"policyId\":\"werf435tr\",\"requirementDescription\":\"Description of policy compliance.\",\"requirementId\":\"req-123-xyz\",\"requirementName\":\"rigidity\",\"sectionDescription\":\"Description of section.\",\"sectionId\":\"sect-453-abc\",\"sectionLabel\":\"label-1\",\"standardDescription\":\"Description of standard.\",\"standardId\":\"stand-543-pqr\",\"standardName\":\"Class 1\"}],\"deleted\":false,\"description\":\"This policy identifies AWS EC2 instances that are internet reachable with unrestricted access (0.0.0.0/0). EC2 instances with unrestricted access to the internet may enable bad actors to use brute force on a system to gain unauthorised access to the entire network. As a best practice, restrict traffic from unknown IP addresses and limit the access to known hosts, services, or specific entities.\",\"findingTypes\":[],\"labels\":[\"Prisma_Cloud\",\"Attack Path Rule\"],\"lastModifiedBy\":\"template@redlock.io\",\"lastModifiedOn\":1687474999057,\"name\":\"AWS EC2 instance that is internet reachable with unrestricted access (0.0.0.0/0)\",\"policyId\":\"ad23603d-754e-4499-8988-b8017xxxx98\",\"policyType\":\"network\",\"recommendation\":\"The following steps are recommended to restrict unrestricted access from the Internet:\\n1. Visit the Network path Analysis from Source to Destination and review the network path components that allow internet access.\\n2. Identify the network component on which restrictive rules can be implemented.\\n3. Implement the required changes and make sure no other resources have been impacted due to these changes:\\n a) The overly permissive Security Group rules can be made more restrictive.\\n b) Move the instance inside a restrictive subnet if the instance does not need to be publicly accessible.\\n c) Define a NAT rule to restrict traffic coming from the Internet to the respective instance.\",\"remediable\":false,\"remediation\":{\"actions\":[{\"operation\":\"buy\",\"payload\":\"erefwsdf\"}],\"cliScriptTemplate\":\"temp1\",\"description\":\"Description of CLI Script Template.\"},\"severity\":\"high\",\"systemDefault\":true},\"policyId\":\"ad23603d-754e-4499-8988-b801xxx85898\",\"reason\":\"NEW_ALERT\",\"resource\":{\"account\":\"AWS Cloud Account\",\"accountId\":\"710002259376\",\"additionalInfo\":null,\"cloudAccountGroups\":[\"Default Account Group\"],\"cloudServiceName\":\"Amazon EC2\",\"cloudType\":\"aws\",\"data\":null,\"id\":\"i-04578exxxx8100947\",\"name\":\"IS-37133\",\"region\":\"AWS Virginia\",\"regionId\":\"us-east-1\",\"resourceApiName\":\"aws-ec2-describe-instances\",\"resourceConfigJsonAvailable\":false,\"resourceDetailsAvailable\":true,\"resourceTs\":1694003441915,\"resourceType\":\"INSTANCE\",\"rrn\":\"rrn:aws:instance:us-east-1:710000059376:e7ddce5a1ffcb47bxxxxxerf2635a3b4d9da3:i-04578e0008100947\",\"unifiedAssetId\":\"66c543b6261c4d9edxxxxxb42e15f4\",\"url\":\"https://console.aws.amazon.com/ec2/v2/home?region=us-east-1#Instances:instanceId=i-0457xxxxx00947\"},\"status\":\"open\"}",
"start": "2023-09-06T12:30:41.966Z",
"type": [
"indicator"
]
},
"input": {
"type": "cel"
},
"prisma_cloud": {
"alert": {
"additional_info": {
"scanner_version": "CS_2.0"
},
"attribution": {
"event_list": [
{
"ts": "2023-09-06T12:30:41.966Z",
"username": "alex123",
"value": "first_event"
}
],
"resource": {
"created_by": "string",
"created_on": "1970-01-01T00:00:00.000Z"
}
},
"first_seen": "2023-09-06T12:30:41.966Z",
"history": [
{
"modified_by": "alex123",
"modified_on": "2023-09-06T12:30:41.966Z",
"reason": "Reason1",
"status": "OPEN"
}
],
"id": "N-3910",
"last": {
"seen": "2023-09-06T12:30:41.966Z",
"updated": "2023-09-06T12:30:41.966Z"
},
"policy": {
"compliance_metadata": [
{
"compliance_id": "qwer345bv",
"custom_assigned": true,
"policy_id": "werf435tr",
"requirement": {
"description": "Description of policy compliance.",
"id": "req-123-xyz",
"name": "rigidity"
},
"section": {
"description": "Description of section.",
"id": "sect-453-abc",
"label": "label-1"
},
"standard": {
"description": "Description of standard.",
"id": "stand-543-pqr",
"name": "Class 1"
}
}
],
"deleted": false,
"description": "This policy identifies AWS EC2 instances that are internet reachable with unrestricted access (0.0.0.0/0). EC2 instances with unrestricted access to the internet may enable bad actors to use brute force on a system to gain unauthorised access to the entire network. As a best practice, restrict traffic from unknown IP addresses and limit the access to known hosts, services, or specific entities.",
"id": "ad23603d-754e-4499-8988-b8017xxxx98",
"labels": [
"Prisma_Cloud",
"Attack Path Rule"
],
"last_modified_by": "template@redlock.io",
"last_modified_on": "2023-06-22T23:03:19.057Z",
"name": "AWS EC2 instance that is internet reachable with unrestricted access (0.0.0.0/0)",
"recommendation": "The following steps are recommended to restrict unrestricted access from the Internet:\n1. Visit the Network path Analysis from Source to Destination and review the network path components that allow internet access.\n2. Identify the network component on which restrictive rules can be implemented.\n3. Implement the required changes and make sure no other resources have been impacted due to these changes:\n a) The overly permissive Security Group rules can be made more restrictive.\n b) Move the instance inside a restrictive subnet if the instance does not need to be publicly accessible.\n c) Define a NAT rule to restrict traffic coming from the Internet to the respective instance.",
"remediable": false,
"remediation": {
"actions": [
{
"operation": "buy",
"payload": "erefwsdf"
}
],
"cli_script_template": "temp1",
"description": "Description of CLI Script Template."
},
"severity": "high",
"system_default": true,
"type": "network"
},
"policy_id": "ad23603d-754e-4499-8988-b801xxx85898",
"reason": "NEW_ALERT",
"resource": {
"account": {
"id": "710002259376",
"value": "AWS Cloud Account"
},
"api_name": "aws-ec2-describe-instances",
"cloud": {
"account": {
"groups": [
"Default Account Group"
]
},
"service_name": "Amazon EC2",
"type": "aws"
},
"config_json_available": false,
"details_available": true,
"id": "i-04578exxxx8100947",
"name": "IS-37133",
"region": {
"id": "us-east-1",
"value": "AWS Virginia"
},
"rrn": "rrn:aws:instance:us-east-1:710000059376:e7ddce5a1ffcb47bxxxxxerf2635a3b4d9da3:i-04578e0008100947",
"ts": "2023-09-06T12:30:41.915Z",
"type": "INSTANCE",
"unified_asset_id": "66c543b6261c4d9edxxxxxb42e15f4",
"url": "https://console.aws.amazon.com/ec2/v2/home?region=us-east-1#Instances:instanceId=i-0457xxxxx00947"
},
"status": "open",
"time": "2023-09-06T12:30:41.966Z"
}
},
"related": {
"user": [
"alex123"
]
},
"tags": [
"preserve_original_event",
"preserve_duplicate_custom_fields",
"forwarded",
"prisma_cloud-alert"
],
"url": {
"domain": "console.aws.amazon.com",
"fragment": "Instances:instanceId=i-0457xxxxx00947",
"original": "https://console.aws.amazon.com/ec2/v2/home?region=us-east-1#Instances:instanceId=i-0457xxxxx00947",
"path": "/ec2/v2/home",
"query": "region=us-east-1",
"scheme": "https"
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset. | constant_keyword |
event.module | Event module. | constant_keyword |
input.type | Type of filebeat input. | keyword |
log.offset | Log offset. | long |
prisma_cloud.alert.additional_info.scanner_version | keyword | |
prisma_cloud.alert.attribution.event_list.ts | date | |
prisma_cloud.alert.attribution.event_list.username | keyword | |
prisma_cloud.alert.attribution.event_list.value | keyword | |
prisma_cloud.alert.attribution.resource.created_by | keyword | |
prisma_cloud.alert.attribution.resource.created_on | date | |
prisma_cloud.alert.count | long | |
prisma_cloud.alert.dismissal.duration | keyword | |
prisma_cloud.alert.dismissal.note | keyword | |
prisma_cloud.alert.dismissal.until_ts | date | |
prisma_cloud.alert.dismissed_by | keyword | |
prisma_cloud.alert.event_occurred | Timestamp when the event occurred. Set only for Audit Event policies. | date |
prisma_cloud.alert.first_seen | Timestamp of the first policy violation for the alert resource (i.e. the alert creation timestamp). | date |
prisma_cloud.alert.history.modified_by | keyword | |
prisma_cloud.alert.history.modified_on | date | |
prisma_cloud.alert.history.reason | keyword | |
prisma_cloud.alert.history.status | keyword | |
prisma_cloud.alert.id | Alert ID. | keyword |
prisma_cloud.alert.last.seen | Timestamp when alert status was last updated. | date |
prisma_cloud.alert.last.updated | Timestamp when alert was last updated. Updates include but are not limited to resource updates, policy updates, alert rule updates, and alert status changes. | date |
prisma_cloud.alert.metadata.save_search_id | keyword | |
prisma_cloud.alert.policy.cloud_type | Possible values: [ALL, AWS, AZURE, GCP, ALIBABA_CLOUD, OCI, IBM] Cloud type (Required for config policies). Not case-sensitive. Default is ALL. | keyword |
prisma_cloud.alert.policy.compliance_metadata.compliance_id | Compliance Section UUID. | keyword |
prisma_cloud.alert.policy.compliance_metadata.custom_assigned | boolean | |
prisma_cloud.alert.policy.compliance_metadata.policy_id | keyword | |
prisma_cloud.alert.policy.compliance_metadata.requirement.description | keyword | |
prisma_cloud.alert.policy.compliance_metadata.requirement.id | keyword | |
prisma_cloud.alert.policy.compliance_metadata.requirement.name | keyword | |
prisma_cloud.alert.policy.compliance_metadata.requirement.view_order | keyword | |
prisma_cloud.alert.policy.compliance_metadata.section.description | keyword | |
prisma_cloud.alert.policy.compliance_metadata.section.id | keyword | |
prisma_cloud.alert.policy.compliance_metadata.section.label | keyword | |
prisma_cloud.alert.policy.compliance_metadata.section.view_order | long | |
prisma_cloud.alert.policy.compliance_metadata.standard.description | keyword | |
prisma_cloud.alert.policy.compliance_metadata.standard.id | keyword | |
prisma_cloud.alert.policy.compliance_metadata.standard.name | keyword | |
prisma_cloud.alert.policy.compliance_metadata.system_default | boolean | |
prisma_cloud.alert.policy.created_by | keyword | |
prisma_cloud.alert.policy.created_on | date | |
prisma_cloud.alert.policy.deleted | boolean | |
prisma_cloud.alert.policy.description | keyword | |
prisma_cloud.alert.policy.enabled | boolean | |
prisma_cloud.alert.policy.finding_types | keyword | |
prisma_cloud.alert.policy.id | keyword | |
prisma_cloud.alert.policy.labels | keyword | |
prisma_cloud.alert.policy.last_modified_by | keyword | |
prisma_cloud.alert.policy.last_modified_on | date | |
prisma_cloud.alert.policy.name | keyword | |
prisma_cloud.alert.policy.recommendation | keyword | |
prisma_cloud.alert.policy.remediable | boolean | |
prisma_cloud.alert.policy.remediation.actions.operation | keyword | |
prisma_cloud.alert.policy.remediation.actions.payload | keyword | |
prisma_cloud.alert.policy.remediation.cli_script_template | keyword | |
prisma_cloud.alert.policy.remediation.description | keyword | |
prisma_cloud.alert.policy.rule.api_name | keyword | |
prisma_cloud.alert.policy.rule.cloud.account | keyword | |
prisma_cloud.alert.policy.rule.cloud.type | keyword | |
prisma_cloud.alert.policy.rule.criteria | Saved search ID that defines the rule criteria. | keyword |
prisma_cloud.alert.policy.rule.data_criteria.classification_result | Data policy. Required for DLP rule criteria. | keyword |
prisma_cloud.alert.policy.rule.data_criteria.exposure | Possible values [private, public, conditional]. | keyword |
prisma_cloud.alert.policy.rule.data_criteria.extension | keyword | |
prisma_cloud.alert.policy.rule.last_modified_on | date | |
prisma_cloud.alert.policy.rule.name | keyword | |
prisma_cloud.alert.policy.rule.parameters | flattened | |
prisma_cloud.alert.policy.rule.resource.id_path | keyword | |
prisma_cloud.alert.policy.rule.resource.type | keyword | |
prisma_cloud.alert.policy.rule.type | Possible values [Config, Network, AuditEvent, DLP, IAM, NetworkConfig] Type of rule or RQL query. | keyword |
prisma_cloud.alert.policy.severity | Possible values [high, medium, low]. | keyword |
prisma_cloud.alert.policy.system_default | boolean | |
prisma_cloud.alert.policy.type | Possible values: [config, network, audit_event, anomaly, data, iam, workload_vulnerability, workload_incident, waas_event, attack_path] Policy type. Policy type anomaly is read-only. | keyword |
prisma_cloud.alert.policy.upi | keyword | |
prisma_cloud.alert.policy_id | keyword | |
prisma_cloud.alert.reason | keyword | |
prisma_cloud.alert.resource.account.id | keyword | |
prisma_cloud.alert.resource.account.value | keyword | |
prisma_cloud.alert.resource.additional_info | Additional info. | flattened |
prisma_cloud.alert.resource.api_name | keyword | |
prisma_cloud.alert.resource.cloud.account.ancestors | keyword | |
prisma_cloud.alert.resource.cloud.account.groups | keyword | |
prisma_cloud.alert.resource.cloud.account.owners | keyword | |
prisma_cloud.alert.resource.cloud.service_name | keyword | |
prisma_cloud.alert.resource.cloud.type | keyword | |
prisma_cloud.alert.resource.config_json_available | boolean | |
prisma_cloud.alert.resource.data | flattened | |
prisma_cloud.alert.resource.details_available | boolean | |
prisma_cloud.alert.resource.id | keyword | |
prisma_cloud.alert.resource.name | keyword | |
prisma_cloud.alert.resource.region.id | keyword | |
prisma_cloud.alert.resource.region.value | keyword | |
prisma_cloud.alert.resource.rrn | keyword | |
prisma_cloud.alert.resource.tags | flattened | |
prisma_cloud.alert.resource.ts | date | |
prisma_cloud.alert.resource.type | keyword | |
prisma_cloud.alert.resource.unified_asset_id | keyword | |
prisma_cloud.alert.resource.url | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.cloud_type | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.compliance_metadata.compliance.id | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.compliance_metadata.compliance_id | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.compliance_metadata.custom_assigned | boolean | |
prisma_cloud.alert.risk_detail.policy_scores.compliance_metadata.policy.id | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.compliance_metadata.requirement.description | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.compliance_metadata.requirement.id | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.compliance_metadata.requirement.name | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.compliance_metadata.section.description | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.compliance_metadata.section.id | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.compliance_metadata.section.label | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.compliance_metadata.standard.description | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.compliance_metadata.standard.id | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.compliance_metadata.standard.name | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.created.by | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.created.on | date | |
prisma_cloud.alert.risk_detail.policy_scores.deleted | boolean | |
prisma_cloud.alert.risk_detail.policy_scores.description | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.enabled | boolean | |
prisma_cloud.alert.risk_detail.policy_scores.finding_types | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.labels | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.last_modified.by | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.last_modified.on | date | |
prisma_cloud.alert.risk_detail.policy_scores.name | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.overridden | boolean | |
prisma_cloud.alert.risk_detail.policy_scores.points | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.policy.id | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.policy.subtypes | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.policy.type | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.policy.upi | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.recommendation | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.remediable | boolean | |
prisma_cloud.alert.risk_detail.policy_scores.remediation.actions.operation | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.remediation.actions.payload | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.remediation.cli_script_template | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.remediation.description | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.remediation.impact | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.restrict_alert_dismissal | boolean | |
prisma_cloud.alert.risk_detail.policy_scores.risk_score.max | long | |
prisma_cloud.alert.risk_detail.policy_scores.risk_score.value | long | |
prisma_cloud.alert.risk_detail.policy_scores.rule.api_name | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.rule.cloud.account | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.rule.cloud.type | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.rule.criteria | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.rule.data_criteria.classification_result | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.rule.data_criteria.exposure | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.rule.data_criteria.extension | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.rule.last_modified_on | date | |
prisma_cloud.alert.risk_detail.policy_scores.rule.name | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.rule.parameters | flattened | |
prisma_cloud.alert.risk_detail.policy_scores.rule.resource.id_path | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.rule.resource.type | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.rule.type | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.severity | keyword | |
prisma_cloud.alert.risk_detail.policy_scores.system_default | boolean | |
prisma_cloud.alert.risk_detail.rating | keyword | |
prisma_cloud.alert.risk_detail.risk_score.max | long | |
prisma_cloud.alert.risk_detail.risk_score.value | long | |
prisma_cloud.alert.risk_detail.score | keyword | |
prisma_cloud.alert.save_search_id | keyword | |
prisma_cloud.alert.status | keyword | |
prisma_cloud.alert.time | Timestamp when alert was last reopened for resource update, or the same as firstSeen if there are no status changes. | date |
prisma_cloud.alert.triggered_by | keyword | |
tags | User defined tags. | keyword |
Audit
This is the Audit
dataset.
Example
An example event for audit
looks as following:
{
"@timestamp": "2023-09-13T08:40:39.068Z",
"agent": {
"ephemeral_id": "748799a0-a545-468b-9b86-764414774225",
"id": "47449736-bd61-40ad-89a6-41d7f7acc093",
"name": "docker-fleet-agent",
"type": "filebeat",
"version": "8.10.1"
},
"data_stream": {
"dataset": "prisma_cloud.audit",
"namespace": "ep",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "47449736-bd61-40ad-89a6-41d7f7acc093",
"snapshot": false,
"version": "8.10.1"
},
"event": {
"action": "login",
"agent_id_status": "verified",
"category": [
"authentication"
],
"dataset": "prisma_cloud.audit",
"ingested": "2023-11-27T09:09:44Z",
"kind": "event",
"original": "{\"action\":\"'john.user@google.com'(with role 'System Admin':'System Admin') logged in via access key.\",\"actionType\":\"LOGIN\",\"ipAddress\":\"81.2.69.192\",\"resourceName\":\"john.user@google.com\",\"resourceType\":\"Login\",\"result\":\"Successful\",\"timestamp\":1694594439068,\"user\":\"john.user@google.com\"}",
"outcome": "success",
"type": [
"info"
]
},
"host": {
"ip": [
"81.2.69.192"
]
},
"input": {
"type": "cel"
},
"prisma_cloud": {
"audit": {
"action": {
"type": "LOGIN",
"value": "'john.user@google.com'(with role 'System Admin':'System Admin') logged in via access key."
},
"ip_address": "81.2.69.192",
"resource": {
"name": "john.user@google.com",
"type": "Login"
},
"result": "Successful",
"timestamp": "2023-09-13T08:40:39.068Z",
"user": "john.user@google.com"
}
},
"related": {
"ip": [
"81.2.69.192"
],
"user": [
"john.user",
"john.user@google.com"
]
},
"tags": [
"preserve_original_event",
"preserve_duplicate_custom_fields",
"forwarded",
"prisma_cloud-audit"
],
"user": {
"domain": "google.com",
"email": "john.user@google.com",
"name": "john.user"
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset. | constant_keyword |
event.module | Event module. | constant_keyword |
input.type | Type of filebeat input. | keyword |
log.offset | Log offset. | long |
prisma_cloud.audit.action.type | Action Type. | keyword |
prisma_cloud.audit.action.value | keyword | |
prisma_cloud.audit.ip_address | IP Address. | ip |
prisma_cloud.audit.resource.name | keyword | |
prisma_cloud.audit.resource.type | keyword | |
prisma_cloud.audit.result | keyword | |
prisma_cloud.audit.timestamp | Timestamp. | date |
prisma_cloud.audit.user | User. | keyword |
tags | User defined tags. | keyword |
Host
This is the Host
dataset.
Example
An example event for host
looks as following:
{
"@timestamp": "2024-04-03T23:20:14.863Z",
"agent": {
"ephemeral_id": "a2e1faf9-a21e-4a2e-a964-e756be243ce0",
"id": "633dac72-aecd-41d9-88df-dd066a3b83ea",
"name": "docker-fleet-agent",
"type": "filebeat",
"version": "8.13.0"
},
"cloud": {
"account": {
"id": "Non-onboarded cloud accounts"
},
"instance": {
"id": "string",
"name": "string"
},
"machine": {
"type": "string"
},
"provider": [
"aws"
],
"region": "string"
},
"data_stream": {
"dataset": "prisma_cloud.host",
"namespace": "ep",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "633dac72-aecd-41d9-88df-dd066a3b83ea",
"snapshot": false,
"version": "8.13.0"
},
"event": {
"agent_id_status": "verified",
"category": [
"host"
],
"dataset": "prisma_cloud.host",
"id": "DESKTOP-6PQXXMS",
"ingested": "2024-04-03T23:20:24Z",
"kind": "event",
"original": "{\"_id\":\"DESKTOP-6PQXXMS\",\"binaries\":[{\"altered\":true,\"cveCount\":0,\"deps\":[\"string\"],\"fileMode\":0,\"functionLayer\":\"string\",\"md5\":\"string\",\"missingPkg\":true,\"name\":\"string\",\"path\":\"string\",\"pkgRootDir\":\"string\",\"services\":[\"string\"],\"version\":\"string\"}],\"cloudMetadata\":{\"accountID\":\"Non-onboarded cloud accounts\",\"awsExecutionEnv\":\"string\",\"image\":\"string\",\"labels\":[{\"key\":\"string\",\"sourceName\":\"string\",\"sourceType\":[\"namespace\"],\"timestamp\":\"2023-09-08T04:01:49.949Z\",\"value\":\"string\"}],\"name\":\"string\",\"provider\":[\"aws\"],\"region\":\"string\",\"resourceID\":\"string\",\"resourceURL\":\"string\",\"type\":\"string\",\"vmID\":\"string\",\"vmImageID\":\"string\"},\"type\":\"host\",\"hostname\":\"DESKTOP-6PQXXMS\",\"scanTime\":\"2023-08-23T11:48:41.803Z\",\"Secrets\":[],\"osDistro\":\"windows\",\"osDistroVersion\":\"string\",\"osDistroRelease\":\"Windows\",\"distro\":\"Microsoft Windows [Version 10.0.19045.2006]\",\"packageManager\":true,\"packages\":[{\"pkgs\":[{\"binaryIdx\":[0],\"binaryPkgs\":[\"string\"],\"cveCount\":0,\"defaultGem\":true,\"files\":[{\"md5\":\"string\",\"path\":\"string\",\"sha1\":\"string\",\"sha256\":\"string\"}],\"functionLayer\":\"string\",\"goPkg\":true,\"jarIdentifier\":\"string\",\"layerTime\":0,\"license\":\"string\",\"name\":\"string\",\"osPackage\":true,\"path\":\"string\",\"version\":\"string\"}],\"pkgsType\":\"nodejs\"}],\"isARM64\":false,\"packageCorrelationDone\":true,\"redHatNonRPMImage\":false,\"image\":{\"created\":\"0001-01-01T00:00:00Z\",\"entrypoint\":[\"string\"],\"env\":[\"string\"],\"healthcheck\":true,\"id\":\"string\",\"labels\":{},\"layers\":[\"string\"],\"os\":\"string\",\"repoDigest\":[\"string\"],\"repoTags\":[\"string\"],\"user\":\"string\",\"workingDir\":\"string\"},\"allCompliance\":{\"compliance\":[{\"applicableRules\":[\"string\"],\"binaryPkgs\":[\"string\"],\"block\":true,\"cause\":\"string\",\"cri\":true,\"custom\":true,\"cve\":\"string\",\"cvss\":0,\"description\":\"string\",\"discovered\":\"2023-09-08T04:01:49.949Z\",\"exploit\":[\"exploit-db\"],\"fixDate\":0,\"fixLink\":\"string\",\"functionLayer\":\"string\",\"gracePeriodDays\":0,\"id\":0,\"layerTime\":0,\"link\":\"string\",\"packageName\":\"string\",\"packageVersion\":\"string\",\"published\":0,\"riskFactors\":{},\"severity\":\"string\",\"status\":\"string\",\"templates\":[[\"PCI\"]],\"text\":\"string\",\"title\":\"string\",\"twistlock\":true,\"type\":[\"container\"],\"vecStr\":\"string\",\"vulnTagInfos\":[{\"color\":\"string\",\"comment\":\"string\",\"name\":\"string\"}],\"wildfireMalware\":{\"md5\":\"string\",\"path\":\"string\",\"verdict\":\"string\"}}],\"enabled\":\"true\"},\"clusters\":[\"string\"],\"repoTag\":null,\"tags\":[{\"digest\":\"string\",\"id\":\"string\",\"registry\":\"string\",\"repo\":\"string\",\"tag\":\"string\"}],\"trustResult\":{\"hostsStatuses\":[{\"host\":\"string\",\"status\":\"trusted\"}]},\"repoDigests\":[],\"creationTime\":\"0001-01-01T00:00:00Z\",\"pushTime\":\"0001-01-01T00:00:00Z\",\"vulnerabilitiesCount\":0,\"complianceIssuesCount\":4,\"vulnerabilityDistribution\":{\"critical\":0,\"high\":0,\"medium\":0,\"low\":0,\"total\":0},\"complianceDistribution\":{\"critical\":4,\"high\":0,\"medium\":0,\"low\":0,\"total\":4},\"vulnerabilityRiskScore\":0,\"complianceRiskScore\":4000000,\"riskFactors\":{},\"firstScanTime\":\"2023-08-11T06:53:57.456Z\",\"history\":[{\"baseLayer\":true,\"created\":0,\"emptyLayer\":true,\"id\":\"string\",\"instruction\":\"string\",\"sizeBytes\":0,\"tags\":[\"string\"],\"vulnerabilities\":[{\"applicableRules\":[\"string\"],\"binaryPkgs\":[\"string\"],\"block\":true,\"cause\":\"string\",\"cri\":true,\"custom\":true,\"cve\":\"string\",\"cvss\":0,\"description\":\"string\",\"discovered\":\"2023-09-08T04:01:49.950Z\",\"exploit\":[\"exploit-db\"],\"exploits\":[{\"kind\":[\"poc\",\"in-the-wild\"],\"link\":\"string\",\"source\":[\"\",\"exploit-db\"]}],\"fixDate\":0,\"fixLink\":\"string\",\"functionLayer\":\"string\",\"gracePeriodDays\":0,\"id\":0,\"layerTime\":0,\"link\":\"string\",\"packageName\":\"string\",\"packageVersion\":\"string\",\"published\":0,\"riskFactors\":{},\"severity\":\"string\",\"status\":\"string\",\"templates\":[[\"PCI\"]],\"text\":\"string\",\"title\":\"string\",\"twistlock\":true,\"type\":[\"container\"],\"vecStr\":\"string\",\"vulnTagInfos\":[{\"color\":\"string\",\"comment\":\"string\",\"name\":\"string\"}],\"wildfireMalware\":{\"md5\":\"string\",\"path\":\"string\",\"verdict\":\"string\"}}]}],\"hostDevices\":[{\"ip\":\"0.0.0.0\",\"name\":\"string\"}],\"hosts\":{},\"id\":\"string\",\"err\":\"\",\"collections\":[\"All\"],\"instances\":[{\"host\":\"string\",\"image\":\"string\",\"modified\":\"2023-09-08T04:01:49.951Z\",\"registry\":\"string\",\"repo\":\"string\",\"tag\":\"string\"}],\"scanID\":0,\"trustStatus\":\"\",\"externalLabels\":[{\"key\":\"string\",\"sourceName\":\"string\",\"sourceType\":[\"namespace\"],\"timestamp\":\"2023-09-08T04:01:49.949Z\",\"value\":\"string\"}],\"files\":[{\"md5\":\"string\",\"path\":\"string\",\"sha1\":\"string\",\"sha256\":\"string\"}],\"firewallProtection\":{\"enabled\":false,\"supported\":false,\"outOfBandMode\":\"Observation\",\"ports\":[0],\"tlsPorts\":[0],\"unprotectedProcesses\":[{\"port\":0,\"process\":\"string\",\"tls\":true}]},\"applications\":[{\"installedFromPackage\":true,\"knownVulnerabilities\":0,\"layerTime\":0,\"name\":\"string\",\"path\":\"string\",\"service\":true,\"version\":\"string\"}],\"appEmbedded\":false,\"wildFireUsage\":null,\"agentless\":false,\"malwareAnalyzedTime\":\"0001-01-01T00:00:00Z\"}",
"start": "0001-01-01T00:00:00.000Z",
"type": [
"info"
]
},
"file": {
"hash": {
"md5": [
"string"
],
"sha1": [
"string"
],
"sha256": [
"string"
]
},
"path": [
"string"
]
},
"host": {
"hostname": "DESKTOP-6PQXXMS",
"ip": [
"0.0.0.0"
],
"type": "host"
},
"input": {
"type": "tcp"
},
"log": {
"source": {
"address": "172.18.0.4:60388"
}
},
"os": {
"family": "windows",
"name": "Windows",
"version": "string"
},
"package": {
"license": [
"string"
],
"name": [
"string"
],
"path": [
"string"
],
"type": [
"nodejs"
],
"version": [
"string"
]
},
"prisma_cloud": {
"host": {
"_id": "DESKTOP-6PQXXMS",
"agentless": false,
"all_compliance": {
"data": [
{
"applicable_rules": [
"string"
],
"binary_pkgs": [
"string"
],
"block": true,
"cause": "string",
"cri": true,
"custom": true,
"cve": "string",
"cvss": 0,
"description": "string",
"discovered": "2023-09-08T04:01:49.949Z",
"exploit": [
"exploit-db"
],
"fix_date": "1970-01-01T00:00:00.000Z",
"fix_link": "string",
"function_layer": "string",
"grace_period_days": 0,
"id": "0",
"layer_time": "1970-01-01T00:00:00.000Z",
"link": "string",
"package": {
"name": "string",
"version": "string"
},
"published": "1970-01-01T00:00:00.000Z",
"severity": "string",
"status": "string",
"templates": [
"PCI"
],
"text": "string",
"title": "string",
"twistlock": true,
"type": [
"container"
],
"vec_str": "string",
"vuln_tag_infos": [
{
"color": "string",
"comment": "string",
"name": "string"
}
],
"wild_fire_malware": {
"md5": "string",
"path": "string",
"verdict": "string"
}
}
],
"enabled": true
},
"app_embedded": false,
"applications": [
{
"installed_from_package": true,
"known_vulnerabilities": 0,
"layer_time": "1970-01-01T00:00:00.000Z",
"name": "string",
"path": "string",
"service": true,
"version": "string"
}
],
"binaries": [
{
"altered": true,
"cve_count": 0,
"deps": [
"string"
],
"file_mode": 0,
"function_layer": "string",
"md5": "string",
"missing_pkg": true,
"name": "string",
"path": "string",
"pkg_root_dir": "string",
"services": [
"string"
],
"version": "string"
}
],
"cloud_metadata": {
"account_id": "Non-onboarded cloud accounts",
"aws_execution_env": "string",
"image": "string",
"labels": [
{
"key": "string",
"source": {
"name": "string",
"type": [
"namespace"
]
},
"timestamp": "2023-09-08T04:01:49.949Z",
"value": "string"
}
],
"name": "string",
"provider": [
"aws"
],
"region": "string",
"resource": {
"id": "string",
"url": "string"
},
"type": "string",
"vm": {
"id": "string",
"image_id": "string"
}
},
"clusters": [
"string"
],
"collections": [
"All"
],
"compliance_distribution": {
"critical": 4,
"high": 0,
"low": 0,
"medium": 0,
"total": 4
},
"compliance_issues": {
"count": 4
},
"compliance_risk_score": 4000000,
"creation_time": "0001-01-01T00:00:00.000Z",
"devices": [
{
"ip": "0.0.0.0",
"name": "string"
}
],
"distro": "Microsoft Windows [Version 10.0.19045.2006]",
"external_labels": [
{
"key": "string",
"source": {
"name": "string",
"type": [
"namespace"
]
},
"timestamp": "2023-09-08T04:01:49.949Z",
"value": "string"
}
],
"files": [
{
"md5": "string",
"path": "string",
"sha1": "string",
"sha256": "string"
}
],
"firewall_protection": {
"enabled": false,
"out_of_band_mode": "Observation",
"ports": [
0
],
"supported": false,
"tls_ports": [
0
],
"unprotected_processes": [
{
"port": 0,
"process": "string",
"tls": true
}
]
},
"first_scan_time": "2023-08-11T06:53:57.456Z",
"history": [
{
"base_layer": true,
"created": "1970-01-01T00:00:00.000Z",
"empty_layer": true,
"id": "string",
"instruction": "string",
"size_bytes": 0,
"tags": [
"string"
],
"vulnerabilities": [
{
"applicable_rules": [
"string"
],
"binary_pkgs": [
"string"
],
"block": true,
"cause": "string",
"cri": true,
"custom": true,
"cve": "string",
"cvss": 0,
"description": "string",
"discovered": "2023-09-08T04:01:49.950Z",
"exploit": [
"exploit-db"
],
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"exploit-db"
]
}
],
"fix_date": "1970-01-01T00:00:00.000Z",
"fix_link": "string",
"function_layer": "string",
"grace_period_days": 0,
"id": "0",
"layer_time": "1970-01-01T00:00:00.000Z",
"link": "string",
"package": {
"name": "string",
"version": "string"
},
"published": "1970-01-01T00:00:00.000Z",
"severity": "string",
"status": "string",
"templates": [
"PCI"
],
"text": "string",
"title": "string",
"twistlock": true,
"type": [
"container"
],
"vec_str": "string",
"vuln_tag_infos": [
{
"color": "string",
"comment": "string",
"name": "string"
}
],
"wild_fire_malware": {
"md5": "string",
"path": "string",
"verdict": "string"
}
}
]
}
],
"hostname": "DESKTOP-6PQXXMS",
"id": "string",
"image": {
"created": "0001-01-01T00:00:00.000Z",
"entrypoint": [
"string"
],
"env": [
"string"
],
"healthcheck": true,
"id": "string",
"layers": [
"string"
],
"os": "string",
"repo": {
"digest": [
"string"
],
"tags": [
"string"
]
},
"user": "string",
"working_dir": "string"
},
"instances": [
{
"host": "string",
"image": "string",
"modified": "2023-09-08T04:01:49.951Z",
"registry": "string",
"repo": "string",
"tag": "string"
}
],
"is_arm64": false,
"malware_analyzed_time": "0001-01-01T00:00:00.000Z",
"os_distro": {
"release": "Windows",
"value": "windows",
"version": "string"
},
"package": {
"correlation_done": true,
"manager": true
},
"packages": [
{
"pkgs": [
{
"binary_idx": [
0
],
"binary_pkgs": [
"string"
],
"cve_count": 0,
"default_gem": true,
"files": [
{
"md5": "string",
"path": "string",
"sha1": "string",
"sha256": "string"
}
],
"function_layer": "string",
"go_pkg": true,
"jar_identifier": "string",
"layer_time": "1970-01-01T00:00:00.000Z",
"license": "string",
"name": "string",
"os_package": true,
"path": "string",
"version": "string"
}
],
"pkgs_type": "nodejs"
}
],
"push_time": "0001-01-01T00:00:00.000Z",
"red_hat_non_rpm_image": false,
"scan": {
"time": "2023-08-23T11:48:41.803Z"
},
"tags": [
{
"digest": "string",
"id": "string",
"registry": "string",
"repo": "string",
"tag": "string"
}
],
"trust_result": {
"hosts_statuses": [
{
"host": "string",
"status": "trusted"
}
]
},
"type": "host",
"vulnerabilities": {
"count": 0
},
"vulnerability": {
"distribution": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"risk_score": 0
}
}
},
"related": {
"hash": [
"string"
],
"hosts": [
"string",
"DESKTOP-6PQXXMS"
],
"ip": [
"0.0.0.0"
]
},
"tags": [
"preserve_original_event",
"preserve_duplicate_custom_fields",
"forwarded",
"prisma_cloud-host"
],
"vulnerability": {
"description": [
"string"
],
"id": [
"string"
],
"severity": [
"string"
]
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset. | constant_keyword |
event.module | Event module. | constant_keyword |
input.type | Type of filebeat input. | keyword |
log.offset | Log offset. | long |
log.source.address | Source address from which the log event was read / sent from. | keyword |
prisma_cloud.host._id | Image identifier (image ID or repo:tag). | keyword |
prisma_cloud.host.agentless | Agentless indicates that the host was scanned with the agentless scanner. | boolean |
prisma_cloud.host.all_compliance.data.applicable_rules | Rules applied on the package. | keyword |
prisma_cloud.host.all_compliance.data.binary_pkgs | Names of the distro binary package names (packages which are built from the source of the package). | keyword |
prisma_cloud.host.all_compliance.data.block | Indicates if the vulnerability has a block effect (true) or not (false). | boolean |
prisma_cloud.host.all_compliance.data.cause | Additional information regarding the root cause for the vulnerability. | keyword |
prisma_cloud.host.all_compliance.data.cri | Indicates if this is a CRI-specific vulnerability (true) or not (false). | boolean |
prisma_cloud.host.all_compliance.data.custom | Indicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false). | boolean |
prisma_cloud.host.all_compliance.data.cve | CVE ID of the vulnerability (if applied). | keyword |
prisma_cloud.host.all_compliance.data.cvss | CVSS score of the vulnerability. | float |
prisma_cloud.host.all_compliance.data.description | Description of the vulnerability. | keyword |
prisma_cloud.host.all_compliance.data.discovered | Specifies the time of discovery for the vulnerability. | date |
prisma_cloud.host.all_compliance.data.exploit | ExploitType represents the source of an exploit. | keyword |
prisma_cloud.host.all_compliance.data.exploits.kind | ExploitKind represents the kind of the exploit. | keyword |
prisma_cloud.host.all_compliance.data.exploits.link | Link is a link to information about the exploit. | keyword |
prisma_cloud.host.all_compliance.data.exploits.source | ExploitType represents the source of an exploit. | keyword |
prisma_cloud.host.all_compliance.data.fix_date | Date/time when the vulnerability was fixed (in Unix time). | date |
prisma_cloud.host.all_compliance.data.fix_link | Link to the vendor's fixed-version information. | keyword |
prisma_cloud.host.all_compliance.data.function_layer | Specifies the serverless layer ID in which the vulnerability was discovered. | keyword |
prisma_cloud.host.all_compliance.data.grace_period_days | Number of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies. | long |
prisma_cloud.host.all_compliance.data.id | ID of the violation. | keyword |
prisma_cloud.host.all_compliance.data.layer_time | Date/time of the image layer to which the CVE belongs. | date |
prisma_cloud.host.all_compliance.data.link | Vendor link to the CVE. | keyword |
prisma_cloud.host.all_compliance.data.package.name | Name of the package that caused the vulnerability. | keyword |
prisma_cloud.host.all_compliance.data.package.version | Version of the package that caused the vulnerability (or null). | keyword |
prisma_cloud.host.all_compliance.data.published | Date/time when the vulnerability was published (in Unix time). | date |
prisma_cloud.host.all_compliance.data.risk_factors | RiskFactors maps the existence of vulnerability risk factors. | flattened |
prisma_cloud.host.all_compliance.data.severity | Textual representation of the vulnerability's severity. | keyword |
prisma_cloud.host.all_compliance.data.status | Vendor status for the vulnerability. | keyword |
prisma_cloud.host.all_compliance.data.templates | List of templates with which the vulnerability is associated. | keyword |
prisma_cloud.host.all_compliance.data.text | Description of the violation. | keyword |
prisma_cloud.host.all_compliance.data.title | Compliance title. | keyword |
prisma_cloud.host.all_compliance.data.twistlock | Indicates if this is a Twistlock-specific vulnerability (true) or not (false). | boolean |
prisma_cloud.host.all_compliance.data.type | Type represents the vulnerability type. | keyword |
prisma_cloud.host.all_compliance.data.vec_str | Textual representation of the metric values used to score the vulnerability. | keyword |
prisma_cloud.host.all_compliance.data.vuln_tag_infos.color | Color is a hexadecimal representation of color code value. | keyword |
prisma_cloud.host.all_compliance.data.vuln_tag_infos.comment | Tag comment in a specific vulnerability context. | keyword |
prisma_cloud.host.all_compliance.data.vuln_tag_infos.name | Name of the tag. | keyword |
prisma_cloud.host.all_compliance.data.wild_fire_malware.md5 | MD5 is the hash of the malicious binary. | keyword |
prisma_cloud.host.all_compliance.data.wild_fire_malware.path | Path is the path to malicious binary. | keyword |
prisma_cloud.host.all_compliance.data.wild_fire_malware.verdict | Verdict is the malicious source like grayware, malware and phishing. | keyword |
prisma_cloud.host.all_compliance.enabled | Enabled indicates whether passed compliance checks is enabled by policy. | boolean |
prisma_cloud.host.app_embedded | Indicates that this image was scanned by an App-Embedded Defender. | boolean |
prisma_cloud.host.applications.installed_from_package | Indicates that the app was installed as an OS package. | boolean |
prisma_cloud.host.applications.known_vulnerabilities | Total number of vulnerabilities for this application. | long |
prisma_cloud.host.applications.layer_time | Image layer to which the application belongs - layer creation time. | date |
prisma_cloud.host.applications.name | Name of the application. | keyword |
prisma_cloud.host.applications.path | Path of the detected application. | keyword |
prisma_cloud.host.applications.service | Service indicates whether the application is installed as a service. | boolean |
prisma_cloud.host.applications.version | Version of the application. | keyword |
prisma_cloud.host.base_image | Image’s base image name. Used when filtering the vulnerabilities by base images. | keyword |
prisma_cloud.host.binaries.altered | Indicates if the binary was installed from a package manager and modified/replaced (true) or not (false). | boolean |
prisma_cloud.host.binaries.cve_count | Total number of CVEs for this specific binary. | long |
prisma_cloud.host.binaries.deps | Third-party package files which are used by the binary. | keyword |
prisma_cloud.host.binaries.file_mode | Represents the file's mode and permission bits. | long |
prisma_cloud.host.binaries.function_layer | ID of the serverless layer in which the package was discovered. | keyword |
prisma_cloud.host.binaries.md5 | Md5 hashset of the binary. | keyword |
prisma_cloud.host.binaries.missing_pkg | Indicates if this binary is not related to any package (true) or not (false). | boolean |
prisma_cloud.host.binaries.name | Name of the binary. | keyword |
prisma_cloud.host.binaries.path | Path is the path of the binary. | keyword |
prisma_cloud.host.binaries.pkg_root_dir | Path for searching packages used by the binary. | keyword |
prisma_cloud.host.binaries.services | Names of services which use the binary. | keyword |
prisma_cloud.host.binaries.version | Version of the binary. | keyword |
prisma_cloud.host.cloud_metadata.account_id | Cloud account ID. | keyword |
prisma_cloud.host.cloud_metadata.aws_execution_env | AWS execution environment (e.g. EC2/Fargate). | keyword |
prisma_cloud.host.cloud_metadata.image | Image name. | keyword |
prisma_cloud.host.cloud_metadata.labels.key | Label key. | keyword |
prisma_cloud.host.cloud_metadata.labels.source.name | Source name (e.g., for a namespace, the source name can be 'twistlock'). | keyword |
prisma_cloud.host.cloud_metadata.labels.source.type | ExternalLabelSourceType indicates the source of the labels. | keyword |
prisma_cloud.host.cloud_metadata.labels.timestamp | Time when the label was fetched. | date |
prisma_cloud.host.cloud_metadata.labels.value | Value of the label. | keyword |
prisma_cloud.host.cloud_metadata.name | Instance name. | keyword |
prisma_cloud.host.cloud_metadata.provider | CloudProvider specifies the cloud provider name. | keyword |
prisma_cloud.host.cloud_metadata.region | Instance region. | keyword |
prisma_cloud.host.cloud_metadata.resource.id | Unique ID of the resource. | keyword |
prisma_cloud.host.cloud_metadata.resource.url | Server-defined URL for the resource. | keyword |
prisma_cloud.host.cloud_metadata.type | Instance type. | keyword |
prisma_cloud.host.cloud_metadata.vm.id | Azure unique vm ID. | keyword |
prisma_cloud.host.cloud_metadata.vm.image_id | VMImageID holds the VM image ID. | keyword |
prisma_cloud.host.cluster_type | ClusterType is the cluster type. | keyword |
prisma_cloud.host.clusters | Cluster names. | keyword |
prisma_cloud.host.collections | Collections to which this result applies. | keyword |
prisma_cloud.host.compliance_distribution.critical | long | |
prisma_cloud.host.compliance_distribution.high | long | |
prisma_cloud.host.compliance_distribution.low | long | |
prisma_cloud.host.compliance_distribution.medium | long | |
prisma_cloud.host.compliance_distribution.total | long | |
prisma_cloud.host.compliance_issues.count | Number of compliance issues. | long |
prisma_cloud.host.compliance_issues.data.applicable_rules | Rules applied on the package. | keyword |
prisma_cloud.host.compliance_issues.data.binary_pkgs | Names of the distro binary package names (packages which are built from the source of the package). | keyword |
prisma_cloud.host.compliance_issues.data.block | Indicates if the vulnerability has a block effect (true) or not (false). | boolean |
prisma_cloud.host.compliance_issues.data.cause | Additional information regarding the root cause for the vulnerability. | keyword |
prisma_cloud.host.compliance_issues.data.cri | Indicates if this is a CRI-specific vulnerability (true) or not (false). | boolean |
prisma_cloud.host.compliance_issues.data.custom | Indicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false). | boolean |
prisma_cloud.host.compliance_issues.data.cve | CVE ID of the vulnerability (if applied). | keyword |
prisma_cloud.host.compliance_issues.data.cvss | CVSS score of the vulnerability. | float |
prisma_cloud.host.compliance_issues.data.description | Description of the vulnerability. | keyword |
prisma_cloud.host.compliance_issues.data.discovered | Specifies the time of discovery for the vulnerability. | date |
prisma_cloud.host.compliance_issues.data.exploit | ExploitType represents the source of an exploit. | keyword |
prisma_cloud.host.compliance_issues.data.exploits.kind | ExploitKind represents the kind of the exploit. | keyword |
prisma_cloud.host.compliance_issues.data.exploits.link | Link is a link to information about the exploit. | keyword |
prisma_cloud.host.compliance_issues.data.exploits.source | ExploitType represents the source of an exploit. | keyword |
prisma_cloud.host.compliance_issues.data.fix_date | Date/time when the vulnerability was fixed (in Unix time). | date |
prisma_cloud.host.compliance_issues.data.fix_link | Link to the vendor's fixed-version information. | keyword |
prisma_cloud.host.compliance_issues.data.function_layer | Specifies the serverless layer ID in which the vulnerability was discovered. | keyword |
prisma_cloud.host.compliance_issues.data.grace_period_days | Number of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies. | long |
prisma_cloud.host.compliance_issues.data.id | ID of the violation. | keyword |
prisma_cloud.host.compliance_issues.data.layer_time | Date/time of the image layer to which the CVE belongs. | date |
prisma_cloud.host.compliance_issues.data.link | Vendor link to the CVE. | keyword |
prisma_cloud.host.compliance_issues.data.package.name | Name of the package that caused the vulnerability. | keyword |
prisma_cloud.host.compliance_issues.data.package.version | Version of the package that caused the vulnerability (or null). | keyword |
prisma_cloud.host.compliance_issues.data.published | Date/time when the vulnerability was published (in Unix time). | date |
prisma_cloud.host.compliance_issues.data.risk_factors | RiskFactors maps the existence of vulnerability risk factors. | flattened |
prisma_cloud.host.compliance_issues.data.severity | Textual representation of the vulnerability's severity. | keyword |
prisma_cloud.host.compliance_issues.data.status | Vendor status for the vulnerability. | keyword |
prisma_cloud.host.compliance_issues.data.templates | List of templates with which the vulnerability is associated. | keyword |
prisma_cloud.host.compliance_issues.data.text | Description of the violation. | keyword |
prisma_cloud.host.compliance_issues.data.title | Compliance title. | keyword |
prisma_cloud.host.compliance_issues.data.twistlock | Indicates if this is a Twistlock-specific vulnerability (true) or not (false). | boolean |
prisma_cloud.host.compliance_issues.data.type | Type represents the vulnerability type. | keyword |
prisma_cloud.host.compliance_issues.data.vec_str | Textual representation of the metric values used to score the vulnerability. | keyword |
prisma_cloud.host.compliance_issues.data.vuln_tag_infos.color | Color is a hexadecimal representation of color code value. | keyword |
prisma_cloud.host.compliance_issues.data.vuln_tag_infos.comment | Tag comment in a specific vulnerability context. | keyword |
prisma_cloud.host.compliance_issues.data.vuln_tag_infos.name | Name of the tag. | keyword |
prisma_cloud.host.compliance_issues.data.wild_fire_malware.md5 | MD5 is the hash of the malicious binary. | keyword |
prisma_cloud.host.compliance_issues.data.wild_fire_malware.path | Path is the path to malicious binary. | keyword |
prisma_cloud.host.compliance_issues.data.wild_fire_malware.verdict | Verdict is the malicious source like grayware, malware and phishing. | keyword |
prisma_cloud.host.compliance_risk_score | Compliance risk score for the image. | float |
prisma_cloud.host.creation_time | Specifies the time of creation for the latest version of the image. | date |
prisma_cloud.host.devices.ip | Network device IPv4 address. | ip |
prisma_cloud.host.devices.name | Network device name. | keyword |
prisma_cloud.host.distro | Full name of the distribution. | keyword |
prisma_cloud.host.ecs_cluster_name | ECS cluster name. | keyword |
prisma_cloud.host.err | Description of an error that occurred during image health scan. | keyword |
prisma_cloud.host.external_labels.key | Label key. | keyword |
prisma_cloud.host.external_labels.source.name | Source name (e.g., for a namespace, the source name can be 'twistlock'). | keyword |
prisma_cloud.host.external_labels.source.type | ExternalLabelSourceType indicates the source of the labels. | keyword |
prisma_cloud.host.external_labels.timestamp | Time when the label was fetched. | keyword |
prisma_cloud.host.external_labels.value | Value of the label. | keyword |
prisma_cloud.host.files.md5 | Hash sum of the file using md5. | keyword |
prisma_cloud.host.files.path | Path of the file. | keyword |
prisma_cloud.host.files.sha1 | Hash sum of the file using SHA-1. | keyword |
prisma_cloud.host.files.sha256 | Hash sum of the file using SHA256. | keyword |
prisma_cloud.host.firewall_protection.enabled | Enabled indicates if WAAS proxy protection is enabled (true) or not (false). | boolean |
prisma_cloud.host.firewall_protection.out_of_band_mode | OutOfBandMode holds the app firewall out-of-band mode. | keyword |
prisma_cloud.host.firewall_protection.ports | Ports indicates http open ports associated with the container. | long |
prisma_cloud.host.firewall_protection.supported | Supported indicates if WAAS protection is supported (true) or not (false). | boolean |
prisma_cloud.host.firewall_protection.tls_ports | TLSPorts indicates https open ports associated with the container. | long |
prisma_cloud.host.firewall_protection.unprotected_processes.port | Port is the process port. | long |
prisma_cloud.host.firewall_protection.unprotected_processes.process | Process is the process name. | keyword |
prisma_cloud.host.firewall_protection.unprotected_processes.tls | TLS is the port TLS indication. | boolean |
prisma_cloud.host.first_scan_time | Specifies the time of the scan for the first version of the image. This time is preserved even after the version update. | date |
prisma_cloud.host.history.base_layer | Indicates if this layer originated from the base image (true) or not (false). | boolean |
prisma_cloud.host.history.created | Date/time when the image layer was created. | date |
prisma_cloud.host.history.empty_layer | Indicates if this instruction didn't create a separate layer (true) or not. | boolean |
prisma_cloud.host.history.id | ID of the layer. | keyword |
prisma_cloud.host.history.instruction | Docker file instruction and arguments used to create this layer. | keyword |
prisma_cloud.host.history.size_bytes | Size of the layer (in bytes). | long |
prisma_cloud.host.history.tags | Holds the image tags. | keyword |
prisma_cloud.host.history.vulnerabilities.applicable_rules | Rules applied on the package. | keyword |
prisma_cloud.host.history.vulnerabilities.binary_pkgs | Names of the distro binary package names (packages which are built from the source of the package). | keyword |
prisma_cloud.host.history.vulnerabilities.block | Indicates if the vulnerability has a block effect (true) or not (false). | boolean |
prisma_cloud.host.history.vulnerabilities.cause | Additional information regarding the root cause for the vulnerability. | keyword |
prisma_cloud.host.history.vulnerabilities.cri | Indicates if this is a CRI-specific vulnerability (true) or not (false). | boolean |
prisma_cloud.host.history.vulnerabilities.custom | Indicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false). | boolean |
prisma_cloud.host.history.vulnerabilities.cve | CVE ID of the vulnerability (if applied). | keyword |
prisma_cloud.host.history.vulnerabilities.cvss | CVSS score of the vulnerability. | float |
prisma_cloud.host.history.vulnerabilities.description | Description of the vulnerability. | keyword |
prisma_cloud.host.history.vulnerabilities.discovered | Specifies the time of discovery for the vulnerability. | date |
prisma_cloud.host.history.vulnerabilities.exploit | ExploitType represents the source of an exploit. | keyword |
prisma_cloud.host.history.vulnerabilities.exploits.kind | ExploitKind represents the kind of the exploit. | keyword |
prisma_cloud.host.history.vulnerabilities.exploits.link | Link is a link to information about the exploit. | keyword |
prisma_cloud.host.history.vulnerabilities.exploits.source | ExploitType represents the source of an exploit. | keyword |
prisma_cloud.host.history.vulnerabilities.fix_date | Date/time when the vulnerability was fixed (in Unix time). | date |
prisma_cloud.host.history.vulnerabilities.fix_link | Link to the vendor's fixed-version information. | keyword |
prisma_cloud.host.history.vulnerabilities.function_layer | Specifies the serverless layer ID in which the vulnerability was discovered. | keyword |
prisma_cloud.host.history.vulnerabilities.grace_period_days | Number of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies. | long |
prisma_cloud.host.history.vulnerabilities.id | ID of the violation. | keyword |
prisma_cloud.host.history.vulnerabilities.layer_time | Date/time of the image layer to which the CVE belongs. | date |
prisma_cloud.host.history.vulnerabilities.link | Vendor link to the CVE. | keyword |
prisma_cloud.host.history.vulnerabilities.package.name | Name of the package that caused the vulnerability. | keyword |
prisma_cloud.host.history.vulnerabilities.package.version | Version of the package that caused the vulnerability (or null). | keyword |
prisma_cloud.host.history.vulnerabilities.published | Date/time when the vulnerability was published (in Unix time). | date |
prisma_cloud.host.history.vulnerabilities.risk_factors | RiskFactors maps the existence of vulnerability risk factors. | flattened |
prisma_cloud.host.history.vulnerabilities.severity | Textual representation of the vulnerability's severity. | keyword |
prisma_cloud.host.history.vulnerabilities.status | Vendor status for the vulnerability. | keyword |
prisma_cloud.host.history.vulnerabilities.templates | List of templates with which the vulnerability is associated. | keyword |
prisma_cloud.host.history.vulnerabilities.text | Description of the violation. | keyword |
prisma_cloud.host.history.vulnerabilities.title | Compliance title. | keyword |
prisma_cloud.host.history.vulnerabilities.twistlock | Indicates if this is a Twistlock-specific vulnerability (true) or not (false). | boolean |
prisma_cloud.host.history.vulnerabilities.type | Type represents the vulnerability type. | keyword |
prisma_cloud.host.history.vulnerabilities.vec_str | Textual representation of the metric values used to score the vulnerability. | keyword |
prisma_cloud.host.history.vulnerabilities.vuln_tag_infos.color | Color is a hexadecimal representation of color code value. | keyword |
prisma_cloud.host.history.vulnerabilities.vuln_tag_infos.comment | Tag comment in a specific vulnerability context. | keyword |
prisma_cloud.host.history.vulnerabilities.vuln_tag_infos.name | Name of the tag. | keyword |
prisma_cloud.host.history.vulnerabilities.wild_fire_malware.md5 | MD5 is the hash of the malicious binary. | keyword |
prisma_cloud.host.history.vulnerabilities.wild_fire_malware.path | Path is the path to malicious binary. | keyword |
prisma_cloud.host.history.vulnerabilities.wild_fire_malware.verdict | Verdict is the malicious source like grayware, malware and phishing. | keyword |
prisma_cloud.host.hostname | Name of the host that was scanned. | keyword |
prisma_cloud.host.hosts | ImageHosts is a fast index for image scan results metadata per host. | flattened |
prisma_cloud.host.id | Image ID. | keyword |
prisma_cloud.host.image.created | Date/time when the image was created. | date |
prisma_cloud.host.image.entrypoint | Combined entrypoint of the image (entrypoint + CMD). | keyword |
prisma_cloud.host.image.env | Image environment variables. | keyword |
prisma_cloud.host.image.healthcheck | Indicates if health checks are enabled (true) or not (false). | boolean |
prisma_cloud.host.image.history.base_layer | Indicates if this layer originated from the base image (true) or not (false). | boolean |
prisma_cloud.host.image.history.created | Date/time when the image layer was created. | date |
prisma_cloud.host.image.history.empty_layer | Indicates if this instruction didn't create a separate layer (true) or not. | boolean |
prisma_cloud.host.image.history.id | ID of the layer. | keyword |
prisma_cloud.host.image.history.instruction | Docker file instruction and arguments used to create this layer. | keyword |
prisma_cloud.host.image.history.size_bytes | Size of the layer (in bytes). | long |
prisma_cloud.host.image.history.tags | Holds the image tags. | keyword |
prisma_cloud.host.image.history.vulnerabilities.applicable_rules | Rules applied on the package. | keyword |
prisma_cloud.host.image.history.vulnerabilities.binary_pkgs | Names of the distro binary package names (packages which are built from the source of the package). | keyword |
prisma_cloud.host.image.history.vulnerabilities.block | Indicates if the vulnerability has a block effect (true) or not (false). | boolean |
prisma_cloud.host.image.history.vulnerabilities.cause | Additional information regarding the root cause for the vulnerability. | keyword |
prisma_cloud.host.image.history.vulnerabilities.cri | Indicates if this is a CRI-specific vulnerability (true) or not (false). | boolean |
prisma_cloud.host.image.history.vulnerabilities.custom | Indicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false). | boolean |
prisma_cloud.host.image.history.vulnerabilities.cve | CVE ID of the vulnerability (if applied). | keyword |
prisma_cloud.host.image.history.vulnerabilities.cvss | CVSS score of the vulnerability. | float |
prisma_cloud.host.image.history.vulnerabilities.description | Description of the vulnerability. | keyword |
prisma_cloud.host.image.history.vulnerabilities.discovered | Specifies the time of discovery for the vulnerability. | date |
prisma_cloud.host.image.history.vulnerabilities.exploit | ExploitType represents the source of an exploit. | keyword |
prisma_cloud.host.image.history.vulnerabilities.exploits.kind | ExploitKind represents the kind of the exploit. | keyword |
prisma_cloud.host.image.history.vulnerabilities.exploits.link | Link is a link to information about the exploit. | keyword |
prisma_cloud.host.image.history.vulnerabilities.exploits.source | ExploitType represents the source of an exploit. | keyword |
prisma_cloud.host.image.history.vulnerabilities.fix_date | Date/time when the vulnerability was fixed (in Unix time). | date |
prisma_cloud.host.image.history.vulnerabilities.fix_link | Link to the vendor's fixed-version information. | keyword |
prisma_cloud.host.image.history.vulnerabilities.function_layer | Specifies the serverless layer ID in which the vulnerability was discovered. | keyword |
prisma_cloud.host.image.history.vulnerabilities.grace_period_days | Number of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies. | long |
prisma_cloud.host.image.history.vulnerabilities.id | ID of the violation. | keyword |
prisma_cloud.host.image.history.vulnerabilities.layer_time | Date/time of the image layer to which the CVE belongs. | date |
prisma_cloud.host.image.history.vulnerabilities.link | Vendor link to the CVE. | keyword |
prisma_cloud.host.image.history.vulnerabilities.package.name | Name of the package that caused the vulnerability. | keyword |
prisma_cloud.host.image.history.vulnerabilities.package.version | Version of the package that caused the vulnerability (or null). | keyword |
prisma_cloud.host.image.history.vulnerabilities.published | Date/time when the vulnerability was published (in Unix time). | date |
prisma_cloud.host.image.history.vulnerabilities.risk_factors | RiskFactors maps the existence of vulnerability risk factors. | flattened |
prisma_cloud.host.image.history.vulnerabilities.severity | Textual representation of the vulnerability's severity. | keyword |
prisma_cloud.host.image.history.vulnerabilities.status | Vendor status for the vulnerability. | keyword |
prisma_cloud.host.image.history.vulnerabilities.templates | List of templates with which the vulnerability is associated. | keyword |
prisma_cloud.host.image.history.vulnerabilities.text | Description of the violation. | keyword |
prisma_cloud.host.image.history.vulnerabilities.title | Compliance title. | keyword |
prisma_cloud.host.image.history.vulnerabilities.twistlock | Indicates if this is a Twistlock-specific vulnerability (true) or not (false). | boolean |
prisma_cloud.host.image.history.vulnerabilities.type | Type represents the vulnerability type. | keyword |
prisma_cloud.host.image.history.vulnerabilities.vec_str | Textual representation of the metric values used to score the vulnerability. | keyword |
prisma_cloud.host.image.history.vulnerabilities.vuln_tag_infos.color | Color is a hexadecimal representation of color code value. | keyword |
prisma_cloud.host.image.history.vulnerabilities.vuln_tag_infos.comment | Tag comment in a specific vulnerability context. | keyword |
prisma_cloud.host.image.history.vulnerabilities.vuln_tag_infos.name | Name of the tag. | keyword |
prisma_cloud.host.image.history.vulnerabilities.wild_fire_malware.md5 | MD5 is the hash of the malicious binary. | keyword |
prisma_cloud.host.image.history.vulnerabilities.wild_fire_malware.path | Path is the path to malicious binary. | keyword |
prisma_cloud.host.image.history.vulnerabilities.wild_fire_malware.verdict | Verdict is the malicious source like grayware, malware and phishing. | keyword |
prisma_cloud.host.image.id | ID of the image. | keyword |
prisma_cloud.host.image.labels | Image labels. | flattened |
prisma_cloud.host.image.layers | Image filesystem layers. | keyword |
prisma_cloud.host.image.os | Image os type. | keyword |
prisma_cloud.host.image.repo.digest | Image repo digests. | keyword |
prisma_cloud.host.image.repo.tags | Image repo tags. | keyword |
prisma_cloud.host.image.user | Image user. | keyword |
prisma_cloud.host.image.working_dir | Base working directory of the image. | keyword |
prisma_cloud.host.installed_products.agentless | Agentless indicates whether the scan was performed with agentless approach. | boolean |
prisma_cloud.host.installed_products.apache | Apache indicates the apache server version, empty in case apache not running. | keyword |
prisma_cloud.host.installed_products.aws_cloud | AWSCloud indicates whether AWS cloud is used. | boolean |
prisma_cloud.host.installed_products.cluster_type | ClusterType is the cluster type. | keyword |
prisma_cloud.host.installed_products.crio | CRI indicates whether the container runtime is CRI (and not docker). | boolean |
prisma_cloud.host.installed_products.docker | Docker represents the docker daemon version. | keyword |
prisma_cloud.host.installed_products.docker_enterprise | DockerEnterprise indicates whether the enterprise version of Docker is installed. | boolean |
prisma_cloud.host.installed_products.has_package_manager | HasPackageManager indicates whether package manager is installed on the OS. | boolean |
prisma_cloud.host.installed_products.k8s_api_server | K8sAPIServer indicates whether a kubernetes API server is running. | boolean |
prisma_cloud.host.installed_products.k8s_controller_manager | K8sControllerManager indicates whether a kubernetes controller manager is running. | boolean |
prisma_cloud.host.installed_products.k8s_etcd | K8sEtcd indicates whether etcd is running. | boolean |
prisma_cloud.host.installed_products.k8s_federation_api_server | K8sFederationAPIServer indicates whether a federation API server is running. | boolean |
prisma_cloud.host.installed_products.k8s_federation_controller_manager | K8sFederationControllerManager indicates whether a federation controller manager is running. | boolean |
prisma_cloud.host.installed_products.k8s_kubelet | K8sKubelet indicates whether kubelet is running. | boolean |
prisma_cloud.host.installed_products.k8s_proxy | K8sProxy indicates whether a kubernetes proxy is running. | boolean |
prisma_cloud.host.installed_products.k8s_scheduler | K8sScheduler indicates whether the kubernetes scheduler is running. | boolean |
prisma_cloud.host.installed_products.kubernetes | Kubernetes represents the kubernetes version. | keyword |
prisma_cloud.host.installed_products.managed_cluster_version | ManagedClusterVersion is the version of the managed Kubernetes service, e.g. AKS/EKS/GKE/etc. | keyword |
prisma_cloud.host.installed_products.openshift | Openshift indicates whether openshift is deployed. | boolean |
prisma_cloud.host.installed_products.openshift_version | OpenshiftVersion represents the running openshift version. | keyword |
prisma_cloud.host.installed_products.os_distro | OSDistro specifies the os distribution. | keyword |
prisma_cloud.host.installed_products.serverless | Serverless indicates whether evaluated on a serverless environment. | boolean |
prisma_cloud.host.installed_products.swarm.manager | SwarmManager indicates whether a swarm manager is running. | boolean |
prisma_cloud.host.installed_products.swarm.node | SwarmNode indicates whether the node is part of an active swarm. | boolean |
prisma_cloud.host.instances.host | keyword | |
prisma_cloud.host.instances.image | keyword | |
prisma_cloud.host.instances.modified | date | |
prisma_cloud.host.instances.registry | keyword | |
prisma_cloud.host.instances.repo | keyword | |
prisma_cloud.host.instances.tag | keyword | |
prisma_cloud.host.is_arm64 | IsARM64 indicates if the architecture of the image is aarch64. | boolean |
prisma_cloud.host.k8s_cluster_addr | Endpoint of the Kubernetes API server. | keyword |
prisma_cloud.host.labels | Image labels. | keyword |
prisma_cloud.host.malware_analyzed_time | MalwareAnalyzedTime is the WildFire evaluator analyzing time shown as progress in UI and cannot to be overwritten by a new scan result. | date |
prisma_cloud.host.missing_distro_vuln_coverage | Indicates if the image OS is covered in the IS (true) or not (false). | boolean |
prisma_cloud.host.namespaces | k8s namespaces of all the containers running this image. | keyword |
prisma_cloud.host.os_distro.release | OS distribution release. | keyword |
prisma_cloud.host.os_distro.value | Name of the OS distribution. | keyword |
prisma_cloud.host.os_distro.version | OS distribution version. | keyword |
prisma_cloud.host.package.correlation_done | PackageCorrelationDone indicates that the correlation to OS packages has been done. | boolean |
prisma_cloud.host.package.manager | Indicates if the package manager is installed for the OS. | boolean |
prisma_cloud.host.packages.pkgs.binary_idx | Indexes of the top binaries which use the package. | long |
prisma_cloud.host.packages.pkgs.binary_pkgs | Names of the distro binary packages (packages which are built on the source of the package). | keyword |
prisma_cloud.host.packages.pkgs.cve_count | Total number of CVEs for this specific package. | long |
prisma_cloud.host.packages.pkgs.default_gem | DefaultGem indicates this is a gem default package (and not a bundled package). | boolean |
prisma_cloud.host.packages.pkgs.files.md5 | Hash sum of the file using md5. | keyword |
prisma_cloud.host.packages.pkgs.files.path | Path of the file. | keyword |
prisma_cloud.host.packages.pkgs.files.sha1 | Hash sum of the file using SHA-1. | keyword |
prisma_cloud.host.packages.pkgs.files.sha256 | Hash sum of the file using SHA256. | keyword |
prisma_cloud.host.packages.pkgs.function_layer | ID of the serverless layer in which the package was discovered. | keyword |
prisma_cloud.host.packages.pkgs.go_pkg | GoPkg indicates this is a Go package (and not module). | boolean |
prisma_cloud.host.packages.pkgs.jar_identifier | JarIdentifier holds an additional identification detail of a JAR package. | keyword |
prisma_cloud.host.packages.pkgs.layer_time | Image layer to which the package belongs (layer creation time). | date |
prisma_cloud.host.packages.pkgs.license | License information for the package. | keyword |
prisma_cloud.host.packages.pkgs.name | Name of the package. | keyword |
prisma_cloud.host.packages.pkgs.os_package | OSPackage indicates that a python/java package was installed as an OS package. | boolean |
prisma_cloud.host.packages.pkgs.path | Full package path (e.g., JAR or Node.js package path). | keyword |
prisma_cloud.host.packages.pkgs.version | Package version. | keyword |
prisma_cloud.host.packages.pkgs_type | PackageType describes the package type. | keyword |
prisma_cloud.host.pull_duration | PullDuration is the time it took to pull the image. | long |
prisma_cloud.host.push_time | PushTime is the image push time to the registry. | date |
prisma_cloud.host.red_hat_non_rpm_image | RedHatNonRPMImage indicates whether the image is a Red Hat image with non-RPM content. | boolean |
prisma_cloud.host.registry.namespace | IBM cloud namespace to which the image belongs. | keyword |
prisma_cloud.host.registry.tags | RegistryTags are the tags of the registry this image is stored. | keyword |
prisma_cloud.host.registry.type | RegistryType indicates the registry type where the image is stored. | keyword |
prisma_cloud.host.repo_digests | Digests of the image. Used for content trust (notary). Has one digest per tag. | keyword |
prisma_cloud.host.repo_tag.digest | Image digest (requires V2 or later registry). | keyword |
prisma_cloud.host.repo_tag.id | ID of the image. | keyword |
prisma_cloud.host.repo_tag.registry | Registry name to which the image belongs. | keyword |
prisma_cloud.host.repo_tag.repo | Repository name to which the image belongs. | keyword |
prisma_cloud.host.repo_tag.value | Image tag. | keyword |
prisma_cloud.host.rhel_repos | RhelRepositories are the (RPM) repositories IDs from which the packages in this image were installed Used for matching vulnerabilities by Red Hat CPEs. | keyword |
prisma_cloud.host.risk_factors | RiskFactors maps the existence of vulnerability risk factors. | flattened |
prisma_cloud.host.runtime_enabled | HostRuntimeEnabled indicates if any runtime rule applies to the host. | boolean |
prisma_cloud.host.scan.build_date | Scanner build date that published the image. | date |
prisma_cloud.host.scan.duration | ScanDuration is the total time it took to scan the image. | long |
prisma_cloud.host.scan.id | ScanID is the ID of the scan. | keyword |
prisma_cloud.host.scan.time | Specifies the time of the last scan of the image. | date |
prisma_cloud.host.scan.version | Scanner version that published the image. | keyword |
prisma_cloud.host.secrets | Secrets are paths to embedded secrets inside the image Note: capital letter JSON annotation is kept to avoid converting all images for backward-compatibility support. | keyword |
prisma_cloud.host.startup_binaries.altered | Indicates if the binary was installed from a package manager and modified/replaced (true) or not (false). | boolean |
prisma_cloud.host.startup_binaries.cve_count | Total number of CVEs for this specific binary. | long |
prisma_cloud.host.startup_binaries.deps | Third-party package files which are used by the binary. | keyword |
prisma_cloud.host.startup_binaries.file_mode | Represents the file's mode and permission bits. | long |
prisma_cloud.host.startup_binaries.function_layer | ID of the serverless layer in which the package was discovered. | keyword |
prisma_cloud.host.startup_binaries.md5 | Md5 hashset of the binary. | keyword |
prisma_cloud.host.startup_binaries.missing_pkg | Indicates if this binary is not related to any package (true) or not (false). | boolean |
prisma_cloud.host.startup_binaries.name | Name of the binary. | keyword |
prisma_cloud.host.startup_binaries.path | Path is the path of the binary. | keyword |
prisma_cloud.host.startup_binaries.pkg_root_dir | Path for searching packages used by the binary. | keyword |
prisma_cloud.host.startup_binaries.services | Names of services which use the binary. | keyword |
prisma_cloud.host.startup_binaries.version | Version of the binary. | keyword |
prisma_cloud.host.stopped | Stopped indicates whether the host was running during the agentless scan. | boolean |
prisma_cloud.host.tags.digest | Image digest (requires V2 or later registry). | keyword |
prisma_cloud.host.tags.id | ID of the image. | keyword |
prisma_cloud.host.tags.registry | Registry name to which the image belongs. | keyword |
prisma_cloud.host.tags.repo | Repository name to which the image belongs. | keyword |
prisma_cloud.host.tags.tag | Image tag. | keyword |
prisma_cloud.host.top_layer | SHA256 of the image's last layer that is the last element of the Layers field. | keyword |
prisma_cloud.host.trust_result.groups._id | Name of the group. | keyword |
prisma_cloud.host.trust_result.groups.disabled | Indicates if the rule is currently disabled (true) or not (false). | boolean |
prisma_cloud.host.trust_result.groups.images | Image names or IDs (e.g., docker.io/library/ubuntu:16.04 / SHA264@...). | keyword |
prisma_cloud.host.trust_result.groups.layers | Filesystem layers. The image is trusted if its layers have a prefix of the trusted groups layer in the same order. | keyword |
prisma_cloud.host.trust_result.groups.modified | Datetime when the rule was last modified. | date |
prisma_cloud.host.trust_result.groups.name | Name of the rule. | keyword |
prisma_cloud.host.trust_result.groups.notes | Free-form text. | keyword |
prisma_cloud.host.trust_result.groups.owner | User who created or last modified the rule. | keyword |
prisma_cloud.host.trust_result.groups.previous_name | Previous name of the rule. Required for rule renaming. | keyword |
prisma_cloud.host.trust_result.hosts_statuses.host | Host name. | keyword |
prisma_cloud.host.trust_result.hosts_statuses.status | Status is the trust status for an image. | keyword |
prisma_cloud.host.trust_status | Status is the trust status for an image. | keyword |
prisma_cloud.host.twistlock_image | Indicates if the image is a Twistlock image (true) or not (false). | boolean |
prisma_cloud.host.type | ScanType displays the components for an ongoing scan. | keyword |
prisma_cloud.host.vulnerabilities.count | Total number of vulnerabilities. | long |
prisma_cloud.host.vulnerabilities.data.applicable_rules | Rules applied on the package. | keyword |
prisma_cloud.host.vulnerabilities.data.binary_pkgs | Names of the distro binary package names (packages which are built from the source of the package). | keyword |
prisma_cloud.host.vulnerabilities.data.block | Indicates if the vulnerability has a block effect (true) or not (false). | boolean |
prisma_cloud.host.vulnerabilities.data.cause | Additional information regarding the root cause for the vulnerability. | keyword |
prisma_cloud.host.vulnerabilities.data.cri | Indicates if this is a CRI-specific vulnerability (true) or not (false). | boolean |
prisma_cloud.host.vulnerabilities.data.custom | Indicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false). | boolean |
prisma_cloud.host.vulnerabilities.data.cve | CVE ID of the vulnerability (if applied). | keyword |
prisma_cloud.host.vulnerabilities.data.cvss | CVSS score of the vulnerability. | float |
prisma_cloud.host.vulnerabilities.data.description | Description of the vulnerability. | keyword |
prisma_cloud.host.vulnerabilities.data.discovered | Specifies the time of discovery for the vulnerability. | date |
prisma_cloud.host.vulnerabilities.data.exploit | ExploitType represents the source of an exploit. | keyword |
prisma_cloud.host.vulnerabilities.data.exploits.kind | ExploitKind represents the kind of the exploit. | keyword |
prisma_cloud.host.vulnerabilities.data.exploits.link | Link is a link to information about the exploit. | keyword |
prisma_cloud.host.vulnerabilities.data.exploits.source | ExploitType represents the source of an exploit. | keyword |
prisma_cloud.host.vulnerabilities.data.fix_date | Date/time when the vulnerability was fixed (in Unix time). | date |
prisma_cloud.host.vulnerabilities.data.fix_link | Link to the vendor's fixed-version information. | keyword |
prisma_cloud.host.vulnerabilities.data.function_layer | Specifies the serverless layer ID in which the vulnerability was discovered. | keyword |
prisma_cloud.host.vulnerabilities.data.grace_period_days | Number of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies. | long |
prisma_cloud.host.vulnerabilities.data.id | ID of the violation. | keyword |
prisma_cloud.host.vulnerabilities.data.layer_time | Date/time of the image layer to which the CVE belongs. | date |
prisma_cloud.host.vulnerabilities.data.link | Vendor link to the CVE. | keyword |
prisma_cloud.host.vulnerabilities.data.package.name | Name of the package that caused the vulnerability. | keyword |
prisma_cloud.host.vulnerabilities.data.package.version | Version of the package that caused the vulnerability (or null). | keyword |
prisma_cloud.host.vulnerabilities.data.published | Date/time when the vulnerability was published (in Unix time). | date |
prisma_cloud.host.vulnerabilities.data.risk_factors | RiskFactors maps the existence of vulnerability risk factors. | flattened |
prisma_cloud.host.vulnerabilities.data.severity | Textual representation of the vulnerability's severity. | keyword |
prisma_cloud.host.vulnerabilities.data.status | Vendor status for the vulnerability. | keyword |
prisma_cloud.host.vulnerabilities.data.templates | List of templates with which the vulnerability is associated. | keyword |
prisma_cloud.host.vulnerabilities.data.text | Description of the violation. | keyword |
prisma_cloud.host.vulnerabilities.data.title | keyword | |
prisma_cloud.host.vulnerabilities.data.twistlock | Indicates if this is a Twistlock-specific vulnerability (true) or not (false). | boolean |
prisma_cloud.host.vulnerabilities.data.type | Type represents the vulnerability type. | keyword |
prisma_cloud.host.vulnerabilities.data.vec_str | Textual representation of the metric values used to score the vulnerability. | keyword |
prisma_cloud.host.vulnerabilities.data.vuln_tag_infos.color | Color is a hexadecimal representation of color code value. | keyword |
prisma_cloud.host.vulnerabilities.data.vuln_tag_infos.comment | Tag comment in a specific vulnerability context. | keyword |
prisma_cloud.host.vulnerabilities.data.vuln_tag_infos.name | Name of the tag. | keyword |
prisma_cloud.host.vulnerabilities.data.wild_fire_malware.md5 | MD5 is the hash of the malicious binary. | keyword |
prisma_cloud.host.vulnerabilities.data.wild_fire_malware.path | Path is the path to malicious binary. | keyword |
prisma_cloud.host.vulnerabilities.data.wild_fire_malware.verdict | Verdict is the malicious source like grayware, malware and phishing. | keyword |
prisma_cloud.host.vulnerability.distribution.critical | long | |
prisma_cloud.host.vulnerability.distribution.high | long | |
prisma_cloud.host.vulnerability.distribution.low | long | |
prisma_cloud.host.vulnerability.distribution.medium | long | |
prisma_cloud.host.vulnerability.distribution.total | long | |
prisma_cloud.host.vulnerability.risk_score | Image's CVE risk score. | long |
prisma_cloud.host.wild_fire_usage.bytes | Bytes is the total number of bytes uploaded to the WildFire API. | long |
prisma_cloud.host.wild_fire_usage.queries | Queries is the number of queries to the WildFire API. | long |
prisma_cloud.host.wild_fire_usage.uploads | Uploads is the number of uploads to the WildFire API. | long |
tags | User defined tags. | keyword |
Host Profile
This is the Host Profile
dataset.
Example
An example event for host_profile
looks as following:
{
"@timestamp": "2023-11-03T06:37:12.285Z",
"agent": {
"ephemeral_id": "3b83c31f-09ab-4ff3-b475-ecc8648c3ef9",
"id": "f2974986-16b8-49d0-803d-316e0e9f4e94",
"name": "docker-fleet-agent",
"type": "filebeat",
"version": "8.10.1"
},
"data_stream": {
"dataset": "prisma_cloud.host_profile",
"namespace": "ep",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "f2974986-16b8-49d0-803d-316e0e9f4e94",
"snapshot": false,
"version": "8.10.1"
},
"event": {
"agent_id_status": "verified",
"category": [
"host"
],
"created": "2023-08-11T06:53:48.855Z",
"dataset": "prisma_cloud.host_profile",
"ingested": "2023-11-03T06:37:13Z",
"kind": "asset",
"original": "{\"_id\":\"DESKTOP-6PXXAMS\",\"hash\":1,\"created\":\"2023-08-11T06:53:48.855Z\",\"time\":\"0001-01-01T00:00:00Z\",\"collections\":[\"All\"]}",
"type": [
"info"
]
},
"host": {
"hostname": "DESKTOP-6PXXAMS"
},
"input": {
"type": "tcp"
},
"log": {
"source": {
"address": "192.168.243.5:48144"
}
},
"prisma_cloud": {
"host_profile": {
"_id": "DESKTOP-6PXXAMS",
"collections": [
"All"
],
"created": "2023-08-11T06:53:48.855Z",
"hash": "1",
"time": "0001-01-01T00:00:00.000Z"
}
},
"related": {
"hash": [
"1"
],
"hosts": [
"DESKTOP-6PXXAMS"
]
},
"tags": [
"preserve_original_event",
"preserve_duplicate_custom_fields",
"forwarded",
"prisma_cloud-host_profile"
]
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset. | constant_keyword |
event.module | Event module. | constant_keyword |
input.type | Type of filebeat input. | keyword |
log.offset | Log offset. | long |
log.source.address | Source address from which the log event was read / sent from. | keyword |
prisma_cloud.host_profile._id | ID is the profile ID (hostname). | keyword |
prisma_cloud.host_profile.account_id | AccountID is the cloud account ID associated with the profile. | keyword |
prisma_cloud.host_profile.apps.listening_ports.command | Command represents the command that triggered the connection. | keyword |
prisma_cloud.host_profile.apps.listening_ports.modified | Modified is a timestamp of when the event occurred. | date |
prisma_cloud.host_profile.apps.listening_ports.port | Port is the port number. | long |
prisma_cloud.host_profile.apps.listening_ports.process_path | ProcessPath represents the path to the process that uses the port. | keyword |
prisma_cloud.host_profile.apps.name | Name is the app name. | keyword |
prisma_cloud.host_profile.apps.outgoing_ports.command | Command represents the command that triggered the connection. | keyword |
prisma_cloud.host_profile.apps.outgoing_ports.country | Country is the country ISO code for the given IP address. | keyword |
prisma_cloud.host_profile.apps.outgoing_ports.ip | IP is the IP address captured over this port. | ip |
prisma_cloud.host_profile.apps.outgoing_ports.modified | Modified is a timestamp of when the event occurred. | date |
prisma_cloud.host_profile.apps.outgoing_ports.port | Port is the port number. | long |
prisma_cloud.host_profile.apps.outgoing_ports.process_path | ProcessPath represents the path to the process that uses the port. | keyword |
prisma_cloud.host_profile.apps.processes.command | Command represents the command that triggered the connection. | keyword |
prisma_cloud.host_profile.apps.processes.interactive | Interactive indicates whether the process belongs to an interactive session. | boolean |
prisma_cloud.host_profile.apps.processes.md5 | MD5 is the process binary MD5 sum. | keyword |
prisma_cloud.host_profile.apps.processes.modified | Modified indicates the process binary was modified after the container has started. | boolean |
prisma_cloud.host_profile.apps.processes.path | Path is the process binary path. | keyword |
prisma_cloud.host_profile.apps.processes.ppath | PPath is the parent process path. | keyword |
prisma_cloud.host_profile.apps.processes.time | Time is the time in which the process was added. If the process was modified, Time is the modification time. | date |
prisma_cloud.host_profile.apps.processes.user | User represents the username that started the process. | keyword |
prisma_cloud.host_profile.apps.startup_process.command | Command represents the command that triggered the connection. | keyword |
prisma_cloud.host_profile.apps.startup_process.interactive | Interactive indicates whether the process belongs to an interactive session. | boolean |
prisma_cloud.host_profile.apps.startup_process.md5 | MD5 is the process binary MD5 sum. | keyword |
prisma_cloud.host_profile.apps.startup_process.modified | Modified is a timestamp of when the event occurred. | boolean |
prisma_cloud.host_profile.apps.startup_process.path | Path is the process binary path. | keyword |
prisma_cloud.host_profile.apps.startup_process.ppath | PPath is the parent process path. | keyword |
prisma_cloud.host_profile.apps.startup_process.time | Time is the time in which the process was added. If the process was modified, Time is the modification time. | date |
prisma_cloud.host_profile.apps.startup_process.user | User represents the username that started the process. | keyword |
prisma_cloud.host_profile.collections | Collections is a list of collections to which this profile applies. | keyword |
prisma_cloud.host_profile.created | Created is the profile creation time. | date |
prisma_cloud.host_profile.geoip.countries.code | Code is the country iso code. | keyword |
prisma_cloud.host_profile.geoip.countries.ip | Ip is the Ip address. | ip |
prisma_cloud.host_profile.geoip.countries.modified | Modified is the last modified time of this entry. | date |
prisma_cloud.host_profile.geoip.modified | Modified is the last modified time of the cache. | date |
prisma_cloud.host_profile.hash | ProfileHash represents the profile hash It is allowed to contain up to uint32 numbers, and represented by int64 since mongodb does not support unsigned data types. | keyword |
prisma_cloud.host_profile.labels | Labels are the labels associated with the profile. | keyword |
prisma_cloud.host_profile.ssh_events.command | Command represents the command that triggered the connection. | keyword |
prisma_cloud.host_profile.ssh_events.country | Country represents the SSH client's origin country. | keyword |
prisma_cloud.host_profile.ssh_events.interactive | Interactive indicates whether the process belongs to an interactive session. | boolean |
prisma_cloud.host_profile.ssh_events.ip | IP address represents the connection client IP address. | keyword |
prisma_cloud.host_profile.ssh_events.login_time | LoginTime represents the SSH login time. | date |
prisma_cloud.host_profile.ssh_events.md5 | MD5 is the process binary MD5 sum. | keyword |
prisma_cloud.host_profile.ssh_events.modified | Modified indicates the process binary was modified after the container has started. | boolean |
prisma_cloud.host_profile.ssh_events.path | Path is the process binary path. | keyword |
prisma_cloud.host_profile.ssh_events.ppath | PPath is the parent process path. | keyword |
prisma_cloud.host_profile.ssh_events.time | Time is the time in which the process was added. If the process was modified, Time is the modification time. | date |
prisma_cloud.host_profile.ssh_events.user | User represents the username that started the process. | keyword |
prisma_cloud.host_profile.time | Time is the last time when this profile was modified. | date |
tags | User defined tags. | keyword |
Incident Audit
This is the Incident Audit
dataset.
Example
An example event for incident_audit
looks as following:
{
"@timestamp": "2023-09-19T07:15:31.899Z",
"agent": {
"ephemeral_id": "2be27553-a973-4cdb-8c8d-e296a788b63a",
"id": "f2974986-16b8-49d0-803d-316e0e9f4e94",
"name": "docker-fleet-agent",
"type": "filebeat",
"version": "8.10.1"
},
"cloud": {
"account": {
"id": [
"123abc",
"abdcsfData"
]
},
"provider": [
"alibaba",
"oci"
],
"region": "string"
},
"container": {
"id": "string",
"image": {
"name": [
"docker.io/library/nginx:latest",
"string"
]
},
"name": [
"nginx",
"string"
]
},
"data_stream": {
"dataset": "prisma_cloud.incident_audit",
"namespace": "ep",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "f2974986-16b8-49d0-803d-316e0e9f4e94",
"snapshot": false,
"version": "8.10.1"
},
"event": {
"agent_id_status": "verified",
"category": [
"malware"
],
"dataset": "prisma_cloud.incident_audit",
"id": "651c46b145d15228585exxxx",
"ingested": "2023-11-03T06:39:34Z",
"kind": "event",
"original": "{\"_id\":\"651c46b145d15228585exxxx\",\"accountID\":\"123abc\",\"acknowledged\":false,\"app\":\"string\",\"appID\":\"string\",\"audits\":[{\"_id\":\"651c46b145d15228585exxxx\",\"accountID\":\"abdcsfData\",\"app\":\"string\",\"appID\":\"string\",\"attackTechniques\":[\"exploitationForPrivilegeEscalation\"],\"attackType\":\"cloudMetadataProbing\",\"cluster\":\"string\",\"collections\":[\"string\"],\"command\":\"string\",\"container\":true,\"containerId\":\"5490e85a1a0c1c9f9c74591a9d3fcbf61beb84a952f14a17277be5fcf00xxxxx\",\"containerName\":\"nginx\",\"count\":0,\"country\":\"string\",\"domain\":\"string\",\"effect\":[\"block\",\"prevent\"],\"err\":\"string\",\"filepath\":\"string\",\"fqdn\":\"audits-fqdn-hostname\",\"function\":\"string\",\"functionID\":\"string\",\"hostname\":\"gke-tp-cluster-tp-pool1-9658xxxx-j87v\",\"imageId\":\"sha256:61395b4c586da2b9b3b7ca903ea6a448e6783dfdd7f768ff2c1a0f3360aaxxxx\",\"imageName\":\"docker.io/library/nginx:latest\",\"interactive\":true,\"ip\":\"0.0.0.0\",\"label\":\"string\",\"labels\":{},\"md5\":\"string\",\"msg\":\"string\",\"namespace\":\"string\",\"os\":\"string\",\"pid\":0,\"port\":0,\"processPath\":\"string\",\"profileId\":\"string\",\"provider\":\"alibaba\",\"rawEvent\":\"string\",\"region\":\"string\",\"requestID\":\"string\",\"resourceID\":\"string\",\"ruleName\":\"string\",\"runtime\":[\"python3.6\"],\"severity\":[\"low\",\"medium\",\"high\"],\"time\":\"2023-09-19T07:15:31.899Z\",\"type\":[\"processes\"],\"user\":\"string\",\"version\":\"string\",\"vmID\":\"string\",\"wildFireReportURL\":\"string\"}],\"category\":\"malware\",\"cluster\":\"string\",\"collections\":[\"string\"],\"containerID\":\"string\",\"containerName\":\"string\",\"customRuleName\":\"string\",\"fqdn\":\"string\",\"function\":\"string\",\"functionID\":\"string\",\"hostname\":\"string\",\"imageID\":\"string\",\"imageName\":\"string\",\"labels\":{},\"namespace\":\"string\",\"profileID\":\"string\",\"provider\":\"oci\",\"region\":\"string\",\"resourceID\":\"string\",\"runtime\":\"string\",\"serialNum\":0,\"shouldCollect\":true,\"time\":\"2023-09-19T07:15:31.899Z\",\"type\":\"host\",\"vmID\":\"string\",\"windows\":true}",
"type": [
"info"
]
},
"host": {
"domain": [
"audits-fqdn-hostname",
"string"
],
"hostname": "string"
},
"input": {
"type": "udp"
},
"log": {
"source": {
"address": "192.168.243.5:50216"
}
},
"os": {
"full": [
"string"
]
},
"prisma_cloud": {
"incident_audit": {
"_id": "651c46b145d15228585exxxx",
"account_id": "123abc",
"acknowledged": false,
"app": {
"id": "string",
"value": "string"
},
"category": "malware",
"cluster": "string",
"collections": [
"string"
],
"container": {
"id": "string",
"name": "string"
},
"custom_rule_name": "string",
"data": [
{
"_id": "651c46b145d15228585exxxx",
"account_id": "abdcsfData",
"app": {
"id": "string",
"value": "string"
},
"attack": {
"techniques": [
"exploitationForPrivilegeEscalation"
],
"type": "cloudMetadataProbing"
},
"cluster": "string",
"collections": [
"string"
],
"command": "string",
"container": {
"id": "5490e85a1a0c1c9f9c74591a9d3fcbf61beb84a952f14a17277be5fcf00xxxxx",
"name": "nginx",
"value": true
},
"count": 0,
"country": "string",
"domain": "string",
"effect": [
"block",
"prevent"
],
"err": "string",
"filepath": "string",
"fqdn": "audits-fqdn-hostname",
"function": {
"id": "string",
"value": "string"
},
"hostname": "gke-tp-cluster-tp-pool1-9658xxxx-j87v",
"image": {
"id": "sha256:61395b4c586da2b9b3b7ca903ea6a448e6783dfdd7f768ff2c1a0f3360aaxxxx",
"name": "docker.io/library/nginx:latest"
},
"interactive": true,
"ip": "0.0.0.0",
"label": "string",
"md5": "string",
"msg": "string",
"namespace": "string",
"os": "string",
"pid": 0,
"port": 0,
"process_path": "string",
"profile_id": "string",
"provider": "alibaba",
"raw_event": "string",
"region": "string",
"request_id": "string",
"resource_id": "string",
"rule_name": "string",
"runtime": [
"python3.6"
],
"severity": [
"low",
"medium",
"high"
],
"time": "2023-09-19T07:15:31.899Z",
"type": [
"processes"
],
"user": "string",
"version": "string",
"vm_id": "string",
"wild_fire_report_url": "string"
}
],
"fqdn": "string",
"function": {
"id": "string",
"value": "string"
},
"hostname": "string",
"image": {
"id": "string",
"name": "string"
},
"namespace": "string",
"profile_id": "string",
"provider": "oci",
"region": "string",
"resource_id": "string",
"runtime": "string",
"serial_num": 0,
"should_collect": true,
"time": "2023-09-19T07:15:31.899Z",
"type": "host",
"vm_id": "string",
"windows": true
}
},
"related": {
"hosts": [
"audits-fqdn-hostname",
"gke-tp-cluster-tp-pool1-9658xxxx-j87v",
"string"
],
"ip": [
"0.0.0.0"
],
"user": [
"string"
]
},
"rule": {
"name": [
"string"
]
},
"tags": [
"preserve_original_event",
"preserve_duplicate_custom_fields",
"forwarded",
"prisma_cloud-incident_audit"
],
"threat": {
"technique": {
"name": [
"exploitationForPrivilegeEscalation"
],
"subtechnique": {
"name": [
"cloudMetadataProbing"
]
}
}
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset. | constant_keyword |
event.module | Event module. | constant_keyword |
input.type | Type of filebeat input. | keyword |
log.offset | Log offset. | long |
log.source.address | Source address from which the log event was read / sent from. | keyword |
prisma_cloud.incident_audit._id | Internal ID of the incident. | keyword |
prisma_cloud.incident_audit.account_id | Cloud account ID. | keyword |
prisma_cloud.incident_audit.acknowledged | Indicates if the incident has been acknowledged (true) or not (false). | boolean |
prisma_cloud.incident_audit.app.id | Application Id. | keyword |
prisma_cloud.incident_audit.app.value | Application that caused the incident. | keyword |
prisma_cloud.incident_audit.category | keyword | |
prisma_cloud.incident_audit.cluster | Cluster on which the incident was found. | keyword |
prisma_cloud.incident_audit.collections | Collections to which this incident applies. | keyword |
prisma_cloud.incident_audit.container.id | ID of the container that triggered the incident. | keyword |
prisma_cloud.incident_audit.container.name | Container name. | keyword |
prisma_cloud.incident_audit.custom_rule_name | Name of the custom runtime rule that triggered the incident. | keyword |
prisma_cloud.incident_audit.data._id | Internal ID of the incident. | keyword |
prisma_cloud.incident_audit.data.account_id | ID of the cloud account where the audit was generated. | keyword |
prisma_cloud.incident_audit.data.app.id | Application id. | keyword |
prisma_cloud.incident_audit.data.app.value | Name of the service which violated the host policy. | keyword |
prisma_cloud.incident_audit.data.attack.techniques | Given list of techniques in documentation. | keyword |
prisma_cloud.incident_audit.data.attack.type | Given list in documentation.RuntimeAttackType is the sub-category of the attack (e.g., malware process, process not in model, etc...). | keyword |
prisma_cloud.incident_audit.data.cluster | Cluster name. | keyword |
prisma_cloud.incident_audit.data.collections | Collections to which this audit applies. | keyword |
prisma_cloud.incident_audit.data.command | ScrubbedCommand is the command executed by the process with scrubbed PII. | keyword |
prisma_cloud.incident_audit.data.container.id | ID of the container that violates the rule. | keyword |
prisma_cloud.incident_audit.data.container.name | Container name. | keyword |
prisma_cloud.incident_audit.data.container.value | Indicates if this is a container audit (true) or host audit (false). | boolean |
prisma_cloud.incident_audit.data.count | Attack type audits count. | long |
prisma_cloud.incident_audit.data.country | Outbound country for outgoing network audits. | keyword |
prisma_cloud.incident_audit.data.domain | Domain is the requested domain. | keyword |
prisma_cloud.incident_audit.data.effect | Possible values: [block,prevent,alert,disable]RuleEffect is the effect that will be used in the runtime rule. | keyword |
prisma_cloud.incident_audit.data.err | Unknown error in the audit process. | keyword |
prisma_cloud.incident_audit.data.filepath | Filepath is the path of the modified file. | keyword |
prisma_cloud.incident_audit.data.fqdn | Current full domain name used in audit alerts. | keyword |
prisma_cloud.incident_audit.data.function.id | Id of function invoked. | keyword |
prisma_cloud.incident_audit.data.function.value | Name of the serverless function that caused the audit. | keyword |
prisma_cloud.incident_audit.data.hostname | current hostname. | keyword |
prisma_cloud.incident_audit.data.image.id | Container image Id. | keyword |
prisma_cloud.incident_audit.data.image.name | Container image name. | keyword |
prisma_cloud.incident_audit.data.interactive | Indicates if the audit was triggered from a process that was spawned in interactive mode (e.g., docker exec ...) (true) or not (false). | boolean |
prisma_cloud.incident_audit.data.ip | IP is the connection destination IP address. | ip |
prisma_cloud.incident_audit.data.label | Container deployment label. | keyword |
prisma_cloud.incident_audit.data.labels | flattened | |
prisma_cloud.incident_audit.data.md5 | MD5 is the MD5 of the modified file (only for executables). | keyword |
prisma_cloud.incident_audit.data.msg | Blocking message text. | keyword |
prisma_cloud.incident_audit.data.namespace | K8s deployment namespace. | keyword |
prisma_cloud.incident_audit.data.os | Operating system distribution. | keyword |
prisma_cloud.incident_audit.data.pid | ID of the process that caused the audit event. | long |
prisma_cloud.incident_audit.data.port | Port is the connection destination port. | long |
prisma_cloud.incident_audit.data.process_path | Path of the process that caused the audit event. | keyword |
prisma_cloud.incident_audit.data.profile_id | Profile ID of the audit. | keyword |
prisma_cloud.incident_audit.data.provider | Possible values: [aws,azure,gcp,alibaba,oci,others]. CloudProvider specifies the cloud provider name. | keyword |
prisma_cloud.incident_audit.data.raw_event | Unparsed function handler event input. | keyword |
prisma_cloud.incident_audit.data.region | Region of the resource where the audit was generated. | keyword |
prisma_cloud.incident_audit.data.request_id | ID of the lambda function invocation request. | keyword |
prisma_cloud.incident_audit.data.resource_id | Unique ID of the resource where the audit was generated. | keyword |
prisma_cloud.incident_audit.data.rule_name | Name of the rule that was applied, if blocked. | keyword |
prisma_cloud.incident_audit.data.runtime | [python,python3.6,python3.7,python3.8,python3.9,nodejs12.x,nodejs14.x,dotnetcore2.1,dotnetcore3.1,dotnet6,java8,java11,ruby2.7]. | keyword |
prisma_cloud.incident_audit.data.severity | Possible value [high, low, medium]. | keyword |
prisma_cloud.incident_audit.data.time | Time of the audit event (in UTC time). | date |
prisma_cloud.incident_audit.data.type | Possible values: [processes,network,kubernetes,filesystem] | |
RuntimeType represents the runtime protection type. | keyword | |
prisma_cloud.incident_audit.data.user | Service user. | keyword |
prisma_cloud.incident_audit.data.version | Defender version. | keyword |
prisma_cloud.incident_audit.data.vm_id | Azure unique VM ID where the audit was generated. | keyword |
prisma_cloud.incident_audit.data.wild_fire_report_url | WildFireReportURL is a URL link of the report generated by wildFire. | keyword |
prisma_cloud.incident_audit.fqdn | Current hostname's full domain name. | keyword |
prisma_cloud.incident_audit.function.id | ID of the function that triggered the incident. | keyword |
prisma_cloud.incident_audit.function.value | Name of the serverless function. | keyword |
prisma_cloud.incident_audit.hostname | Current hostname. | keyword |
prisma_cloud.incident_audit.image.id | Container image id. | keyword |
prisma_cloud.incident_audit.image.name | Container image name. | keyword |
prisma_cloud.incident_audit.labels | flattened | |
prisma_cloud.incident_audit.namespace | k8s deployment namespace. | keyword |
prisma_cloud.incident_audit.profile_id | Runtime profile ID. | keyword |
prisma_cloud.incident_audit.provider | Possible values: [aws,azure,gcp,alibaba,oci,others]. | keyword |
prisma_cloud.incident_audit.region | Region of the resource on which the incident was found. | keyword |
prisma_cloud.incident_audit.resource_id | Unique ID of the resource on which the incident was found. | keyword |
prisma_cloud.incident_audit.runtime | Runtime of the serverless function. | keyword |
prisma_cloud.incident_audit.serial_num | Serial number of incident. | long |
prisma_cloud.incident_audit.should_collect | Indicates if this incident should be collected (true) or not (false). | boolean |
prisma_cloud.incident_audit.time | Time of the incident (in UTC time). | date |
prisma_cloud.incident_audit.type | Possible values: [host,container,function,appEmbedded,fargate]. | keyword |
prisma_cloud.incident_audit.vm_id | Azure unique VM ID on which the incident was found. | keyword |
prisma_cloud.incident_audit.windows | Windows indicates if defender OS type is Windows. | boolean |
tags | User defined tags. | keyword |
Changelog
Version | Details | Kibana version(s) |
---|---|---|
1.2.0 | Enhancement View pull request | 8.12.0 or higher |
1.1.1 | Enhancement View pull request | 8.12.0 or higher |
1.1.0 | Enhancement View pull request | 8.12.0 or higher |
1.0.1 | Enhancement View pull request | 8.10.1 or higher |
1.0.0 | Enhancement View pull request | 8.10.1 or higher |
0.6.0 | Bug fix View pull request | — |
0.5.0 | Enhancement View pull request | — |
0.4.0 | Enhancement View pull request | — |
0.3.0 | Enhancement View pull request | — |
0.2.0 | Enhancement View pull request | — |
0.1.0 | Enhancement View pull request | — |