precinct6-cybersecurity / reference /lead_rules_catalog.json
f15hb0wn's picture
Upload reference/lead_rules_catalog.json with huggingface_hub
765b62f verified
{
"products": {
"1": {
"name": "Stealthwatch",
"vendor": "Cisco",
"streams": [
"Stealthwatch High Concern Index",
"Stealthwatch Suspect Data Hoarding Alarm",
"Stealthwatch Suspect Data Hoarding",
"Stealthwatch Suspect Data Loss",
"Stealthwatch Suspect Quiet Long Flow",
"stealth_watch",
"lancope_stealthwatch"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"2": {
"name": "QRadar",
"vendor": "IBM",
"streams": [
"QRadar Offense"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"3": {
"name": "Advanced Malware Protection (AMP)",
"vendor": "Cisco",
"streams": [
"AMP Detection",
"AMP Ransomware",
"AMP Event",
"AMP Asset Inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"5": {
"name": "Carbon Black Protect/Defend",
"vendor": "Carbon Black",
"streams": [
"CarbonBlack Protect Detection",
"CarbonBlack Ransomware Detection",
"CarbonBlack Respond Detection",
"bit9",
"carbonblack_cbdefense_syslog_connector",
"carbonblack_analytics"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"6": {
"name": "Precinct",
"vendor": "WitFoo",
"streams": [
"WitFoo Precinct"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"nist800171",
"csf",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"7": {
"name": "Falcon",
"vendor": "Crowdstrike",
"streams": [
"Crowdstrike Detection",
"Crowdstrike Ransomware Detection",
"crowdstrike_falcon",
"Crowdstrike Asset Inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"8": {
"name": "Symantec Endpoint Protection",
"vendor": "Symantec",
"streams": [
"symantec_sep",
"symantec_sep_ransomware",
"symantec antivirus",
"symantec endpoint protection client"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"9": {
"name": "Firepower",
"vendor": "Cisco",
"streams": [
"estreamer",
"firepower",
"cisco_firepower",
"sfims"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"10": {
"name": "STIX/Taxii",
"vendor": "Taxii",
"streams": [],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"17": {
"name": "ASA Firewall",
"vendor": "Cisco",
"streams": [
"cisco_asa_deny",
"cisco_asa"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"18": {
"name": "Windows Logs",
"vendor": "Microsoft",
"streams": [
"microsoft_windows_security_audit",
"windows_security_audit",
"windows_sysmon",
"windows_task_scheduler"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"19": {
"name": "Websense",
"vendor": "Websense",
"streams": [
"websense"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"20": {
"name": "PAN NGFW",
"vendor": "Palo Alto",
"streams": [
"pan_firewall",
"palo alto networks_pan-os"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"21": {
"name": "Checkpoint FW",
"vendor": "Checkpoint",
"streams": [
"checkpoint_firewall",
"checkpoint_smart1",
"check point_vpn-1 & firewall-1",
"check point_smartdefense",
"check point_log update",
"check point_security gateway/management",
"check point_syslog"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"22": {
"name": "Tippingpoint IPS",
"vendor": "Tippingpoint",
"streams": [
"tippingpoint_block"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"23": {
"name": "FireEye Email Security (EX Series)",
"vendor": "FireEye",
"streams": [
"fireeye_emps"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"sco2"
]
},
"24": {
"name": "TrapX",
"vendor": "TrapX",
"streams": [
"trapx_tsoc"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"25": {
"name": "InfoBlox",
"vendor": "InfoBlox",
"streams": [
"infoblox_nios"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"26": {
"name": "Meraki",
"vendor": "Cisco",
"streams": [
"meraki",
"meraki_flow",
"meraki_firewall",
"meraki_l7_firewall",
"meraki_vpn"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"27": {
"name": "N-Central",
"vendor": "Solarwinds",
"streams": [
"NCentral Detection"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"28": {
"name": "Suricata IDS",
"vendor": "Suricata",
"streams": [
"suricata"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"29": {
"name": "Radware Appwall",
"vendor": "Radware",
"streams": [
"radware_waf"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"30": {
"name": "Trend Deep Security",
"vendor": "Trend Micro",
"streams": [
"trend micro_deep security agent",
"trend micro_deep discovery inspector"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"31": {
"name": "zScaler NSS",
"vendor": "zScaler",
"streams": [
"zscaler_nssweblog"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"32": {
"name": "Protect",
"vendor": "ProofPoint",
"streams": [
"proofpoint_protect",
"proofpoint"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"sco2"
]
},
"33": {
"name": "Mist Wireless",
"vendor": "Mist",
"streams": [
"mist"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"34": {
"name": "Cisco Ironport",
"vendor": "Cisco",
"streams": [
"cisco_ironport"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"sco2"
]
},
"35": {
"name": "Cybereason",
"vendor": "Cybereason",
"streams": [
"Cybereason CNC Detection",
"Cybereason RANSOMWARE Detection",
"Cybereason KNOWN_MALWARE Detection",
"Cybereason MALICIOUS_PROCESS Detection",
"Cybereason PROCESS_INJECTION Detection"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"36": {
"name": "Fortigate",
"vendor": "Fortinet",
"streams": [
"fortigate",
"fortinet_fortigate"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"37": {
"name": "Cognito",
"vendor": "Vectra Networks",
"streams": [
"vectra networks_x series"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"38": {
"name": "Umbrella",
"vendor": "Cisco",
"streams": [
"OpenDNS Detection",
"Umbrella Asset Inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"39": {
"name": "OSSEC",
"vendor": "OSSEC",
"streams": [
"ossec"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"40": {
"name": "Malwarebytes Anti-Malware",
"vendor": "Malwarebytes",
"streams": [
"malwarebytes_mbmc"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"41": {
"name": "Cisco Threat Response",
"vendor": "Cisco",
"streams": [],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"42": {
"name": "Vulnerability Management",
"vendor": "Qualys",
"streams": [
"Qualys Vulnerability"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"43": {
"name": "Windows Active Directory",
"vendor": "Microsoft",
"streams": [
"Microsoft-Windows-Security-Auditing",
"UserManagement",
"microsoft_windows_security_audit",
"microsoft-windows-security-auditing"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"44": {
"name": "Symantec Data Loss Prevention",
"vendor": "Symantec",
"streams": [
"symantec_dlp"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"45": {
"name": "BRO IDS",
"vendor": "BRO IDS",
"streams": [
"bro"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"46": {
"name": "DatAdvantage",
"vendor": "Varonis",
"streams": [
"varonis inc._datadvantage"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"47": {
"name": "Centrify",
"vendor": "Centrify",
"streams": [
"centrify"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"48": {
"name": "ASM",
"vendor": "F5",
"streams": [
"f5_asm",
"f5"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"49": {
"name": "SecureSphere",
"vendor": "Imperva",
"streams": [
"imperva_secure_sphere"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"50": {
"name": "Secret Server",
"vendor": "Thycotic",
"streams": [
"thycotic software_secret server"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"51": {
"name": "McAfee Web Gateway",
"vendor": "McAfee",
"streams": [
"mcafee_web_gateway"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"52": {
"name": "Cylance Protect",
"vendor": "Cylance",
"streams": [
"Cylance MALWARE Detection",
"Cylance TRUSTED Detection",
"Cylance PUP Detection",
"Cylance Asset Inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"53": {
"name": "Threatmetrix",
"vendor": "Threatmetrix",
"streams": [],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"54": {
"name": "Wazuh",
"vendor": "Wazuh",
"streams": [
"wazuh inc._wazuh"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"55": {
"name": "NetGuard",
"vendor": "Nokia",
"streams": [
"nokia_netguard"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"56": {
"name": "Sophos Central",
"vendor": "Sophos",
"streams": [
"Sophos Detection"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"57": {
"name": "Advanced Threat Analytics",
"vendor": "Microsoft",
"streams": [
"microsoft_ata"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"58": {
"name": "McAfee ePolicy Orchestrator",
"vendor": "McAfee",
"streams": [
"mcafee_epo"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"59": {
"name": "Cisco Wireless",
"vendor": "Cisco",
"streams": [
"cisco_wireless_lan_controller"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"60": {
"name": "Juniper FW",
"vendor": "Juniper",
"streams": [
"juniper_srx"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"61": {
"name": "Barracuda WAF",
"vendor": "Barracuda",
"streams": [
"barracuda_waf"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"62": {
"name": "Apache Web Server",
"vendor": "Apache",
"streams": [
"apache_access_log"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"63": {
"name": "Cloudwatch",
"vendor": "Amazon Web Services",
"streams": [],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"64": {
"name": "Cloudtrail",
"vendor": "Amazon Web Services",
"streams": [],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"65": {
"name": "Guard Duty",
"vendor": "Amazon Web Services",
"streams": [
"aws_guard_duty_findings"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"66": {
"name": "Security Manager",
"vendor": "Ericsson",
"streams": [
"ericsson_security_manager"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"67": {
"name": "Gin Access Log",
"vendor": "Gin",
"streams": [],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"68": {
"name": "Mojo Wireless",
"vendor": "Mojo",
"streams": [
"mojo_wireless"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"69": {
"name": "NameD",
"vendor": "Linux",
"streams": [
"named"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"70": {
"name": "Netscaler",
"vendor": "Citrix",
"streams": [
"netscaler"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"71": {
"name": "Netscout",
"vendor": "Netscout",
"streams": [],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"72": {
"name": "POSTFIX",
"vendor": "POSTFIX",
"streams": [],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"73": {
"name": "SSHD",
"vendor": "Linux",
"streams": [],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"74": {
"name": "DHCP",
"vendor": "Microsoft",
"streams": [],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"75": {
"name": "Secure Cloud",
"vendor": "Zix",
"streams": [
"zix_email"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"sco2"
]
},
"76": {
"name": "Gigamon GigaVUE",
"vendor": "Gigamon",
"streams": [
"gigamon_gigavue"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"77": {
"name": "NetFlow v5, v7, v9",
"vendor": "Multiple",
"streams": [],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"78": {
"name": "IPFIX",
"vendor": "Multiple",
"streams": [],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"79": {
"name": "Common Event Format (CEF)",
"vendor": "Multiple",
"streams": [],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"80": {
"name": "Log Event Extended Format (LEEF)",
"vendor": "Multiple",
"streams": [],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"81": {
"name": "pfSense Firewall",
"vendor": "pfSense",
"streams": [
"pf_sense_firewall"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"82": {
"name": "SonicWall Firewall",
"vendor": "SonicWall",
"streams": [
"sonic_wall_firewall",
"sonicwall_nsa 3600"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"83": {
"name": "Senhasegura PAM",
"vendor": "Senhasegura",
"streams": [
"senhasegura_pam"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"84": {
"name": "SpamTitan",
"vendor": "Titan",
"streams": [
"spam_titan"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"sco2"
]
},
"85": {
"name": "WitFoo IOC Feed",
"vendor": "WitFoo",
"streams": [],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"86": {
"name": "FireEye Network Security (NX Series)",
"vendor": "FireEye",
"streams": [
"fireeye_mps"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"87": {
"name": "FireEye Endpoint Security (HX Series)",
"vendor": "FireEye",
"streams": [
"fireeye_hx"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"88": {
"name": "FireEye Malware Analysis (AX Series)",
"vendor": "FireEye",
"streams": [
"fireeye_mas"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"89": {
"name": "FireEye File Protect (FX Series)",
"vendor": "FireEye",
"streams": [
"fireeye_fmps"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"90": {
"name": "FireEye Central Management (CM Series)",
"vendor": "FireEye",
"streams": [
"fireeye_cms"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"91": {
"name": "fail2ban",
"vendor": "Linux",
"streams": [
"fail2ban"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"iso27001",
"soc2"
]
},
"92": {
"name": "AWS VPC Security",
"vendor": "Amazon Web Services",
"streams": [
"aws_vpc_flow_log"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"93": {
"name": "AWS Instance Backup",
"vendor": "Amazon Web Services",
"streams": [
"aws_cloudtrail_events"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"94": {
"name": "Azure Security",
"vendor": "Microsoft",
"streams": [
"azure_security_alert",
"microsoft_ata",
"Microsoft Graph Asset Inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"95": {
"name": "Unify Security Gateway",
"vendor": "Ubiquity",
"streams": [
"unifi_security_gateway"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"96": {
"name": "Advanced Endpoint Security",
"vendor": "Deep Instinct",
"streams": [
"deep instinct_d-appliance",
"deepinstinct",
"Deep Instinct Asset Inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"97": {
"name": "Roqos Core",
"vendor": "Roqos",
"streams": [
"roqos"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"98": {
"name": "HPE Nimble",
"vendor": "HPE",
"streams": [
"hpe_nimble"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"99": {
"name": "Uncomplicated Firewall (UFW)",
"vendor": "linux",
"streams": [
"ufw"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"100": {
"name": "Cisco ISE",
"vendor": "Cisco",
"streams": [
"cisco_ise"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"101": {
"name": "Tufin SecureTrack",
"vendor": "Tufin",
"streams": [
"tufin_st_policy"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"102": {
"name": "Shibboleth IDP",
"vendor": "Shibboleth",
"streams": [
"shibboleth"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"103": {
"name": "AT&T Arris Gateway",
"vendor": "AT&T",
"streams": [
"att_arris_gateway"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"104": {
"name": "VMWare VCenter",
"vendor": "VMWare",
"streams": [
"vcenter"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"105": {
"name": "Cisco Network Operating System",
"vendor": "Cisco",
"streams": [
"cisco_os"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"106": {
"name": "McAfee Network Security",
"vendor": "McAfee",
"streams": [
"mcafee_nsp"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"107": {
"name": "Pulse Secure",
"vendor": "Pulse",
"streams": [
"pulse_secure"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nst800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"108": {
"name": "Beyond Trust",
"vendor": "Beyond Trust",
"streams": [
"beyond_trust",
"beyond_trust_ad_bridge"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"109": {
"name": "Web Security Appliance (WSA)",
"vendor": "Cisco",
"streams": [
"cisco_wsa"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"110": {
"name": "Kernel",
"vendor": "linux",
"streams": [
"kernel"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"111": {
"name": "Access Control Server (ACS)",
"vendor": "Cisco",
"streams": [
"cisco_acs"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"112": {
"name": "Mediant Media Gateway",
"vendor": "AudioCodes",
"streams": [
"audiocodes_mediant"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"113": {
"name": "Auditd Logs",
"vendor": "Linux",
"streams": [
"auditd_logs"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"114": {
"name": "Linux PAM",
"vendor": "Linux",
"streams": [
"pam"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"115": {
"name": "HPE EFS",
"vendor": "HPE",
"streams": [
"hpe_efs"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"116": {
"name": "System Security Services Daemon (sssd)",
"vendor": "SSSD Project",
"streams": [
"sssd"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"117": {
"name": "Apache Tomcat",
"vendor": "Apache",
"streams": [
"tomcat_log"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"118": {
"name": "HAProxy Load Balancer",
"vendor": "HAProxy",
"streams": [
"haproxy"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"119": {
"name": "NXLog",
"vendor": "NXLog",
"streams": [],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"120": {
"name": "Akamai SIEM Integration",
"vendor": "Akamai",
"streams": [
"akamai"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"121": {
"name": "JavaMelody",
"vendor": "JavaMelody Project",
"streams": [
"javamelody"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"122": {
"name": "IBM i Powertech SIEM Agent",
"vendor": "IBM",
"streams": [
"powertech_interact"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"123": {
"name": "VMWare NSX Firewall",
"vendor": "VMWare",
"streams": [
"vmware_nsx_firewall"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"124": {
"name": "Netfilter ulogd",
"vendor": "linux",
"streams": [
"netfilter_ulogd"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"125": {
"name": "OpenVPN",
"vendor": "OpenVPN",
"streams": [
"openvpn"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"126": {
"name": "Tanium",
"vendor": "Tanium",
"streams": [
"tanium",
"tanium_tanium application server",
"tanium_detect",
"tanium_signals"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"127": {
"name": "McAfee Endpoint Security",
"vendor": "McAfee",
"streams": [
"mcafee_ens"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"128": {
"name": "Fortimail",
"vendor": "Fortinet",
"streams": [
"fortimail"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"129": {
"name": "PRTG Network Monitor",
"vendor": "Paessler",
"streams": [
"paessler_prtg"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"130": {
"name": "ESET Antivirus",
"vendor": "ESET",
"streams": [
"eset_remoteadministrator",
"eset"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"131": {
"name": "Infocyte Hunt",
"vendor": "Infocyte",
"streams": [
"infocyte",
"infocyte_hunt"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"132": {
"name": "Okta",
"vendor": "Okta",
"streams": [
"Okta",
"Okta Asset Inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"133": {
"name": "SecureCircle",
"vendor": "SecureCircle",
"streams": [
"securecircle"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"134": {
"name": "Mimecast",
"vendor": "Mimecast",
"streams": [
"mimecast",
"Mimecast Asset Inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf"
]
},
"135": {
"name": "Cisco Meraki Firewall",
"vendor": "Cisco",
"streams": [
"meraki_flow",
"meraki_firewall",
"meraki_l7_firewall",
"meraki_vpn"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"136": {
"name": "SentinelOne",
"vendor": "SentinelOne",
"streams": [
"sentinelone",
"sentinelone_mgmt"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"144": {
"name": "Vulnerability Management",
"vendor": "Tenable",
"streams": [
"tenable_vulnerability_management",
"tenable_vulnerability_management_asset_inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf"
]
},
"145": {
"name": "Noname Security",
"vendor": "Noname Security",
"streams": [
"noname"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf"
]
},
"146": {
"name": "Automox",
"vendor": "Automox",
"streams": [
"automox",
"automox_asset_inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"147": {
"name": "Actifio",
"vendor": "Actifio",
"streams": [
"actifio",
"actifio_asset_inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf"
]
},
"148": {
"name": "Cubro Network Visibility",
"vendor": "Cubro",
"streams": [
"cubro"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf"
]
},
"149": {
"name": "PIX Firewall",
"vendor": "Cisco",
"streams": [
"cisco_pix_deny",
"cisco_pix"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf"
]
},
"150": {
"name": "ProxySG",
"vendor": "Symantec",
"streams": [
"symantec_proxy_sg"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf"
]
},
"151": {
"name": "Cortex XDR",
"vendor": "Palo Alto",
"streams": [
"Cortex Detection"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf"
]
},
"152": {
"name": "Barracuda CloudGen Firewall",
"vendor": "Barracuda",
"streams": [
"barracuda_cloudgen"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf"
]
},
"153": {
"name": "CyberArk EPM",
"vendor": "CyberArk",
"streams": [
"CyberArk EPM"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf"
]
},
"155": {
"name": "ManageEngine ADManager",
"vendor": "ManageEngine",
"streams": [
"ad_audit_plus"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"156": {
"name": "VyOS",
"vendor": "VyOS",
"streams": [
"vyos"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf"
]
},
"157": {
"name": "OPNsense Firewall",
"vendor": "OPNSense",
"streams": [
"opnsense_audit",
"opnsense_status"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf"
]
},
"158": {
"name": "CyberArk Vault",
"vendor": "CyberArk",
"streams": [
"cyber-ark_vault"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf"
]
},
"159": {
"name": "Barracuda ESS",
"vendor": "Barracuda",
"streams": [
"barracuda_ess"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001"
]
},
"160": {
"name": "CASB",
"vendor": "ProofPoint",
"streams": [
"proofpoint_casb"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001"
]
},
"161": {
"name": "Security Onion",
"vendor": "Security Onion Solutions, LLC",
"streams": [
"Security Onion"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"nist800171",
"csf",
"csc8",
"pci40",
"iso27001"
]
},
"162": {
"name": "Stealthbits",
"vendor": "Netwrix",
"streams": [
"stealthbits technologies llc_stealthbits activity monitor"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf"
]
},
"163": {
"name": "Taegis VDR",
"vendor": "Secureworks",
"streams": [
"taegis"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001"
]
},
"164": {
"name": "Graph",
"vendor": "Microsoft",
"streams": [
"Microsoft Graph Asset Inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"psi40",
"iso27001",
"soc2"
]
},
"165": {
"name": "Datto RMM",
"vendor": "Datto",
"streams": [
"datto_network_manager_audit"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"166": {
"name": "Carson & Saint",
"vendor": "carson_saint",
"streams": [
"carson_saint",
"carson_saint_asset_inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf"
]
},
"167": {
"name": "Duo",
"vendor": "Cisco",
"streams": [
"DUO Detection",
"DUO Ransomware",
"DUO Event",
"DUO Asset Inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"168": {
"name": "Druva",
"vendor": "Druva",
"streams": [
"druva"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf"
]
},
"169": {
"name": "AppRiver",
"vendor": "Zix",
"streams": [
"zix_appriver"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"sco2"
]
},
"170": {
"name": "Netskope",
"vendor": "Netskope",
"streams": [
"netskope",
"Netskope Asset Inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"171": {
"name": "LimaCharlie",
"vendor": "LimaCharlie",
"streams": [
"limacharlie",
"LimaCharlie Asset Inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"soc2"
]
},
"172": {
"name": "Harmony Email",
"vendor": "Checkpoint",
"streams": [
"checkpoint_harmony_email"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"csf",
"nist800171",
"csc8",
"pci40",
"iso27001",
"sco2"
]
},
"173": {
"name": "Splunk",
"vendor": "Splunk",
"streams": [
"splunk",
"Splunk Asset Inventory"
],
"frameworks": [
"csc",
"cmmc1",
"cmmc3",
"pci32",
"nist80053",
"nist800171",
"csf",
"csc8",
"pci40",
"iso27001"
]
}
},
"stream_to_product": {
"stealthwatch high concern index": {
"product_id": 1,
"product_name": "Stealthwatch",
"vendor": "Cisco"
},
"stealthwatch suspect data hoarding alarm": {
"product_id": 1,
"product_name": "Stealthwatch",
"vendor": "Cisco"
},
"stealthwatch suspect data hoarding": {
"product_id": 1,
"product_name": "Stealthwatch",
"vendor": "Cisco"
},
"stealthwatch suspect data loss": {
"product_id": 1,
"product_name": "Stealthwatch",
"vendor": "Cisco"
},
"stealthwatch suspect quiet long flow": {
"product_id": 1,
"product_name": "Stealthwatch",
"vendor": "Cisco"
},
"stealth_watch": {
"product_id": 1,
"product_name": "Stealthwatch",
"vendor": "Cisco"
},
"lancope_stealthwatch": {
"product_id": 1,
"product_name": "Stealthwatch",
"vendor": "Cisco"
},
"qradar offense": {
"product_id": 2,
"product_name": "QRadar",
"vendor": "IBM"
},
"amp detection": {
"product_id": 3,
"product_name": "Advanced Malware Protection (AMP)",
"vendor": "Cisco"
},
"amp ransomware": {
"product_id": 3,
"product_name": "Advanced Malware Protection (AMP)",
"vendor": "Cisco"
},
"amp event": {
"product_id": 3,
"product_name": "Advanced Malware Protection (AMP)",
"vendor": "Cisco"
},
"amp asset inventory": {
"product_id": 3,
"product_name": "Advanced Malware Protection (AMP)",
"vendor": "Cisco"
},
"carbonblack protect detection": {
"product_id": 5,
"product_name": "Carbon Black Protect/Defend",
"vendor": "Carbon Black"
},
"carbonblack ransomware detection": {
"product_id": 5,
"product_name": "Carbon Black Protect/Defend",
"vendor": "Carbon Black"
},
"carbonblack respond detection": {
"product_id": 5,
"product_name": "Carbon Black Protect/Defend",
"vendor": "Carbon Black"
},
"bit9": {
"product_id": 5,
"product_name": "Carbon Black Protect/Defend",
"vendor": "Carbon Black"
},
"carbonblack_cbdefense_syslog_connector": {
"product_id": 5,
"product_name": "Carbon Black Protect/Defend",
"vendor": "Carbon Black"
},
"carbonblack_analytics": {
"product_id": 5,
"product_name": "Carbon Black Protect/Defend",
"vendor": "Carbon Black"
},
"witfoo precinct": {
"product_id": 6,
"product_name": "Precinct",
"vendor": "WitFoo"
},
"crowdstrike detection": {
"product_id": 7,
"product_name": "Falcon",
"vendor": "Crowdstrike"
},
"crowdstrike ransomware detection": {
"product_id": 7,
"product_name": "Falcon",
"vendor": "Crowdstrike"
},
"crowdstrike_falcon": {
"product_id": 7,
"product_name": "Falcon",
"vendor": "Crowdstrike"
},
"crowdstrike asset inventory": {
"product_id": 7,
"product_name": "Falcon",
"vendor": "Crowdstrike"
},
"symantec_sep": {
"product_id": 8,
"product_name": "Symantec Endpoint Protection",
"vendor": "Symantec"
},
"symantec_sep_ransomware": {
"product_id": 8,
"product_name": "Symantec Endpoint Protection",
"vendor": "Symantec"
},
"symantec antivirus": {
"product_id": 8,
"product_name": "Symantec Endpoint Protection",
"vendor": "Symantec"
},
"symantec endpoint protection client": {
"product_id": 8,
"product_name": "Symantec Endpoint Protection",
"vendor": "Symantec"
},
"estreamer": {
"product_id": 9,
"product_name": "Firepower",
"vendor": "Cisco"
},
"firepower": {
"product_id": 9,
"product_name": "Firepower",
"vendor": "Cisco"
},
"cisco_firepower": {
"product_id": 9,
"product_name": "Firepower",
"vendor": "Cisco"
},
"sfims": {
"product_id": 9,
"product_name": "Firepower",
"vendor": "Cisco"
},
"cisco_asa_deny": {
"product_id": 17,
"product_name": "ASA Firewall",
"vendor": "Cisco"
},
"cisco_asa": {
"product_id": 17,
"product_name": "ASA Firewall",
"vendor": "Cisco"
},
"microsoft_windows_security_audit": {
"product_id": 43,
"product_name": "Windows Active Directory",
"vendor": "Microsoft"
},
"windows_security_audit": {
"product_id": 18,
"product_name": "Windows Logs",
"vendor": "Microsoft"
},
"windows_sysmon": {
"product_id": 18,
"product_name": "Windows Logs",
"vendor": "Microsoft"
},
"windows_task_scheduler": {
"product_id": 18,
"product_name": "Windows Logs",
"vendor": "Microsoft"
},
"websense": {
"product_id": 19,
"product_name": "Websense",
"vendor": "Websense"
},
"pan_firewall": {
"product_id": 20,
"product_name": "PAN NGFW",
"vendor": "Palo Alto"
},
"palo alto networks_pan-os": {
"product_id": 20,
"product_name": "PAN NGFW",
"vendor": "Palo Alto"
},
"checkpoint_firewall": {
"product_id": 21,
"product_name": "Checkpoint FW",
"vendor": "Checkpoint"
},
"checkpoint_smart1": {
"product_id": 21,
"product_name": "Checkpoint FW",
"vendor": "Checkpoint"
},
"check point_vpn-1 & firewall-1": {
"product_id": 21,
"product_name": "Checkpoint FW",
"vendor": "Checkpoint"
},
"check point_smartdefense": {
"product_id": 21,
"product_name": "Checkpoint FW",
"vendor": "Checkpoint"
},
"check point_log update": {
"product_id": 21,
"product_name": "Checkpoint FW",
"vendor": "Checkpoint"
},
"check point_security gateway/management": {
"product_id": 21,
"product_name": "Checkpoint FW",
"vendor": "Checkpoint"
},
"check point_syslog": {
"product_id": 21,
"product_name": "Checkpoint FW",
"vendor": "Checkpoint"
},
"tippingpoint_block": {
"product_id": 22,
"product_name": "Tippingpoint IPS",
"vendor": "Tippingpoint"
},
"fireeye_emps": {
"product_id": 23,
"product_name": "FireEye Email Security (EX Series)",
"vendor": "FireEye"
},
"trapx_tsoc": {
"product_id": 24,
"product_name": "TrapX",
"vendor": "TrapX"
},
"infoblox_nios": {
"product_id": 25,
"product_name": "InfoBlox",
"vendor": "InfoBlox"
},
"meraki": {
"product_id": 26,
"product_name": "Meraki",
"vendor": "Cisco"
},
"meraki_flow": {
"product_id": 135,
"product_name": "Cisco Meraki Firewall",
"vendor": "Cisco"
},
"meraki_firewall": {
"product_id": 135,
"product_name": "Cisco Meraki Firewall",
"vendor": "Cisco"
},
"meraki_l7_firewall": {
"product_id": 135,
"product_name": "Cisco Meraki Firewall",
"vendor": "Cisco"
},
"meraki_vpn": {
"product_id": 135,
"product_name": "Cisco Meraki Firewall",
"vendor": "Cisco"
},
"ncentral detection": {
"product_id": 27,
"product_name": "N-Central",
"vendor": "Solarwinds"
},
"suricata": {
"product_id": 28,
"product_name": "Suricata IDS",
"vendor": "Suricata"
},
"radware_waf": {
"product_id": 29,
"product_name": "Radware Appwall",
"vendor": "Radware"
},
"trend micro_deep security agent": {
"product_id": 30,
"product_name": "Trend Deep Security",
"vendor": "Trend Micro"
},
"trend micro_deep discovery inspector": {
"product_id": 30,
"product_name": "Trend Deep Security",
"vendor": "Trend Micro"
},
"zscaler_nssweblog": {
"product_id": 31,
"product_name": "zScaler NSS",
"vendor": "zScaler"
},
"proofpoint_protect": {
"product_id": 32,
"product_name": "Protect",
"vendor": "ProofPoint"
},
"proofpoint": {
"product_id": 32,
"product_name": "Protect",
"vendor": "ProofPoint"
},
"mist": {
"product_id": 33,
"product_name": "Mist Wireless",
"vendor": "Mist"
},
"cisco_ironport": {
"product_id": 34,
"product_name": "Cisco Ironport",
"vendor": "Cisco"
},
"cybereason cnc detection": {
"product_id": 35,
"product_name": "Cybereason",
"vendor": "Cybereason"
},
"cybereason ransomware detection": {
"product_id": 35,
"product_name": "Cybereason",
"vendor": "Cybereason"
},
"cybereason known_malware detection": {
"product_id": 35,
"product_name": "Cybereason",
"vendor": "Cybereason"
},
"cybereason malicious_process detection": {
"product_id": 35,
"product_name": "Cybereason",
"vendor": "Cybereason"
},
"cybereason process_injection detection": {
"product_id": 35,
"product_name": "Cybereason",
"vendor": "Cybereason"
},
"fortigate": {
"product_id": 36,
"product_name": "Fortigate",
"vendor": "Fortinet"
},
"fortinet_fortigate": {
"product_id": 36,
"product_name": "Fortigate",
"vendor": "Fortinet"
},
"vectra networks_x series": {
"product_id": 37,
"product_name": "Cognito",
"vendor": "Vectra Networks"
},
"opendns detection": {
"product_id": 38,
"product_name": "Umbrella",
"vendor": "Cisco"
},
"umbrella asset inventory": {
"product_id": 38,
"product_name": "Umbrella",
"vendor": "Cisco"
},
"ossec": {
"product_id": 39,
"product_name": "OSSEC",
"vendor": "OSSEC"
},
"malwarebytes_mbmc": {
"product_id": 40,
"product_name": "Malwarebytes Anti-Malware",
"vendor": "Malwarebytes"
},
"qualys vulnerability": {
"product_id": 42,
"product_name": "Vulnerability Management",
"vendor": "Qualys"
},
"microsoft-windows-security-auditing": {
"product_id": 43,
"product_name": "Windows Active Directory",
"vendor": "Microsoft"
},
"usermanagement": {
"product_id": 43,
"product_name": "Windows Active Directory",
"vendor": "Microsoft"
},
"symantec_dlp": {
"product_id": 44,
"product_name": "Symantec Data Loss Prevention",
"vendor": "Symantec"
},
"bro": {
"product_id": 45,
"product_name": "BRO IDS",
"vendor": "BRO IDS"
},
"varonis inc._datadvantage": {
"product_id": 46,
"product_name": "DatAdvantage",
"vendor": "Varonis"
},
"centrify": {
"product_id": 47,
"product_name": "Centrify",
"vendor": "Centrify"
},
"f5_asm": {
"product_id": 48,
"product_name": "ASM",
"vendor": "F5"
},
"f5": {
"product_id": 48,
"product_name": "ASM",
"vendor": "F5"
},
"imperva_secure_sphere": {
"product_id": 49,
"product_name": "SecureSphere",
"vendor": "Imperva"
},
"thycotic software_secret server": {
"product_id": 50,
"product_name": "Secret Server",
"vendor": "Thycotic"
},
"mcafee_web_gateway": {
"product_id": 51,
"product_name": "McAfee Web Gateway",
"vendor": "McAfee"
},
"cylance malware detection": {
"product_id": 52,
"product_name": "Cylance Protect",
"vendor": "Cylance"
},
"cylance trusted detection": {
"product_id": 52,
"product_name": "Cylance Protect",
"vendor": "Cylance"
},
"cylance pup detection": {
"product_id": 52,
"product_name": "Cylance Protect",
"vendor": "Cylance"
},
"cylance asset inventory": {
"product_id": 52,
"product_name": "Cylance Protect",
"vendor": "Cylance"
},
"wazuh inc._wazuh": {
"product_id": 54,
"product_name": "Wazuh",
"vendor": "Wazuh"
},
"nokia_netguard": {
"product_id": 55,
"product_name": "NetGuard",
"vendor": "Nokia"
},
"sophos detection": {
"product_id": 56,
"product_name": "Sophos Central",
"vendor": "Sophos"
},
"microsoft_ata": {
"product_id": 94,
"product_name": "Azure Security",
"vendor": "Microsoft"
},
"mcafee_epo": {
"product_id": 58,
"product_name": "McAfee ePolicy Orchestrator",
"vendor": "McAfee"
},
"cisco_wireless_lan_controller": {
"product_id": 59,
"product_name": "Cisco Wireless",
"vendor": "Cisco"
},
"juniper_srx": {
"product_id": 60,
"product_name": "Juniper FW",
"vendor": "Juniper"
},
"barracuda_waf": {
"product_id": 61,
"product_name": "Barracuda WAF",
"vendor": "Barracuda"
},
"apache_access_log": {
"product_id": 62,
"product_name": "Apache Web Server",
"vendor": "Apache"
},
"aws_guard_duty_findings": {
"product_id": 65,
"product_name": "Guard Duty",
"vendor": "Amazon Web Services"
},
"ericsson_security_manager": {
"product_id": 66,
"product_name": "Security Manager",
"vendor": "Ericsson"
},
"mojo_wireless": {
"product_id": 68,
"product_name": "Mojo Wireless",
"vendor": "Mojo"
},
"named": {
"product_id": 69,
"product_name": "NameD",
"vendor": "Linux"
},
"netscaler": {
"product_id": 70,
"product_name": "Netscaler",
"vendor": "Citrix"
},
"zix_email": {
"product_id": 75,
"product_name": "Secure Cloud",
"vendor": "Zix"
},
"gigamon_gigavue": {
"product_id": 76,
"product_name": "Gigamon GigaVUE",
"vendor": "Gigamon"
},
"pf_sense_firewall": {
"product_id": 81,
"product_name": "pfSense Firewall",
"vendor": "pfSense"
},
"sonic_wall_firewall": {
"product_id": 82,
"product_name": "SonicWall Firewall",
"vendor": "SonicWall"
},
"sonicwall_nsa 3600": {
"product_id": 82,
"product_name": "SonicWall Firewall",
"vendor": "SonicWall"
},
"senhasegura_pam": {
"product_id": 83,
"product_name": "Senhasegura PAM",
"vendor": "Senhasegura"
},
"spam_titan": {
"product_id": 84,
"product_name": "SpamTitan",
"vendor": "Titan"
},
"fireeye_mps": {
"product_id": 86,
"product_name": "FireEye Network Security (NX Series)",
"vendor": "FireEye"
},
"fireeye_hx": {
"product_id": 87,
"product_name": "FireEye Endpoint Security (HX Series)",
"vendor": "FireEye"
},
"fireeye_mas": {
"product_id": 88,
"product_name": "FireEye Malware Analysis (AX Series)",
"vendor": "FireEye"
},
"fireeye_fmps": {
"product_id": 89,
"product_name": "FireEye File Protect (FX Series)",
"vendor": "FireEye"
},
"fireeye_cms": {
"product_id": 90,
"product_name": "FireEye Central Management (CM Series)",
"vendor": "FireEye"
},
"fail2ban": {
"product_id": 91,
"product_name": "fail2ban",
"vendor": "Linux"
},
"aws_vpc_flow_log": {
"product_id": 92,
"product_name": "AWS VPC Security",
"vendor": "Amazon Web Services"
},
"aws_cloudtrail_events": {
"product_id": 93,
"product_name": "AWS Instance Backup",
"vendor": "Amazon Web Services"
},
"azure_security_alert": {
"product_id": 94,
"product_name": "Azure Security",
"vendor": "Microsoft"
},
"microsoft graph asset inventory": {
"product_id": 164,
"product_name": "Graph",
"vendor": "Microsoft"
},
"unifi_security_gateway": {
"product_id": 95,
"product_name": "Unify Security Gateway",
"vendor": "Ubiquity"
},
"deep instinct_d-appliance": {
"product_id": 96,
"product_name": "Advanced Endpoint Security",
"vendor": "Deep Instinct"
},
"deepinstinct": {
"product_id": 96,
"product_name": "Advanced Endpoint Security",
"vendor": "Deep Instinct"
},
"deep instinct asset inventory": {
"product_id": 96,
"product_name": "Advanced Endpoint Security",
"vendor": "Deep Instinct"
},
"roqos": {
"product_id": 97,
"product_name": "Roqos Core",
"vendor": "Roqos"
},
"hpe_nimble": {
"product_id": 98,
"product_name": "HPE Nimble",
"vendor": "HPE"
},
"ufw": {
"product_id": 99,
"product_name": "Uncomplicated Firewall (UFW)",
"vendor": "linux"
},
"cisco_ise": {
"product_id": 100,
"product_name": "Cisco ISE",
"vendor": "Cisco"
},
"tufin_st_policy": {
"product_id": 101,
"product_name": "Tufin SecureTrack",
"vendor": "Tufin"
},
"shibboleth": {
"product_id": 102,
"product_name": "Shibboleth IDP",
"vendor": "Shibboleth"
},
"att_arris_gateway": {
"product_id": 103,
"product_name": "AT&T Arris Gateway",
"vendor": "AT&T"
},
"vcenter": {
"product_id": 104,
"product_name": "VMWare VCenter",
"vendor": "VMWare"
},
"cisco_os": {
"product_id": 105,
"product_name": "Cisco Network Operating System",
"vendor": "Cisco"
},
"mcafee_nsp": {
"product_id": 106,
"product_name": "McAfee Network Security",
"vendor": "McAfee"
},
"pulse_secure": {
"product_id": 107,
"product_name": "Pulse Secure",
"vendor": "Pulse"
},
"beyond_trust": {
"product_id": 108,
"product_name": "Beyond Trust",
"vendor": "Beyond Trust"
},
"beyond_trust_ad_bridge": {
"product_id": 108,
"product_name": "Beyond Trust",
"vendor": "Beyond Trust"
},
"cisco_wsa": {
"product_id": 109,
"product_name": "Web Security Appliance (WSA)",
"vendor": "Cisco"
},
"kernel": {
"product_id": 110,
"product_name": "Kernel",
"vendor": "linux"
},
"cisco_acs": {
"product_id": 111,
"product_name": "Access Control Server (ACS)",
"vendor": "Cisco"
},
"audiocodes_mediant": {
"product_id": 112,
"product_name": "Mediant Media Gateway",
"vendor": "AudioCodes"
},
"auditd_logs": {
"product_id": 113,
"product_name": "Auditd Logs",
"vendor": "Linux"
},
"pam": {
"product_id": 114,
"product_name": "Linux PAM",
"vendor": "Linux"
},
"hpe_efs": {
"product_id": 115,
"product_name": "HPE EFS",
"vendor": "HPE"
},
"sssd": {
"product_id": 116,
"product_name": "System Security Services Daemon (sssd)",
"vendor": "SSSD Project"
},
"tomcat_log": {
"product_id": 117,
"product_name": "Apache Tomcat",
"vendor": "Apache"
},
"haproxy": {
"product_id": 118,
"product_name": "HAProxy Load Balancer",
"vendor": "HAProxy"
},
"akamai": {
"product_id": 120,
"product_name": "Akamai SIEM Integration",
"vendor": "Akamai"
},
"javamelody": {
"product_id": 121,
"product_name": "JavaMelody",
"vendor": "JavaMelody Project"
},
"powertech_interact": {
"product_id": 122,
"product_name": "IBM i Powertech SIEM Agent",
"vendor": "IBM"
},
"vmware_nsx_firewall": {
"product_id": 123,
"product_name": "VMWare NSX Firewall",
"vendor": "VMWare"
},
"netfilter_ulogd": {
"product_id": 124,
"product_name": "Netfilter ulogd",
"vendor": "linux"
},
"openvpn": {
"product_id": 125,
"product_name": "OpenVPN",
"vendor": "OpenVPN"
},
"tanium": {
"product_id": 126,
"product_name": "Tanium",
"vendor": "Tanium"
},
"tanium_tanium application server": {
"product_id": 126,
"product_name": "Tanium",
"vendor": "Tanium"
},
"tanium_detect": {
"product_id": 126,
"product_name": "Tanium",
"vendor": "Tanium"
},
"tanium_signals": {
"product_id": 126,
"product_name": "Tanium",
"vendor": "Tanium"
},
"mcafee_ens": {
"product_id": 127,
"product_name": "McAfee Endpoint Security",
"vendor": "McAfee"
},
"fortimail": {
"product_id": 128,
"product_name": "Fortimail",
"vendor": "Fortinet"
},
"paessler_prtg": {
"product_id": 129,
"product_name": "PRTG Network Monitor",
"vendor": "Paessler"
},
"eset_remoteadministrator": {
"product_id": 130,
"product_name": "ESET Antivirus",
"vendor": "ESET"
},
"eset": {
"product_id": 130,
"product_name": "ESET Antivirus",
"vendor": "ESET"
},
"infocyte": {
"product_id": 131,
"product_name": "Infocyte Hunt",
"vendor": "Infocyte"
},
"infocyte_hunt": {
"product_id": 131,
"product_name": "Infocyte Hunt",
"vendor": "Infocyte"
},
"okta": {
"product_id": 132,
"product_name": "Okta",
"vendor": "Okta"
},
"okta asset inventory": {
"product_id": 132,
"product_name": "Okta",
"vendor": "Okta"
},
"securecircle": {
"product_id": 133,
"product_name": "SecureCircle",
"vendor": "SecureCircle"
},
"mimecast": {
"product_id": 134,
"product_name": "Mimecast",
"vendor": "Mimecast"
},
"mimecast asset inventory": {
"product_id": 134,
"product_name": "Mimecast",
"vendor": "Mimecast"
},
"sentinelone": {
"product_id": 136,
"product_name": "SentinelOne",
"vendor": "SentinelOne"
},
"sentinelone_mgmt": {
"product_id": 136,
"product_name": "SentinelOne",
"vendor": "SentinelOne"
},
"tenable_vulnerability_management": {
"product_id": 144,
"product_name": "Vulnerability Management",
"vendor": "Tenable"
},
"tenable_vulnerability_management_asset_inventory": {
"product_id": 144,
"product_name": "Vulnerability Management",
"vendor": "Tenable"
},
"noname": {
"product_id": 145,
"product_name": "Noname Security",
"vendor": "Noname Security"
},
"automox": {
"product_id": 146,
"product_name": "Automox",
"vendor": "Automox"
},
"automox_asset_inventory": {
"product_id": 146,
"product_name": "Automox",
"vendor": "Automox"
},
"actifio": {
"product_id": 147,
"product_name": "Actifio",
"vendor": "Actifio"
},
"actifio_asset_inventory": {
"product_id": 147,
"product_name": "Actifio",
"vendor": "Actifio"
},
"cubro": {
"product_id": 148,
"product_name": "Cubro Network Visibility",
"vendor": "Cubro"
},
"cisco_pix_deny": {
"product_id": 149,
"product_name": "PIX Firewall",
"vendor": "Cisco"
},
"cisco_pix": {
"product_id": 149,
"product_name": "PIX Firewall",
"vendor": "Cisco"
},
"symantec_proxy_sg": {
"product_id": 150,
"product_name": "ProxySG",
"vendor": "Symantec"
},
"cortex detection": {
"product_id": 151,
"product_name": "Cortex XDR",
"vendor": "Palo Alto"
},
"barracuda_cloudgen": {
"product_id": 152,
"product_name": "Barracuda CloudGen Firewall",
"vendor": "Barracuda"
},
"cyberark epm": {
"product_id": 153,
"product_name": "CyberArk EPM",
"vendor": "CyberArk"
},
"ad_audit_plus": {
"product_id": 155,
"product_name": "ManageEngine ADManager",
"vendor": "ManageEngine"
},
"vyos": {
"product_id": 156,
"product_name": "VyOS",
"vendor": "VyOS"
},
"opnsense_audit": {
"product_id": 157,
"product_name": "OPNsense Firewall",
"vendor": "OPNSense"
},
"opnsense_status": {
"product_id": 157,
"product_name": "OPNsense Firewall",
"vendor": "OPNSense"
},
"cyber-ark_vault": {
"product_id": 158,
"product_name": "CyberArk Vault",
"vendor": "CyberArk"
},
"barracuda_ess": {
"product_id": 159,
"product_name": "Barracuda ESS",
"vendor": "Barracuda"
},
"proofpoint_casb": {
"product_id": 160,
"product_name": "CASB",
"vendor": "ProofPoint"
},
"security onion": {
"product_id": 161,
"product_name": "Security Onion",
"vendor": "Security Onion Solutions, LLC"
},
"stealthbits technologies llc_stealthbits activity monitor": {
"product_id": 162,
"product_name": "Stealthbits",
"vendor": "Netwrix"
},
"taegis": {
"product_id": 163,
"product_name": "Taegis VDR",
"vendor": "Secureworks"
},
"datto_network_manager_audit": {
"product_id": 165,
"product_name": "Datto RMM",
"vendor": "Datto"
},
"carson_saint": {
"product_id": 166,
"product_name": "Carson & Saint",
"vendor": "carson_saint"
},
"carson_saint_asset_inventory": {
"product_id": 166,
"product_name": "Carson & Saint",
"vendor": "carson_saint"
},
"duo detection": {
"product_id": 167,
"product_name": "Duo",
"vendor": "Cisco"
},
"duo ransomware": {
"product_id": 167,
"product_name": "Duo",
"vendor": "Cisco"
},
"duo event": {
"product_id": 167,
"product_name": "Duo",
"vendor": "Cisco"
},
"duo asset inventory": {
"product_id": 167,
"product_name": "Duo",
"vendor": "Cisco"
},
"druva": {
"product_id": 168,
"product_name": "Druva",
"vendor": "Druva"
},
"zix_appriver": {
"product_id": 169,
"product_name": "AppRiver",
"vendor": "Zix"
},
"netskope": {
"product_id": 170,
"product_name": "Netskope",
"vendor": "Netskope"
},
"netskope asset inventory": {
"product_id": 170,
"product_name": "Netskope",
"vendor": "Netskope"
},
"limacharlie": {
"product_id": 171,
"product_name": "LimaCharlie",
"vendor": "LimaCharlie"
},
"limacharlie asset inventory": {
"product_id": 171,
"product_name": "LimaCharlie",
"vendor": "LimaCharlie"
},
"checkpoint_harmony_email": {
"product_id": 172,
"product_name": "Harmony Email",
"vendor": "Checkpoint"
},
"splunk": {
"product_id": 173,
"product_name": "Splunk",
"vendor": "Splunk"
},
"splunk asset inventory": {
"product_id": 173,
"product_name": "Splunk",
"vendor": "Splunk"
}
},
"lead_rules": [
{
"id": 1,
"description": "Stealthwatch High Concern Index Alarm",
"criteria": "streamName = \"Stealthwatch High Concern Index\"",
"client_set_id": 1001,
"server_set_id": 1005,
"product_id": 1
},
{
"id": 2,
"description": "Stealthwatch Suspect Data Hoarding Alarm",
"criteria": "streamName = \"Stealthwatch Suspect Data Hoarding\"",
"client_set_id": 1002,
"server_set_id": 1006,
"product_id": 1
},
{
"id": 3,
"description": "Stealthwatch Suspect Data Loss Alarm",
"criteria": "streamName = \"Stealthwatch Suspect Data Loss\"",
"client_set_id": 1003,
"server_set_id": 1007,
"product_id": 1
},
{
"id": 4,
"description": "Stealthwatch Suspect Quient Long Flow",
"criteria": "streamName = \"Stealthwatch Suspect Quiet Long Flow\"",
"client_set_id": 1009,
"server_set_id": 1008,
"product_id": 1
},
{
"id": 5,
"description": "Stealthwatch High Concern Index Alarm",
"criteria": "streamName = \"stealth_watch\" AND ruleName = \"High Concern Index\"",
"client_set_id": 1001,
"server_set_id": 1005,
"product_id": 1
},
{
"id": 6,
"description": "Stealthwatch High Total Traffic Alarm",
"criteria": "streamName = \"stealth_watch\" AND ruleName = \"High Total Traffic\"",
"client_set_id": 1001,
"server_set_id": 1005,
"product_id": 1
},
{
"id": 7,
"description": "Stealthwatch Command & Control Alarm",
"criteria": "streamName = \"stealth_watch\" AND ruleName = \"Command & Control\"",
"client_set_id": 1001,
"server_set_id": 1005,
"product_id": 1
},
{
"id": 8,
"description": "QRadar Offense",
"criteria": "streamName = \"QRadar Offense\"",
"client_set_id": 2001,
"server_set_id": 2005,
"product_id": 2
},
{
"id": 9,
"description": "AMP Detection",
"criteria": "streamName = \"AMP Detection\"",
"client_set_id": 3005,
"server_set_id": 3001,
"product_id": 3
},
{
"id": 10,
"description": "AMP Ransomware Detection",
"criteria": "streamName = \"AMP Ransomware\"",
"client_set_id": 3019,
"server_set_id": 3026,
"product_id": 3
},
{
"id": 11,
"description": "FireEye NX Malware Detection",
"criteria": "streamName = \"fireeye_mps\" AND tags CONTAINS \"malware-object\"",
"client_set_id": 86001,
"server_set_id": 86005,
"product_id": 86
},
{
"id": 12,
"description": "FireEye NX Callback Detection",
"criteria": "streamName = \"fireeye_mps\" AND tags CONTAINS \"malware-callback\"",
"client_set_id": 86009,
"server_set_id": 86008,
"product_id": 86
},
{
"id": 13,
"description": "FireEye NX Web Infection Detection",
"criteria": "streamName = \"fireeye_mps\" AND tags CONTAINS \"web-infection\"",
"client_set_id": 86024,
"server_set_id": 86022,
"product_id": 86
},
{
"id": 14,
"description": "FireEye NX IPS Event",
"criteria": "streamName = \"fireeye_mps\" AND tags CONTAINS \"ips-event\"",
"client_set_id": 86001,
"server_set_id": 86005,
"product_id": 86
},
{
"id": 15,
"description": "FireEye HX Malware Detection",
"criteria": "streamName = \"fireeye_hx\" AND tags CONTAINS \"malware-object\"",
"client_set_id": 87005,
"server_set_id": 87001,
"product_id": 87
},
{
"id": 16,
"description": "FireEye HX Callback Detection",
"criteria": "streamName = \"fireeye_hx\" AND tags CONTAINS \"malware-callback\"",
"client_set_id": 87009,
"server_set_id": 87008,
"product_id": 87
},
{
"id": 17,
"description": "FireEye HX Web Infection Detection",
"criteria": "streamName = \"fireeye_hx\" AND tags CONTAINS \"web-infection\"",
"client_set_id": 87024,
"server_set_id": 87022,
"product_id": 87
},
{
"id": 18,
"description": "FireEye HX ExD Hit",
"criteria": "streamName = \"fireeye_hx\" AND tags CONTAINS \"ExD Hit Found\"",
"client_set_id": 87005,
"server_set_id": 87001,
"product_id": 87
},
{
"id": 19,
"description": "FireEye HX Malware Hit",
"criteria": "streamName = \"fireeye_hx\" AND tags CONTAINS \"Malware Hit Found\"",
"client_set_id": 87005,
"server_set_id": 87001,
"product_id": 87
},
{
"id": 20,
"description": "FireEye HX Infection Match",
"criteria": "streamName = \"fireeye_hx\" AND tags CONTAINS \"infection-match\"",
"client_set_id": 87005,
"server_set_id": 87001,
"product_id": 87
},
{
"id": 21,
"description": "FireEye HX Domain Match",
"criteria": "streamName = \"fireeye_hx\" AND tags CONTAINS \"domain-match\"",
"client_set_id": 87005,
"server_set_id": 87001,
"product_id": 87
},
{
"id": 22,
"description": "FireEye AX Detection",
"criteria": "streamName = \"fireeye_mas\" AND tags CONTAINS \"malware-object\"",
"client_set_id": 88005,
"server_set_id": 88001,
"product_id": 88
},
{
"id": 23,
"description": "FireEye FX Detection",
"criteria": "streamName = \"fireeye_fmps\" AND tags CONTAINS \"malware-object\"",
"client_set_id": 89005,
"server_set_id": 89001,
"product_id": 89
},
{
"id": 24,
"description": "FireEye CMS Detection",
"criteria": "streamName = \"fireeye_cms\" AND tags CONTAINS \"malware-object\"",
"client_set_id": 90005,
"server_set_id": 90001,
"product_id": 90
},
{
"id": 25,
"description": "FireEye CMS Callback Detection",
"criteria": "streamName = \"fireeye_cms\" AND tags CONTAINS \"malware-callback\"",
"client_set_id": 90009,
"server_set_id": 90008,
"product_id": 90
},
{
"id": 26,
"description": "FireEye CMS Web Infection Detection",
"criteria": "streamName = \"fireeye_cms\" AND tags CONTAINS \"web-infection\"",
"client_set_id": 90024,
"server_set_id": 90022,
"product_id": 90
},
{
"id": 27,
"description": "FireEye CMS IPS Event",
"criteria": "streamName = \"fireeye_cms\" AND tags CONTAINS \"ips-event\"",
"client_set_id": 90001,
"server_set_id": 90005,
"product_id": 90
},
{
"id": 28,
"description": "FireEye CMS Infection Match",
"criteria": "streamName = \"fireeye_cms\" AND tags CONTAINS \"infection-match\"",
"client_set_id": 90005,
"server_set_id": 90001,
"product_id": 90
},
{
"id": 29,
"description": "FireEye CMS Domain Match",
"criteria": "streamName = \"fireeye_cms\" AND tags CONTAINS \"domain-match\"",
"client_set_id": 90005,
"server_set_id": 90001,
"product_id": 90
},
{
"id": 30,
"description": "FireEye Email Security Alarm",
"criteria": "streamName = \"fireeye_emps\" AND tags CONTAINS \"malware-object\"",
"client_set_id": 23005,
"server_set_id": 23001,
"product_id": 23
},
{
"id": 31,
"description": "FireEye Email Security Ransomware Alarm",
"criteria": "streamName = \"fireeye_emps\" AND tags CONTAINS \"ransomware\"",
"client_set_id": 23019,
"server_set_id": 23026,
"product_id": 23
},
{
"id": 32,
"description": "CarbonBlack Protect Detection",
"criteria": "streamName = \"CarbonBlack Protect Detection\"",
"client_set_id": 5005,
"server_set_id": 5001,
"product_id": 5
},
{
"id": 33,
"description": "CarbonBlack Ransomware Detection",
"criteria": "streamName = \"CarbonBlack Ransomware Detection\"",
"client_set_id": 5019,
"server_set_id": 5026,
"product_id": 5
},
{
"id": 34,
"description": "CarbonBlack Respond Detection",
"criteria": "streamName = \"CarbonBlack Respond Detection\"",
"client_set_id": 5005,
"server_set_id": 5001,
"product_id": 5
},
{
"id": 35,
"description": "CarbonBlack Bit9 Detection",
"criteria": "streamName = \"bit9\" AND action LIKE \"%block%\"",
"client_set_id": 5005,
"server_set_id": 5001,
"product_id": 5
},
{
"id": 36,
"description": "CarbonBlack Defend Detection",
"criteria": "streamName = \"carbonblack_cbdefense_syslog_connector\" AND severityCode < 5",
"client_set_id": 5005,
"server_set_id": 5001,
"product_id": 5
},
{
"id": 37,
"description": "Crowdstrike Detection",
"criteria": "streamName = \"Crowdstrike Detection\"",
"client_set_id": 7005,
"server_set_id": 7001,
"product_id": 7
},
{
"id": 38,
"description": "Crowdstrike Ransomware Detection",
"criteria": "streamName = \"Crowdstrike Ransomware Detection\"",
"client_set_id": 7019,
"server_set_id": 7026,
"product_id": 7
},
{
"id": 39,
"description": "Crowdstrike Detection",
"criteria": "streamName = \"crowdstrike_falcon\" AND action = \"UserLogonFailed\"",
"client_set_id": 7005,
"server_set_id": 7001,
"product_id": 7
},
{
"id": 40,
"description": "Crowdstrike Detection",
"criteria": "streamName = \"crowdstrike_falcon\" AND action = \"ProcessBlocked\"",
"client_set_id": 7005,
"server_set_id": 7001,
"product_id": 7
},
{
"id": 41,
"description": "Crowdstrike Detection",
"criteria": "streamName = \"crowdstrike_falcon\" AND action = \"QuarantineActionResult\"",
"client_set_id": 7005,
"server_set_id": 7001,
"product_id": 7
},
{
"id": 42,
"description": "Cisco Wireless Detection",
"criteria": "streamName = \"cisco_wireless_lan_controller\" AND severityCode < 5",
"client_set_id": 59001,
"server_set_id": 59005,
"product_id": 59
},
{
"id": 43,
"description": "Cisco Wireless Detection",
"criteria": "streamName = \"cisco_wireless_lan_controller\" AND severityLabel = \"High\"",
"client_set_id": 59001,
"server_set_id": 59005,
"product_id": 59
},
{
"id": 44,
"description": "Cisco Wireless Detection",
"criteria": "streamName = \"cisco_wireless_lan_controller\" AND action = \"block\"",
"client_set_id": 59001,
"server_set_id": 59005,
"product_id": 59
},
{
"id": 45,
"description": "Cisco Wireless Detection",
"criteria": "streamName = \"cisco_wireless_lan_controller\" AND messageType = \"auth_failure\"",
"client_set_id": 59001,
"server_set_id": 59005,
"product_id": 59
},
{
"id": 46,
"description": "Cybereason CNC Detection",
"criteria": "streamName = \"Cybereason CNC Detection\"",
"client_set_id": 35009,
"server_set_id": 35008,
"product_id": 35
},
{
"id": 47,
"description": "Cybereason KNOWN_MALWARE Detection",
"criteria": "streamName = \"Cybereason KNOWN_MALWARE Detection\"",
"client_set_id": 35005,
"server_set_id": 35001,
"product_id": 35
},
{
"id": 48,
"description": "Cybereason MALICIOUS_PROCESS Detection",
"criteria": "streamName = \"Cybereason MALICIOUS_PROCESS Detection\"",
"client_set_id": 35005,
"server_set_id": 35001,
"product_id": 35
},
{
"id": 49,
"description": "Cybereason PROCESS_INJECTION Detection",
"criteria": "streamName = \"Cybereason PROCESS_INJECTION Detection\"",
"client_set_id": 35005,
"server_set_id": 35001,
"product_id": 35
},
{
"id": 50,
"description": "Cybereason RANSOMWARE Detection",
"criteria": "streamName = \"Cybereason RANSOMWARE Detection\"",
"client_set_id": 35019,
"server_set_id": 35026,
"product_id": 35
},
{
"id": 51,
"description": "Cybereason PHISHING Detection",
"criteria": "streamName = \"Cybereason PHISHING Detection\"",
"client_set_id": 35023,
"server_set_id": 35015,
"product_id": 35
},
{
"id": 52,
"description": "NCentral Detection",
"criteria": "streamName = \"NCentral Detection\"",
"client_set_id": 27005,
"server_set_id": 27001,
"product_id": 27
},
{
"id": 53,
"description": "Symantec Endpoint Protection Alarm",
"criteria": "streamName = \"symantec_sep\" AND severityCode < 5",
"client_set_id": 8001,
"server_set_id": 8005,
"product_id": 8
},
{
"id": 54,
"description": "Symantec Endpoint Protection Ransomware Alarm",
"criteria": "streamName = \"symantec_sep_ransomware\"",
"client_set_id": 8019,
"server_set_id": 8026,
"product_id": 8
},
{
"id": 55,
"description": "Symantec Endpoint Protection Alarm",
"criteria": "streamName = \"symantec antivirus\" AND severityCode < 5",
"client_set_id": 8001,
"server_set_id": 8005,
"product_id": 8
},
{
"id": 56,
"description": "Symantec Endpoint Protection Alarm",
"criteria": "streamName = \"symantec endpoint protection client\" AND severityCode < 5",
"client_set_id": 8001,
"server_set_id": 8005,
"product_id": 8
},
{
"id": 57,
"description": "Firepower Alarm",
"criteria": "streamName = \"estreamer\" AND severityCode < 5",
"client_set_id": 9001,
"server_set_id": 9005,
"product_id": 9
},
{
"id": 58,
"description": "ASA Deny",
"criteria": "streamName = \"cisco_asa\" AND action = \"deny\"",
"client_set_id": 17001,
"server_set_id": 17005,
"product_id": 17
},
{
"id": 59,
"description": "ASA Deny",
"criteria": "streamName = \"cisco_asa\" AND action = \"block\"",
"client_set_id": 17001,
"server_set_id": 17005,
"product_id": 17
},
{
"id": 60,
"description": "Websense Security Alarm",
"criteria": "streamName = \"websense\" AND severityCode < 5",
"client_set_id": 19001,
"server_set_id": 19005,
"product_id": 19
},
{
"id": 61,
"description": "Windows Security Alarm",
"criteria": "streamName = \"microsoft_windows_security_audit\" AND severityCode < 5",
"client_set_id": 18001,
"server_set_id": 18005,
"product_id": 18
},
{
"id": 62,
"description": "Windows Security Alarm",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND severityCode < 5",
"client_set_id": 18001,
"server_set_id": 18005,
"product_id": 18
},
{
"id": 63,
"description": "Palo Alto FW Alarm",
"criteria": "streamName = \"pan_firewall\" AND severityCode < 5",
"client_set_id": 20001,
"server_set_id": 20005,
"product_id": 20
},
{
"id": 64,
"description": "Palo Alto FW Alarm",
"criteria": "streamName = \"palo alto networks_pan-os\" AND severityCode < 5",
"client_set_id": 20001,
"server_set_id": 20005,
"product_id": 20
},
{
"id": 65,
"description": "Palo Alto FW Alarm",
"criteria": "streamName = \"pan_firewall\" AND action = \"block\"",
"client_set_id": 20001,
"server_set_id": 20005,
"product_id": 20
},
{
"id": 66,
"description": "Palo Alto FW Alarm",
"criteria": "streamName = \"palo alto networks_pan-os\" AND action = \"block\"",
"client_set_id": 20001,
"server_set_id": 20005,
"product_id": 20
},
{
"id": 67,
"description": "Palo Alto Threat Alarm",
"criteria": "streamName = \"palo alto networks_pan-os\" AND messageType = \"THREAT\" AND severityCode < 5",
"client_set_id": 20001,
"server_set_id": 20005,
"product_id": 20
},
{
"id": 68,
"description": "Palo Alto Threat Alarm",
"criteria": "streamName = \"palo alto networks_pan-os\" AND tags CONTAINS \"reason:threat\" AND severityCode < 5",
"client_set_id": 20001,
"server_set_id": 20005,
"product_id": 20
},
{
"id": 69,
"description": "Palo Alto FW Alarm",
"criteria": "streamName = \"pan_firewall\" AND action = \"deny\"",
"client_set_id": 20001,
"server_set_id": 20005,
"product_id": 20
},
{
"id": 70,
"description": "Palo Alto FW Alarm",
"criteria": "streamName = \"palo alto networks_pan-os\" AND action = \"deny\"",
"client_set_id": 20001,
"server_set_id": 20005,
"product_id": 20
},
{
"id": 71,
"description": "Checkpoint Alarm",
"criteria": "streamName LIKE \"checkpoint\" AND severityCode < 4",
"client_set_id": 21001,
"server_set_id": 21005,
"product_id": 21
},
{
"id": 72,
"description": "Checkpoint Drop Action",
"criteria": "streamName LIKE \"check point\" AND action = \"Drop\"",
"client_set_id": 21001,
"server_set_id": 21005,
"product_id": 21
},
{
"id": 73,
"description": "Checkpoint Alarm",
"criteria": "streamName LIKE \"check point\" AND severityCode < 4",
"client_set_id": 21001,
"server_set_id": 21005,
"product_id": 21
},
{
"id": 74,
"description": "Checkpoint Reject Action",
"criteria": "streamName LIKE \"check point\" AND action = \"Reject\"",
"client_set_id": 21001,
"server_set_id": 21005,
"product_id": 21
},
{
"id": 75,
"description": "Checkpoint Alarm",
"criteria": "streamName LIKE \"checkpoint\" AND severityCode < 4",
"client_set_id": 21001,
"server_set_id": 21005,
"product_id": 21
},
{
"id": 76,
"description": "Checkpoint Drop Action",
"criteria": "streamName LIKE \"check point\" AND action = \"block\"",
"client_set_id": 21001,
"server_set_id": 21005,
"product_id": 21
},
{
"id": 77,
"description": "Tippingpoint Block",
"criteria": "streamName = \"tippingpoint_block\"",
"client_set_id": 22001,
"server_set_id": 22005,
"product_id": 22
},
{
"id": 78,
"description": "TrapX TSOC Alarm",
"criteria": "streamName = \"trapx_tsoc\"",
"client_set_id": 24001,
"server_set_id": 24005,
"product_id": 24
},
{
"id": 79,
"description": "Infoblox NIOS Alarm",
"criteria": "streamName = \"infoblox_nios\"",
"client_set_id": 25001,
"server_set_id": 25005,
"product_id": 25
},
{
"id": 80,
"description": "Meraki IDS Alarm",
"criteria": "streamName = \"meraki\" AND messageType = \"ids\"",
"client_set_id": 26001,
"server_set_id": 26005,
"product_id": 26
},
{
"id": 81,
"description": "Meraki Deny Alarm",
"criteria": "streamName = \"meraki\" AND action = \"deny\"",
"client_set_id": 26001,
"server_set_id": 26005,
"product_id": 26
},
{
"id": 82,
"description": "Meraki Deny Alarm",
"criteria": "streamName = \"meraki\" AND action = \"block\"",
"client_set_id": 26001,
"server_set_id": 26005,
"product_id": 26
},
{
"id": 83,
"description": "Suricata IDS Alarm",
"criteria": "streamName = \"suricata\"",
"client_set_id": 28001,
"server_set_id": 28005,
"product_id": 28
},
{
"id": 84,
"description": "Radware Appwall Alarm",
"criteria": "streamName = \"radware_waf\"",
"client_set_id": 29001,
"server_set_id": 29005,
"product_id": 29
},
{
"id": 85,
"description": "Trend Micro Deep Security Alarm",
"criteria": "streamName = \"trend micro_deep security agent\" AND severityCode < 5",
"client_set_id": 30005,
"server_set_id": 30001,
"product_id": 30
},
{
"id": 86,
"description": "Trend Micro Deep Security Alarm",
"criteria": "streamName = \"trend micro_deep discovery inspector\" AND severityCode < 5",
"client_set_id": 30005,
"server_set_id": 30001,
"product_id": 30
},
{
"id": 87,
"description": "Trend Micro Deep Security Alarm",
"criteria": "streamName = \"trend micro_deep security manager\" AND severityCode < 5",
"client_set_id": 30005,
"server_set_id": 30001,
"product_id": 30
},
{
"id": 88,
"description": "zScaler NSS Block",
"criteria": "streamName = \"zscaler_nssweblog\" AND action = \"Blocked\"",
"client_set_id": 31001,
"server_set_id": 31005,
"product_id": 31
},
{
"id": 89,
"description": "zScaler NSS Block",
"criteria": "streamName = \"zscaler_nssweblog\" AND action = \"blocked\"",
"client_set_id": 31001,
"server_set_id": 31005,
"product_id": 31
},
{
"id": 90,
"description": "ZScaler Detection",
"criteria": "streamName = \"zscaler_nssweblog\" AND severityCode < 5",
"client_set_id": 31001,
"server_set_id": 31005,
"product_id": 31
},
{
"id": 91,
"description": "ZScaler Detection",
"criteria": "streamName = \"zscaler_nssweblog\" AND severityLabel = \"High\"",
"client_set_id": 31001,
"server_set_id": 31005,
"product_id": 31
},
{
"id": 92,
"description": "ZScaler Detection",
"criteria": "streamName = \"zscaler_nssweblog\" AND action = \"block\"",
"client_set_id": 31001,
"server_set_id": 31005,
"product_id": 31
},
{
"id": 93,
"description": "ZScaler Detection",
"criteria": "streamName = \"zscaler_nssweblog\" AND messageType = \"auth_failure\"",
"client_set_id": 31001,
"server_set_id": 31005,
"product_id": 31
},
{
"id": 94,
"description": "ProofPoint Protect Detection",
"criteria": "streamName = \"proofpoint_protect\"",
"client_set_id": 32023,
"server_set_id": 32015,
"product_id": 32
},
{
"id": 95,
"description": "Cisco Ironport Detection",
"criteria": "streamName = \"cisco_ironport\" AND severityCode < 5",
"client_set_id": 34023,
"server_set_id": 34015,
"product_id": 34
},
{
"id": 96,
"description": "Mist Wireless Service Disruption Detection",
"criteria": "streamName = \"mist\"",
"client_set_id": 33013,
"server_set_id": 33014,
"product_id": 33
},
{
"id": 97,
"description": "Fortinet Firewall Action Block",
"criteria": "streamName = \"fortigate\" AND messageType = \"firewall_action\" AND action = \"blocked\"",
"client_set_id": 36001,
"server_set_id": 36005,
"product_id": 36
},
{
"id": 98,
"description": "Fortinet Alert",
"criteria": "streamName = \"fortigate\" AND severityLabel = \"alert\"",
"client_set_id": 36001,
"server_set_id": 36005,
"product_id": 36
},
{
"id": 99,
"description": "Fortinet IDS Action Block",
"criteria": "streamName = \"fortigate\" AND messageType = \"ips_action\" AND action = \"blocked\"",
"client_set_id": 36001,
"server_set_id": 36005,
"product_id": 36
},
{
"id": 100,
"description": "Fortinet URL Filter Block",
"criteria": "streamName = \"fortigate\" AND messageType = \"waf_event\" AND action = \"blocked\"",
"client_set_id": 36024,
"server_set_id": 36022,
"product_id": 36
},
{
"id": 101,
"description": "Fortinet Firewall Action Block",
"criteria": "streamName = \"fortinet_fortigate\" AND action = \"blocked\"",
"client_set_id": 36001,
"server_set_id": 36005,
"product_id": 36
},
{
"id": 102,
"description": "Fortinet Firewall Action Block",
"criteria": "streamName = \"fortigate\" AND messageType = \"firewall_action\" AND action = \"server-rst\"",
"client_set_id": 36001,
"server_set_id": 36005,
"product_id": 36
},
{
"id": 103,
"description": "Fortinet Firewall Action Block",
"criteria": "streamName = \"fortinet_fortigate\" AND action = \"block\"",
"client_set_id": 36001,
"server_set_id": 36005,
"product_id": 36
},
{
"id": 104,
"description": "Vectra Cognito Alarm",
"criteria": "streamName = \"vectra networks_x series\" AND severityCode < 5",
"client_set_id": 37005,
"server_set_id": 37001,
"product_id": 37
},
{
"id": 105,
"description": "Umbrella Alarm",
"criteria": "streamName = \"OpenDNS Detection\"",
"client_set_id": 38005,
"server_set_id": 38001,
"product_id": 38
},
{
"id": 106,
"description": "OSSEC Auth Failure",
"criteria": "streamName = \"ossec\" AND messageType = \"auth_failure\"",
"client_set_id": 39001,
"server_set_id": 39005,
"product_id": 39
},
{
"id": 107,
"description": "MalwareBytes Anti-malware Alarm",
"criteria": "streamName = \"malwarebytes_mbmc\"",
"client_set_id": 40005,
"server_set_id": 40001,
"product_id": 40
},
{
"id": 108,
"description": "Web Application Access Denied (401)",
"criteria": "tags CONTAINS \"HTTP_RESPONSE_CODE:401\"",
"client_set_id": 6001,
"server_set_id": 6005,
"product_id": 6
},
{
"id": 109,
"description": "Web Application Access Denied (403)",
"criteria": "tags CONTAINS \"HTTP_RESPONSE_CODE:403\"",
"client_set_id": 6001,
"server_set_id": 6005,
"product_id": 6
},
{
"id": 110,
"description": "Web Application Error (500)",
"criteria": "tags CONTAINS \"HTTP_RESPONSE_CODE:500\"",
"client_set_id": 6001,
"server_set_id": 6005,
"product_id": 6
},
{
"id": 111,
"description": "Web Application Recon (404)",
"criteria": "tags CONTAINS \"HTTP_RESPONSE_CODE:404\"",
"client_set_id": 6001,
"server_set_id": 6005,
"product_id": 6
},
{
"id": 112,
"description": "Denial of Service Detected",
"criteria": "tags CONTAINS \"service_denial\"",
"client_set_id": 6013,
"server_set_id": 6014,
"product_id": 6
},
{
"id": 113,
"description": "Denial of Service Confirmed",
"criteria": "tags CONTAINS \"service_denial_confirmed\"",
"client_set_id": 6013,
"server_set_id": 6020,
"product_id": 6
},
{
"id": 114,
"description": "Policy Violation Detected",
"criteria": "tags CONTAINS \"policy_violation\"",
"client_set_id": 6024,
"server_set_id": 6022,
"product_id": 6
},
{
"id": 115,
"description": "Authentication Failure",
"criteria": "messageType = \"auth_failure\"",
"client_set_id": 6001,
"server_set_id": 6005,
"product_id": 6
},
{
"id": 116,
"description": "Data Upload > 10GB",
"criteria": "clientBytes > 10000000000",
"client_set_id": 6003,
"server_set_id": 6007,
"product_id": 6
},
{
"id": 117,
"description": "Data Download > 10GB",
"criteria": "serverBytes > 10000000000",
"client_set_id": 6002,
"server_set_id": 6006,
"product_id": 6
},
{
"id": 118,
"description": "Qualys Vulnerability",
"criteria": "streamName = \"Qualys Vulnerability\"",
"client_set_id": 0,
"server_set_id": 0,
"product_id": 42
},
{
"id": 119,
"description": "Windows Authentication",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\"",
"client_set_id": 0,
"server_set_id": 0,
"product_id": 43
},
{
"id": 120,
"description": "User Account Created",
"criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4720\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 121,
"description": "A member was added to a security-enabled global group",
"criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4728\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 122,
"description": "A member was added to a security-enabled local group",
"criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4732\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 123,
"description": "A member was added to a security-enabled universal group",
"criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4756\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 124,
"description": "A security-enabled local group was changed",
"criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4735\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 125,
"description": "The audit log was cleared",
"criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:1102\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 126,
"description": "A user account was locked out",
"criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4740\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 127,
"description": "Object permission was changed",
"criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4640\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 128,
"description": "Special privileges assigned to new logon",
"criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4672\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 129,
"description": "Windows Defender detected malware",
"criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:1116\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 130,
"description": "User Account Created",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4720\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 131,
"description": "A member was added to a security-enabled global group",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4728\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 132,
"description": "A member was added to a security-enabled local group",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4732\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 133,
"description": "A member was added to a security-enabled universal group",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4756\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 134,
"description": "A security-enabled local group was changed",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4735\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 135,
"description": "The audit log was cleared",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:1102\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 136,
"description": "A user account was locked out",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4740\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 137,
"description": "Object permission was changed",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4760\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 138,
"description": "Special privileges assigned to new logon",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4672\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 139,
"description": "Windows Defender detected malware",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:116\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 140,
"description": "Windows Failed Login Attempt",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4625\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 141,
"description": "Windows Failed Login Attempt",
"criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4625\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 142,
"description": "Windows Failed Login Attempt",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4673\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 143,
"description": "Windows Failed Login Attempt",
"criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4673\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 144,
"description": "A member was added to a security-enabled global group",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4728\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 145,
"description": "A member was added to a security-enabled local group",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4732\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 146,
"description": "A member was added to a security-enabled universal group",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4756\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 147,
"description": "A security-enabled local group was changed",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4735\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 148,
"description": "The audit log was cleared",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:1102\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 149,
"description": "A user account was locked out",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4740\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 150,
"description": "Object permission was changed",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4760\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 151,
"description": "Special privileges assigned to new logon",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4672\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 152,
"description": "Windows Defender detected malware",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:116\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 153,
"description": "Windows Failed Login Attempt",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4625\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 154,
"description": "Windows Failed Login Attempt",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4673\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 155,
"description": "Windows Failed Login Attempt",
"criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4720\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 156,
"description": "User Account Created",
"criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4720\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 157,
"description": "A member was added to a security-enabled global group",
"criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4728\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 158,
"description": "A member was added to a security-enabled local group",
"criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4732\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 159,
"description": "A member was added to a security-enabled universal group",
"criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4756\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 160,
"description": "A security-enabled local group was changed",
"criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4735\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 161,
"description": "The audit log was cleared",
"criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:1102\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 162,
"description": "A user account was locked out",
"criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4740\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 163,
"description": "Object permission was changed",
"criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4640\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 164,
"description": "Special privileges assigned to new logon",
"criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4672\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 165,
"description": "Windows Defender detected malware",
"criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:1116\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 166,
"description": "Windows Failed Login Attempt",
"criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4625\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 167,
"description": "Windows Failed Login Attempt",
"criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4673\"",
"client_set_id": 43005,
"server_set_id": 43001,
"product_id": 43
},
{
"id": 168,
"description": "Symantec DLP Detection",
"criteria": "streamName = \"symantec_dlp\"",
"client_set_id": 44003,
"server_set_id": 44007,
"product_id": 44
},
{
"id": 169,
"description": "BRO IDS Detection",
"criteria": "streamName = \"bro\" AND severityCode < 5",
"client_set_id": 45001,
"server_set_id": 45005,
"product_id": 45
},
{
"id": 170,
"description": "Cisco ISE Authentication Failure",
"criteria": "streamName = \"cisco_ise\" AND messageType = \"auth_failure\"",
"client_set_id": 100001,
"server_set_id": 100005,
"product_id": 100
},
{
"id": 171,
"description": "Varonis DatAdvantage Detection",
"criteria": "streamName = \"varonis inc._datadvantage\" AND severityCode < 5",
"client_set_id": 46001,
"server_set_id": 46005,
"product_id": 46
},
{
"id": 172,
"description": "Centrify Detection",
"criteria": "streamName = \"centrify\" AND severityCode < 5",
"client_set_id": 47001,
"server_set_id": 47005,
"product_id": 47
},
{
"id": 173,
"description": "Centrify Detection",
"criteria": "streamName = \"centrify\" AND severityLabel = \"High\"",
"client_set_id": 47001,
"server_set_id": 47005,
"product_id": 47
},
{
"id": 174,
"description": "Centrify Detection",
"criteria": "streamName = \"centrify\" AND action = \"block\"",
"client_set_id": 47001,
"server_set_id": 47005,
"product_id": 47
},
{
"id": 175,
"description": "Centrify Detection",
"criteria": "streamName = \"centrify\" AND messageType = \"auth_failure\"",
"client_set_id": 47001,
"server_set_id": 47005,
"product_id": 47
},
{
"id": 176,
"description": "Netscaler Detection",
"criteria": "streamName = \"netscaler\" AND severityCode < 5",
"client_set_id": 70001,
"server_set_id": 70005,
"product_id": 70
},
{
"id": 177,
"description": "Netscaler Detection",
"criteria": "streamName = \"netscaler\" AND severityLabel = \"High\"",
"client_set_id": 70001,
"server_set_id": 70005,
"product_id": 70
},
{
"id": 178,
"description": "Netscaler Detection",
"criteria": "streamName = \"netscaler\" AND action = \"block\"",
"client_set_id": 70001,
"server_set_id": 70005,
"product_id": 70
},
{
"id": 179,
"description": "Netscaler Detection",
"criteria": "streamName = \"netscaler\" AND messageType = \"auth_failure\"",
"client_set_id": 70001,
"server_set_id": 70005,
"product_id": 70
},
{
"id": 180,
"description": "F5 ASM Detection",
"criteria": "streamName = \"f5_asm\" AND severityCode < 5",
"client_set_id": 48001,
"server_set_id": 48005,
"product_id": 48
},
{
"id": 181,
"description": "F5 Detection",
"criteria": "streamName = \"f5\" AND severityCode < 5",
"client_set_id": 48001,
"server_set_id": 48005,
"product_id": 48
},
{
"id": 182,
"description": "Imperva SecureSphere Detection",
"criteria": "streamName = \"imperva_secure_sphere\" AND severityLabel = \"High\"",
"client_set_id": 49001,
"server_set_id": 49005,
"product_id": 49
},
{
"id": 183,
"description": "Imperva SecureSphere Detection",
"criteria": "streamName = \"imperva_secure_sphere\" AND severityCode < 5",
"client_set_id": 49001,
"server_set_id": 49005,
"product_id": 49
},
{
"id": 184,
"description": "Secret Server Detection",
"criteria": "streamName = \"thycotic software_secret server\" AND severityCode < 5",
"client_set_id": 50001,
"server_set_id": 50005,
"product_id": 50
},
{
"id": 185,
"description": "McAfee Web Gateway Detection",
"criteria": "streamName = \"mcafee_web_gateway\" AND severityCode < 5",
"client_set_id": 51024,
"server_set_id": 51022,
"product_id": 51
},
{
"id": 186,
"description": "Cylance Protect Detection",
"criteria": "streamName = \"Cylance MALWARE Detection\"",
"client_set_id": 52001,
"server_set_id": 52005,
"product_id": 52
},
{
"id": 187,
"description": "Cylance Protect Detection",
"criteria": "streamName = \"Cylance Detection\"",
"client_set_id": 52001,
"server_set_id": 52005,
"product_id": 52
},
{
"id": 188,
"description": "Wazuh Detection",
"criteria": "streamName = \"wazuh inc._wazuh\" AND severityCode < 5",
"client_set_id": 54001,
"server_set_id": 54005,
"product_id": 54
},
{
"id": 189,
"description": "Nokia NetGuard Detection",
"criteria": "streamName = \"nokia_netguard\" AND severityLabel = \"high\"",
"client_set_id": 55001,
"server_set_id": 55005,
"product_id": 55
},
{
"id": 190,
"description": "Sophos Detection",
"criteria": "streamName = \"Sophos Detection\" AND severityCode < 5",
"client_set_id": 56001,
"server_set_id": 56005,
"product_id": 56
},
{
"id": 191,
"description": "MS ATA Detection",
"criteria": "streamName = \"microsoft_ata\"",
"client_set_id": 57001,
"server_set_id": 57005,
"product_id": 57
},
{
"id": 192,
"description": "McAfee ePO Detection",
"criteria": "streamName = \"mcafee_epo\" AND severityCode < 3 AND messageType != \"software_update_event\"",
"client_set_id": 58001,
"server_set_id": 58005,
"product_id": 58
},
{
"id": 193,
"description": "pfSense Firewall Block",
"criteria": "streamName = \"pf_sense_firewall\" AND action = \"block\"",
"client_set_id": 81001,
"server_set_id": 81005,
"product_id": 81
},
{
"id": 194,
"description": "SonicWall Firewall Block",
"criteria": "streamName = \"sonic_wall_firewall\" AND action = \"block\"",
"client_set_id": 82001,
"server_set_id": 82005,
"product_id": 82
},
{
"id": 195,
"description": "SonicWall Firewall Closed with 0 Bytes",
"criteria": "streamName = \"sonicwall_nsa 3600\" AND messageType = \"Connection Closed\" AND serverBytes < 1",
"client_set_id": 82001,
"server_set_id": 82005,
"product_id": 82
},
{
"id": 196,
"description": "SonicWall Firewall Closed with 0 Bytes",
"criteria": "streamName = \"sonic_wall_firewall\" AND messageType = \"Connection Closed\" AND serverBytes < 1",
"client_set_id": 82001,
"server_set_id": 82005,
"product_id": 82
},
{
"id": 197,
"description": "SonicWall High Severity",
"criteria": "streamName = \"dell_nsa 250 m\" AND severityCode < 5",
"client_set_id": 82001,
"server_set_id": 82005,
"product_id": 82
},
{
"id": 198,
"description": "SpamTitan Block",
"criteria": "streamName = \"spam_titan\" AND action = \"block\" ",
"client_set_id": 84023,
"server_set_id": 84015,
"product_id": 84
},
{
"id": 199,
"description": "Fail2Ban Ban",
"criteria": "streamName = \"fail2ban\" AND action = \"block\" ",
"client_set_id": 91001,
"server_set_id": 91005,
"product_id": 91
},
{
"id": 200,
"description": "AWS VPC Reject",
"criteria": "streamName = \"aws_vpc_flow_log\" AND action = \"REJECT\"",
"client_set_id": 92001,
"server_set_id": 92005,
"product_id": 92
},
{
"id": 201,
"description": "AWS VPC Reject",
"criteria": "streamName = \"aws_vpc_flow_log\" AND action = \"block\"",
"client_set_id": 92001,
"server_set_id": 92005,
"product_id": 92
},
{
"id": 202,
"description": "Azure Security Alert",
"criteria": "streamName = \"azure_security_alert\" AND severityCode < 5",
"client_set_id": 94001,
"server_set_id": 94005,
"product_id": 94
},
{
"id": 203,
"description": "Microsoft ATA Alert",
"criteria": "streamName = \"microsoft_ata\"",
"client_set_id": 94001,
"server_set_id": 94005,
"product_id": 94
},
{
"id": 204,
"description": "Unify Security Gateway Alert",
"criteria": "streamName = \"unifi_security_gateway\" AND severityCode < 5",
"client_set_id": 95001,
"server_set_id": 95005,
"product_id": 95
},
{
"id": 205,
"description": "Deep Instinct Alarm",
"criteria": "streamName = \"deep instinct_d-appliance\" AND severityCode < 5",
"client_set_id": 96001,
"server_set_id": 96005,
"product_id": 96
},
{
"id": 206,
"description": "UFW Firewall Block",
"criteria": "streamName = \"ufw\" AND action = \"block\"",
"client_set_id": 99001,
"server_set_id": 99005,
"product_id": 99
},
{
"id": 207,
"description": "Shibboleth Authentication Failure",
"criteria": "streamName = \"shibboleth\" AND messageType = \"auth_failure\"",
"client_set_id": 102001,
"server_set_id": 102005,
"product_id": 102
},
{
"id": 208,
"description": "AT&T Arris Gateway Firewall Block",
"criteria": "streamName = \"att_arris_gateway\" AND action = \"block\"",
"client_set_id": 103001,
"server_set_id": 103005,
"product_id": 103
},
{
"id": 209,
"description": "Cisco OS Suspicious Network Activity",
"criteria": "streamName = \"cisco_os\" AND messageType = \"suspicious_network\"",
"client_set_id": 104001,
"server_set_id": 104005,
"product_id": 105
},
{
"id": 210,
"description": "Cisco OS Detection",
"criteria": "streamName = \"cisco_os\" AND severityCode < 5",
"client_set_id": 105001,
"server_set_id": 105005,
"product_id": 105
},
{
"id": 211,
"description": "Cisco OS Detection",
"criteria": "streamName = \"cisco_os\" AND severityLabel = \"High\"",
"client_set_id": 105001,
"server_set_id": 105005,
"product_id": 105
},
{
"id": 212,
"description": "Cisco OS Detection",
"criteria": "streamName = \"cisco_os\" AND action = \"block\"",
"client_set_id": 105001,
"server_set_id": 105005,
"product_id": 105
},
{
"id": 213,
"description": "Cisco Wireless Detection",
"criteria": "streamName = \"cisco_os\" AND messageType = \"auth_failure\"",
"client_set_id": 105001,
"server_set_id": 105005,
"product_id": 105
},
{
"id": 214,
"description": "McAfee NSP Detection",
"criteria": "streamName = \"mcafee_nsp\" AND severityCode < 5",
"client_set_id": 106001,
"server_set_id": 106005,
"product_id": 106
},
{
"id": 215,
"description": "McAfee NSP Detection",
"criteria": "streamName = \"mcafee_nsp\" AND severityLabel = \"High\"",
"client_set_id": 106001,
"server_set_id": 106005,
"product_id": 106
},
{
"id": 216,
"description": "McAfee NSP Detection",
"criteria": "streamName = \"mcafee_nsp\" AND action = \"block\"",
"client_set_id": 106001,
"server_set_id": 106005,
"product_id": 106
},
{
"id": 217,
"description": "McAfee NSP Detection",
"criteria": "streamName = \"mcafee_nsp\" AND messageType = \"auth_failure\"",
"client_set_id": 106001,
"server_set_id": 106005,
"product_id": 106
},
{
"id": 218,
"description": "Pulse Secure Detection",
"criteria": "streamName = \"pulse_secure\" AND severityCode < 5",
"client_set_id": 107001,
"server_set_id": 107005,
"product_id": 107
},
{
"id": 219,
"description": "Pulse Secure Detection",
"criteria": "streamName = \"pulse_secure\" AND severityLabel = \"High\"",
"client_set_id": 107001,
"server_set_id": 107005,
"product_id": 107
},
{
"id": 220,
"description": "Pulse Secure Detection",
"criteria": "streamName = \"pulse_secure\" AND action = \"block\"",
"client_set_id": 107001,
"server_set_id": 107005,
"product_id": 107
},
{
"id": 221,
"description": "Pulse Secure Detection",
"criteria": "streamName = \"pulse_secure\" AND messageType = \"auth_failure\"",
"client_set_id": 107001,
"server_set_id": 107005,
"product_id": 107
},
{
"id": 222,
"description": "Beyond Trust Detection",
"criteria": "streamName = \"beyond_trust\" AND severityCode < 5",
"client_set_id": 108001,
"server_set_id": 108005,
"product_id": 108
},
{
"id": 223,
"description": "Beyond Trust Detection",
"criteria": "streamName = \"beyond_trust\" AND severityLabel = \"High\"",
"client_set_id": 108001,
"server_set_id": 108005,
"product_id": 108
},
{
"id": 224,
"description": "Beyond Trust Detection",
"criteria": "streamName = \"beyond_trust\" AND action = \"block\"",
"client_set_id": 108001,
"server_set_id": 108005,
"product_id": 108
},
{
"id": 225,
"description": "Beyond Trust Detection",
"criteria": "streamName = \"beyond_trust\" AND messageType = \"auth_failure\"",
"client_set_id": 108001,
"server_set_id": 108005,
"product_id": 108
},
{
"id": 226,
"description": "Cisco WSA Detection",
"criteria": "streamName = \"cisco_wsa\" AND severityCode < 5",
"client_set_id": 109001,
"server_set_id": 109005,
"product_id": 109
},
{
"id": 227,
"description": "Cisco WSA Detection",
"criteria": "streamName = \"cisco_wsa\" AND severityLabel = \"High\"",
"client_set_id": 109001,
"server_set_id": 109005,
"product_id": 109
},
{
"id": 228,
"description": "Cisco WSA Detection",
"criteria": "streamName = \"cisco_wsa\" AND action = \"block\"",
"client_set_id": 109001,
"server_set_id": 109005,
"product_id": 109
},
{
"id": 229,
"description": "Cisco WSA Detection",
"criteria": "streamName = \"cisco_wsa\" AND messageType = \"auth_failure\"",
"client_set_id": 109001,
"server_set_id": 109005,
"product_id": 109
},
{
"id": 230,
"description": "Kernel Martian Source Detection",
"criteria": "streamName = \"kernel\" AND tags CONTAINS \"EVENT:martian_source\"",
"client_set_id": 110001,
"server_set_id": 110005,
"product_id": 110
},
{
"id": 231,
"description": "Cisco ACS Auth Failure",
"criteria": "streamName = \"cisco_acs\" AND messageType = \"auth_failure\"",
"client_set_id": 111001,
"server_set_id": 111005,
"product_id": 111
},
{
"id": 232,
"description": "Blocked Action",
"criteria": "action = \"block\"",
"client_set_id": 1,
"server_set_id": 5,
"product_id": 0
},
{
"id": 233,
"description": "Authentication Failure",
"criteria": "messageType = \"auth_failure\"",
"client_set_id": 1,
"server_set_id": 5,
"product_id": 0
},
{
"id": 234,
"description": "Exploit Attempt",
"criteria": "messageType = \"exploit_attempt\"",
"client_set_id": 1,
"server_set_id": 5,
"product_id": 0
},
{
"id": 235,
"description": "Privilege Escalation",
"criteria": "messageType = \"privilege_escalation\"",
"client_set_id": 1,
"server_set_id": 5,
"product_id": 0
},
{
"id": 236,
"description": "Credential Access",
"criteria": "messageType = \"credential_access\"",
"client_set_id": 1,
"server_set_id": 5,
"product_id": 0
},
{
"id": 237,
"description": "Malicious Session",
"criteria": "messageType = \"malicious_session\"",
"client_set_id": 1,
"server_set_id": 5,
"product_id": 0
},
{
"id": 238,
"description": "Defense Evasion",
"criteria": "messageType = \"defense_evasion\"",
"client_set_id": 1,
"server_set_id": 5,
"product_id": 0
},
{
"id": 239,
"description": "Service Discovery",
"criteria": "messageType = \"service_discovery\"",
"client_set_id": 1,
"server_set_id": 5,
"product_id": 0
},
{
"id": 240,
"description": "Malicious Behavior",
"criteria": "messageType = \"malicious_behavior\"",
"client_set_id": 5,
"server_set_id": 1,
"product_id": 0
},
{
"id": 241,
"description": "Command and Control",
"criteria": "messageType = \"botnet_connection\"",
"client_set_id": 9,
"server_set_id": 8,
"product_id": 0
},
{
"id": 242,
"description": "Data Staging",
"criteria": "messageType = \"data_staging\"",
"client_set_id": 2,
"server_set_id": 6,
"product_id": 0
},
{
"id": 243,
"description": "Data Exfiltration",
"criteria": "messageType = \"data_exfiltration\"",
"client_set_id": 3,
"server_set_id": 7,
"product_id": 0
},
{
"id": 244,
"description": "Phishing Email",
"criteria": "messageType = \"phishing_email\"",
"client_set_id": 5,
"server_set_id": 23,
"product_id": 0
},
{
"id": 245,
"description": "Phishing Click",
"criteria": "messageType = \"phishing_click\"",
"client_set_id": 5,
"server_set_id": 23,
"product_id": 0
},
{
"id": 246,
"description": "Policy Violation",
"criteria": "messageType = \"prohibited_connection\"",
"client_set_id": 24,
"server_set_id": 22,
"product_id": 0
},
{
"id": 247,
"description": "Ransomware Download",
"criteria": "messageType = \"ransomware_download\"",
"client_set_id": 19,
"server_set_id": 26,
"product_id": 0
},
{
"id": 248,
"description": "Ransomware Encryption",
"criteria": "messageType = \"ransomware_encryption\"",
"client_set_id": 19,
"server_set_id": 26,
"product_id": 0
},
{
"id": 249,
"description": "Service Disruption",
"criteria": "messageType = \"service_disruption\"",
"client_set_id": 13,
"server_set_id": 14,
"product_id": 0
},
{
"id": 250,
"description": "IDS Event",
"criteria": "messageType = \"ids_event\" AND severityCode < 5",
"client_set_id": 5,
"server_set_id": 1,
"product_id": 0
},
{
"id": 251,
"description": "Content Filter",
"criteria": "messageType = \"content_filter\"",
"client_set_id": 24,
"server_set_id": 22,
"product_id": 0
},
{
"id": 252,
"description": "Anomalous Behavior",
"criteria": "messageType = \"anomalous_behavior\"",
"client_set_id": 5,
"server_set_id": 1,
"product_id": 0
},
{
"id": 253,
"description": "Degraded Hardware Detected",
"criteria": "messageType = \"degraded_hardware\"",
"client_set_id": 33,
"server_set_id": 58,
"product_id": 0
},
{
"id": 254,
"description": "Degraded Service Detected",
"criteria": "messageType = \"degraded_service\"",
"client_set_id": 35,
"server_set_id": 58,
"product_id": 0
},
{
"id": 255,
"description": "Financial Anomaly",
"criteria": "messageType = \"financial_anomaly\"",
"client_set_id": 60,
"server_set_id": 61,
"product_id": 0
},
{
"id": 256,
"description": "Financial Exploit",
"criteria": "messageType = \"financial_exploit\"",
"client_set_id": 60,
"server_set_id": 61,
"product_id": 0
},
{
"id": 257,
"description": "Infrastructure Exploit",
"criteria": "messageType = \"infrastructure_exploit\"",
"client_set_id": 70,
"server_set_id": 71,
"product_id": 0
},
{
"id": 258,
"description": "Blacklisted Process",
"criteria": "tags CONTAINS \"Blacklist process found\"",
"client_set_id": 1,
"server_set_id": 5,
"product_id": 0
},
{
"id": 259,
"description": "Infocyte Detection",
"criteria": "streamName = \"infocyte_hunt\"",
"client_set_id": 1,
"server_set_id": 5,
"product_id": 0
},
{
"id": 260,
"description": "Malicious Software Detected",
"criteria": "messageType = \"malicious_software\"",
"client_set_id": 1,
"server_set_id": 5,
"product_id": 0
},
{
"id": 261,
"description": "Data Destruction",
"criteria": "messageType = \"data_destruction\"",
"client_set_id": 13,
"server_set_id": 14,
"product_id": 0
}
],
"sets": {
"1": "Exploiting Host",
"2": "Staging Host",
"3": "Exfiltration Host",
"4": "Suspicious User",
"5": "Exploiting Target",
"6": "Staging Target",
"7": "Exfiltration Target",
"8": "C2 Server",
"9": "Bot",
"10": "Malicious File",
"11": "Reconnaissance Host",
"12": "Reconnaissance Target",
"13": "Disruption Host",
"14": "Disruption Target",
"20": "Disrupted Service",
"15": "Phishing Site",
"16": "Phished User",
"23": "Phished Host",
"17": "Phishing Email",
"18": "Ransomware Malware",
"19": "Ransomware Target",
"26": "Ransomware Source",
"25": "Ransomware User",
"21": "Policy Violation User",
"22": "Policy Violation Target",
"24": "Policy Violation Host",
"30": "Malicious Email",
"32": "Degraded Hardware",
"33": "Degraded Hardware Host",
"34": "Degraded Service",
"35": "Degraded Service Host",
"36": "Degraded Service User",
"37": "Degraded Service File",
"38": "Degraded Hardware User",
"39": "Degraded Hardware File",
"40": "Exploited Service",
"41": "Exploited Hardware",
"42": "Staging Service",
"43": "Staging Hardware",
"44": "Exfiltration Service",
"45": "Exfiltration Hardware",
"46": "Botnet Service",
"47": "Botnet Hardware",
"48": "Recon Service",
"49": "Recon Hardware",
"50": "Disruption Service",
"51": "Disruption Hardware",
"52": "Phishing Service",
"53": "Phishing Hardware",
"54": "Ransomware Service",
"55": "Ransomware Hardware",
"56": "Policy Violation Service",
"57": "Policy Violation Hardware",
"58": "Degraded Service Server",
"60": "Financial Exploit Target",
"61": "Financial Exploiting Host",
"62": "Financial Exploiting File",
"63": "Financial Exploiting User",
"64": "Financial Exploiting Hardware",
"65": "Financial Exploiting Service",
"66": "Financial Account",
"70": "SCADA Exploit Target",
"71": "SCADA Exploiting Host",
"72": "SCADA Exploiting File",
"73": "SCADA Exploiting User",
"74": "SCADA Exploiting Hardware",
"75": "SCADA Exploiting Service",
"200": "General",
"201": "Exploiting Host",
"202": "Staging Host",
"203": "Exploiting Host",
"204": "Suspicious User",
"205": "Exploiting Target",
"206": "Staging Target",
"207": "Exfiltration Target",
"208": "C2 Server",
"209": "Bot",
"210": "Malicious File",
"301": "Internal Host",
"302": "External Host",
"303": "Server",
"304": "Web Server",
"305": "Email Server",
"306": "Backup Server",
"307": "Wireless Host",
"308": "Network Scanner",
"309": "Business Critical Host",
"310": "Host with Business Critical User",
"311": "Infrastructure Device",
"312": "Mobile Host",
"313": "Laptop Host",
"314": "SCADA Device",
"315": "IoT Device",
"316": "Virtual Machine",
"317": "Cloud Host",
"318": "Contractor Host",
"319": "Host with Sensitive Data",
"320": "Host with Sensitive PII Data",
"321": "Host with Sensitive Card Data",
"322": "Host with Sensitive Proprietary Data",
"323": "Host is Joined to Domain",
"324": "Business Critical User ",
"325": "SysAdmin User ",
"326": "Employee User ",
"327": "Contractor User ",
"328": "System Account User "
}
}