| { |
| "products": { |
| "1": { |
| "name": "Stealthwatch", |
| "vendor": "Cisco", |
| "streams": [ |
| "Stealthwatch High Concern Index", |
| "Stealthwatch Suspect Data Hoarding Alarm", |
| "Stealthwatch Suspect Data Hoarding", |
| "Stealthwatch Suspect Data Loss", |
| "Stealthwatch Suspect Quiet Long Flow", |
| "stealth_watch", |
| "lancope_stealthwatch" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "2": { |
| "name": "QRadar", |
| "vendor": "IBM", |
| "streams": [ |
| "QRadar Offense" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "3": { |
| "name": "Advanced Malware Protection (AMP)", |
| "vendor": "Cisco", |
| "streams": [ |
| "AMP Detection", |
| "AMP Ransomware", |
| "AMP Event", |
| "AMP Asset Inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "5": { |
| "name": "Carbon Black Protect/Defend", |
| "vendor": "Carbon Black", |
| "streams": [ |
| "CarbonBlack Protect Detection", |
| "CarbonBlack Ransomware Detection", |
| "CarbonBlack Respond Detection", |
| "bit9", |
| "carbonblack_cbdefense_syslog_connector", |
| "carbonblack_analytics" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "6": { |
| "name": "Precinct", |
| "vendor": "WitFoo", |
| "streams": [ |
| "WitFoo Precinct" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "nist800171", |
| "csf", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "7": { |
| "name": "Falcon", |
| "vendor": "Crowdstrike", |
| "streams": [ |
| "Crowdstrike Detection", |
| "Crowdstrike Ransomware Detection", |
| "crowdstrike_falcon", |
| "Crowdstrike Asset Inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "8": { |
| "name": "Symantec Endpoint Protection", |
| "vendor": "Symantec", |
| "streams": [ |
| "symantec_sep", |
| "symantec_sep_ransomware", |
| "symantec antivirus", |
| "symantec endpoint protection client" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "9": { |
| "name": "Firepower", |
| "vendor": "Cisco", |
| "streams": [ |
| "estreamer", |
| "firepower", |
| "cisco_firepower", |
| "sfims" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "10": { |
| "name": "STIX/Taxii", |
| "vendor": "Taxii", |
| "streams": [], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "17": { |
| "name": "ASA Firewall", |
| "vendor": "Cisco", |
| "streams": [ |
| "cisco_asa_deny", |
| "cisco_asa" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "18": { |
| "name": "Windows Logs", |
| "vendor": "Microsoft", |
| "streams": [ |
| "microsoft_windows_security_audit", |
| "windows_security_audit", |
| "windows_sysmon", |
| "windows_task_scheduler" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "19": { |
| "name": "Websense", |
| "vendor": "Websense", |
| "streams": [ |
| "websense" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "20": { |
| "name": "PAN NGFW", |
| "vendor": "Palo Alto", |
| "streams": [ |
| "pan_firewall", |
| "palo alto networks_pan-os" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "21": { |
| "name": "Checkpoint FW", |
| "vendor": "Checkpoint", |
| "streams": [ |
| "checkpoint_firewall", |
| "checkpoint_smart1", |
| "check point_vpn-1 & firewall-1", |
| "check point_smartdefense", |
| "check point_log update", |
| "check point_security gateway/management", |
| "check point_syslog" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "22": { |
| "name": "Tippingpoint IPS", |
| "vendor": "Tippingpoint", |
| "streams": [ |
| "tippingpoint_block" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "23": { |
| "name": "FireEye Email Security (EX Series)", |
| "vendor": "FireEye", |
| "streams": [ |
| "fireeye_emps" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "sco2" |
| ] |
| }, |
| "24": { |
| "name": "TrapX", |
| "vendor": "TrapX", |
| "streams": [ |
| "trapx_tsoc" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "25": { |
| "name": "InfoBlox", |
| "vendor": "InfoBlox", |
| "streams": [ |
| "infoblox_nios" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "26": { |
| "name": "Meraki", |
| "vendor": "Cisco", |
| "streams": [ |
| "meraki", |
| "meraki_flow", |
| "meraki_firewall", |
| "meraki_l7_firewall", |
| "meraki_vpn" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "27": { |
| "name": "N-Central", |
| "vendor": "Solarwinds", |
| "streams": [ |
| "NCentral Detection" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "28": { |
| "name": "Suricata IDS", |
| "vendor": "Suricata", |
| "streams": [ |
| "suricata" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "29": { |
| "name": "Radware Appwall", |
| "vendor": "Radware", |
| "streams": [ |
| "radware_waf" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "30": { |
| "name": "Trend Deep Security", |
| "vendor": "Trend Micro", |
| "streams": [ |
| "trend micro_deep security agent", |
| "trend micro_deep discovery inspector" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "31": { |
| "name": "zScaler NSS", |
| "vendor": "zScaler", |
| "streams": [ |
| "zscaler_nssweblog" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "32": { |
| "name": "Protect", |
| "vendor": "ProofPoint", |
| "streams": [ |
| "proofpoint_protect", |
| "proofpoint" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "sco2" |
| ] |
| }, |
| "33": { |
| "name": "Mist Wireless", |
| "vendor": "Mist", |
| "streams": [ |
| "mist" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "34": { |
| "name": "Cisco Ironport", |
| "vendor": "Cisco", |
| "streams": [ |
| "cisco_ironport" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "sco2" |
| ] |
| }, |
| "35": { |
| "name": "Cybereason", |
| "vendor": "Cybereason", |
| "streams": [ |
| "Cybereason CNC Detection", |
| "Cybereason RANSOMWARE Detection", |
| "Cybereason KNOWN_MALWARE Detection", |
| "Cybereason MALICIOUS_PROCESS Detection", |
| "Cybereason PROCESS_INJECTION Detection" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "36": { |
| "name": "Fortigate", |
| "vendor": "Fortinet", |
| "streams": [ |
| "fortigate", |
| "fortinet_fortigate" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "37": { |
| "name": "Cognito", |
| "vendor": "Vectra Networks", |
| "streams": [ |
| "vectra networks_x series" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "38": { |
| "name": "Umbrella", |
| "vendor": "Cisco", |
| "streams": [ |
| "OpenDNS Detection", |
| "Umbrella Asset Inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "39": { |
| "name": "OSSEC", |
| "vendor": "OSSEC", |
| "streams": [ |
| "ossec" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "40": { |
| "name": "Malwarebytes Anti-Malware", |
| "vendor": "Malwarebytes", |
| "streams": [ |
| "malwarebytes_mbmc" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "41": { |
| "name": "Cisco Threat Response", |
| "vendor": "Cisco", |
| "streams": [], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "42": { |
| "name": "Vulnerability Management", |
| "vendor": "Qualys", |
| "streams": [ |
| "Qualys Vulnerability" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "43": { |
| "name": "Windows Active Directory", |
| "vendor": "Microsoft", |
| "streams": [ |
| "Microsoft-Windows-Security-Auditing", |
| "UserManagement", |
| "microsoft_windows_security_audit", |
| "microsoft-windows-security-auditing" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "44": { |
| "name": "Symantec Data Loss Prevention", |
| "vendor": "Symantec", |
| "streams": [ |
| "symantec_dlp" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "45": { |
| "name": "BRO IDS", |
| "vendor": "BRO IDS", |
| "streams": [ |
| "bro" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "46": { |
| "name": "DatAdvantage", |
| "vendor": "Varonis", |
| "streams": [ |
| "varonis inc._datadvantage" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "47": { |
| "name": "Centrify", |
| "vendor": "Centrify", |
| "streams": [ |
| "centrify" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "48": { |
| "name": "ASM", |
| "vendor": "F5", |
| "streams": [ |
| "f5_asm", |
| "f5" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "49": { |
| "name": "SecureSphere", |
| "vendor": "Imperva", |
| "streams": [ |
| "imperva_secure_sphere" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "50": { |
| "name": "Secret Server", |
| "vendor": "Thycotic", |
| "streams": [ |
| "thycotic software_secret server" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "51": { |
| "name": "McAfee Web Gateway", |
| "vendor": "McAfee", |
| "streams": [ |
| "mcafee_web_gateway" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "52": { |
| "name": "Cylance Protect", |
| "vendor": "Cylance", |
| "streams": [ |
| "Cylance MALWARE Detection", |
| "Cylance TRUSTED Detection", |
| "Cylance PUP Detection", |
| "Cylance Asset Inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "53": { |
| "name": "Threatmetrix", |
| "vendor": "Threatmetrix", |
| "streams": [], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "54": { |
| "name": "Wazuh", |
| "vendor": "Wazuh", |
| "streams": [ |
| "wazuh inc._wazuh" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "55": { |
| "name": "NetGuard", |
| "vendor": "Nokia", |
| "streams": [ |
| "nokia_netguard" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "56": { |
| "name": "Sophos Central", |
| "vendor": "Sophos", |
| "streams": [ |
| "Sophos Detection" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "57": { |
| "name": "Advanced Threat Analytics", |
| "vendor": "Microsoft", |
| "streams": [ |
| "microsoft_ata" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "58": { |
| "name": "McAfee ePolicy Orchestrator", |
| "vendor": "McAfee", |
| "streams": [ |
| "mcafee_epo" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "59": { |
| "name": "Cisco Wireless", |
| "vendor": "Cisco", |
| "streams": [ |
| "cisco_wireless_lan_controller" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "60": { |
| "name": "Juniper FW", |
| "vendor": "Juniper", |
| "streams": [ |
| "juniper_srx" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "61": { |
| "name": "Barracuda WAF", |
| "vendor": "Barracuda", |
| "streams": [ |
| "barracuda_waf" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "62": { |
| "name": "Apache Web Server", |
| "vendor": "Apache", |
| "streams": [ |
| "apache_access_log" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "63": { |
| "name": "Cloudwatch", |
| "vendor": "Amazon Web Services", |
| "streams": [], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "64": { |
| "name": "Cloudtrail", |
| "vendor": "Amazon Web Services", |
| "streams": [], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "65": { |
| "name": "Guard Duty", |
| "vendor": "Amazon Web Services", |
| "streams": [ |
| "aws_guard_duty_findings" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "66": { |
| "name": "Security Manager", |
| "vendor": "Ericsson", |
| "streams": [ |
| "ericsson_security_manager" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "67": { |
| "name": "Gin Access Log", |
| "vendor": "Gin", |
| "streams": [], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "68": { |
| "name": "Mojo Wireless", |
| "vendor": "Mojo", |
| "streams": [ |
| "mojo_wireless" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "69": { |
| "name": "NameD", |
| "vendor": "Linux", |
| "streams": [ |
| "named" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "70": { |
| "name": "Netscaler", |
| "vendor": "Citrix", |
| "streams": [ |
| "netscaler" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "71": { |
| "name": "Netscout", |
| "vendor": "Netscout", |
| "streams": [], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "72": { |
| "name": "POSTFIX", |
| "vendor": "POSTFIX", |
| "streams": [], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "73": { |
| "name": "SSHD", |
| "vendor": "Linux", |
| "streams": [], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "74": { |
| "name": "DHCP", |
| "vendor": "Microsoft", |
| "streams": [], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "75": { |
| "name": "Secure Cloud", |
| "vendor": "Zix", |
| "streams": [ |
| "zix_email" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "sco2" |
| ] |
| }, |
| "76": { |
| "name": "Gigamon GigaVUE", |
| "vendor": "Gigamon", |
| "streams": [ |
| "gigamon_gigavue" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "77": { |
| "name": "NetFlow v5, v7, v9", |
| "vendor": "Multiple", |
| "streams": [], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "78": { |
| "name": "IPFIX", |
| "vendor": "Multiple", |
| "streams": [], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "79": { |
| "name": "Common Event Format (CEF)", |
| "vendor": "Multiple", |
| "streams": [], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "80": { |
| "name": "Log Event Extended Format (LEEF)", |
| "vendor": "Multiple", |
| "streams": [], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "81": { |
| "name": "pfSense Firewall", |
| "vendor": "pfSense", |
| "streams": [ |
| "pf_sense_firewall" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "82": { |
| "name": "SonicWall Firewall", |
| "vendor": "SonicWall", |
| "streams": [ |
| "sonic_wall_firewall", |
| "sonicwall_nsa 3600" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "83": { |
| "name": "Senhasegura PAM", |
| "vendor": "Senhasegura", |
| "streams": [ |
| "senhasegura_pam" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "84": { |
| "name": "SpamTitan", |
| "vendor": "Titan", |
| "streams": [ |
| "spam_titan" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "sco2" |
| ] |
| }, |
| "85": { |
| "name": "WitFoo IOC Feed", |
| "vendor": "WitFoo", |
| "streams": [], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "86": { |
| "name": "FireEye Network Security (NX Series)", |
| "vendor": "FireEye", |
| "streams": [ |
| "fireeye_mps" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "87": { |
| "name": "FireEye Endpoint Security (HX Series)", |
| "vendor": "FireEye", |
| "streams": [ |
| "fireeye_hx" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "88": { |
| "name": "FireEye Malware Analysis (AX Series)", |
| "vendor": "FireEye", |
| "streams": [ |
| "fireeye_mas" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "89": { |
| "name": "FireEye File Protect (FX Series)", |
| "vendor": "FireEye", |
| "streams": [ |
| "fireeye_fmps" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "90": { |
| "name": "FireEye Central Management (CM Series)", |
| "vendor": "FireEye", |
| "streams": [ |
| "fireeye_cms" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "91": { |
| "name": "fail2ban", |
| "vendor": "Linux", |
| "streams": [ |
| "fail2ban" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "92": { |
| "name": "AWS VPC Security", |
| "vendor": "Amazon Web Services", |
| "streams": [ |
| "aws_vpc_flow_log" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "93": { |
| "name": "AWS Instance Backup", |
| "vendor": "Amazon Web Services", |
| "streams": [ |
| "aws_cloudtrail_events" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "94": { |
| "name": "Azure Security", |
| "vendor": "Microsoft", |
| "streams": [ |
| "azure_security_alert", |
| "microsoft_ata", |
| "Microsoft Graph Asset Inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "95": { |
| "name": "Unify Security Gateway", |
| "vendor": "Ubiquity", |
| "streams": [ |
| "unifi_security_gateway" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "96": { |
| "name": "Advanced Endpoint Security", |
| "vendor": "Deep Instinct", |
| "streams": [ |
| "deep instinct_d-appliance", |
| "deepinstinct", |
| "Deep Instinct Asset Inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "97": { |
| "name": "Roqos Core", |
| "vendor": "Roqos", |
| "streams": [ |
| "roqos" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "98": { |
| "name": "HPE Nimble", |
| "vendor": "HPE", |
| "streams": [ |
| "hpe_nimble" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "99": { |
| "name": "Uncomplicated Firewall (UFW)", |
| "vendor": "linux", |
| "streams": [ |
| "ufw" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "100": { |
| "name": "Cisco ISE", |
| "vendor": "Cisco", |
| "streams": [ |
| "cisco_ise" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "101": { |
| "name": "Tufin SecureTrack", |
| "vendor": "Tufin", |
| "streams": [ |
| "tufin_st_policy" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "102": { |
| "name": "Shibboleth IDP", |
| "vendor": "Shibboleth", |
| "streams": [ |
| "shibboleth" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "103": { |
| "name": "AT&T Arris Gateway", |
| "vendor": "AT&T", |
| "streams": [ |
| "att_arris_gateway" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "104": { |
| "name": "VMWare VCenter", |
| "vendor": "VMWare", |
| "streams": [ |
| "vcenter" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "105": { |
| "name": "Cisco Network Operating System", |
| "vendor": "Cisco", |
| "streams": [ |
| "cisco_os" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "106": { |
| "name": "McAfee Network Security", |
| "vendor": "McAfee", |
| "streams": [ |
| "mcafee_nsp" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "107": { |
| "name": "Pulse Secure", |
| "vendor": "Pulse", |
| "streams": [ |
| "pulse_secure" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nst800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "108": { |
| "name": "Beyond Trust", |
| "vendor": "Beyond Trust", |
| "streams": [ |
| "beyond_trust", |
| "beyond_trust_ad_bridge" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "109": { |
| "name": "Web Security Appliance (WSA)", |
| "vendor": "Cisco", |
| "streams": [ |
| "cisco_wsa" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "110": { |
| "name": "Kernel", |
| "vendor": "linux", |
| "streams": [ |
| "kernel" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "111": { |
| "name": "Access Control Server (ACS)", |
| "vendor": "Cisco", |
| "streams": [ |
| "cisco_acs" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "112": { |
| "name": "Mediant Media Gateway", |
| "vendor": "AudioCodes", |
| "streams": [ |
| "audiocodes_mediant" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "113": { |
| "name": "Auditd Logs", |
| "vendor": "Linux", |
| "streams": [ |
| "auditd_logs" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "114": { |
| "name": "Linux PAM", |
| "vendor": "Linux", |
| "streams": [ |
| "pam" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "115": { |
| "name": "HPE EFS", |
| "vendor": "HPE", |
| "streams": [ |
| "hpe_efs" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "116": { |
| "name": "System Security Services Daemon (sssd)", |
| "vendor": "SSSD Project", |
| "streams": [ |
| "sssd" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "117": { |
| "name": "Apache Tomcat", |
| "vendor": "Apache", |
| "streams": [ |
| "tomcat_log" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "118": { |
| "name": "HAProxy Load Balancer", |
| "vendor": "HAProxy", |
| "streams": [ |
| "haproxy" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "119": { |
| "name": "NXLog", |
| "vendor": "NXLog", |
| "streams": [], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "120": { |
| "name": "Akamai SIEM Integration", |
| "vendor": "Akamai", |
| "streams": [ |
| "akamai" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "121": { |
| "name": "JavaMelody", |
| "vendor": "JavaMelody Project", |
| "streams": [ |
| "javamelody" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "122": { |
| "name": "IBM i Powertech SIEM Agent", |
| "vendor": "IBM", |
| "streams": [ |
| "powertech_interact" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "123": { |
| "name": "VMWare NSX Firewall", |
| "vendor": "VMWare", |
| "streams": [ |
| "vmware_nsx_firewall" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "124": { |
| "name": "Netfilter ulogd", |
| "vendor": "linux", |
| "streams": [ |
| "netfilter_ulogd" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "125": { |
| "name": "OpenVPN", |
| "vendor": "OpenVPN", |
| "streams": [ |
| "openvpn" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "126": { |
| "name": "Tanium", |
| "vendor": "Tanium", |
| "streams": [ |
| "tanium", |
| "tanium_tanium application server", |
| "tanium_detect", |
| "tanium_signals" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "127": { |
| "name": "McAfee Endpoint Security", |
| "vendor": "McAfee", |
| "streams": [ |
| "mcafee_ens" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "128": { |
| "name": "Fortimail", |
| "vendor": "Fortinet", |
| "streams": [ |
| "fortimail" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "129": { |
| "name": "PRTG Network Monitor", |
| "vendor": "Paessler", |
| "streams": [ |
| "paessler_prtg" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "130": { |
| "name": "ESET Antivirus", |
| "vendor": "ESET", |
| "streams": [ |
| "eset_remoteadministrator", |
| "eset" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "131": { |
| "name": "Infocyte Hunt", |
| "vendor": "Infocyte", |
| "streams": [ |
| "infocyte", |
| "infocyte_hunt" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "132": { |
| "name": "Okta", |
| "vendor": "Okta", |
| "streams": [ |
| "Okta", |
| "Okta Asset Inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "133": { |
| "name": "SecureCircle", |
| "vendor": "SecureCircle", |
| "streams": [ |
| "securecircle" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "134": { |
| "name": "Mimecast", |
| "vendor": "Mimecast", |
| "streams": [ |
| "mimecast", |
| "Mimecast Asset Inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf" |
| ] |
| }, |
| "135": { |
| "name": "Cisco Meraki Firewall", |
| "vendor": "Cisco", |
| "streams": [ |
| "meraki_flow", |
| "meraki_firewall", |
| "meraki_l7_firewall", |
| "meraki_vpn" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "136": { |
| "name": "SentinelOne", |
| "vendor": "SentinelOne", |
| "streams": [ |
| "sentinelone", |
| "sentinelone_mgmt" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "144": { |
| "name": "Vulnerability Management", |
| "vendor": "Tenable", |
| "streams": [ |
| "tenable_vulnerability_management", |
| "tenable_vulnerability_management_asset_inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf" |
| ] |
| }, |
| "145": { |
| "name": "Noname Security", |
| "vendor": "Noname Security", |
| "streams": [ |
| "noname" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf" |
| ] |
| }, |
| "146": { |
| "name": "Automox", |
| "vendor": "Automox", |
| "streams": [ |
| "automox", |
| "automox_asset_inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "147": { |
| "name": "Actifio", |
| "vendor": "Actifio", |
| "streams": [ |
| "actifio", |
| "actifio_asset_inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf" |
| ] |
| }, |
| "148": { |
| "name": "Cubro Network Visibility", |
| "vendor": "Cubro", |
| "streams": [ |
| "cubro" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf" |
| ] |
| }, |
| "149": { |
| "name": "PIX Firewall", |
| "vendor": "Cisco", |
| "streams": [ |
| "cisco_pix_deny", |
| "cisco_pix" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf" |
| ] |
| }, |
| "150": { |
| "name": "ProxySG", |
| "vendor": "Symantec", |
| "streams": [ |
| "symantec_proxy_sg" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf" |
| ] |
| }, |
| "151": { |
| "name": "Cortex XDR", |
| "vendor": "Palo Alto", |
| "streams": [ |
| "Cortex Detection" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf" |
| ] |
| }, |
| "152": { |
| "name": "Barracuda CloudGen Firewall", |
| "vendor": "Barracuda", |
| "streams": [ |
| "barracuda_cloudgen" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf" |
| ] |
| }, |
| "153": { |
| "name": "CyberArk EPM", |
| "vendor": "CyberArk", |
| "streams": [ |
| "CyberArk EPM" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf" |
| ] |
| }, |
| "155": { |
| "name": "ManageEngine ADManager", |
| "vendor": "ManageEngine", |
| "streams": [ |
| "ad_audit_plus" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "156": { |
| "name": "VyOS", |
| "vendor": "VyOS", |
| "streams": [ |
| "vyos" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf" |
| ] |
| }, |
| "157": { |
| "name": "OPNsense Firewall", |
| "vendor": "OPNSense", |
| "streams": [ |
| "opnsense_audit", |
| "opnsense_status" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf" |
| ] |
| }, |
| "158": { |
| "name": "CyberArk Vault", |
| "vendor": "CyberArk", |
| "streams": [ |
| "cyber-ark_vault" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf" |
| ] |
| }, |
| "159": { |
| "name": "Barracuda ESS", |
| "vendor": "Barracuda", |
| "streams": [ |
| "barracuda_ess" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001" |
| ] |
| }, |
| "160": { |
| "name": "CASB", |
| "vendor": "ProofPoint", |
| "streams": [ |
| "proofpoint_casb" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001" |
| ] |
| }, |
| "161": { |
| "name": "Security Onion", |
| "vendor": "Security Onion Solutions, LLC", |
| "streams": [ |
| "Security Onion" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "nist800171", |
| "csf", |
| "csc8", |
| "pci40", |
| "iso27001" |
| ] |
| }, |
| "162": { |
| "name": "Stealthbits", |
| "vendor": "Netwrix", |
| "streams": [ |
| "stealthbits technologies llc_stealthbits activity monitor" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf" |
| ] |
| }, |
| "163": { |
| "name": "Taegis VDR", |
| "vendor": "Secureworks", |
| "streams": [ |
| "taegis" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001" |
| ] |
| }, |
| "164": { |
| "name": "Graph", |
| "vendor": "Microsoft", |
| "streams": [ |
| "Microsoft Graph Asset Inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "psi40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "165": { |
| "name": "Datto RMM", |
| "vendor": "Datto", |
| "streams": [ |
| "datto_network_manager_audit" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "166": { |
| "name": "Carson & Saint", |
| "vendor": "carson_saint", |
| "streams": [ |
| "carson_saint", |
| "carson_saint_asset_inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf" |
| ] |
| }, |
| "167": { |
| "name": "Duo", |
| "vendor": "Cisco", |
| "streams": [ |
| "DUO Detection", |
| "DUO Ransomware", |
| "DUO Event", |
| "DUO Asset Inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "168": { |
| "name": "Druva", |
| "vendor": "Druva", |
| "streams": [ |
| "druva" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf" |
| ] |
| }, |
| "169": { |
| "name": "AppRiver", |
| "vendor": "Zix", |
| "streams": [ |
| "zix_appriver" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "sco2" |
| ] |
| }, |
| "170": { |
| "name": "Netskope", |
| "vendor": "Netskope", |
| "streams": [ |
| "netskope", |
| "Netskope Asset Inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "171": { |
| "name": "LimaCharlie", |
| "vendor": "LimaCharlie", |
| "streams": [ |
| "limacharlie", |
| "LimaCharlie Asset Inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "soc2" |
| ] |
| }, |
| "172": { |
| "name": "Harmony Email", |
| "vendor": "Checkpoint", |
| "streams": [ |
| "checkpoint_harmony_email" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "csf", |
| "nist800171", |
| "csc8", |
| "pci40", |
| "iso27001", |
| "sco2" |
| ] |
| }, |
| "173": { |
| "name": "Splunk", |
| "vendor": "Splunk", |
| "streams": [ |
| "splunk", |
| "Splunk Asset Inventory" |
| ], |
| "frameworks": [ |
| "csc", |
| "cmmc1", |
| "cmmc3", |
| "pci32", |
| "nist80053", |
| "nist800171", |
| "csf", |
| "csc8", |
| "pci40", |
| "iso27001" |
| ] |
| } |
| }, |
| "stream_to_product": { |
| "stealthwatch high concern index": { |
| "product_id": 1, |
| "product_name": "Stealthwatch", |
| "vendor": "Cisco" |
| }, |
| "stealthwatch suspect data hoarding alarm": { |
| "product_id": 1, |
| "product_name": "Stealthwatch", |
| "vendor": "Cisco" |
| }, |
| "stealthwatch suspect data hoarding": { |
| "product_id": 1, |
| "product_name": "Stealthwatch", |
| "vendor": "Cisco" |
| }, |
| "stealthwatch suspect data loss": { |
| "product_id": 1, |
| "product_name": "Stealthwatch", |
| "vendor": "Cisco" |
| }, |
| "stealthwatch suspect quiet long flow": { |
| "product_id": 1, |
| "product_name": "Stealthwatch", |
| "vendor": "Cisco" |
| }, |
| "stealth_watch": { |
| "product_id": 1, |
| "product_name": "Stealthwatch", |
| "vendor": "Cisco" |
| }, |
| "lancope_stealthwatch": { |
| "product_id": 1, |
| "product_name": "Stealthwatch", |
| "vendor": "Cisco" |
| }, |
| "qradar offense": { |
| "product_id": 2, |
| "product_name": "QRadar", |
| "vendor": "IBM" |
| }, |
| "amp detection": { |
| "product_id": 3, |
| "product_name": "Advanced Malware Protection (AMP)", |
| "vendor": "Cisco" |
| }, |
| "amp ransomware": { |
| "product_id": 3, |
| "product_name": "Advanced Malware Protection (AMP)", |
| "vendor": "Cisco" |
| }, |
| "amp event": { |
| "product_id": 3, |
| "product_name": "Advanced Malware Protection (AMP)", |
| "vendor": "Cisco" |
| }, |
| "amp asset inventory": { |
| "product_id": 3, |
| "product_name": "Advanced Malware Protection (AMP)", |
| "vendor": "Cisco" |
| }, |
| "carbonblack protect detection": { |
| "product_id": 5, |
| "product_name": "Carbon Black Protect/Defend", |
| "vendor": "Carbon Black" |
| }, |
| "carbonblack ransomware detection": { |
| "product_id": 5, |
| "product_name": "Carbon Black Protect/Defend", |
| "vendor": "Carbon Black" |
| }, |
| "carbonblack respond detection": { |
| "product_id": 5, |
| "product_name": "Carbon Black Protect/Defend", |
| "vendor": "Carbon Black" |
| }, |
| "bit9": { |
| "product_id": 5, |
| "product_name": "Carbon Black Protect/Defend", |
| "vendor": "Carbon Black" |
| }, |
| "carbonblack_cbdefense_syslog_connector": { |
| "product_id": 5, |
| "product_name": "Carbon Black Protect/Defend", |
| "vendor": "Carbon Black" |
| }, |
| "carbonblack_analytics": { |
| "product_id": 5, |
| "product_name": "Carbon Black Protect/Defend", |
| "vendor": "Carbon Black" |
| }, |
| "witfoo precinct": { |
| "product_id": 6, |
| "product_name": "Precinct", |
| "vendor": "WitFoo" |
| }, |
| "crowdstrike detection": { |
| "product_id": 7, |
| "product_name": "Falcon", |
| "vendor": "Crowdstrike" |
| }, |
| "crowdstrike ransomware detection": { |
| "product_id": 7, |
| "product_name": "Falcon", |
| "vendor": "Crowdstrike" |
| }, |
| "crowdstrike_falcon": { |
| "product_id": 7, |
| "product_name": "Falcon", |
| "vendor": "Crowdstrike" |
| }, |
| "crowdstrike asset inventory": { |
| "product_id": 7, |
| "product_name": "Falcon", |
| "vendor": "Crowdstrike" |
| }, |
| "symantec_sep": { |
| "product_id": 8, |
| "product_name": "Symantec Endpoint Protection", |
| "vendor": "Symantec" |
| }, |
| "symantec_sep_ransomware": { |
| "product_id": 8, |
| "product_name": "Symantec Endpoint Protection", |
| "vendor": "Symantec" |
| }, |
| "symantec antivirus": { |
| "product_id": 8, |
| "product_name": "Symantec Endpoint Protection", |
| "vendor": "Symantec" |
| }, |
| "symantec endpoint protection client": { |
| "product_id": 8, |
| "product_name": "Symantec Endpoint Protection", |
| "vendor": "Symantec" |
| }, |
| "estreamer": { |
| "product_id": 9, |
| "product_name": "Firepower", |
| "vendor": "Cisco" |
| }, |
| "firepower": { |
| "product_id": 9, |
| "product_name": "Firepower", |
| "vendor": "Cisco" |
| }, |
| "cisco_firepower": { |
| "product_id": 9, |
| "product_name": "Firepower", |
| "vendor": "Cisco" |
| }, |
| "sfims": { |
| "product_id": 9, |
| "product_name": "Firepower", |
| "vendor": "Cisco" |
| }, |
| "cisco_asa_deny": { |
| "product_id": 17, |
| "product_name": "ASA Firewall", |
| "vendor": "Cisco" |
| }, |
| "cisco_asa": { |
| "product_id": 17, |
| "product_name": "ASA Firewall", |
| "vendor": "Cisco" |
| }, |
| "microsoft_windows_security_audit": { |
| "product_id": 43, |
| "product_name": "Windows Active Directory", |
| "vendor": "Microsoft" |
| }, |
| "windows_security_audit": { |
| "product_id": 18, |
| "product_name": "Windows Logs", |
| "vendor": "Microsoft" |
| }, |
| "windows_sysmon": { |
| "product_id": 18, |
| "product_name": "Windows Logs", |
| "vendor": "Microsoft" |
| }, |
| "windows_task_scheduler": { |
| "product_id": 18, |
| "product_name": "Windows Logs", |
| "vendor": "Microsoft" |
| }, |
| "websense": { |
| "product_id": 19, |
| "product_name": "Websense", |
| "vendor": "Websense" |
| }, |
| "pan_firewall": { |
| "product_id": 20, |
| "product_name": "PAN NGFW", |
| "vendor": "Palo Alto" |
| }, |
| "palo alto networks_pan-os": { |
| "product_id": 20, |
| "product_name": "PAN NGFW", |
| "vendor": "Palo Alto" |
| }, |
| "checkpoint_firewall": { |
| "product_id": 21, |
| "product_name": "Checkpoint FW", |
| "vendor": "Checkpoint" |
| }, |
| "checkpoint_smart1": { |
| "product_id": 21, |
| "product_name": "Checkpoint FW", |
| "vendor": "Checkpoint" |
| }, |
| "check point_vpn-1 & firewall-1": { |
| "product_id": 21, |
| "product_name": "Checkpoint FW", |
| "vendor": "Checkpoint" |
| }, |
| "check point_smartdefense": { |
| "product_id": 21, |
| "product_name": "Checkpoint FW", |
| "vendor": "Checkpoint" |
| }, |
| "check point_log update": { |
| "product_id": 21, |
| "product_name": "Checkpoint FW", |
| "vendor": "Checkpoint" |
| }, |
| "check point_security gateway/management": { |
| "product_id": 21, |
| "product_name": "Checkpoint FW", |
| "vendor": "Checkpoint" |
| }, |
| "check point_syslog": { |
| "product_id": 21, |
| "product_name": "Checkpoint FW", |
| "vendor": "Checkpoint" |
| }, |
| "tippingpoint_block": { |
| "product_id": 22, |
| "product_name": "Tippingpoint IPS", |
| "vendor": "Tippingpoint" |
| }, |
| "fireeye_emps": { |
| "product_id": 23, |
| "product_name": "FireEye Email Security (EX Series)", |
| "vendor": "FireEye" |
| }, |
| "trapx_tsoc": { |
| "product_id": 24, |
| "product_name": "TrapX", |
| "vendor": "TrapX" |
| }, |
| "infoblox_nios": { |
| "product_id": 25, |
| "product_name": "InfoBlox", |
| "vendor": "InfoBlox" |
| }, |
| "meraki": { |
| "product_id": 26, |
| "product_name": "Meraki", |
| "vendor": "Cisco" |
| }, |
| "meraki_flow": { |
| "product_id": 135, |
| "product_name": "Cisco Meraki Firewall", |
| "vendor": "Cisco" |
| }, |
| "meraki_firewall": { |
| "product_id": 135, |
| "product_name": "Cisco Meraki Firewall", |
| "vendor": "Cisco" |
| }, |
| "meraki_l7_firewall": { |
| "product_id": 135, |
| "product_name": "Cisco Meraki Firewall", |
| "vendor": "Cisco" |
| }, |
| "meraki_vpn": { |
| "product_id": 135, |
| "product_name": "Cisco Meraki Firewall", |
| "vendor": "Cisco" |
| }, |
| "ncentral detection": { |
| "product_id": 27, |
| "product_name": "N-Central", |
| "vendor": "Solarwinds" |
| }, |
| "suricata": { |
| "product_id": 28, |
| "product_name": "Suricata IDS", |
| "vendor": "Suricata" |
| }, |
| "radware_waf": { |
| "product_id": 29, |
| "product_name": "Radware Appwall", |
| "vendor": "Radware" |
| }, |
| "trend micro_deep security agent": { |
| "product_id": 30, |
| "product_name": "Trend Deep Security", |
| "vendor": "Trend Micro" |
| }, |
| "trend micro_deep discovery inspector": { |
| "product_id": 30, |
| "product_name": "Trend Deep Security", |
| "vendor": "Trend Micro" |
| }, |
| "zscaler_nssweblog": { |
| "product_id": 31, |
| "product_name": "zScaler NSS", |
| "vendor": "zScaler" |
| }, |
| "proofpoint_protect": { |
| "product_id": 32, |
| "product_name": "Protect", |
| "vendor": "ProofPoint" |
| }, |
| "proofpoint": { |
| "product_id": 32, |
| "product_name": "Protect", |
| "vendor": "ProofPoint" |
| }, |
| "mist": { |
| "product_id": 33, |
| "product_name": "Mist Wireless", |
| "vendor": "Mist" |
| }, |
| "cisco_ironport": { |
| "product_id": 34, |
| "product_name": "Cisco Ironport", |
| "vendor": "Cisco" |
| }, |
| "cybereason cnc detection": { |
| "product_id": 35, |
| "product_name": "Cybereason", |
| "vendor": "Cybereason" |
| }, |
| "cybereason ransomware detection": { |
| "product_id": 35, |
| "product_name": "Cybereason", |
| "vendor": "Cybereason" |
| }, |
| "cybereason known_malware detection": { |
| "product_id": 35, |
| "product_name": "Cybereason", |
| "vendor": "Cybereason" |
| }, |
| "cybereason malicious_process detection": { |
| "product_id": 35, |
| "product_name": "Cybereason", |
| "vendor": "Cybereason" |
| }, |
| "cybereason process_injection detection": { |
| "product_id": 35, |
| "product_name": "Cybereason", |
| "vendor": "Cybereason" |
| }, |
| "fortigate": { |
| "product_id": 36, |
| "product_name": "Fortigate", |
| "vendor": "Fortinet" |
| }, |
| "fortinet_fortigate": { |
| "product_id": 36, |
| "product_name": "Fortigate", |
| "vendor": "Fortinet" |
| }, |
| "vectra networks_x series": { |
| "product_id": 37, |
| "product_name": "Cognito", |
| "vendor": "Vectra Networks" |
| }, |
| "opendns detection": { |
| "product_id": 38, |
| "product_name": "Umbrella", |
| "vendor": "Cisco" |
| }, |
| "umbrella asset inventory": { |
| "product_id": 38, |
| "product_name": "Umbrella", |
| "vendor": "Cisco" |
| }, |
| "ossec": { |
| "product_id": 39, |
| "product_name": "OSSEC", |
| "vendor": "OSSEC" |
| }, |
| "malwarebytes_mbmc": { |
| "product_id": 40, |
| "product_name": "Malwarebytes Anti-Malware", |
| "vendor": "Malwarebytes" |
| }, |
| "qualys vulnerability": { |
| "product_id": 42, |
| "product_name": "Vulnerability Management", |
| "vendor": "Qualys" |
| }, |
| "microsoft-windows-security-auditing": { |
| "product_id": 43, |
| "product_name": "Windows Active Directory", |
| "vendor": "Microsoft" |
| }, |
| "usermanagement": { |
| "product_id": 43, |
| "product_name": "Windows Active Directory", |
| "vendor": "Microsoft" |
| }, |
| "symantec_dlp": { |
| "product_id": 44, |
| "product_name": "Symantec Data Loss Prevention", |
| "vendor": "Symantec" |
| }, |
| "bro": { |
| "product_id": 45, |
| "product_name": "BRO IDS", |
| "vendor": "BRO IDS" |
| }, |
| "varonis inc._datadvantage": { |
| "product_id": 46, |
| "product_name": "DatAdvantage", |
| "vendor": "Varonis" |
| }, |
| "centrify": { |
| "product_id": 47, |
| "product_name": "Centrify", |
| "vendor": "Centrify" |
| }, |
| "f5_asm": { |
| "product_id": 48, |
| "product_name": "ASM", |
| "vendor": "F5" |
| }, |
| "f5": { |
| "product_id": 48, |
| "product_name": "ASM", |
| "vendor": "F5" |
| }, |
| "imperva_secure_sphere": { |
| "product_id": 49, |
| "product_name": "SecureSphere", |
| "vendor": "Imperva" |
| }, |
| "thycotic software_secret server": { |
| "product_id": 50, |
| "product_name": "Secret Server", |
| "vendor": "Thycotic" |
| }, |
| "mcafee_web_gateway": { |
| "product_id": 51, |
| "product_name": "McAfee Web Gateway", |
| "vendor": "McAfee" |
| }, |
| "cylance malware detection": { |
| "product_id": 52, |
| "product_name": "Cylance Protect", |
| "vendor": "Cylance" |
| }, |
| "cylance trusted detection": { |
| "product_id": 52, |
| "product_name": "Cylance Protect", |
| "vendor": "Cylance" |
| }, |
| "cylance pup detection": { |
| "product_id": 52, |
| "product_name": "Cylance Protect", |
| "vendor": "Cylance" |
| }, |
| "cylance asset inventory": { |
| "product_id": 52, |
| "product_name": "Cylance Protect", |
| "vendor": "Cylance" |
| }, |
| "wazuh inc._wazuh": { |
| "product_id": 54, |
| "product_name": "Wazuh", |
| "vendor": "Wazuh" |
| }, |
| "nokia_netguard": { |
| "product_id": 55, |
| "product_name": "NetGuard", |
| "vendor": "Nokia" |
| }, |
| "sophos detection": { |
| "product_id": 56, |
| "product_name": "Sophos Central", |
| "vendor": "Sophos" |
| }, |
| "microsoft_ata": { |
| "product_id": 94, |
| "product_name": "Azure Security", |
| "vendor": "Microsoft" |
| }, |
| "mcafee_epo": { |
| "product_id": 58, |
| "product_name": "McAfee ePolicy Orchestrator", |
| "vendor": "McAfee" |
| }, |
| "cisco_wireless_lan_controller": { |
| "product_id": 59, |
| "product_name": "Cisco Wireless", |
| "vendor": "Cisco" |
| }, |
| "juniper_srx": { |
| "product_id": 60, |
| "product_name": "Juniper FW", |
| "vendor": "Juniper" |
| }, |
| "barracuda_waf": { |
| "product_id": 61, |
| "product_name": "Barracuda WAF", |
| "vendor": "Barracuda" |
| }, |
| "apache_access_log": { |
| "product_id": 62, |
| "product_name": "Apache Web Server", |
| "vendor": "Apache" |
| }, |
| "aws_guard_duty_findings": { |
| "product_id": 65, |
| "product_name": "Guard Duty", |
| "vendor": "Amazon Web Services" |
| }, |
| "ericsson_security_manager": { |
| "product_id": 66, |
| "product_name": "Security Manager", |
| "vendor": "Ericsson" |
| }, |
| "mojo_wireless": { |
| "product_id": 68, |
| "product_name": "Mojo Wireless", |
| "vendor": "Mojo" |
| }, |
| "named": { |
| "product_id": 69, |
| "product_name": "NameD", |
| "vendor": "Linux" |
| }, |
| "netscaler": { |
| "product_id": 70, |
| "product_name": "Netscaler", |
| "vendor": "Citrix" |
| }, |
| "zix_email": { |
| "product_id": 75, |
| "product_name": "Secure Cloud", |
| "vendor": "Zix" |
| }, |
| "gigamon_gigavue": { |
| "product_id": 76, |
| "product_name": "Gigamon GigaVUE", |
| "vendor": "Gigamon" |
| }, |
| "pf_sense_firewall": { |
| "product_id": 81, |
| "product_name": "pfSense Firewall", |
| "vendor": "pfSense" |
| }, |
| "sonic_wall_firewall": { |
| "product_id": 82, |
| "product_name": "SonicWall Firewall", |
| "vendor": "SonicWall" |
| }, |
| "sonicwall_nsa 3600": { |
| "product_id": 82, |
| "product_name": "SonicWall Firewall", |
| "vendor": "SonicWall" |
| }, |
| "senhasegura_pam": { |
| "product_id": 83, |
| "product_name": "Senhasegura PAM", |
| "vendor": "Senhasegura" |
| }, |
| "spam_titan": { |
| "product_id": 84, |
| "product_name": "SpamTitan", |
| "vendor": "Titan" |
| }, |
| "fireeye_mps": { |
| "product_id": 86, |
| "product_name": "FireEye Network Security (NX Series)", |
| "vendor": "FireEye" |
| }, |
| "fireeye_hx": { |
| "product_id": 87, |
| "product_name": "FireEye Endpoint Security (HX Series)", |
| "vendor": "FireEye" |
| }, |
| "fireeye_mas": { |
| "product_id": 88, |
| "product_name": "FireEye Malware Analysis (AX Series)", |
| "vendor": "FireEye" |
| }, |
| "fireeye_fmps": { |
| "product_id": 89, |
| "product_name": "FireEye File Protect (FX Series)", |
| "vendor": "FireEye" |
| }, |
| "fireeye_cms": { |
| "product_id": 90, |
| "product_name": "FireEye Central Management (CM Series)", |
| "vendor": "FireEye" |
| }, |
| "fail2ban": { |
| "product_id": 91, |
| "product_name": "fail2ban", |
| "vendor": "Linux" |
| }, |
| "aws_vpc_flow_log": { |
| "product_id": 92, |
| "product_name": "AWS VPC Security", |
| "vendor": "Amazon Web Services" |
| }, |
| "aws_cloudtrail_events": { |
| "product_id": 93, |
| "product_name": "AWS Instance Backup", |
| "vendor": "Amazon Web Services" |
| }, |
| "azure_security_alert": { |
| "product_id": 94, |
| "product_name": "Azure Security", |
| "vendor": "Microsoft" |
| }, |
| "microsoft graph asset inventory": { |
| "product_id": 164, |
| "product_name": "Graph", |
| "vendor": "Microsoft" |
| }, |
| "unifi_security_gateway": { |
| "product_id": 95, |
| "product_name": "Unify Security Gateway", |
| "vendor": "Ubiquity" |
| }, |
| "deep instinct_d-appliance": { |
| "product_id": 96, |
| "product_name": "Advanced Endpoint Security", |
| "vendor": "Deep Instinct" |
| }, |
| "deepinstinct": { |
| "product_id": 96, |
| "product_name": "Advanced Endpoint Security", |
| "vendor": "Deep Instinct" |
| }, |
| "deep instinct asset inventory": { |
| "product_id": 96, |
| "product_name": "Advanced Endpoint Security", |
| "vendor": "Deep Instinct" |
| }, |
| "roqos": { |
| "product_id": 97, |
| "product_name": "Roqos Core", |
| "vendor": "Roqos" |
| }, |
| "hpe_nimble": { |
| "product_id": 98, |
| "product_name": "HPE Nimble", |
| "vendor": "HPE" |
| }, |
| "ufw": { |
| "product_id": 99, |
| "product_name": "Uncomplicated Firewall (UFW)", |
| "vendor": "linux" |
| }, |
| "cisco_ise": { |
| "product_id": 100, |
| "product_name": "Cisco ISE", |
| "vendor": "Cisco" |
| }, |
| "tufin_st_policy": { |
| "product_id": 101, |
| "product_name": "Tufin SecureTrack", |
| "vendor": "Tufin" |
| }, |
| "shibboleth": { |
| "product_id": 102, |
| "product_name": "Shibboleth IDP", |
| "vendor": "Shibboleth" |
| }, |
| "att_arris_gateway": { |
| "product_id": 103, |
| "product_name": "AT&T Arris Gateway", |
| "vendor": "AT&T" |
| }, |
| "vcenter": { |
| "product_id": 104, |
| "product_name": "VMWare VCenter", |
| "vendor": "VMWare" |
| }, |
| "cisco_os": { |
| "product_id": 105, |
| "product_name": "Cisco Network Operating System", |
| "vendor": "Cisco" |
| }, |
| "mcafee_nsp": { |
| "product_id": 106, |
| "product_name": "McAfee Network Security", |
| "vendor": "McAfee" |
| }, |
| "pulse_secure": { |
| "product_id": 107, |
| "product_name": "Pulse Secure", |
| "vendor": "Pulse" |
| }, |
| "beyond_trust": { |
| "product_id": 108, |
| "product_name": "Beyond Trust", |
| "vendor": "Beyond Trust" |
| }, |
| "beyond_trust_ad_bridge": { |
| "product_id": 108, |
| "product_name": "Beyond Trust", |
| "vendor": "Beyond Trust" |
| }, |
| "cisco_wsa": { |
| "product_id": 109, |
| "product_name": "Web Security Appliance (WSA)", |
| "vendor": "Cisco" |
| }, |
| "kernel": { |
| "product_id": 110, |
| "product_name": "Kernel", |
| "vendor": "linux" |
| }, |
| "cisco_acs": { |
| "product_id": 111, |
| "product_name": "Access Control Server (ACS)", |
| "vendor": "Cisco" |
| }, |
| "audiocodes_mediant": { |
| "product_id": 112, |
| "product_name": "Mediant Media Gateway", |
| "vendor": "AudioCodes" |
| }, |
| "auditd_logs": { |
| "product_id": 113, |
| "product_name": "Auditd Logs", |
| "vendor": "Linux" |
| }, |
| "pam": { |
| "product_id": 114, |
| "product_name": "Linux PAM", |
| "vendor": "Linux" |
| }, |
| "hpe_efs": { |
| "product_id": 115, |
| "product_name": "HPE EFS", |
| "vendor": "HPE" |
| }, |
| "sssd": { |
| "product_id": 116, |
| "product_name": "System Security Services Daemon (sssd)", |
| "vendor": "SSSD Project" |
| }, |
| "tomcat_log": { |
| "product_id": 117, |
| "product_name": "Apache Tomcat", |
| "vendor": "Apache" |
| }, |
| "haproxy": { |
| "product_id": 118, |
| "product_name": "HAProxy Load Balancer", |
| "vendor": "HAProxy" |
| }, |
| "akamai": { |
| "product_id": 120, |
| "product_name": "Akamai SIEM Integration", |
| "vendor": "Akamai" |
| }, |
| "javamelody": { |
| "product_id": 121, |
| "product_name": "JavaMelody", |
| "vendor": "JavaMelody Project" |
| }, |
| "powertech_interact": { |
| "product_id": 122, |
| "product_name": "IBM i Powertech SIEM Agent", |
| "vendor": "IBM" |
| }, |
| "vmware_nsx_firewall": { |
| "product_id": 123, |
| "product_name": "VMWare NSX Firewall", |
| "vendor": "VMWare" |
| }, |
| "netfilter_ulogd": { |
| "product_id": 124, |
| "product_name": "Netfilter ulogd", |
| "vendor": "linux" |
| }, |
| "openvpn": { |
| "product_id": 125, |
| "product_name": "OpenVPN", |
| "vendor": "OpenVPN" |
| }, |
| "tanium": { |
| "product_id": 126, |
| "product_name": "Tanium", |
| "vendor": "Tanium" |
| }, |
| "tanium_tanium application server": { |
| "product_id": 126, |
| "product_name": "Tanium", |
| "vendor": "Tanium" |
| }, |
| "tanium_detect": { |
| "product_id": 126, |
| "product_name": "Tanium", |
| "vendor": "Tanium" |
| }, |
| "tanium_signals": { |
| "product_id": 126, |
| "product_name": "Tanium", |
| "vendor": "Tanium" |
| }, |
| "mcafee_ens": { |
| "product_id": 127, |
| "product_name": "McAfee Endpoint Security", |
| "vendor": "McAfee" |
| }, |
| "fortimail": { |
| "product_id": 128, |
| "product_name": "Fortimail", |
| "vendor": "Fortinet" |
| }, |
| "paessler_prtg": { |
| "product_id": 129, |
| "product_name": "PRTG Network Monitor", |
| "vendor": "Paessler" |
| }, |
| "eset_remoteadministrator": { |
| "product_id": 130, |
| "product_name": "ESET Antivirus", |
| "vendor": "ESET" |
| }, |
| "eset": { |
| "product_id": 130, |
| "product_name": "ESET Antivirus", |
| "vendor": "ESET" |
| }, |
| "infocyte": { |
| "product_id": 131, |
| "product_name": "Infocyte Hunt", |
| "vendor": "Infocyte" |
| }, |
| "infocyte_hunt": { |
| "product_id": 131, |
| "product_name": "Infocyte Hunt", |
| "vendor": "Infocyte" |
| }, |
| "okta": { |
| "product_id": 132, |
| "product_name": "Okta", |
| "vendor": "Okta" |
| }, |
| "okta asset inventory": { |
| "product_id": 132, |
| "product_name": "Okta", |
| "vendor": "Okta" |
| }, |
| "securecircle": { |
| "product_id": 133, |
| "product_name": "SecureCircle", |
| "vendor": "SecureCircle" |
| }, |
| "mimecast": { |
| "product_id": 134, |
| "product_name": "Mimecast", |
| "vendor": "Mimecast" |
| }, |
| "mimecast asset inventory": { |
| "product_id": 134, |
| "product_name": "Mimecast", |
| "vendor": "Mimecast" |
| }, |
| "sentinelone": { |
| "product_id": 136, |
| "product_name": "SentinelOne", |
| "vendor": "SentinelOne" |
| }, |
| "sentinelone_mgmt": { |
| "product_id": 136, |
| "product_name": "SentinelOne", |
| "vendor": "SentinelOne" |
| }, |
| "tenable_vulnerability_management": { |
| "product_id": 144, |
| "product_name": "Vulnerability Management", |
| "vendor": "Tenable" |
| }, |
| "tenable_vulnerability_management_asset_inventory": { |
| "product_id": 144, |
| "product_name": "Vulnerability Management", |
| "vendor": "Tenable" |
| }, |
| "noname": { |
| "product_id": 145, |
| "product_name": "Noname Security", |
| "vendor": "Noname Security" |
| }, |
| "automox": { |
| "product_id": 146, |
| "product_name": "Automox", |
| "vendor": "Automox" |
| }, |
| "automox_asset_inventory": { |
| "product_id": 146, |
| "product_name": "Automox", |
| "vendor": "Automox" |
| }, |
| "actifio": { |
| "product_id": 147, |
| "product_name": "Actifio", |
| "vendor": "Actifio" |
| }, |
| "actifio_asset_inventory": { |
| "product_id": 147, |
| "product_name": "Actifio", |
| "vendor": "Actifio" |
| }, |
| "cubro": { |
| "product_id": 148, |
| "product_name": "Cubro Network Visibility", |
| "vendor": "Cubro" |
| }, |
| "cisco_pix_deny": { |
| "product_id": 149, |
| "product_name": "PIX Firewall", |
| "vendor": "Cisco" |
| }, |
| "cisco_pix": { |
| "product_id": 149, |
| "product_name": "PIX Firewall", |
| "vendor": "Cisco" |
| }, |
| "symantec_proxy_sg": { |
| "product_id": 150, |
| "product_name": "ProxySG", |
| "vendor": "Symantec" |
| }, |
| "cortex detection": { |
| "product_id": 151, |
| "product_name": "Cortex XDR", |
| "vendor": "Palo Alto" |
| }, |
| "barracuda_cloudgen": { |
| "product_id": 152, |
| "product_name": "Barracuda CloudGen Firewall", |
| "vendor": "Barracuda" |
| }, |
| "cyberark epm": { |
| "product_id": 153, |
| "product_name": "CyberArk EPM", |
| "vendor": "CyberArk" |
| }, |
| "ad_audit_plus": { |
| "product_id": 155, |
| "product_name": "ManageEngine ADManager", |
| "vendor": "ManageEngine" |
| }, |
| "vyos": { |
| "product_id": 156, |
| "product_name": "VyOS", |
| "vendor": "VyOS" |
| }, |
| "opnsense_audit": { |
| "product_id": 157, |
| "product_name": "OPNsense Firewall", |
| "vendor": "OPNSense" |
| }, |
| "opnsense_status": { |
| "product_id": 157, |
| "product_name": "OPNsense Firewall", |
| "vendor": "OPNSense" |
| }, |
| "cyber-ark_vault": { |
| "product_id": 158, |
| "product_name": "CyberArk Vault", |
| "vendor": "CyberArk" |
| }, |
| "barracuda_ess": { |
| "product_id": 159, |
| "product_name": "Barracuda ESS", |
| "vendor": "Barracuda" |
| }, |
| "proofpoint_casb": { |
| "product_id": 160, |
| "product_name": "CASB", |
| "vendor": "ProofPoint" |
| }, |
| "security onion": { |
| "product_id": 161, |
| "product_name": "Security Onion", |
| "vendor": "Security Onion Solutions, LLC" |
| }, |
| "stealthbits technologies llc_stealthbits activity monitor": { |
| "product_id": 162, |
| "product_name": "Stealthbits", |
| "vendor": "Netwrix" |
| }, |
| "taegis": { |
| "product_id": 163, |
| "product_name": "Taegis VDR", |
| "vendor": "Secureworks" |
| }, |
| "datto_network_manager_audit": { |
| "product_id": 165, |
| "product_name": "Datto RMM", |
| "vendor": "Datto" |
| }, |
| "carson_saint": { |
| "product_id": 166, |
| "product_name": "Carson & Saint", |
| "vendor": "carson_saint" |
| }, |
| "carson_saint_asset_inventory": { |
| "product_id": 166, |
| "product_name": "Carson & Saint", |
| "vendor": "carson_saint" |
| }, |
| "duo detection": { |
| "product_id": 167, |
| "product_name": "Duo", |
| "vendor": "Cisco" |
| }, |
| "duo ransomware": { |
| "product_id": 167, |
| "product_name": "Duo", |
| "vendor": "Cisco" |
| }, |
| "duo event": { |
| "product_id": 167, |
| "product_name": "Duo", |
| "vendor": "Cisco" |
| }, |
| "duo asset inventory": { |
| "product_id": 167, |
| "product_name": "Duo", |
| "vendor": "Cisco" |
| }, |
| "druva": { |
| "product_id": 168, |
| "product_name": "Druva", |
| "vendor": "Druva" |
| }, |
| "zix_appriver": { |
| "product_id": 169, |
| "product_name": "AppRiver", |
| "vendor": "Zix" |
| }, |
| "netskope": { |
| "product_id": 170, |
| "product_name": "Netskope", |
| "vendor": "Netskope" |
| }, |
| "netskope asset inventory": { |
| "product_id": 170, |
| "product_name": "Netskope", |
| "vendor": "Netskope" |
| }, |
| "limacharlie": { |
| "product_id": 171, |
| "product_name": "LimaCharlie", |
| "vendor": "LimaCharlie" |
| }, |
| "limacharlie asset inventory": { |
| "product_id": 171, |
| "product_name": "LimaCharlie", |
| "vendor": "LimaCharlie" |
| }, |
| "checkpoint_harmony_email": { |
| "product_id": 172, |
| "product_name": "Harmony Email", |
| "vendor": "Checkpoint" |
| }, |
| "splunk": { |
| "product_id": 173, |
| "product_name": "Splunk", |
| "vendor": "Splunk" |
| }, |
| "splunk asset inventory": { |
| "product_id": 173, |
| "product_name": "Splunk", |
| "vendor": "Splunk" |
| } |
| }, |
| "lead_rules": [ |
| { |
| "id": 1, |
| "description": "Stealthwatch High Concern Index Alarm", |
| "criteria": "streamName = \"Stealthwatch High Concern Index\"", |
| "client_set_id": 1001, |
| "server_set_id": 1005, |
| "product_id": 1 |
| }, |
| { |
| "id": 2, |
| "description": "Stealthwatch Suspect Data Hoarding Alarm", |
| "criteria": "streamName = \"Stealthwatch Suspect Data Hoarding\"", |
| "client_set_id": 1002, |
| "server_set_id": 1006, |
| "product_id": 1 |
| }, |
| { |
| "id": 3, |
| "description": "Stealthwatch Suspect Data Loss Alarm", |
| "criteria": "streamName = \"Stealthwatch Suspect Data Loss\"", |
| "client_set_id": 1003, |
| "server_set_id": 1007, |
| "product_id": 1 |
| }, |
| { |
| "id": 4, |
| "description": "Stealthwatch Suspect Quient Long Flow", |
| "criteria": "streamName = \"Stealthwatch Suspect Quiet Long Flow\"", |
| "client_set_id": 1009, |
| "server_set_id": 1008, |
| "product_id": 1 |
| }, |
| { |
| "id": 5, |
| "description": "Stealthwatch High Concern Index Alarm", |
| "criteria": "streamName = \"stealth_watch\" AND ruleName = \"High Concern Index\"", |
| "client_set_id": 1001, |
| "server_set_id": 1005, |
| "product_id": 1 |
| }, |
| { |
| "id": 6, |
| "description": "Stealthwatch High Total Traffic Alarm", |
| "criteria": "streamName = \"stealth_watch\" AND ruleName = \"High Total Traffic\"", |
| "client_set_id": 1001, |
| "server_set_id": 1005, |
| "product_id": 1 |
| }, |
| { |
| "id": 7, |
| "description": "Stealthwatch Command & Control Alarm", |
| "criteria": "streamName = \"stealth_watch\" AND ruleName = \"Command & Control\"", |
| "client_set_id": 1001, |
| "server_set_id": 1005, |
| "product_id": 1 |
| }, |
| { |
| "id": 8, |
| "description": "QRadar Offense", |
| "criteria": "streamName = \"QRadar Offense\"", |
| "client_set_id": 2001, |
| "server_set_id": 2005, |
| "product_id": 2 |
| }, |
| { |
| "id": 9, |
| "description": "AMP Detection", |
| "criteria": "streamName = \"AMP Detection\"", |
| "client_set_id": 3005, |
| "server_set_id": 3001, |
| "product_id": 3 |
| }, |
| { |
| "id": 10, |
| "description": "AMP Ransomware Detection", |
| "criteria": "streamName = \"AMP Ransomware\"", |
| "client_set_id": 3019, |
| "server_set_id": 3026, |
| "product_id": 3 |
| }, |
| { |
| "id": 11, |
| "description": "FireEye NX Malware Detection", |
| "criteria": "streamName = \"fireeye_mps\" AND tags CONTAINS \"malware-object\"", |
| "client_set_id": 86001, |
| "server_set_id": 86005, |
| "product_id": 86 |
| }, |
| { |
| "id": 12, |
| "description": "FireEye NX Callback Detection", |
| "criteria": "streamName = \"fireeye_mps\" AND tags CONTAINS \"malware-callback\"", |
| "client_set_id": 86009, |
| "server_set_id": 86008, |
| "product_id": 86 |
| }, |
| { |
| "id": 13, |
| "description": "FireEye NX Web Infection Detection", |
| "criteria": "streamName = \"fireeye_mps\" AND tags CONTAINS \"web-infection\"", |
| "client_set_id": 86024, |
| "server_set_id": 86022, |
| "product_id": 86 |
| }, |
| { |
| "id": 14, |
| "description": "FireEye NX IPS Event", |
| "criteria": "streamName = \"fireeye_mps\" AND tags CONTAINS \"ips-event\"", |
| "client_set_id": 86001, |
| "server_set_id": 86005, |
| "product_id": 86 |
| }, |
| { |
| "id": 15, |
| "description": "FireEye HX Malware Detection", |
| "criteria": "streamName = \"fireeye_hx\" AND tags CONTAINS \"malware-object\"", |
| "client_set_id": 87005, |
| "server_set_id": 87001, |
| "product_id": 87 |
| }, |
| { |
| "id": 16, |
| "description": "FireEye HX Callback Detection", |
| "criteria": "streamName = \"fireeye_hx\" AND tags CONTAINS \"malware-callback\"", |
| "client_set_id": 87009, |
| "server_set_id": 87008, |
| "product_id": 87 |
| }, |
| { |
| "id": 17, |
| "description": "FireEye HX Web Infection Detection", |
| "criteria": "streamName = \"fireeye_hx\" AND tags CONTAINS \"web-infection\"", |
| "client_set_id": 87024, |
| "server_set_id": 87022, |
| "product_id": 87 |
| }, |
| { |
| "id": 18, |
| "description": "FireEye HX ExD Hit", |
| "criteria": "streamName = \"fireeye_hx\" AND tags CONTAINS \"ExD Hit Found\"", |
| "client_set_id": 87005, |
| "server_set_id": 87001, |
| "product_id": 87 |
| }, |
| { |
| "id": 19, |
| "description": "FireEye HX Malware Hit", |
| "criteria": "streamName = \"fireeye_hx\" AND tags CONTAINS \"Malware Hit Found\"", |
| "client_set_id": 87005, |
| "server_set_id": 87001, |
| "product_id": 87 |
| }, |
| { |
| "id": 20, |
| "description": "FireEye HX Infection Match", |
| "criteria": "streamName = \"fireeye_hx\" AND tags CONTAINS \"infection-match\"", |
| "client_set_id": 87005, |
| "server_set_id": 87001, |
| "product_id": 87 |
| }, |
| { |
| "id": 21, |
| "description": "FireEye HX Domain Match", |
| "criteria": "streamName = \"fireeye_hx\" AND tags CONTAINS \"domain-match\"", |
| "client_set_id": 87005, |
| "server_set_id": 87001, |
| "product_id": 87 |
| }, |
| { |
| "id": 22, |
| "description": "FireEye AX Detection", |
| "criteria": "streamName = \"fireeye_mas\" AND tags CONTAINS \"malware-object\"", |
| "client_set_id": 88005, |
| "server_set_id": 88001, |
| "product_id": 88 |
| }, |
| { |
| "id": 23, |
| "description": "FireEye FX Detection", |
| "criteria": "streamName = \"fireeye_fmps\" AND tags CONTAINS \"malware-object\"", |
| "client_set_id": 89005, |
| "server_set_id": 89001, |
| "product_id": 89 |
| }, |
| { |
| "id": 24, |
| "description": "FireEye CMS Detection", |
| "criteria": "streamName = \"fireeye_cms\" AND tags CONTAINS \"malware-object\"", |
| "client_set_id": 90005, |
| "server_set_id": 90001, |
| "product_id": 90 |
| }, |
| { |
| "id": 25, |
| "description": "FireEye CMS Callback Detection", |
| "criteria": "streamName = \"fireeye_cms\" AND tags CONTAINS \"malware-callback\"", |
| "client_set_id": 90009, |
| "server_set_id": 90008, |
| "product_id": 90 |
| }, |
| { |
| "id": 26, |
| "description": "FireEye CMS Web Infection Detection", |
| "criteria": "streamName = \"fireeye_cms\" AND tags CONTAINS \"web-infection\"", |
| "client_set_id": 90024, |
| "server_set_id": 90022, |
| "product_id": 90 |
| }, |
| { |
| "id": 27, |
| "description": "FireEye CMS IPS Event", |
| "criteria": "streamName = \"fireeye_cms\" AND tags CONTAINS \"ips-event\"", |
| "client_set_id": 90001, |
| "server_set_id": 90005, |
| "product_id": 90 |
| }, |
| { |
| "id": 28, |
| "description": "FireEye CMS Infection Match", |
| "criteria": "streamName = \"fireeye_cms\" AND tags CONTAINS \"infection-match\"", |
| "client_set_id": 90005, |
| "server_set_id": 90001, |
| "product_id": 90 |
| }, |
| { |
| "id": 29, |
| "description": "FireEye CMS Domain Match", |
| "criteria": "streamName = \"fireeye_cms\" AND tags CONTAINS \"domain-match\"", |
| "client_set_id": 90005, |
| "server_set_id": 90001, |
| "product_id": 90 |
| }, |
| { |
| "id": 30, |
| "description": "FireEye Email Security Alarm", |
| "criteria": "streamName = \"fireeye_emps\" AND tags CONTAINS \"malware-object\"", |
| "client_set_id": 23005, |
| "server_set_id": 23001, |
| "product_id": 23 |
| }, |
| { |
| "id": 31, |
| "description": "FireEye Email Security Ransomware Alarm", |
| "criteria": "streamName = \"fireeye_emps\" AND tags CONTAINS \"ransomware\"", |
| "client_set_id": 23019, |
| "server_set_id": 23026, |
| "product_id": 23 |
| }, |
| { |
| "id": 32, |
| "description": "CarbonBlack Protect Detection", |
| "criteria": "streamName = \"CarbonBlack Protect Detection\"", |
| "client_set_id": 5005, |
| "server_set_id": 5001, |
| "product_id": 5 |
| }, |
| { |
| "id": 33, |
| "description": "CarbonBlack Ransomware Detection", |
| "criteria": "streamName = \"CarbonBlack Ransomware Detection\"", |
| "client_set_id": 5019, |
| "server_set_id": 5026, |
| "product_id": 5 |
| }, |
| { |
| "id": 34, |
| "description": "CarbonBlack Respond Detection", |
| "criteria": "streamName = \"CarbonBlack Respond Detection\"", |
| "client_set_id": 5005, |
| "server_set_id": 5001, |
| "product_id": 5 |
| }, |
| { |
| "id": 35, |
| "description": "CarbonBlack Bit9 Detection", |
| "criteria": "streamName = \"bit9\" AND action LIKE \"%block%\"", |
| "client_set_id": 5005, |
| "server_set_id": 5001, |
| "product_id": 5 |
| }, |
| { |
| "id": 36, |
| "description": "CarbonBlack Defend Detection", |
| "criteria": "streamName = \"carbonblack_cbdefense_syslog_connector\" AND severityCode < 5", |
| "client_set_id": 5005, |
| "server_set_id": 5001, |
| "product_id": 5 |
| }, |
| { |
| "id": 37, |
| "description": "Crowdstrike Detection", |
| "criteria": "streamName = \"Crowdstrike Detection\"", |
| "client_set_id": 7005, |
| "server_set_id": 7001, |
| "product_id": 7 |
| }, |
| { |
| "id": 38, |
| "description": "Crowdstrike Ransomware Detection", |
| "criteria": "streamName = \"Crowdstrike Ransomware Detection\"", |
| "client_set_id": 7019, |
| "server_set_id": 7026, |
| "product_id": 7 |
| }, |
| { |
| "id": 39, |
| "description": "Crowdstrike Detection", |
| "criteria": "streamName = \"crowdstrike_falcon\" AND action = \"UserLogonFailed\"", |
| "client_set_id": 7005, |
| "server_set_id": 7001, |
| "product_id": 7 |
| }, |
| { |
| "id": 40, |
| "description": "Crowdstrike Detection", |
| "criteria": "streamName = \"crowdstrike_falcon\" AND action = \"ProcessBlocked\"", |
| "client_set_id": 7005, |
| "server_set_id": 7001, |
| "product_id": 7 |
| }, |
| { |
| "id": 41, |
| "description": "Crowdstrike Detection", |
| "criteria": "streamName = \"crowdstrike_falcon\" AND action = \"QuarantineActionResult\"", |
| "client_set_id": 7005, |
| "server_set_id": 7001, |
| "product_id": 7 |
| }, |
| { |
| "id": 42, |
| "description": "Cisco Wireless Detection", |
| "criteria": "streamName = \"cisco_wireless_lan_controller\" AND severityCode < 5", |
| "client_set_id": 59001, |
| "server_set_id": 59005, |
| "product_id": 59 |
| }, |
| { |
| "id": 43, |
| "description": "Cisco Wireless Detection", |
| "criteria": "streamName = \"cisco_wireless_lan_controller\" AND severityLabel = \"High\"", |
| "client_set_id": 59001, |
| "server_set_id": 59005, |
| "product_id": 59 |
| }, |
| { |
| "id": 44, |
| "description": "Cisco Wireless Detection", |
| "criteria": "streamName = \"cisco_wireless_lan_controller\" AND action = \"block\"", |
| "client_set_id": 59001, |
| "server_set_id": 59005, |
| "product_id": 59 |
| }, |
| { |
| "id": 45, |
| "description": "Cisco Wireless Detection", |
| "criteria": "streamName = \"cisco_wireless_lan_controller\" AND messageType = \"auth_failure\"", |
| "client_set_id": 59001, |
| "server_set_id": 59005, |
| "product_id": 59 |
| }, |
| { |
| "id": 46, |
| "description": "Cybereason CNC Detection", |
| "criteria": "streamName = \"Cybereason CNC Detection\"", |
| "client_set_id": 35009, |
| "server_set_id": 35008, |
| "product_id": 35 |
| }, |
| { |
| "id": 47, |
| "description": "Cybereason KNOWN_MALWARE Detection", |
| "criteria": "streamName = \"Cybereason KNOWN_MALWARE Detection\"", |
| "client_set_id": 35005, |
| "server_set_id": 35001, |
| "product_id": 35 |
| }, |
| { |
| "id": 48, |
| "description": "Cybereason MALICIOUS_PROCESS Detection", |
| "criteria": "streamName = \"Cybereason MALICIOUS_PROCESS Detection\"", |
| "client_set_id": 35005, |
| "server_set_id": 35001, |
| "product_id": 35 |
| }, |
| { |
| "id": 49, |
| "description": "Cybereason PROCESS_INJECTION Detection", |
| "criteria": "streamName = \"Cybereason PROCESS_INJECTION Detection\"", |
| "client_set_id": 35005, |
| "server_set_id": 35001, |
| "product_id": 35 |
| }, |
| { |
| "id": 50, |
| "description": "Cybereason RANSOMWARE Detection", |
| "criteria": "streamName = \"Cybereason RANSOMWARE Detection\"", |
| "client_set_id": 35019, |
| "server_set_id": 35026, |
| "product_id": 35 |
| }, |
| { |
| "id": 51, |
| "description": "Cybereason PHISHING Detection", |
| "criteria": "streamName = \"Cybereason PHISHING Detection\"", |
| "client_set_id": 35023, |
| "server_set_id": 35015, |
| "product_id": 35 |
| }, |
| { |
| "id": 52, |
| "description": "NCentral Detection", |
| "criteria": "streamName = \"NCentral Detection\"", |
| "client_set_id": 27005, |
| "server_set_id": 27001, |
| "product_id": 27 |
| }, |
| { |
| "id": 53, |
| "description": "Symantec Endpoint Protection Alarm", |
| "criteria": "streamName = \"symantec_sep\" AND severityCode < 5", |
| "client_set_id": 8001, |
| "server_set_id": 8005, |
| "product_id": 8 |
| }, |
| { |
| "id": 54, |
| "description": "Symantec Endpoint Protection Ransomware Alarm", |
| "criteria": "streamName = \"symantec_sep_ransomware\"", |
| "client_set_id": 8019, |
| "server_set_id": 8026, |
| "product_id": 8 |
| }, |
| { |
| "id": 55, |
| "description": "Symantec Endpoint Protection Alarm", |
| "criteria": "streamName = \"symantec antivirus\" AND severityCode < 5", |
| "client_set_id": 8001, |
| "server_set_id": 8005, |
| "product_id": 8 |
| }, |
| { |
| "id": 56, |
| "description": "Symantec Endpoint Protection Alarm", |
| "criteria": "streamName = \"symantec endpoint protection client\" AND severityCode < 5", |
| "client_set_id": 8001, |
| "server_set_id": 8005, |
| "product_id": 8 |
| }, |
| { |
| "id": 57, |
| "description": "Firepower Alarm", |
| "criteria": "streamName = \"estreamer\" AND severityCode < 5", |
| "client_set_id": 9001, |
| "server_set_id": 9005, |
| "product_id": 9 |
| }, |
| { |
| "id": 58, |
| "description": "ASA Deny", |
| "criteria": "streamName = \"cisco_asa\" AND action = \"deny\"", |
| "client_set_id": 17001, |
| "server_set_id": 17005, |
| "product_id": 17 |
| }, |
| { |
| "id": 59, |
| "description": "ASA Deny", |
| "criteria": "streamName = \"cisco_asa\" AND action = \"block\"", |
| "client_set_id": 17001, |
| "server_set_id": 17005, |
| "product_id": 17 |
| }, |
| { |
| "id": 60, |
| "description": "Websense Security Alarm", |
| "criteria": "streamName = \"websense\" AND severityCode < 5", |
| "client_set_id": 19001, |
| "server_set_id": 19005, |
| "product_id": 19 |
| }, |
| { |
| "id": 61, |
| "description": "Windows Security Alarm", |
| "criteria": "streamName = \"microsoft_windows_security_audit\" AND severityCode < 5", |
| "client_set_id": 18001, |
| "server_set_id": 18005, |
| "product_id": 18 |
| }, |
| { |
| "id": 62, |
| "description": "Windows Security Alarm", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND severityCode < 5", |
| "client_set_id": 18001, |
| "server_set_id": 18005, |
| "product_id": 18 |
| }, |
| { |
| "id": 63, |
| "description": "Palo Alto FW Alarm", |
| "criteria": "streamName = \"pan_firewall\" AND severityCode < 5", |
| "client_set_id": 20001, |
| "server_set_id": 20005, |
| "product_id": 20 |
| }, |
| { |
| "id": 64, |
| "description": "Palo Alto FW Alarm", |
| "criteria": "streamName = \"palo alto networks_pan-os\" AND severityCode < 5", |
| "client_set_id": 20001, |
| "server_set_id": 20005, |
| "product_id": 20 |
| }, |
| { |
| "id": 65, |
| "description": "Palo Alto FW Alarm", |
| "criteria": "streamName = \"pan_firewall\" AND action = \"block\"", |
| "client_set_id": 20001, |
| "server_set_id": 20005, |
| "product_id": 20 |
| }, |
| { |
| "id": 66, |
| "description": "Palo Alto FW Alarm", |
| "criteria": "streamName = \"palo alto networks_pan-os\" AND action = \"block\"", |
| "client_set_id": 20001, |
| "server_set_id": 20005, |
| "product_id": 20 |
| }, |
| { |
| "id": 67, |
| "description": "Palo Alto Threat Alarm", |
| "criteria": "streamName = \"palo alto networks_pan-os\" AND messageType = \"THREAT\" AND severityCode < 5", |
| "client_set_id": 20001, |
| "server_set_id": 20005, |
| "product_id": 20 |
| }, |
| { |
| "id": 68, |
| "description": "Palo Alto Threat Alarm", |
| "criteria": "streamName = \"palo alto networks_pan-os\" AND tags CONTAINS \"reason:threat\" AND severityCode < 5", |
| "client_set_id": 20001, |
| "server_set_id": 20005, |
| "product_id": 20 |
| }, |
| { |
| "id": 69, |
| "description": "Palo Alto FW Alarm", |
| "criteria": "streamName = \"pan_firewall\" AND action = \"deny\"", |
| "client_set_id": 20001, |
| "server_set_id": 20005, |
| "product_id": 20 |
| }, |
| { |
| "id": 70, |
| "description": "Palo Alto FW Alarm", |
| "criteria": "streamName = \"palo alto networks_pan-os\" AND action = \"deny\"", |
| "client_set_id": 20001, |
| "server_set_id": 20005, |
| "product_id": 20 |
| }, |
| { |
| "id": 71, |
| "description": "Checkpoint Alarm", |
| "criteria": "streamName LIKE \"checkpoint\" AND severityCode < 4", |
| "client_set_id": 21001, |
| "server_set_id": 21005, |
| "product_id": 21 |
| }, |
| { |
| "id": 72, |
| "description": "Checkpoint Drop Action", |
| "criteria": "streamName LIKE \"check point\" AND action = \"Drop\"", |
| "client_set_id": 21001, |
| "server_set_id": 21005, |
| "product_id": 21 |
| }, |
| { |
| "id": 73, |
| "description": "Checkpoint Alarm", |
| "criteria": "streamName LIKE \"check point\" AND severityCode < 4", |
| "client_set_id": 21001, |
| "server_set_id": 21005, |
| "product_id": 21 |
| }, |
| { |
| "id": 74, |
| "description": "Checkpoint Reject Action", |
| "criteria": "streamName LIKE \"check point\" AND action = \"Reject\"", |
| "client_set_id": 21001, |
| "server_set_id": 21005, |
| "product_id": 21 |
| }, |
| { |
| "id": 75, |
| "description": "Checkpoint Alarm", |
| "criteria": "streamName LIKE \"checkpoint\" AND severityCode < 4", |
| "client_set_id": 21001, |
| "server_set_id": 21005, |
| "product_id": 21 |
| }, |
| { |
| "id": 76, |
| "description": "Checkpoint Drop Action", |
| "criteria": "streamName LIKE \"check point\" AND action = \"block\"", |
| "client_set_id": 21001, |
| "server_set_id": 21005, |
| "product_id": 21 |
| }, |
| { |
| "id": 77, |
| "description": "Tippingpoint Block", |
| "criteria": "streamName = \"tippingpoint_block\"", |
| "client_set_id": 22001, |
| "server_set_id": 22005, |
| "product_id": 22 |
| }, |
| { |
| "id": 78, |
| "description": "TrapX TSOC Alarm", |
| "criteria": "streamName = \"trapx_tsoc\"", |
| "client_set_id": 24001, |
| "server_set_id": 24005, |
| "product_id": 24 |
| }, |
| { |
| "id": 79, |
| "description": "Infoblox NIOS Alarm", |
| "criteria": "streamName = \"infoblox_nios\"", |
| "client_set_id": 25001, |
| "server_set_id": 25005, |
| "product_id": 25 |
| }, |
| { |
| "id": 80, |
| "description": "Meraki IDS Alarm", |
| "criteria": "streamName = \"meraki\" AND messageType = \"ids\"", |
| "client_set_id": 26001, |
| "server_set_id": 26005, |
| "product_id": 26 |
| }, |
| { |
| "id": 81, |
| "description": "Meraki Deny Alarm", |
| "criteria": "streamName = \"meraki\" AND action = \"deny\"", |
| "client_set_id": 26001, |
| "server_set_id": 26005, |
| "product_id": 26 |
| }, |
| { |
| "id": 82, |
| "description": "Meraki Deny Alarm", |
| "criteria": "streamName = \"meraki\" AND action = \"block\"", |
| "client_set_id": 26001, |
| "server_set_id": 26005, |
| "product_id": 26 |
| }, |
| { |
| "id": 83, |
| "description": "Suricata IDS Alarm", |
| "criteria": "streamName = \"suricata\"", |
| "client_set_id": 28001, |
| "server_set_id": 28005, |
| "product_id": 28 |
| }, |
| { |
| "id": 84, |
| "description": "Radware Appwall Alarm", |
| "criteria": "streamName = \"radware_waf\"", |
| "client_set_id": 29001, |
| "server_set_id": 29005, |
| "product_id": 29 |
| }, |
| { |
| "id": 85, |
| "description": "Trend Micro Deep Security Alarm", |
| "criteria": "streamName = \"trend micro_deep security agent\" AND severityCode < 5", |
| "client_set_id": 30005, |
| "server_set_id": 30001, |
| "product_id": 30 |
| }, |
| { |
| "id": 86, |
| "description": "Trend Micro Deep Security Alarm", |
| "criteria": "streamName = \"trend micro_deep discovery inspector\" AND severityCode < 5", |
| "client_set_id": 30005, |
| "server_set_id": 30001, |
| "product_id": 30 |
| }, |
| { |
| "id": 87, |
| "description": "Trend Micro Deep Security Alarm", |
| "criteria": "streamName = \"trend micro_deep security manager\" AND severityCode < 5", |
| "client_set_id": 30005, |
| "server_set_id": 30001, |
| "product_id": 30 |
| }, |
| { |
| "id": 88, |
| "description": "zScaler NSS Block", |
| "criteria": "streamName = \"zscaler_nssweblog\" AND action = \"Blocked\"", |
| "client_set_id": 31001, |
| "server_set_id": 31005, |
| "product_id": 31 |
| }, |
| { |
| "id": 89, |
| "description": "zScaler NSS Block", |
| "criteria": "streamName = \"zscaler_nssweblog\" AND action = \"blocked\"", |
| "client_set_id": 31001, |
| "server_set_id": 31005, |
| "product_id": 31 |
| }, |
| { |
| "id": 90, |
| "description": "ZScaler Detection", |
| "criteria": "streamName = \"zscaler_nssweblog\" AND severityCode < 5", |
| "client_set_id": 31001, |
| "server_set_id": 31005, |
| "product_id": 31 |
| }, |
| { |
| "id": 91, |
| "description": "ZScaler Detection", |
| "criteria": "streamName = \"zscaler_nssweblog\" AND severityLabel = \"High\"", |
| "client_set_id": 31001, |
| "server_set_id": 31005, |
| "product_id": 31 |
| }, |
| { |
| "id": 92, |
| "description": "ZScaler Detection", |
| "criteria": "streamName = \"zscaler_nssweblog\" AND action = \"block\"", |
| "client_set_id": 31001, |
| "server_set_id": 31005, |
| "product_id": 31 |
| }, |
| { |
| "id": 93, |
| "description": "ZScaler Detection", |
| "criteria": "streamName = \"zscaler_nssweblog\" AND messageType = \"auth_failure\"", |
| "client_set_id": 31001, |
| "server_set_id": 31005, |
| "product_id": 31 |
| }, |
| { |
| "id": 94, |
| "description": "ProofPoint Protect Detection", |
| "criteria": "streamName = \"proofpoint_protect\"", |
| "client_set_id": 32023, |
| "server_set_id": 32015, |
| "product_id": 32 |
| }, |
| { |
| "id": 95, |
| "description": "Cisco Ironport Detection", |
| "criteria": "streamName = \"cisco_ironport\" AND severityCode < 5", |
| "client_set_id": 34023, |
| "server_set_id": 34015, |
| "product_id": 34 |
| }, |
| { |
| "id": 96, |
| "description": "Mist Wireless Service Disruption Detection", |
| "criteria": "streamName = \"mist\"", |
| "client_set_id": 33013, |
| "server_set_id": 33014, |
| "product_id": 33 |
| }, |
| { |
| "id": 97, |
| "description": "Fortinet Firewall Action Block", |
| "criteria": "streamName = \"fortigate\" AND messageType = \"firewall_action\" AND action = \"blocked\"", |
| "client_set_id": 36001, |
| "server_set_id": 36005, |
| "product_id": 36 |
| }, |
| { |
| "id": 98, |
| "description": "Fortinet Alert", |
| "criteria": "streamName = \"fortigate\" AND severityLabel = \"alert\"", |
| "client_set_id": 36001, |
| "server_set_id": 36005, |
| "product_id": 36 |
| }, |
| { |
| "id": 99, |
| "description": "Fortinet IDS Action Block", |
| "criteria": "streamName = \"fortigate\" AND messageType = \"ips_action\" AND action = \"blocked\"", |
| "client_set_id": 36001, |
| "server_set_id": 36005, |
| "product_id": 36 |
| }, |
| { |
| "id": 100, |
| "description": "Fortinet URL Filter Block", |
| "criteria": "streamName = \"fortigate\" AND messageType = \"waf_event\" AND action = \"blocked\"", |
| "client_set_id": 36024, |
| "server_set_id": 36022, |
| "product_id": 36 |
| }, |
| { |
| "id": 101, |
| "description": "Fortinet Firewall Action Block", |
| "criteria": "streamName = \"fortinet_fortigate\" AND action = \"blocked\"", |
| "client_set_id": 36001, |
| "server_set_id": 36005, |
| "product_id": 36 |
| }, |
| { |
| "id": 102, |
| "description": "Fortinet Firewall Action Block", |
| "criteria": "streamName = \"fortigate\" AND messageType = \"firewall_action\" AND action = \"server-rst\"", |
| "client_set_id": 36001, |
| "server_set_id": 36005, |
| "product_id": 36 |
| }, |
| { |
| "id": 103, |
| "description": "Fortinet Firewall Action Block", |
| "criteria": "streamName = \"fortinet_fortigate\" AND action = \"block\"", |
| "client_set_id": 36001, |
| "server_set_id": 36005, |
| "product_id": 36 |
| }, |
| { |
| "id": 104, |
| "description": "Vectra Cognito Alarm", |
| "criteria": "streamName = \"vectra networks_x series\" AND severityCode < 5", |
| "client_set_id": 37005, |
| "server_set_id": 37001, |
| "product_id": 37 |
| }, |
| { |
| "id": 105, |
| "description": "Umbrella Alarm", |
| "criteria": "streamName = \"OpenDNS Detection\"", |
| "client_set_id": 38005, |
| "server_set_id": 38001, |
| "product_id": 38 |
| }, |
| { |
| "id": 106, |
| "description": "OSSEC Auth Failure", |
| "criteria": "streamName = \"ossec\" AND messageType = \"auth_failure\"", |
| "client_set_id": 39001, |
| "server_set_id": 39005, |
| "product_id": 39 |
| }, |
| { |
| "id": 107, |
| "description": "MalwareBytes Anti-malware Alarm", |
| "criteria": "streamName = \"malwarebytes_mbmc\"", |
| "client_set_id": 40005, |
| "server_set_id": 40001, |
| "product_id": 40 |
| }, |
| { |
| "id": 108, |
| "description": "Web Application Access Denied (401)", |
| "criteria": "tags CONTAINS \"HTTP_RESPONSE_CODE:401\"", |
| "client_set_id": 6001, |
| "server_set_id": 6005, |
| "product_id": 6 |
| }, |
| { |
| "id": 109, |
| "description": "Web Application Access Denied (403)", |
| "criteria": "tags CONTAINS \"HTTP_RESPONSE_CODE:403\"", |
| "client_set_id": 6001, |
| "server_set_id": 6005, |
| "product_id": 6 |
| }, |
| { |
| "id": 110, |
| "description": "Web Application Error (500)", |
| "criteria": "tags CONTAINS \"HTTP_RESPONSE_CODE:500\"", |
| "client_set_id": 6001, |
| "server_set_id": 6005, |
| "product_id": 6 |
| }, |
| { |
| "id": 111, |
| "description": "Web Application Recon (404)", |
| "criteria": "tags CONTAINS \"HTTP_RESPONSE_CODE:404\"", |
| "client_set_id": 6001, |
| "server_set_id": 6005, |
| "product_id": 6 |
| }, |
| { |
| "id": 112, |
| "description": "Denial of Service Detected", |
| "criteria": "tags CONTAINS \"service_denial\"", |
| "client_set_id": 6013, |
| "server_set_id": 6014, |
| "product_id": 6 |
| }, |
| { |
| "id": 113, |
| "description": "Denial of Service Confirmed", |
| "criteria": "tags CONTAINS \"service_denial_confirmed\"", |
| "client_set_id": 6013, |
| "server_set_id": 6020, |
| "product_id": 6 |
| }, |
| { |
| "id": 114, |
| "description": "Policy Violation Detected", |
| "criteria": "tags CONTAINS \"policy_violation\"", |
| "client_set_id": 6024, |
| "server_set_id": 6022, |
| "product_id": 6 |
| }, |
| { |
| "id": 115, |
| "description": "Authentication Failure", |
| "criteria": "messageType = \"auth_failure\"", |
| "client_set_id": 6001, |
| "server_set_id": 6005, |
| "product_id": 6 |
| }, |
| { |
| "id": 116, |
| "description": "Data Upload > 10GB", |
| "criteria": "clientBytes > 10000000000", |
| "client_set_id": 6003, |
| "server_set_id": 6007, |
| "product_id": 6 |
| }, |
| { |
| "id": 117, |
| "description": "Data Download > 10GB", |
| "criteria": "serverBytes > 10000000000", |
| "client_set_id": 6002, |
| "server_set_id": 6006, |
| "product_id": 6 |
| }, |
| { |
| "id": 118, |
| "description": "Qualys Vulnerability", |
| "criteria": "streamName = \"Qualys Vulnerability\"", |
| "client_set_id": 0, |
| "server_set_id": 0, |
| "product_id": 42 |
| }, |
| { |
| "id": 119, |
| "description": "Windows Authentication", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\"", |
| "client_set_id": 0, |
| "server_set_id": 0, |
| "product_id": 43 |
| }, |
| { |
| "id": 120, |
| "description": "User Account Created", |
| "criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4720\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 121, |
| "description": "A member was added to a security-enabled global group", |
| "criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4728\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 122, |
| "description": "A member was added to a security-enabled local group", |
| "criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4732\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 123, |
| "description": "A member was added to a security-enabled universal group", |
| "criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4756\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 124, |
| "description": "A security-enabled local group was changed", |
| "criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4735\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 125, |
| "description": "The audit log was cleared", |
| "criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:1102\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 126, |
| "description": "A user account was locked out", |
| "criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4740\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 127, |
| "description": "Object permission was changed", |
| "criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4640\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 128, |
| "description": "Special privileges assigned to new logon", |
| "criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4672\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 129, |
| "description": "Windows Defender detected malware", |
| "criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:1116\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 130, |
| "description": "User Account Created", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4720\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 131, |
| "description": "A member was added to a security-enabled global group", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4728\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 132, |
| "description": "A member was added to a security-enabled local group", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4732\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 133, |
| "description": "A member was added to a security-enabled universal group", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4756\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 134, |
| "description": "A security-enabled local group was changed", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4735\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 135, |
| "description": "The audit log was cleared", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:1102\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 136, |
| "description": "A user account was locked out", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4740\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 137, |
| "description": "Object permission was changed", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4760\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 138, |
| "description": "Special privileges assigned to new logon", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4672\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 139, |
| "description": "Windows Defender detected malware", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:116\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 140, |
| "description": "Windows Failed Login Attempt", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4625\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 141, |
| "description": "Windows Failed Login Attempt", |
| "criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4625\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 142, |
| "description": "Windows Failed Login Attempt", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4673\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 143, |
| "description": "Windows Failed Login Attempt", |
| "criteria": "streamName = \"microsoft_windows_security_audit\" AND tags CONTAINS \"eventId:4673\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 144, |
| "description": "A member was added to a security-enabled global group", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4728\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 145, |
| "description": "A member was added to a security-enabled local group", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4732\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 146, |
| "description": "A member was added to a security-enabled universal group", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4756\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 147, |
| "description": "A security-enabled local group was changed", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4735\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 148, |
| "description": "The audit log was cleared", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:1102\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 149, |
| "description": "A user account was locked out", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4740\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 150, |
| "description": "Object permission was changed", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4760\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 151, |
| "description": "Special privileges assigned to new logon", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4672\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 152, |
| "description": "Windows Defender detected malware", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:116\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 153, |
| "description": "Windows Failed Login Attempt", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4625\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 154, |
| "description": "Windows Failed Login Attempt", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4673\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 155, |
| "description": "Windows Failed Login Attempt", |
| "criteria": "streamName = \"Microsoft-Windows-Security-Auditing\" AND tags CONTAINS \"eventId:4720\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 156, |
| "description": "User Account Created", |
| "criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4720\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 157, |
| "description": "A member was added to a security-enabled global group", |
| "criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4728\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 158, |
| "description": "A member was added to a security-enabled local group", |
| "criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4732\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 159, |
| "description": "A member was added to a security-enabled universal group", |
| "criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4756\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 160, |
| "description": "A security-enabled local group was changed", |
| "criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4735\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 161, |
| "description": "The audit log was cleared", |
| "criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:1102\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 162, |
| "description": "A user account was locked out", |
| "criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4740\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 163, |
| "description": "Object permission was changed", |
| "criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4640\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 164, |
| "description": "Special privileges assigned to new logon", |
| "criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4672\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 165, |
| "description": "Windows Defender detected malware", |
| "criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:1116\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 166, |
| "description": "Windows Failed Login Attempt", |
| "criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4625\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 167, |
| "description": "Windows Failed Login Attempt", |
| "criteria": "streamName = \"microsoft-windows-security-auditing\" AND tags CONTAINS \"eventId:4673\"", |
| "client_set_id": 43005, |
| "server_set_id": 43001, |
| "product_id": 43 |
| }, |
| { |
| "id": 168, |
| "description": "Symantec DLP Detection", |
| "criteria": "streamName = \"symantec_dlp\"", |
| "client_set_id": 44003, |
| "server_set_id": 44007, |
| "product_id": 44 |
| }, |
| { |
| "id": 169, |
| "description": "BRO IDS Detection", |
| "criteria": "streamName = \"bro\" AND severityCode < 5", |
| "client_set_id": 45001, |
| "server_set_id": 45005, |
| "product_id": 45 |
| }, |
| { |
| "id": 170, |
| "description": "Cisco ISE Authentication Failure", |
| "criteria": "streamName = \"cisco_ise\" AND messageType = \"auth_failure\"", |
| "client_set_id": 100001, |
| "server_set_id": 100005, |
| "product_id": 100 |
| }, |
| { |
| "id": 171, |
| "description": "Varonis DatAdvantage Detection", |
| "criteria": "streamName = \"varonis inc._datadvantage\" AND severityCode < 5", |
| "client_set_id": 46001, |
| "server_set_id": 46005, |
| "product_id": 46 |
| }, |
| { |
| "id": 172, |
| "description": "Centrify Detection", |
| "criteria": "streamName = \"centrify\" AND severityCode < 5", |
| "client_set_id": 47001, |
| "server_set_id": 47005, |
| "product_id": 47 |
| }, |
| { |
| "id": 173, |
| "description": "Centrify Detection", |
| "criteria": "streamName = \"centrify\" AND severityLabel = \"High\"", |
| "client_set_id": 47001, |
| "server_set_id": 47005, |
| "product_id": 47 |
| }, |
| { |
| "id": 174, |
| "description": "Centrify Detection", |
| "criteria": "streamName = \"centrify\" AND action = \"block\"", |
| "client_set_id": 47001, |
| "server_set_id": 47005, |
| "product_id": 47 |
| }, |
| { |
| "id": 175, |
| "description": "Centrify Detection", |
| "criteria": "streamName = \"centrify\" AND messageType = \"auth_failure\"", |
| "client_set_id": 47001, |
| "server_set_id": 47005, |
| "product_id": 47 |
| }, |
| { |
| "id": 176, |
| "description": "Netscaler Detection", |
| "criteria": "streamName = \"netscaler\" AND severityCode < 5", |
| "client_set_id": 70001, |
| "server_set_id": 70005, |
| "product_id": 70 |
| }, |
| { |
| "id": 177, |
| "description": "Netscaler Detection", |
| "criteria": "streamName = \"netscaler\" AND severityLabel = \"High\"", |
| "client_set_id": 70001, |
| "server_set_id": 70005, |
| "product_id": 70 |
| }, |
| { |
| "id": 178, |
| "description": "Netscaler Detection", |
| "criteria": "streamName = \"netscaler\" AND action = \"block\"", |
| "client_set_id": 70001, |
| "server_set_id": 70005, |
| "product_id": 70 |
| }, |
| { |
| "id": 179, |
| "description": "Netscaler Detection", |
| "criteria": "streamName = \"netscaler\" AND messageType = \"auth_failure\"", |
| "client_set_id": 70001, |
| "server_set_id": 70005, |
| "product_id": 70 |
| }, |
| { |
| "id": 180, |
| "description": "F5 ASM Detection", |
| "criteria": "streamName = \"f5_asm\" AND severityCode < 5", |
| "client_set_id": 48001, |
| "server_set_id": 48005, |
| "product_id": 48 |
| }, |
| { |
| "id": 181, |
| "description": "F5 Detection", |
| "criteria": "streamName = \"f5\" AND severityCode < 5", |
| "client_set_id": 48001, |
| "server_set_id": 48005, |
| "product_id": 48 |
| }, |
| { |
| "id": 182, |
| "description": "Imperva SecureSphere Detection", |
| "criteria": "streamName = \"imperva_secure_sphere\" AND severityLabel = \"High\"", |
| "client_set_id": 49001, |
| "server_set_id": 49005, |
| "product_id": 49 |
| }, |
| { |
| "id": 183, |
| "description": "Imperva SecureSphere Detection", |
| "criteria": "streamName = \"imperva_secure_sphere\" AND severityCode < 5", |
| "client_set_id": 49001, |
| "server_set_id": 49005, |
| "product_id": 49 |
| }, |
| { |
| "id": 184, |
| "description": "Secret Server Detection", |
| "criteria": "streamName = \"thycotic software_secret server\" AND severityCode < 5", |
| "client_set_id": 50001, |
| "server_set_id": 50005, |
| "product_id": 50 |
| }, |
| { |
| "id": 185, |
| "description": "McAfee Web Gateway Detection", |
| "criteria": "streamName = \"mcafee_web_gateway\" AND severityCode < 5", |
| "client_set_id": 51024, |
| "server_set_id": 51022, |
| "product_id": 51 |
| }, |
| { |
| "id": 186, |
| "description": "Cylance Protect Detection", |
| "criteria": "streamName = \"Cylance MALWARE Detection\"", |
| "client_set_id": 52001, |
| "server_set_id": 52005, |
| "product_id": 52 |
| }, |
| { |
| "id": 187, |
| "description": "Cylance Protect Detection", |
| "criteria": "streamName = \"Cylance Detection\"", |
| "client_set_id": 52001, |
| "server_set_id": 52005, |
| "product_id": 52 |
| }, |
| { |
| "id": 188, |
| "description": "Wazuh Detection", |
| "criteria": "streamName = \"wazuh inc._wazuh\" AND severityCode < 5", |
| "client_set_id": 54001, |
| "server_set_id": 54005, |
| "product_id": 54 |
| }, |
| { |
| "id": 189, |
| "description": "Nokia NetGuard Detection", |
| "criteria": "streamName = \"nokia_netguard\" AND severityLabel = \"high\"", |
| "client_set_id": 55001, |
| "server_set_id": 55005, |
| "product_id": 55 |
| }, |
| { |
| "id": 190, |
| "description": "Sophos Detection", |
| "criteria": "streamName = \"Sophos Detection\" AND severityCode < 5", |
| "client_set_id": 56001, |
| "server_set_id": 56005, |
| "product_id": 56 |
| }, |
| { |
| "id": 191, |
| "description": "MS ATA Detection", |
| "criteria": "streamName = \"microsoft_ata\"", |
| "client_set_id": 57001, |
| "server_set_id": 57005, |
| "product_id": 57 |
| }, |
| { |
| "id": 192, |
| "description": "McAfee ePO Detection", |
| "criteria": "streamName = \"mcafee_epo\" AND severityCode < 3 AND messageType != \"software_update_event\"", |
| "client_set_id": 58001, |
| "server_set_id": 58005, |
| "product_id": 58 |
| }, |
| { |
| "id": 193, |
| "description": "pfSense Firewall Block", |
| "criteria": "streamName = \"pf_sense_firewall\" AND action = \"block\"", |
| "client_set_id": 81001, |
| "server_set_id": 81005, |
| "product_id": 81 |
| }, |
| { |
| "id": 194, |
| "description": "SonicWall Firewall Block", |
| "criteria": "streamName = \"sonic_wall_firewall\" AND action = \"block\"", |
| "client_set_id": 82001, |
| "server_set_id": 82005, |
| "product_id": 82 |
| }, |
| { |
| "id": 195, |
| "description": "SonicWall Firewall Closed with 0 Bytes", |
| "criteria": "streamName = \"sonicwall_nsa 3600\" AND messageType = \"Connection Closed\" AND serverBytes < 1", |
| "client_set_id": 82001, |
| "server_set_id": 82005, |
| "product_id": 82 |
| }, |
| { |
| "id": 196, |
| "description": "SonicWall Firewall Closed with 0 Bytes", |
| "criteria": "streamName = \"sonic_wall_firewall\" AND messageType = \"Connection Closed\" AND serverBytes < 1", |
| "client_set_id": 82001, |
| "server_set_id": 82005, |
| "product_id": 82 |
| }, |
| { |
| "id": 197, |
| "description": "SonicWall High Severity", |
| "criteria": "streamName = \"dell_nsa 250 m\" AND severityCode < 5", |
| "client_set_id": 82001, |
| "server_set_id": 82005, |
| "product_id": 82 |
| }, |
| { |
| "id": 198, |
| "description": "SpamTitan Block", |
| "criteria": "streamName = \"spam_titan\" AND action = \"block\" ", |
| "client_set_id": 84023, |
| "server_set_id": 84015, |
| "product_id": 84 |
| }, |
| { |
| "id": 199, |
| "description": "Fail2Ban Ban", |
| "criteria": "streamName = \"fail2ban\" AND action = \"block\" ", |
| "client_set_id": 91001, |
| "server_set_id": 91005, |
| "product_id": 91 |
| }, |
| { |
| "id": 200, |
| "description": "AWS VPC Reject", |
| "criteria": "streamName = \"aws_vpc_flow_log\" AND action = \"REJECT\"", |
| "client_set_id": 92001, |
| "server_set_id": 92005, |
| "product_id": 92 |
| }, |
| { |
| "id": 201, |
| "description": "AWS VPC Reject", |
| "criteria": "streamName = \"aws_vpc_flow_log\" AND action = \"block\"", |
| "client_set_id": 92001, |
| "server_set_id": 92005, |
| "product_id": 92 |
| }, |
| { |
| "id": 202, |
| "description": "Azure Security Alert", |
| "criteria": "streamName = \"azure_security_alert\" AND severityCode < 5", |
| "client_set_id": 94001, |
| "server_set_id": 94005, |
| "product_id": 94 |
| }, |
| { |
| "id": 203, |
| "description": "Microsoft ATA Alert", |
| "criteria": "streamName = \"microsoft_ata\"", |
| "client_set_id": 94001, |
| "server_set_id": 94005, |
| "product_id": 94 |
| }, |
| { |
| "id": 204, |
| "description": "Unify Security Gateway Alert", |
| "criteria": "streamName = \"unifi_security_gateway\" AND severityCode < 5", |
| "client_set_id": 95001, |
| "server_set_id": 95005, |
| "product_id": 95 |
| }, |
| { |
| "id": 205, |
| "description": "Deep Instinct Alarm", |
| "criteria": "streamName = \"deep instinct_d-appliance\" AND severityCode < 5", |
| "client_set_id": 96001, |
| "server_set_id": 96005, |
| "product_id": 96 |
| }, |
| { |
| "id": 206, |
| "description": "UFW Firewall Block", |
| "criteria": "streamName = \"ufw\" AND action = \"block\"", |
| "client_set_id": 99001, |
| "server_set_id": 99005, |
| "product_id": 99 |
| }, |
| { |
| "id": 207, |
| "description": "Shibboleth Authentication Failure", |
| "criteria": "streamName = \"shibboleth\" AND messageType = \"auth_failure\"", |
| "client_set_id": 102001, |
| "server_set_id": 102005, |
| "product_id": 102 |
| }, |
| { |
| "id": 208, |
| "description": "AT&T Arris Gateway Firewall Block", |
| "criteria": "streamName = \"att_arris_gateway\" AND action = \"block\"", |
| "client_set_id": 103001, |
| "server_set_id": 103005, |
| "product_id": 103 |
| }, |
| { |
| "id": 209, |
| "description": "Cisco OS Suspicious Network Activity", |
| "criteria": "streamName = \"cisco_os\" AND messageType = \"suspicious_network\"", |
| "client_set_id": 104001, |
| "server_set_id": 104005, |
| "product_id": 105 |
| }, |
| { |
| "id": 210, |
| "description": "Cisco OS Detection", |
| "criteria": "streamName = \"cisco_os\" AND severityCode < 5", |
| "client_set_id": 105001, |
| "server_set_id": 105005, |
| "product_id": 105 |
| }, |
| { |
| "id": 211, |
| "description": "Cisco OS Detection", |
| "criteria": "streamName = \"cisco_os\" AND severityLabel = \"High\"", |
| "client_set_id": 105001, |
| "server_set_id": 105005, |
| "product_id": 105 |
| }, |
| { |
| "id": 212, |
| "description": "Cisco OS Detection", |
| "criteria": "streamName = \"cisco_os\" AND action = \"block\"", |
| "client_set_id": 105001, |
| "server_set_id": 105005, |
| "product_id": 105 |
| }, |
| { |
| "id": 213, |
| "description": "Cisco Wireless Detection", |
| "criteria": "streamName = \"cisco_os\" AND messageType = \"auth_failure\"", |
| "client_set_id": 105001, |
| "server_set_id": 105005, |
| "product_id": 105 |
| }, |
| { |
| "id": 214, |
| "description": "McAfee NSP Detection", |
| "criteria": "streamName = \"mcafee_nsp\" AND severityCode < 5", |
| "client_set_id": 106001, |
| "server_set_id": 106005, |
| "product_id": 106 |
| }, |
| { |
| "id": 215, |
| "description": "McAfee NSP Detection", |
| "criteria": "streamName = \"mcafee_nsp\" AND severityLabel = \"High\"", |
| "client_set_id": 106001, |
| "server_set_id": 106005, |
| "product_id": 106 |
| }, |
| { |
| "id": 216, |
| "description": "McAfee NSP Detection", |
| "criteria": "streamName = \"mcafee_nsp\" AND action = \"block\"", |
| "client_set_id": 106001, |
| "server_set_id": 106005, |
| "product_id": 106 |
| }, |
| { |
| "id": 217, |
| "description": "McAfee NSP Detection", |
| "criteria": "streamName = \"mcafee_nsp\" AND messageType = \"auth_failure\"", |
| "client_set_id": 106001, |
| "server_set_id": 106005, |
| "product_id": 106 |
| }, |
| { |
| "id": 218, |
| "description": "Pulse Secure Detection", |
| "criteria": "streamName = \"pulse_secure\" AND severityCode < 5", |
| "client_set_id": 107001, |
| "server_set_id": 107005, |
| "product_id": 107 |
| }, |
| { |
| "id": 219, |
| "description": "Pulse Secure Detection", |
| "criteria": "streamName = \"pulse_secure\" AND severityLabel = \"High\"", |
| "client_set_id": 107001, |
| "server_set_id": 107005, |
| "product_id": 107 |
| }, |
| { |
| "id": 220, |
| "description": "Pulse Secure Detection", |
| "criteria": "streamName = \"pulse_secure\" AND action = \"block\"", |
| "client_set_id": 107001, |
| "server_set_id": 107005, |
| "product_id": 107 |
| }, |
| { |
| "id": 221, |
| "description": "Pulse Secure Detection", |
| "criteria": "streamName = \"pulse_secure\" AND messageType = \"auth_failure\"", |
| "client_set_id": 107001, |
| "server_set_id": 107005, |
| "product_id": 107 |
| }, |
| { |
| "id": 222, |
| "description": "Beyond Trust Detection", |
| "criteria": "streamName = \"beyond_trust\" AND severityCode < 5", |
| "client_set_id": 108001, |
| "server_set_id": 108005, |
| "product_id": 108 |
| }, |
| { |
| "id": 223, |
| "description": "Beyond Trust Detection", |
| "criteria": "streamName = \"beyond_trust\" AND severityLabel = \"High\"", |
| "client_set_id": 108001, |
| "server_set_id": 108005, |
| "product_id": 108 |
| }, |
| { |
| "id": 224, |
| "description": "Beyond Trust Detection", |
| "criteria": "streamName = \"beyond_trust\" AND action = \"block\"", |
| "client_set_id": 108001, |
| "server_set_id": 108005, |
| "product_id": 108 |
| }, |
| { |
| "id": 225, |
| "description": "Beyond Trust Detection", |
| "criteria": "streamName = \"beyond_trust\" AND messageType = \"auth_failure\"", |
| "client_set_id": 108001, |
| "server_set_id": 108005, |
| "product_id": 108 |
| }, |
| { |
| "id": 226, |
| "description": "Cisco WSA Detection", |
| "criteria": "streamName = \"cisco_wsa\" AND severityCode < 5", |
| "client_set_id": 109001, |
| "server_set_id": 109005, |
| "product_id": 109 |
| }, |
| { |
| "id": 227, |
| "description": "Cisco WSA Detection", |
| "criteria": "streamName = \"cisco_wsa\" AND severityLabel = \"High\"", |
| "client_set_id": 109001, |
| "server_set_id": 109005, |
| "product_id": 109 |
| }, |
| { |
| "id": 228, |
| "description": "Cisco WSA Detection", |
| "criteria": "streamName = \"cisco_wsa\" AND action = \"block\"", |
| "client_set_id": 109001, |
| "server_set_id": 109005, |
| "product_id": 109 |
| }, |
| { |
| "id": 229, |
| "description": "Cisco WSA Detection", |
| "criteria": "streamName = \"cisco_wsa\" AND messageType = \"auth_failure\"", |
| "client_set_id": 109001, |
| "server_set_id": 109005, |
| "product_id": 109 |
| }, |
| { |
| "id": 230, |
| "description": "Kernel Martian Source Detection", |
| "criteria": "streamName = \"kernel\" AND tags CONTAINS \"EVENT:martian_source\"", |
| "client_set_id": 110001, |
| "server_set_id": 110005, |
| "product_id": 110 |
| }, |
| { |
| "id": 231, |
| "description": "Cisco ACS Auth Failure", |
| "criteria": "streamName = \"cisco_acs\" AND messageType = \"auth_failure\"", |
| "client_set_id": 111001, |
| "server_set_id": 111005, |
| "product_id": 111 |
| }, |
| { |
| "id": 232, |
| "description": "Blocked Action", |
| "criteria": "action = \"block\"", |
| "client_set_id": 1, |
| "server_set_id": 5, |
| "product_id": 0 |
| }, |
| { |
| "id": 233, |
| "description": "Authentication Failure", |
| "criteria": "messageType = \"auth_failure\"", |
| "client_set_id": 1, |
| "server_set_id": 5, |
| "product_id": 0 |
| }, |
| { |
| "id": 234, |
| "description": "Exploit Attempt", |
| "criteria": "messageType = \"exploit_attempt\"", |
| "client_set_id": 1, |
| "server_set_id": 5, |
| "product_id": 0 |
| }, |
| { |
| "id": 235, |
| "description": "Privilege Escalation", |
| "criteria": "messageType = \"privilege_escalation\"", |
| "client_set_id": 1, |
| "server_set_id": 5, |
| "product_id": 0 |
| }, |
| { |
| "id": 236, |
| "description": "Credential Access", |
| "criteria": "messageType = \"credential_access\"", |
| "client_set_id": 1, |
| "server_set_id": 5, |
| "product_id": 0 |
| }, |
| { |
| "id": 237, |
| "description": "Malicious Session", |
| "criteria": "messageType = \"malicious_session\"", |
| "client_set_id": 1, |
| "server_set_id": 5, |
| "product_id": 0 |
| }, |
| { |
| "id": 238, |
| "description": "Defense Evasion", |
| "criteria": "messageType = \"defense_evasion\"", |
| "client_set_id": 1, |
| "server_set_id": 5, |
| "product_id": 0 |
| }, |
| { |
| "id": 239, |
| "description": "Service Discovery", |
| "criteria": "messageType = \"service_discovery\"", |
| "client_set_id": 1, |
| "server_set_id": 5, |
| "product_id": 0 |
| }, |
| { |
| "id": 240, |
| "description": "Malicious Behavior", |
| "criteria": "messageType = \"malicious_behavior\"", |
| "client_set_id": 5, |
| "server_set_id": 1, |
| "product_id": 0 |
| }, |
| { |
| "id": 241, |
| "description": "Command and Control", |
| "criteria": "messageType = \"botnet_connection\"", |
| "client_set_id": 9, |
| "server_set_id": 8, |
| "product_id": 0 |
| }, |
| { |
| "id": 242, |
| "description": "Data Staging", |
| "criteria": "messageType = \"data_staging\"", |
| "client_set_id": 2, |
| "server_set_id": 6, |
| "product_id": 0 |
| }, |
| { |
| "id": 243, |
| "description": "Data Exfiltration", |
| "criteria": "messageType = \"data_exfiltration\"", |
| "client_set_id": 3, |
| "server_set_id": 7, |
| "product_id": 0 |
| }, |
| { |
| "id": 244, |
| "description": "Phishing Email", |
| "criteria": "messageType = \"phishing_email\"", |
| "client_set_id": 5, |
| "server_set_id": 23, |
| "product_id": 0 |
| }, |
| { |
| "id": 245, |
| "description": "Phishing Click", |
| "criteria": "messageType = \"phishing_click\"", |
| "client_set_id": 5, |
| "server_set_id": 23, |
| "product_id": 0 |
| }, |
| { |
| "id": 246, |
| "description": "Policy Violation", |
| "criteria": "messageType = \"prohibited_connection\"", |
| "client_set_id": 24, |
| "server_set_id": 22, |
| "product_id": 0 |
| }, |
| { |
| "id": 247, |
| "description": "Ransomware Download", |
| "criteria": "messageType = \"ransomware_download\"", |
| "client_set_id": 19, |
| "server_set_id": 26, |
| "product_id": 0 |
| }, |
| { |
| "id": 248, |
| "description": "Ransomware Encryption", |
| "criteria": "messageType = \"ransomware_encryption\"", |
| "client_set_id": 19, |
| "server_set_id": 26, |
| "product_id": 0 |
| }, |
| { |
| "id": 249, |
| "description": "Service Disruption", |
| "criteria": "messageType = \"service_disruption\"", |
| "client_set_id": 13, |
| "server_set_id": 14, |
| "product_id": 0 |
| }, |
| { |
| "id": 250, |
| "description": "IDS Event", |
| "criteria": "messageType = \"ids_event\" AND severityCode < 5", |
| "client_set_id": 5, |
| "server_set_id": 1, |
| "product_id": 0 |
| }, |
| { |
| "id": 251, |
| "description": "Content Filter", |
| "criteria": "messageType = \"content_filter\"", |
| "client_set_id": 24, |
| "server_set_id": 22, |
| "product_id": 0 |
| }, |
| { |
| "id": 252, |
| "description": "Anomalous Behavior", |
| "criteria": "messageType = \"anomalous_behavior\"", |
| "client_set_id": 5, |
| "server_set_id": 1, |
| "product_id": 0 |
| }, |
| { |
| "id": 253, |
| "description": "Degraded Hardware Detected", |
| "criteria": "messageType = \"degraded_hardware\"", |
| "client_set_id": 33, |
| "server_set_id": 58, |
| "product_id": 0 |
| }, |
| { |
| "id": 254, |
| "description": "Degraded Service Detected", |
| "criteria": "messageType = \"degraded_service\"", |
| "client_set_id": 35, |
| "server_set_id": 58, |
| "product_id": 0 |
| }, |
| { |
| "id": 255, |
| "description": "Financial Anomaly", |
| "criteria": "messageType = \"financial_anomaly\"", |
| "client_set_id": 60, |
| "server_set_id": 61, |
| "product_id": 0 |
| }, |
| { |
| "id": 256, |
| "description": "Financial Exploit", |
| "criteria": "messageType = \"financial_exploit\"", |
| "client_set_id": 60, |
| "server_set_id": 61, |
| "product_id": 0 |
| }, |
| { |
| "id": 257, |
| "description": "Infrastructure Exploit", |
| "criteria": "messageType = \"infrastructure_exploit\"", |
| "client_set_id": 70, |
| "server_set_id": 71, |
| "product_id": 0 |
| }, |
| { |
| "id": 258, |
| "description": "Blacklisted Process", |
| "criteria": "tags CONTAINS \"Blacklist process found\"", |
| "client_set_id": 1, |
| "server_set_id": 5, |
| "product_id": 0 |
| }, |
| { |
| "id": 259, |
| "description": "Infocyte Detection", |
| "criteria": "streamName = \"infocyte_hunt\"", |
| "client_set_id": 1, |
| "server_set_id": 5, |
| "product_id": 0 |
| }, |
| { |
| "id": 260, |
| "description": "Malicious Software Detected", |
| "criteria": "messageType = \"malicious_software\"", |
| "client_set_id": 1, |
| "server_set_id": 5, |
| "product_id": 0 |
| }, |
| { |
| "id": 261, |
| "description": "Data Destruction", |
| "criteria": "messageType = \"data_destruction\"", |
| "client_set_id": 13, |
| "server_set_id": 14, |
| "product_id": 0 |
| } |
| ], |
| "sets": { |
| "1": "Exploiting Host", |
| "2": "Staging Host", |
| "3": "Exfiltration Host", |
| "4": "Suspicious User", |
| "5": "Exploiting Target", |
| "6": "Staging Target", |
| "7": "Exfiltration Target", |
| "8": "C2 Server", |
| "9": "Bot", |
| "10": "Malicious File", |
| "11": "Reconnaissance Host", |
| "12": "Reconnaissance Target", |
| "13": "Disruption Host", |
| "14": "Disruption Target", |
| "20": "Disrupted Service", |
| "15": "Phishing Site", |
| "16": "Phished User", |
| "23": "Phished Host", |
| "17": "Phishing Email", |
| "18": "Ransomware Malware", |
| "19": "Ransomware Target", |
| "26": "Ransomware Source", |
| "25": "Ransomware User", |
| "21": "Policy Violation User", |
| "22": "Policy Violation Target", |
| "24": "Policy Violation Host", |
| "30": "Malicious Email", |
| "32": "Degraded Hardware", |
| "33": "Degraded Hardware Host", |
| "34": "Degraded Service", |
| "35": "Degraded Service Host", |
| "36": "Degraded Service User", |
| "37": "Degraded Service File", |
| "38": "Degraded Hardware User", |
| "39": "Degraded Hardware File", |
| "40": "Exploited Service", |
| "41": "Exploited Hardware", |
| "42": "Staging Service", |
| "43": "Staging Hardware", |
| "44": "Exfiltration Service", |
| "45": "Exfiltration Hardware", |
| "46": "Botnet Service", |
| "47": "Botnet Hardware", |
| "48": "Recon Service", |
| "49": "Recon Hardware", |
| "50": "Disruption Service", |
| "51": "Disruption Hardware", |
| "52": "Phishing Service", |
| "53": "Phishing Hardware", |
| "54": "Ransomware Service", |
| "55": "Ransomware Hardware", |
| "56": "Policy Violation Service", |
| "57": "Policy Violation Hardware", |
| "58": "Degraded Service Server", |
| "60": "Financial Exploit Target", |
| "61": "Financial Exploiting Host", |
| "62": "Financial Exploiting File", |
| "63": "Financial Exploiting User", |
| "64": "Financial Exploiting Hardware", |
| "65": "Financial Exploiting Service", |
| "66": "Financial Account", |
| "70": "SCADA Exploit Target", |
| "71": "SCADA Exploiting Host", |
| "72": "SCADA Exploiting File", |
| "73": "SCADA Exploiting User", |
| "74": "SCADA Exploiting Hardware", |
| "75": "SCADA Exploiting Service", |
| "200": "General", |
| "201": "Exploiting Host", |
| "202": "Staging Host", |
| "203": "Exploiting Host", |
| "204": "Suspicious User", |
| "205": "Exploiting Target", |
| "206": "Staging Target", |
| "207": "Exfiltration Target", |
| "208": "C2 Server", |
| "209": "Bot", |
| "210": "Malicious File", |
| "301": "Internal Host", |
| "302": "External Host", |
| "303": "Server", |
| "304": "Web Server", |
| "305": "Email Server", |
| "306": "Backup Server", |
| "307": "Wireless Host", |
| "308": "Network Scanner", |
| "309": "Business Critical Host", |
| "310": "Host with Business Critical User", |
| "311": "Infrastructure Device", |
| "312": "Mobile Host", |
| "313": "Laptop Host", |
| "314": "SCADA Device", |
| "315": "IoT Device", |
| "316": "Virtual Machine", |
| "317": "Cloud Host", |
| "318": "Contractor Host", |
| "319": "Host with Sensitive Data", |
| "320": "Host with Sensitive PII Data", |
| "321": "Host with Sensitive Card Data", |
| "322": "Host with Sensitive Proprietary Data", |
| "323": "Host is Joined to Domain", |
| "324": "Business Critical User ", |
| "325": "SysAdmin User ", |
| "326": "Employee User ", |
| "327": "Contractor User ", |
| "328": "System Account User " |
| } |
| } |