Mimecast Integration
<div class="condensed-table">
| | |
| --- | --- |
| Version | 2.4.1 (View all) |
| Compatible Kibana version(s) | 8.15.0 or higher |
| Supported Serverless project types
What’s this? | Security
Observability |
| Subscription level
What’s this? | Basic |
| Level of support
What’s this? | Partner |
</div>
The Mimecast integration collects events from the Mimecast API.
Authorization parameters for the Mimecast API (Application Key
, Application ID
, Access Key
, and Secret Key
) should be provided by a Mimecast representative for this integration. Under Advanced options
you can set the time interval between two API requests as well as the API URL. A Mimecast representative should also be able to give you this information in case you need to change the defaults.
Rate limit quotas may require you to set up different credentials for the different available log types.
Authorization parameters for the Mimecast API (Client ID
and Client Key
) should be provided by a Mimecast representative for this integration. Under Advanced options
you can set the time interval between two API requests as well as the API URL. A Mimecast representative should also be able to give you this information in case you need to change the defaults.
Rate limit quotas may require you to set up different credentials for the different available log types.
This is the mimecast.archive_search_logs
dataset. These logs contain Mimecast archive search logs with the following details: search source, description and detailed information about the search performed. More information about these logs is available here.
**Example**
An example event for archive_search
looks as following:
{
"@timestamp": "2024-11-12T16:21:27.000Z",
"agent": {
"ephemeral_id": "d3b97519-7fb6-43c4-8b77-64243fb1a1a3",
"id": "c25a1c6b-6203-415b-8548-b4a1b5c845e0",
"name": "elastic-agent-14690",
"type": "filebeat",
"version": "8.14.0"
},
"data_stream": {
"dataset": "mimecast.archive_search_logs",
"namespace": "34146",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "c25a1c6b-6203-415b-8548-b4a1b5c845e0",
"snapshot": false,
"version": "8.14.0"
},
"event": {
"agent_id_status": "verified",
"category": [
"api"
],
"created": "2024-11-12T16:21:27.000Z",
"dataset": "mimecast.archive_search_logs",
"ingested": "2024-12-05T00:48:50Z",
"kind": "event",
"original": "{\"createTime\":\"2024-11-12T16:21:27+0000\",\"description\":\"Message Tracking Search\",\"emailAddr\":\"\\u003c\\u003e\",\"searchReason\":\"\",\"searchText\":\"[User : dhamilton@mimecast.local]\",\"source\":\"archive\"}",
"type": [
"admin"
]
},
"input": {
"type": "cel"
},
"mimecast": {
"search_details": {
"description": "Message Tracking Search",
"source": "archive",
"text": "[User : dhamilton@mimecast.local]"
}
},
"related": {
"user": [
"<>"
]
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-archive-search-logs"
],
"user": {
"email": "<>"
}
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.email.address | The email address of the user who performed the search. | keyword |
mimecast.search_details.description | The description of the search if any. | keyword |
mimecast.search_details.path | The search path if any. | keyword |
mimecast.search_details.reason | The search reason entered when the search was executed if any. | keyword |
mimecast.search_details.source | The search source context | keyword |
mimecast.search_details.text | The text used in the search. | keyword |
This is the mimecast.audit_events
dataset. These logs contain Mimecast audit events with the following details: audit type, event category and detailed information about the event. More information about these logs.
**Example**
An example event for audit_events
looks as following:
{
"@timestamp": "2024-10-17T02:06:50.000Z",
"agent": {
"ephemeral_id": "d3d233d7-62b7-40f6-8de7-d3c2937d6dae",
"id": "b6346117-4ee0-428a-9d74-6580e405feeb",
"name": "elastic-agent-20780",
"type": "filebeat",
"version": "8.14.0"
},
"client": {
"ip": "203.59.201.168"
},
"data_stream": {
"dataset": "mimecast.audit_events",
"namespace": "54489",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "b6346117-4ee0-428a-9d74-6580e405feeb",
"snapshot": false,
"version": "8.14.0"
},
"event": {
"action": "api-application-updated",
"agent_id_status": "verified",
"category": [
"email"
],
"created": "2024-10-17T02:06:50.000Z",
"dataset": "mimecast.audit_events",
"id": "eNoVzk0PgiAAgOH_wrUO4SizrYOasxUzs6jWLYURfqEg6Wr99-z-bs_7AZplRjFBwQp4E3y5t3G7w1SVz9KxwxtJj7mVNripeP7WV3N2-3AohNUFGw0DmMY2aqOeq7MZfCKqyME1jeUMv_qAdVub6MJdnprZIYz2PS3u-bNuB54kfA2m4GGo6ErJ_zZCi4UD51OQGd3JiqlMUjYu-eTkIdey0di_mNJC1mAFvz-isz1f",
"ingested": "2024-12-05T00:52:32Z",
"original": "{\"auditType\":\"API Application Updated\",\"category\":\"account_logs\",\"eventInfo\":\"API Gateway Application testing Updated. Application Program Interface Addendum (22 September 2022) acknowledged, Date: 2024-10-17, Time: 02:06:50+0000, IP: 203.59.201.168, Application: Administration Console\",\"eventTime\":\"2024-10-17T02:06:50+0000\",\"id\":\"eNoVzk0PgiAAgOH_wrUO4SizrYOasxUzs6jWLYURfqEg6Wr99-z-bs_7AZplRjFBwQp4E3y5t3G7w1SVz9KxwxtJj7mVNripeP7WV3N2-3AohNUFGw0DmMY2aqOeq7MZfCKqyME1jeUMv_qAdVub6MJdnprZIYz2PS3u-bNuB54kfA2m4GGo6ErJ_zZCi4UD51OQGd3JiqlMUjYu-eTkIdey0di_mNJC1mAFvz-isz1f\",\"user\":\"user.name@company.mime-api.com\"}"
},
"input": {
"type": "cel"
},
"mimecast": {
"application": "Administration Console",
"category": "account_logs",
"eventInfo": "API Gateway Application testing Updated. Application Program Interface Addendum (22 September 2022) acknowledged, Date: 2024-10-17, Time: 02:06:50+0000, IP: 203.59.201.168, Application: Administration Console"
},
"related": {
"ip": [
"203.59.201.168"
],
"user": [
"user.name",
"user.name@company.mime-api.com"
]
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-audit-events"
],
"user": {
"domain": "company.mime-api.com",
"email": "user.name@company.mime-api.com",
"name": "user.name"
}
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.2FA | Info about two-factor authentication. | keyword |
mimecast.application | The Mimecast unique id of the event. | keyword |
mimecast.category | The category of the event. | keyword |
mimecast.email.address | Email address from event info. | keyword |
mimecast.email.metadata | The email meta data from audit info. | keyword |
mimecast.eventInfo | The detailed event information. | keyword |
mimecast.method | Method which triggers audit events. | keyword |
mimecast.remote | Info about remote IP trying to access the API. | keyword |
mimecast.remote_ip | Remote IP. | ip |
mimecast.timezone | Timezone reported in the event message. | keyword |
This is the mimecast.cloud_integrated_logs
dataset. These logs contain Mimecast threats and security events with the following details: entities, mail flows and URL protected events. More information about these logs.
**Example**
An example event for cloud_integrated
looks as following:
{
"@timestamp": "2024-11-21T18:03:26.960Z",
"agent": {
"ephemeral_id": "d0571978-95ee-4d4e-9fc1-2c0b57f47a64",
"id": "27a1a18b-9cc1-424a-8573-425423e11318",
"name": "elastic-agent-77334",
"type": "filebeat",
"version": "8.15.0"
},
"data_stream": {
"dataset": "mimecast.cloud_integrated_logs",
"namespace": "67059",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "27a1a18b-9cc1-424a-8573-425423e11318",
"snapshot": false,
"version": "8.15.0"
},
"email": {
"message_id": "<2ae37333-38e7-89ff-dc36-c8d48c6e3df3@demovation-ci.b41.one>"
},
"event": {
"agent_id_status": "verified",
"category": [
"email"
],
"created": "2024-11-21T18:03:26.960Z",
"dataset": "mimecast.cloud_integrated_logs",
"ingested": "2024-12-09T23:17:44Z",
"original": "{\"_offset\":1803841,\"_partition\":53,\"accountId\":\"AUS2474\",\"aggregateId\":\"4XvR1B4m7BzFB8L-qk59b4szrgayciaagczc977rzb_1732212206\",\"authResults\":[{\"aligned\":true,\"result\":\"pass\",\"type\":\"SPF\"},{\"aligned\":false,\"result\":\"none\",\"type\":\"DKIM\"},{\"aligned\":null,\"result\":\"pass\",\"type\":\"DMARC\"}],\"messageId\":\"\\u003c2ae37333-38e7-89ff-dc36-c8d48c6e3df3@demovation-ci.b41.one\\u003e\",\"processingId\":\"c40337e6860db0301575d8d09362bff214c0b010d6c4d41da9d770759ff54d10_1732212206\",\"subtype\":null,\"timestamp\":1732212206960,\"type\":\"mailflow\"}"
},
"input": {
"type": "cel"
},
"mimecast": {
"accountId": "AUS2474",
"aggregateId": "4XvR1B4m7BzFB8L-qk59b4szrgayciaagczc977rzb_1732212206",
"authResults": [
{
"aligned": true,
"result": "pass",
"type": "SPF"
},
{
"aligned": false,
"result": "none",
"type": "DKIM"
},
{
"result": "pass",
"type": "DMARC"
}
],
"log_type": "mailflow",
"processingId": "c40337e6860db0301575d8d09362bff214c0b010d6c4d41da9d770759ff54d10_1732212206"
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-cloud-integrated-logs"
]
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.accountId | The Mimecast account code for your account. | keyword |
mimecast.action | The action taken for this message. | keyword |
mimecast.aggregateId | Unique identifier that allows you to correlate/group related events. | keyword |
mimecast.attachments | The filenames of all attachments on the emai. | keyword |
mimecast.authResults.aligned | boolean | |
mimecast.authResults.result | keyword | |
mimecast.authResults.type | keyword | |
mimecast.direction | The direction of the email based on the sending and receiving domains. | keyword |
mimecast.historicalMail | Identifies whether the scan was from historical email (prior to Mimecast). | boolean |
mimecast.log_type | keyword | |
mimecast.messageId | The internet message id of the email. | keyword |
mimecast.originalUrl | The original URL Clicked. | keyword |
mimecast.policiesApplied.action | keyword | |
mimecast.policiesApplied.mode | keyword | |
mimecast.policiesApplied.name | keyword | |
mimecast.processingId | Unique identifier that allows you to correlate/group related events. | keyword |
mimecast.recipients | The recipient of the email. | keyword |
mimecast.redirectUrl | The redirect URL, following original URL click. | keyword |
mimecast.senderEnvelope | The sender of the email. | keyword |
mimecast.senderHeader | The sender address found in the from header of the email. | keyword |
mimecast.senderIp | The source IP of the sending mail server. | keyword |
mimecast.source | keyword | |
mimecast.sourceIp | The source IP of the original message. | keyword |
mimecast.subject | The subject of the email, limited to 150 characters. | keyword |
mimecast.subtype | keyword | |
mimecast.tags | The determination if the email was untrustworthy. | keyword |
mimecast.threatState | The action taken. | keyword |
mimecast.threatType | The type of threat identified where applicable. no detections= allowed. | keyword |
mimecast.timestamp | The date and time of event. | keyword |
This is the mimecast.dlp_logs
dataset. These logs contain information about messages that triggered a DLP or Content Examination policy. More information about these logs.
**Example**
An example event for dlp
looks as following:
{
"@timestamp": "2024-11-17T19:47:39.000Z",
"agent": {
"ephemeral_id": "6a8bd8fb-21cf-4c1e-a294-35bddf3ebeba",
"id": "890bb494-8ddc-489b-8bfe-48aea81e2d36",
"name": "elastic-agent-24674",
"type": "filebeat",
"version": "8.14.0"
},
"data_stream": {
"dataset": "mimecast.dlp_logs",
"namespace": "14088",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "890bb494-8ddc-489b-8bfe-48aea81e2d36",
"snapshot": false,
"version": "8.14.0"
},
"email": {
"direction": "inbound",
"from": {
"address": [
"webmaster@empirepartners.b41.one"
]
},
"message_id": "<ae9f2f0678ed116f-152138@hapi.b41.one>",
"subject": "New CERA.com Coming Soon! - CERA Alert",
"to": {
"address": [
"vkamins@demo-int.elastic.mime-api.com"
]
}
},
"event": {
"action": "hold",
"agent_id_status": "verified",
"category": [
"email"
],
"created": "2024-11-17T19:47:39+0000",
"dataset": "mimecast.dlp_logs",
"ingested": "2024-12-05T00:57:34Z",
"original": "{\"action\":\"hold\",\"eventTime\":\"2024-11-17T19:47:39+0000\",\"messageId\":\"\\u003cae9f2f0678ed116f-152138@hapi.b41.one\\u003e\",\"policy\":\"Confidential\",\"recipientAddress\":\"vkamins@demo-int.elastic.mime-api.com\",\"route\":\"inbound\",\"senderAddress\":\"webmaster@empirepartners.b41.one\",\"subject\":\"New CERA.com Coming Soon! - CERA Alert\"}"
},
"input": {
"type": "cel"
},
"rule": {
"name": "Confidential"
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-dlp-logs"
]
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
This is the mimecast.message_release_logs
dataset. These logs contain information about messages that were either released to the recipient, with details about the user that processed the release. More information about these logs.
**Example**
An example event for message_release
looks as following:
{
"@timestamp": "2024-10-28T14:16:51.000Z",
"agent": {
"ephemeral_id": "7afd67cc-d1eb-44e6-9ae3-d6cdd6a2930a",
"id": "019f79cd-9e55-4eaf-863d-78181137d95d",
"name": "elastic-agent-60936",
"type": "filebeat",
"version": "8.14.0"
},
"data_stream": {
"dataset": "mimecast.message_release_logs",
"namespace": "39938",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "019f79cd-9e55-4eaf-863d-78181137d95d",
"snapshot": false,
"version": "8.14.0"
},
"email": {
"direction": "inbound",
"from": {
"address": [
"yahoo-delivers@evaluation-fuzz.b41.one"
]
},
"local_id": "eNoNjt0KgjAYQN9ltwlNMVZBF...",
"subject": "Yahoo! Newsletter, November 2001",
"to": {
"address": [
"monika.causholli@demo-int.elastic.mime-api.com"
]
}
},
"event": {
"action": "rejected",
"agent_id_status": "verified",
"dataset": "mimecast.message_release_logs",
"id": "eNoNjt0KgjAYQN9ltwlNMVZBF...",
"ingested": "2024-11-21T02:12:00Z",
"kind": "event",
"original": "{\"attachments\":true,\"detectionLevel\":\"relaxed\",\"fromEnv\":{\"emailAddress\":\"yahoo-delivers@evaluation-fuzz.b41.one\"},\"fromHdr\":{\"emailAddress\":\"yahoo-delivers@evaluation-fuzz.b41.one\"},\"heldReason\":\"Default Spam Scanning Definition\",\"id\":\"eNoNjt0KgjAYQN9ltwlNMVZBF...\",\"messageInfo\":\"Graymail\",\"operator\":{\"emailAddress\":\"monika.causholli@demo-int.elastic.mime-api.com\"},\"policy\":\"Default Spam Scanning Definition\",\"rejectReason\":\"Message goes against email policies\",\"released\":\"2024-10-28T14:16:51+0000\",\"route\":\"inbound\",\"size\":3670056,\"spamProcessingDetail\":{\"dkim\":{\"allow\":true,\"info\":\"unknown\"},\"dmarc\":{\"allow\":true,\"info\":\"allow\"},\"greyEmail\":false,\"managedSender\":{\"allow\":true,\"info\":\"unknown\"},\"permittedSender\":{\"allow\":true,\"info\":\"none\"},\"rbl\":{\"allow\":true,\"info\":\"\"},\"spf\":{\"allow\":true,\"info\":\"allow\"},\"verdict\":{\"categories\":[{\"name\":\"spam\",\"risk\":\"high\",\"subcategories\":[{\"augmentations\":[],\"name\":\"technology_feed\",\"risk\":\"high\"},{\"augmentations\":[{\"name\":\"body\",\"risk\":\"negligible\"}],\"name\":\"content\",\"risk\":\"negligible\"}]},{\"name\":\"graymail\",\"risk\":\"negligible\",\"subcategories\":[]}],\"decision\":\"spam\",\"description\":\"\",\"risk\":\"high\"}},\"spamScore\":20,\"status\":\"rejected\",\"subject\":\"Yahoo! Newsletter, November 2001\",\"to\":[{\"emailAddress\":\"monika.causholli@demo-int.elastic.mime-api.com\"}]}",
"reason": "Message goes against email policies",
"risk_score": 20,
"type": [
"info"
]
},
"input": {
"type": "cel"
},
"mimecast": {
"message_release_logs": {
"attachments": true,
"detectionLevel": "relaxed",
"fromEnv": {
"emailAddress": "yahoo-delivers@evaluation-fuzz.b41.one"
},
"fromHdr": {
"emailAddress": "yahoo-delivers@evaluation-fuzz.b41.one"
},
"heldReason": "Default Spam Scanning Definition",
"id": "eNoNjt0KgjAYQN9ltwlNMVZBF...",
"messageInfo": "Graymail",
"operator": "monika.causholli@demo-int.elastic.mime-api.com",
"policy": "Default Spam Scanning Definition",
"rejectReason": "Message goes against email policies",
"released": "2024-10-28T14:16:51+0000",
"route": "inbound",
"size": 3670056,
"spamProcessingDetail": {
"dkim": {
"allow": true,
"info": "unknown"
},
"dmarc": {
"allow": true,
"info": "allow"
},
"greyEmail": false,
"managedSender": {
"allow": true,
"info": "unknown"
},
"permittedSender": {
"allow": true,
"info": "none"
},
"rbl": {
"allow": true
},
"spamVerdict": {
"categories": [
{
"name": "spam",
"risk": "high",
"subcategories": [
{
"name": "technology_feed",
"risk": "high"
},
{
"augmentations": [
{
"name": "body",
"risk": "negligible"
}
],
"name": "content",
"risk": "negligible"
}
]
},
{
"name": "graymail",
"risk": "negligible"
}
],
"decision": "spam",
"risk": "high"
},
"spf": {
"allow": true,
"info": "allow"
}
},
"spamScore": 20,
"status": "rejected",
"subject": "Yahoo! Newsletter, November 2001",
"to": [
{
"emailAddress": "monika.causholli@demo-int.elastic.mime-api.com"
}
]
}
},
"related": {
"hosts": [
"demo-int.elastic.mime-api.com",
"evaluation-fuzz.b41.one"
],
"user": [
"monika.causholli",
"monika.causholli@demo-int.elastic.mime-api.com",
"yahoo-delivers",
"yahoo-delivers@evaluation-fuzz.b41.one"
]
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-message-release-logs"
],
"user": {
"email": [
"monika.causholli@demo-int.elastic.mime-api.com"
]
}
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.message_release_logs.attachments | Indicates whether the message contains attachments. | boolean |
mimecast.message_release_logs.detectionLevel | Spam detection level, if held by a spam policy. Possible values are: relaxed, moderate, aggressive, cluster or whitelisted_cluster. | keyword |
mimecast.message_release_logs.fromEnv.displayableName | Display name of the user address from the "from" envelope. If none exists, this field will be empty. | keyword |
mimecast.message_release_logs.fromEnv.emailAddress | The routable email address of the user from the "from" envelope. | keyword |
mimecast.message_release_logs.fromHdr.displayableName | Display name of the user address from the "from" header. If none exists, this field will be empty. | keyword |
mimecast.message_release_logs.fromHdr.emailAddress | The routable email address of the user from the "from" header. | keyword |
mimecast.message_release_logs.heldGroup | The recipient group of the held message, if message was sent to a group. | keyword |
mimecast.message_release_logs.heldReason | Detail around the reason the message was initially held. If held by a specific policy definition, this will be the name of the policy definition that triggered the message to be held. | keyword |
mimecast.message_release_logs.id | The Mimecast secure ID of the specific message release log. | keyword |
mimecast.message_release_logs.messageInfo | Additional information around the release reason. | text |
mimecast.message_release_logs.operator | Email address of the user that released the message. | keyword |
mimecast.message_release_logs.policy | Name of the policy definition that triggered the message to be held. | keyword |
mimecast.message_release_logs.rejectReason | Detail on the reason a message was rejected, if message was rejected. | keyword |
mimecast.message_release_logs.released | Timestamp of the message release action in ISO 8601 format. | keyword |
mimecast.message_release_logs.route | Message direction. Possible values are: inbound or outbound. | keyword |
mimecast.message_release_logs.size | Total size of the message, in bytes. | long |
mimecast.message_release_logs.spamProcessingDetail.dkim.allow | Indicates checks for whether the message passed DKIM checks are performed. | boolean |
mimecast.message_release_logs.spamProcessingDetail.dkim.info | Details about the check result. | keyword |
mimecast.message_release_logs.spamProcessingDetail.dmarc.allow | Indicates checks for whether the message passed DMARC checks are performed. | boolean |
mimecast.message_release_logs.spamProcessingDetail.dmarc.info | Details about the check result. | keyword |
mimecast.message_release_logs.spamProcessingDetail.grayEmail | Indicates with the spam was classified as graymail or bulk. Note that this API uses graymail and greymail interchangeably. | boolean |
mimecast.message_release_logs.spamProcessingDetail.greyEmail | Indicates with the spam was classified as graymail or bulk. Note that this API uses graymail and greymail interchangeably. | boolean |
mimecast.message_release_logs.spamProcessingDetail.managedSender.allow | Indicates checks for whether the sender has been permitted by a Managed Sender entry are performed. | boolean |
mimecast.message_release_logs.spamProcessingDetail.managedSender.info | Details about the check result. | keyword |
mimecast.message_release_logs.spamProcessingDetail.permittedSender.allow | Indicates checks for whether the sender has been permitted by policy are performed. | boolean |
mimecast.message_release_logs.spamProcessingDetail.permittedSender.info | Details about the check result. | keyword |
mimecast.message_release_logs.spamProcessingDetail.rbl.allow | Indicates checks for whether the message passed RBL checks are performed. | boolean |
mimecast.message_release_logs.spamProcessingDetail.rbl.info | Details about the check result. | keyword |
mimecast.message_release_logs.spamProcessingDetail.spamVerdict.categories | Spam detection type categories. | flattened |
mimecast.message_release_logs.spamProcessingDetail.spamVerdict.decision | Indicating what the ultimate verdict was for the message. | keyword |
mimecast.message_release_logs.spamProcessingDetail.spamVerdict.description | Description of the spam verdict decision. | keyword |
mimecast.message_release_logs.spamProcessingDetail.spamVerdict.risk | Identified risk level within the spam detection. Possible values are: negligible, low, high. | keyword |
mimecast.message_release_logs.spamProcessingDetail.spf.allow | Indicates checks for whether the message passed SPF checks are performed. | boolean |
mimecast.message_release_logs.spamProcessingDetail.spf.info | Details about the check result. | keyword |
mimecast.message_release_logs.spamScore | The message spam score, based on the applied spam scanning policy definition. | double |
mimecast.message_release_logs.status | Status of the message. Possible values are released or rejected. | keyword |
mimecast.message_release_logs.subject | The released message’s subject line. | keyword |
mimecast.message_release_logs.to.displayableName | Display name of the user address from the "to" header. If none exists, this field will be empty. | keyword |
mimecast.message_release_logs.to.emailAddress | The routable email address of the user from the "to" header. | keyword |
This is the mimecast.siem_logs
dataset. These logs contain information about messages that contains MTA (message transfer agent) log – all inbound, outbound, and internal messages. More about these logs.
**Example**
An example event for siem
looks as following:
{
"@timestamp": "2024-11-12T18:52:07.130Z",
"agent": {
"ephemeral_id": "3d21ae78-86cd-4666-84a7-c6309a29e2e5",
"id": "260b2d28-beb4-4e1e-83aa-9fd450347db8",
"name": "elastic-agent-64770",
"type": "filebeat",
"version": "8.15.0"
},
"data_stream": {
"dataset": "mimecast.siem_logs",
"namespace": "18433",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "260b2d28-beb4-4e1e-83aa-9fd450347db8",
"snapshot": false,
"version": "8.15.0"
},
"email": {
"direction": "outbound",
"from": {
"address": [
"chris.germany@demo-int.elastic.mime-api.com"
]
},
"message_id": "<23b9843f48f8d349-99325@hapi.b41.one>",
"subject": "Out of office",
"to": {
"address": [
"dkinney@pacific-concept.b41.one"
]
}
},
"event": {
"action": "Acc",
"agent_id_status": "verified",
"category": [
"email"
],
"created": "2024-11-12T18:52:07.130Z",
"dataset": "mimecast.siem_logs",
"ingested": "2024-12-08T21:06:17Z",
"original": "{\"_offset\":70595,\"_partition\":60,\"accountId\":\"CUSB4A274\",\"action\":\"Acc\",\"aggregateId\":\"q1h3LjgrN46b12GlX0By9Q_1731437523\",\"direction\":\"Outbound\",\"messageId\":\"\\u003c23b9843f48f8d349-99325@hapi.b41.one\\u003e\",\"numberAttachments\":\"0\",\"processingId\":\"X7OQopo8177ryv7KXWXxytbksk3qv0Ct8NSYWcQkhJM_1731437523\",\"receiptErrors\":null,\"recipients\":\"dkinney@pacific-concept.b41.one\",\"rejectionCode\":null,\"rejectionInfo\":null,\"rejectionType\":null,\"senderEnvelope\":\"chris.germany@demo-int.elastic.mime-api.com\",\"senderHeader\":\"chris.germany@demo-int.elastic.mime-api.com\",\"senderIp\":\"54.236.186.184\",\"spamDetectionLevel\":\"28\",\"spamInfo\":\"[]\",\"spamProcessingDetail\":null,\"spamScore\":\"0\",\"subject\":\"Out of office\",\"subtype\":\"Acc\",\"timestamp\":1731437527130,\"tlsCipher\":\"TLS_AES_256_GCM_SHA384\",\"tlsVersion\":\"TLSv1.3\",\"type\":\"receipt\",\"virusFound\":null}",
"outcome": "unknown"
},
"input": {
"type": "cel"
},
"mimecast": {
"accountId": "CUSB4A274",
"aggregateId": "q1h3LjgrN46b12GlX0By9Q_1731437523",
"log_type": "receipt",
"numberAttachments": "0",
"processingId": "X7OQopo8177ryv7KXWXxytbksk3qv0Ct8NSYWcQkhJM_1731437523",
"senderHeader": "chris.germany@demo-int.elastic.mime-api.com",
"spamDetectionLevel": "28",
"spamInfo": "[]",
"spamScore": "0",
"subtype": "Acc",
"tlsVersion": "TLSv1.3"
},
"related": {
"user": [
"chris.germany@demo-int.elastic.mime-api.com",
"dkinney@pacific-concept.b41.one"
]
},
"source": {
"ip": "54.236.186.184"
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-siem-logs"
],
"tls": {
"cipher": "TLS_AES_256_GCM_SHA384"
}
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.AttCnt | The number of attachments on the email. | long |
mimecast.AttNames | The filenames of all attachments on the email. | keyword |
mimecast.Attempt | The count of attempts that the Mimecast MTA has made to deliver the email. | long |
mimecast.CustomName | The message has matched a custom name. | keyword |
mimecast.CustomThreatDictionary | The content of the email was detected to contain words in a custom threat dictionary. | keyword |
mimecast.CustomerIP | The source IP is one of the accounts authorised IPs or one of the authorised IPs belonging to an Umbrella Account, if the Account uses an Umbrella Account. | keyword |
mimecast.Hits | Number of items flagged for the message. | keyword |
mimecast.Hostname | keyword | |
mimecast.IPInternalName | For emails subject to Targeted Threat Protection - Impersonation Protect, if the email was detected to be from an internal user name. | keyword |
mimecast.IPNewDomain | For emails subject to Targeted Threat Protection - Impersonation Protect, if the email was detected to be from a new domain. | keyword |
mimecast.IPReplyMismatch | For emails subject to Targeted Threat Protection - Impersonation Protect, if the email was detetced to have a mismatch in the reply to address. | keyword |
mimecast.IPSimilarDomain | For emails subject to Targeted Threat Protection - Impersonation Protect, if the email was detetced to be from a similar domain to any domain you have registered as an Internal Domain. | keyword |
mimecast.IPThreadDict | For emails subject to Targeted Threat Protection - Impersonation Protect, if the content of the email was detected to contain words in the Mimecast threat dictionary. | keyword |
mimecast.InternalName | The email was detected to be from an internal user name. | keyword |
mimecast.Latency | The time in milliseconds that the delivery attempt took. | long |
mimecast.MimecastIP | The source IP is one of the Mimecast' IPs e.g. Mimecast Personal Portal. | keyword |
mimecast.MsgId | The internet message id of the email. | keyword |
mimecast.MsgSize | The total size of the email. | long |
mimecast.RcptActType | Action after reception. | keyword |
mimecast.RcptHdrType | Type of the receipt header. | keyword |
mimecast.ReceiptAck | The receipt acknowledgment message received by Mimecast from the receiving mail server. | keyword |
mimecast.Recipient | The recipient of the original message. | keyword |
mimecast.ReplyMismatch | The reply address does not correspond to the senders address. | keyword |
mimecast.Route | Email route. | keyword |
mimecast.ScanResultInfo | The reason that the click was blocked. | keyword |
mimecast.SenderDomainInternal | The sender domain is a registered internal domain. | keyword |
mimecast.SimilarCustomExternalDomain | The senders domain is similar to a custom external domain list. | keyword |
mimecast.SimilarInternalDomain | The senders domain is similar to a registered internal domain. | keyword |
mimecast.SimilarMimecastExternalDomain | The senders domain is similar to a Mimecast managed list of domains. | keyword |
mimecast.Snt | The amount of data in bytes that were delivered. | long |
mimecast.SpamInfo | Information from Mimecast Spam scanners for messages found to be Spam. | keyword |
mimecast.SpamLimit | The Spam limit defined for the given sender and recipient. | long |
mimecast.SpamProcessingDetail | The Spam processing details for DKIM, SPF, DMARC. | flattened |
mimecast.SpamScore | The Spam score the email was given. | long |
mimecast.Subject | The subject of the email, limited to 150 characters. | keyword |
mimecast.TaggedExternal | The message has been tagged as originating from a external source. | keyword |
mimecast.TaggedMalicious | The message has been tagged as malicious. | keyword |
mimecast.ThreatDictionary | The content of the email was detected to contain words in the Mimecast threat dictionary. | keyword |
mimecast.UrlCategory | The category of the URL that was clicked. | keyword |
mimecast.Virus | The name of the virus found on the email, if applicable. | keyword |
mimecast.acc | The Mimecast account code for your account. | keyword |
mimecast.accountId | The Mimecast account code for your account | keyword |
mimecast.action | The action taken at the receipt stage. Receipt logs:(Rej; Acc; Ign; Bnc), Process logs:(Acc; Hld; Bnc; Sdbx; Rty), Impersonation Protect logs:(None; Hold), URL Protect logs:(Block). | keyword |
mimecast.aggregateId | Unique identifier that allows you to correlate/group related events. | keyword |
mimecast.analysis | The senders domain is similar to a custom external domain list. | keyword |
mimecast.attachments | The filenames of all attachments on the email | keyword |
mimecast.blockReason | The reason click was blocked. (Unknown; File Detected; Clean; Malicious; Suspicious) | keyword |
mimecast.credentialTheft | The info about credential theft. | keyword |
mimecast.customNameMatch | The message has matched a custom name. True; False | keyword |
mimecast.customThreatDictionary | The content of the email was detected to contain words in the client custom threat dictionary. (True; False) | keyword |
mimecast.customerIp | The source IP is one of the accounts authorised IPs or one of the authorised IPs belonging to an Umbrella Account, if the Account uses an Umbrella Account. | keyword |
mimecast.delivered | * If the email was delivered successfully or not. False; True | keyword |
mimecast.delivery | Attempts The count of attempts that the Mimecast MTA has made to deliver the email. | keyword |
mimecast.deliveryAttempts | keyword | |
mimecast.deliveryErrors | Information about any errors that occurred on the delivery attempt. | keyword |
mimecast.deliveryTime | The time in milliseconds that the delivery attempt took. | keyword |
mimecast.destinationIp | The destination IP address for the delivery attempt. | keyword |
mimecast.direction | The direction of the email based on the sending and receiving domains. (Inbound; Outbound; Internal; External) | keyword |
mimecast.emailSize | The amount of data in bytes that were delivered. | keyword |
mimecast.fileExtension | The file extension. | keyword |
mimecast.fileName | The name of file. | keyword |
mimecast.holdReason | The reason the email was held for review (quarantined), if applicable. (Spm; Att; RcptLimit; Exp; Imp; Sbx; Oth; Url; Ctnt; Dpp; RBL; (absent)) | keyword |
mimecast.internalUserName | The email was detected to be from an internal user name. (Hit; No Hit) | keyword |
mimecast.ipNewDomain | For emails subject to Targeted Threat Protection: Impersonation Protect, if the email was detected to be from a new domain. | keyword |
mimecast.ipReplyMismatch | For emails subject to Targeted Threat Protection: Impersonation Protect, if the email was detetced to have a mismatch in the reply to address. | keyword |
mimecast.ipSimilarDomain | For emails subject to Targeted Threat Protection: Impersonation Protect, if the email was detetced to be from a similar domain to any domain you have registered as an Internal Domain. | keyword |
mimecast.ipThreatDictionary | For emails subject to Targeted Threat Protection: Impersonation Protect, if the content of the email was detected to contain words in the Mimecast threat dictionary. | keyword |
mimecast.ipUserName | For emails subject to Targeted Threat Protection: Impersonation Protect, if the email was detected to be from an internal user name. | keyword |
mimecast.itemsDetected | Number of items flagged for the message. | keyword |
mimecast.log_type | String to get type of SIEM log. | keyword |
5 | MD5 Hash. | keyword |
mimecast.messageId | The internet message id of the email. | keyword |
mimecast.mimecastThreatDictionary | The content of the email was detected to contain words in the Mimecast threat dictionary. (True; False) | keyword |
mimecast.monitoredDomainSource | the source of the URL match based on Mimecast’s heuristic scanning techniques | keyword |
mimecast.msgid | The internet message id of the email. | keyword |
mimecast.newDomain | The email was detected to be from a new domain (True; False) | keyword |
mimecast.numberAttachments | The number of attachments on the email. | keyword |
mimecast.policyDefinition | The definition of policy triggered. | keyword |
mimecast.processingId | Unique identifier that allows you to correlate/group related events. | keyword |
mimecast.receiptErrors | Information about any errors that occurred during receipt. | keyword |
mimecast.recipients | The recipient of the email. | keyword |
mimecast.rejectionCode | The rejection code, for messages rejected by the receiving mail server. | keyword |
mimecast.rejectionInfo | The rejection information if the email was rejected at the receipt stage. | keyword |
mimecast.rejectionType | The rejection type, for messages rejected by the receiving mail server. | keyword |
mimecast.replyMismatch | The reply address does not correspond to the senders address. (True; False) | keyword |
mimecast.route | The route of the message. (Inbound; Outbound; Internal; External) | keyword |
mimecast.scanResults | The reason that the click was blocked. | keyword |
mimecast.senderDomain | The sender domain. | keyword |
mimecast.senderDomainInternal | The sender domain is a registered internal domain. | keyword |
mimecast.senderEnvelope | The sender of the email. | keyword |
mimecast.senderHeader | Sender address found in the from header of the email. | keyword |
mimecast.senderIp | The source IP of the original message or sending mail server. | keyword |
mimecast.sha1 | SHA1 hash. | keyword |
mimecast.sha256 | SHA256 hash. | keyword |
mimecast.similarCustomExternalDomain | The senders domain is similar to a custom external domain list. (True; False) | keyword |
mimecast.similarDomain | The domain is similar to a registered domain. | keyword |
mimecast.similarInternalDomain | The senders domain is similar to a registered internal domain. (True; False) | keyword |
mimecast.similarMimecastExternalDomain | The senders domain is similar to a Mimecast managed list of domains. (True; False) | keyword |
mimecast.similarMimecastExternalDomainResults | Advanced phishing detection results from scanners | keyword |
mimecast.sizeAttachment | The size (in bytes) of the malicious file. | keyword |
mimecast.sourceIp | The source IP of the original message. | keyword |
mimecast.spamDetectionLevel | The detection level defined for the given sender and recipient. | keyword |
mimecast.spamInfo | Information from Mimecast Spam scanners for messages found to be Spam. | keyword |
mimecast.spamProcessingDetail | The Spam processing details for DKIM, SPF, DMARC | keyword |
mimecast.spamScore | The metric that measures the likelihood of the event being considered spam. | keyword |
mimecast.subject | The subject of the email. | keyword |
mimecast.subtype | keyword | |
mimecast.taggedExternal | The message has been tagged as originating from a external source. (True; False) | keyword |
mimecast.taggedMalicious | The message has been tagged as malicious. (True; False) | keyword |
mimecast.timestamp | The date and time of event. | keyword |
mimecast.tlsCipher | The TLS Cipher used if the email was delivered or received using TLS. | keyword |
mimecast.tlsUsed | If the message was delivered using TLS or not. (Yes; No) | keyword |
mimecast.tlsVersion | The TLS version used if the email was delivered or received using TLS. | keyword |
mimecast.totalSizeAttachments | The total size of all attachments on the email. | keyword |
mimecast.url | URL Clicked | keyword |
mimecast.urlCategory | The category of the URL that was clicked. | keyword |
mimecast.virusFound | The name or signature of the virus found on the email, if applicable. | keyword |
This is the mimecast.threat_intel_malware_customer
dataset. These logs contain information about messages that return identified malware threats at a customer level. Learn more about these logs.
**Example**
An example event for threat_intel_malware_customer
looks as following:
{
"@timestamp": "2024-11-18T16:08:27.231Z",
"agent": {
"ephemeral_id": "d1f430e4-51c4-4477-b0c8-c09935910589",
"id": "2f4dbe4d-f9d3-4bb4-b16e-cc670095357a",
"name": "elastic-agent-69346",
"type": "filebeat",
"version": "8.14.0"
},
"data_stream": {
"dataset": "mimecast.threat_intel_malware_customer",
"namespace": "60530",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "2f4dbe4d-f9d3-4bb4-b16e-cc670095357a",
"snapshot": false,
"version": "8.14.0"
},
"event": {
"agent_id_status": "verified",
"category": [
"threat",
"email",
"malware"
],
"dataset": "mimecast.threat_intel_malware_customer",
"ingested": "2024-12-05T01:02:33Z",
"kind": "enrichment",
"original": "{\"created\":\"2024-11-18T16:08:27.231Z\",\"id\":\"indicator--dd9dd839-2362-4e60-9685-7d0b3b8e9497\",\"labels\":[\"malicious-activity\"],\"modified\":\"2024-11-18T16:08:27.231Z\",\"pattern\":\"[file:hashes.'SHA-256' = '275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f']\",\"type\":\"indicator\",\"valid_from\":\"2024-11-18T16:08:27.231Z\"}",
"type": [
"indicator"
]
},
"input": {
"type": "cel"
},
"mimecast": {
"id": "indicator--dd9dd839-2362-4e60-9685-7d0b3b8e9497",
"labels": [
"malicious-activity"
],
"pattern": "[file:hashes.'SHA-256' = '275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f']",
"type": "indicator"
},
"related": {
"hash": [
"275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f"
]
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-threat-intel-feed-malware-customer",
"malicious-activity"
],
"threat": {
"indicator": {
"file": {
"hash": {
"sha256": "275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f"
}
},
"first_seen": "2024-11-18T16:08:27.231Z",
"modified_at": "2024-11-18T16:08:27.231Z",
"type": "file"
}
}
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.created | When the indicator was last created. | date |
mimecast.hashtype | The hash type. | keyword |
mimecast.id | The ID of the indicator. | keyword |
mimecast.labels | The labels related to the indicator. | keyword |
mimecast.log_type | String to get type of Threat intel feed. | keyword |
mimecast.modified | When the indicator was last modified. | date |
mimecast.name | Name of the file. | keyword |
mimecast.pattern | The pattern. | keyword |
mimecast.relationship_type | Type of the relationship. | keyword |
mimecast.source_ref | Source of the reference. | keyword |
mimecast.target_ref | Reference target. | keyword |
mimecast.type | The indicator type, can for example be "domain, email, FileHash-SHA256". | keyword |
mimecast.valid_from | The valid from date. | date |
mimecast.value | The value of the indicator. | keyword |
This is the mimecast.threat_intel_malware_grid
dataset. These logs contain information about messages that return identified malware threats at a regional grid level. More about these logs.
**Example**
An example event for threat_intel_malware_grid
looks as following:
{
"@timestamp": "2024-11-18T23:45:40.537Z",
"agent": {
"ephemeral_id": "5324b627-0cb0-4c9c-ade5-b381ee81af8f",
"id": "e14a2fc5-d58b-4d98-a9ee-46df63eab758",
"name": "elastic-agent-94233",
"type": "filebeat",
"version": "8.14.0"
},
"data_stream": {
"dataset": "mimecast.threat_intel_malware_grid",
"namespace": "50567",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "e14a2fc5-d58b-4d98-a9ee-46df63eab758",
"snapshot": false,
"version": "8.14.0"
},
"event": {
"agent_id_status": "verified",
"category": [
"threat",
"email",
"malware"
],
"dataset": "mimecast.threat_intel_malware_grid",
"ingested": "2024-12-05T01:20:52Z",
"kind": "enrichment",
"original": "{\"created\":\"2024-11-18T23:45:40.537Z\",\"id\":\"indicator--9633476b-0235-41cb-b9fb-6cc48b15391f\",\"labels\":[\"malicious-activity\"],\"modified\":\"2024-11-18T23:45:40.537Z\",\"pattern\":\"[file:hashes.'SHA-256' = '838c3483b20a3f81a199c49e7dc30b39d8d23a9810608f2bb7bb5ca059d42a72']\",\"type\":\"indicator\",\"valid_from\":\"2024-11-18T23:45:40.537Z\"}",
"type": [
"indicator"
]
},
"input": {
"type": "cel"
},
"mimecast": {
"id": "indicator--9633476b-0235-41cb-b9fb-6cc48b15391f",
"labels": [
"malicious-activity"
],
"pattern": "[file:hashes.'SHA-256' = '838c3483b20a3f81a199c49e7dc30b39d8d23a9810608f2bb7bb5ca059d42a72']",
"type": "indicator"
},
"related": {
"hash": [
"838c3483b20a3f81a199c49e7dc30b39d8d23a9810608f2bb7bb5ca059d42a72"
]
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-threat-intel-feed-malware-grid",
"malicious-activity"
],
"threat": {
"indicator": {
"file": {
"hash": {
"sha256": "838c3483b20a3f81a199c49e7dc30b39d8d23a9810608f2bb7bb5ca059d42a72"
}
},
"first_seen": "2024-11-18T23:45:40.537Z",
"modified_at": "2024-11-18T23:45:40.537Z",
"type": "file"
}
}
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.created | When the indicator was last created. | date |
mimecast.hashtype | The hash type. | keyword |
mimecast.id | The ID of the indicator. | keyword |
mimecast.labels | The labels related to the indicator. | keyword |
mimecast.log_type | String to get type of Threat intel feed. | keyword |
mimecast.modified | When the indicator was last modified. | date |
mimecast.name | Name of the file. | keyword |
mimecast.pattern | The pattern. | keyword |
mimecast.relationship_type | Type of the relationship. | keyword |
mimecast.source_ref | Source of the reference. | keyword |
mimecast.target_ref | Reference target. | keyword |
mimecast.type | The indicator type, can for example be "domain, email, FileHash-SHA256". | keyword |
mimecast.valid_from | The valid from date. | date |
mimecast.value | The value of the indicator. | keyword |
This is the mimecast.ttp_ap_logs
dataset. These logs contain Mimecast TTP attachment protection logs with the following details: result of attachment analysis (if it is malicious or not etc.), date when file is released, sender and recipient address, filename and type, action triggered for the attachment, the route of the original email containing the attachment and details. Learn more about these logs.
**Example**
An example event for ttp_ap
looks as following:
{
"@timestamp": "2024-11-17T00:52:30.000Z",
"agent": {
"ephemeral_id": "10879bb9-44da-4174-a9f3-9c7a620c6a1b",
"id": "e12e39dc-5a8b-4aef-864e-fe617a5507e2",
"name": "elastic-agent-80555",
"type": "filebeat",
"version": "8.14.0"
},
"data_stream": {
"dataset": "mimecast.ttp_ap_logs",
"namespace": "21632",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "e12e39dc-5a8b-4aef-864e-fe617a5507e2",
"snapshot": false,
"version": "8.14.0"
},
"email": {
"attachments": {
"file": {
"extension": "xlsx",
"hash": {
"sha256": "168dde02cf41aed3bf31ad831b75d8ee0b738304baa6957c40e29b2487f15116"
},
"mime_type": "application/vnd.openxmlformats-officedocument.spreadsheetml.sheet",
"name": "Sandbox Test.xlsx"
}
},
"direction": "internal",
"from": {
"address": [
"eric.boyt@demo-int.elastic.mime-api.com"
]
},
"message_id": "<675ddc8ccedda6a7-363046@hapi.b41.one>",
"subject": "RE",
"to": {
"address": [
"charles.weldon@demo-int.elastic.mime-api.com"
]
}
},
"event": {
"action": "none",
"agent_id_status": "verified",
"category": [
"email"
],
"created": "2024-11-17T00:52:30+0000",
"dataset": "mimecast.ttp_ap_logs",
"ingested": "2024-12-05T01:08:12Z",
"original": "{\"actionTriggered\":\"none\",\"date\":\"2024-11-17T00:52:30+0000\",\"definition\":\"Default Internal Attachment Protect Definition\",\"details\":\"Malicious \\r\\nTime taken: 0 hrs, 0 min, 1 sec\",\"fileHash\":\"168dde02cf41aed3bf31ad831b75d8ee0b738304baa6957c40e29b2487f15116\",\"fileName\":\"Sandbox Test.xlsx\",\"fileType\":\"application/vnd.openxmlformats-officedocument.spreadsheetml.sheet\",\"messageId\":\"\\u003c675ddc8ccedda6a7-363046@hapi.b41.one\\u003e\",\"recipientAddress\":\"charles.weldon@demo-int.elastic.mime-api.com\",\"result\":\"malicious\",\"route\":\"internal\",\"senderAddress\":\"eric.boyt@demo-int.elastic.mime-api.com\",\"subject\":\"RE\"}"
},
"input": {
"type": "cel"
},
"mimecast": {
"details": "Malicious \r\nTime taken: 0 hrs, 0 min, 1 sec",
"result": "malicious"
},
"related": {
"hash": [
"168dde02cf41aed3bf31ad831b75d8ee0b738304baa6957c40e29b2487f15116"
]
},
"rule": {
"name": "Default Internal Attachment Protect Definition"
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-ttp-ap"
]
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.actionTriggered | The action triggered for the attachment. | keyword |
mimecast.definition | The definition. | keyword |
mimecast.details | Detailed output of the attachment sandbox processing. | keyword |
mimecast.fileHash | The hash of the attachment. | keyword |
mimecast.fileName | The file name of the original attachment. | keyword |
mimecast.fileType | The file type of the attachment. | keyword |
mimecast.messageId | The internet message id of the email. | keyword |
mimecast.recipientAddress | The address of the user that received the attachment. | keyword |
mimecast.result | The result of the attachment analysis - clean, malicious, unknown, or timeout. | keyword |
mimecast.route | The route of the original email containing the attachment, either - inbound, outbound, internal, or external. | keyword |
mimecast.senderAddress | The sender of the attachment. | keyword |
mimecast.subject | The subject of the email. | keyword |
This is the mimecast.ttp_ip_logs
dataset. These logs contain information about messages containing information flagged by an Impersonation Protection configuration. Learn more about [these logs] (https://integrations.mimecast.com/documentation/endpoint-reference/logs-and-statistics/get-ttp-impersonation-protect-logs/).
**Example**
An example event for ttp_ip
looks as following:
{
"@timestamp": "2021-11-12T15:27:14.000Z",
"agent": {
"ephemeral_id": "7b14936f-f3a2-4c0d-84ca-343382ff527a",
"id": "628d55fb-6e16-49d4-a0ba-b6db1b4d2281",
"name": "elastic-agent-89042",
"type": "filebeat",
"version": "8.14.0"
},
"data_stream": {
"dataset": "mimecast.ttp_ip_logs",
"namespace": "61588",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "628d55fb-6e16-49d4-a0ba-b6db1b4d2281",
"snapshot": false,
"version": "8.14.0"
},
"email": {
"from": {
"address": [
"johndoe@example.com"
]
},
"message_id": "<2-MN2PR16MB2719879CA4DB60C265F7FD8FB0959@MN2PR16MB2719.namprd16.example.outlook.com>",
"subject": "Don't read, just fill out!",
"to": {
"address": [
"johndoejr@exampple.com"
]
}
},
"event": {
"action": "none",
"agent_id_status": "verified",
"category": [
"email"
],
"created": "2021-11-12T15:27:14+0000",
"dataset": "mimecast.ttp_ip_logs",
"id": "MTOKEN:eNqrVkouLS7Jz00tSs5PSVWyUnI2MXM0N1XSUcpMUbIyMjM3MzCw0FEqSy0qzszPU7Iy1FEqyQMrNDAwV6oFAGP7Ehc",
"ingested": "2024-12-05T01:13:21Z",
"original": "{\"action\":\"none\",\"definition\":\"IP - 1 hit (Tag email)\",\"eventTime\":\"2021-11-12T15:27:14+0000\",\"hits\":1,\"id\":\"MTOKEN:eNqrVkouLS7Jz00tSs5PSVWyUnI2MXM0N1XSUcpMUbIyMjM3MzCw0FEqSy0qzszPU7Iy1FEqyQMrNDAwV6oFAGP7Ehc\",\"identifiers\":[\"internal_user_name\"],\"impersonationResults\":[{\"checkerResult\":\"hit\",\"impersonationDomainSource\":\"internal_user_name\",\"similarDomain\":\"John Doe \\u003cjohndoe_nu@example.com\\u003e\",\"stringSimilarToDomain\":\"John Doe\"}],\"messageId\":\"\\u003c2-MN2PR16MB2719879CA4DB60C265F7FD8FB0959@MN2PR16MB2719.namprd16.example.outlook.com\\u003e\",\"recipientAddress\":\"johndoejr@exampple.com\",\"senderAddress\":\"johndoe@example.com\",\"senderIpAddress\":\"8.8.8.8\",\"subject\":\"Don't read, just fill out!\",\"taggedExternal\":false,\"taggedMalicious\":true}"
},
"input": {
"type": "cel"
},
"mimecast": {
"hits": 1,
"identifiers": [
"internal_user_name"
],
"impersonationResults": [
{
"checkerResult": "hit",
"impersonationDomainSource": "internal_user_name",
"similarDomain": "John Doe <johndoe_nu@example.com>",
"stringSimilarToDomain": "John Doe"
}
],
"taggedExternal": false,
"taggedMalicious": true
},
"related": {
"ip": [
"8.8.8.8"
]
},
"rule": {
"name": "IP - 1 hit (Tag email)"
},
"source": {
"ip": "8.8.8.8"
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-ttp-ip"
]
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.action | The action triggered by the email. | keyword |
mimecast.definition | The name of the policy definition that triggered the log. | keyword |
mimecast.hits | The number of identifiers that the message triggered. | long |
mimecast.id | A token that can be used to retrieve this log again. | keyword |
mimecast.identifiers | The properties of the message that triggered the action - similar_internal_domain, newly_observed_domain, internal_user_name, reply_address_mismatch, and/or targeted_threat_dictionary. | keyword |
mimecast.impersonationResults.checkerResult | Result checker. | keyword |
mimecast.impersonationResults.impersonationDomainSource | Impersonation domain source. | keyword |
mimecast.impersonationResults.similarDomain | Similar domain. | keyword |
mimecast.impersonationResults.stringSimilarToDomain | The string that is suspiciously similar to a known value within the Mimecast configuration. Multiple triggers will be comma-separated. | keyword |
mimecast.messageId | The message-id of the identified message. | keyword |
mimecast.recipientAddress | The email address of the recipient of the email. | keyword |
mimecast.senderAddress | The email address of the sender of the message. | keyword |
mimecast.senderIpAddress | The source IP address of the message. | keyword |
mimecast.subject | The subject of the email. | keyword |
mimecast.taggedExternal | Whether the message was tagged as coming from an external address. | boolean |
mimecast.taggedMalicious | Whether the message was tagged as malicious. | boolean |
This is the mimecast.ttp_url_logs
dataset. These logs contain Mimecast TTP attachment protection logs with the following details: the category of the URL clicked, the email address of the user who clicked the link, the url clicked, the action taken by the user if user awareness was applied, the route of the email that contained the link, the action defined by the administrator for the URL, the date that the URL was clicked, url scan result, the action that was taken for the click, the description of the definition that triggered the URL to be rewritten by Mimecast, the action requested by the user, an array of components of the message where the URL was found. More about these logs.
**Example**
An example event for ttp_url
looks as following:
{
"@timestamp": "2024-11-13T13:03:11.000Z",
"agent": {
"ephemeral_id": "675bf199-2969-46bf-a9c1-8f880acc18f4",
"id": "d0b37a9a-11c1-4a25-898d-0ddb211b9fd2",
"name": "elastic-agent-71893",
"type": "filebeat",
"version": "8.14.0"
},
"data_stream": {
"dataset": "mimecast.ttp_url_logs",
"namespace": "65054",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "d0b37a9a-11c1-4a25-898d-0ddb211b9fd2",
"snapshot": false,
"version": "8.14.0"
},
"email": {
"direction": "inbound",
"from": {
"address": [
"gregoryhunt@thejunglegroup.b41.one"
]
},
"message_id": "<cc11f61d32d018de-152846@hapi.b41.one>",
"subject": "Re",
"to": {
"address": [
"mike.a.roberts@demo-int.elastic.mime-api.com"
]
}
},
"event": {
"action": "N/A",
"agent_id_status": "verified",
"category": [
"email"
],
"created": "2024-11-13T13:03:11+0000",
"dataset": "mimecast.ttp_url_logs",
"ingested": "2024-12-05T01:17:02Z",
"original": "{\"action\":\"warn\",\"actions\":\"Block\",\"adminOverride\":\"N/A\",\"category\":\"Dangerous file extension\",\"creationMethod\":\"Entry Scan\",\"date\":\"2024-11-13T13:03:11+0000\",\"emailPartsDescription\":[\"Attachment\"],\"fromUserEmailAddress\":\"gregoryhunt@thejunglegroup.b41.one\",\"messageId\":\"\\u003ccc11f61d32d018de-152846@hapi.b41.one\\u003e\",\"route\":\"inbound\",\"scanResult\":\"malicious\",\"sendingIp\":\"54.243.138.179\",\"subject\":\"Re\",\"tagMap\":{\"DangerousFileExt\":{\"ContentCheck:ContentScannersBlocked\":[\".exe\"],\"ContentCheck:DangerousExtsUrlFileDownload\":[\"dll\"],\"ContentCheck:DangerousMimetypesUrlFileDownload\":[\"application/x-msdownload\"],\"Inspect:FileExts\":[\"[exe]\"],\"Inspect:MimeTypes\":[\"[]\"],\"Status\":[\"CustomerSpecific\",\"VerdictBlock\"]}},\"ttpDefinition\":\"Default Inbound URL Protect Definition\",\"url\":\"https://oneclient.sfx.ms/Win/Preview/OneDriveSetup.exe\",\"userAwarenessAction\":\"N/A\",\"userEmailAddress\":\"mike.a.roberts@demo-int.elastic.mime-api.com\",\"userOverride\":\"None\"}"
},
"input": {
"type": "cel"
},
"mimecast": {
"action": "warn",
"actions": "Block",
"adminOverride": "N/A",
"category": "Dangerous file extension",
"creationMethod": "Entry Scan",
"emailPartsDescription": [
"Attachment"
],
"scanResult": "malicious",
"tagMap": {
"DangerousFileExt": {
"ContentCheck_ContentScannersBlocked": [
".exe"
],
"ContentCheck_DangerousExtsUrlFileDownload": [
"dll"
],
"ContentCheck_DangerousMimetypesUrlFileDownload": [
"application/x-msdownload"
],
"Inspect_FileExts": [
"[exe]"
],
"Inspect_MimeTypes": [
"[]"
],
"Status": [
"CustomerSpecific",
"VerdictBlock"
]
}
},
"userOverride": "None"
},
"related": {
"ip": [
"54.243.138.179"
],
"user": [
"gregoryhunt@thejunglegroup.b41.one",
"mike.a.roberts@demo-int.elastic.mime-api.com"
]
},
"rule": {
"name": "Default Inbound URL Protect Definition"
},
"source": {
"ip": "54.243.138.179"
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-ttp-url"
],
"url": {
"domain": "oneclient.sfx.ms",
"extension": "exe",
"original": "https://oneclient.sfx.ms/Win/Preview/OneDriveSetup.exe",
"path": "/Win/Preview/OneDriveSetup.exe",
"scheme": "https"
},
"user": {
"email": [
"mike.a.roberts@demo-int.elastic.mime-api.com"
]
}
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.action | The action that was taken for the click. | keyword |
mimecast.actions | The actions that were taken. | keyword |
mimecast.adminOverride | The action defined by the administrator for the URL. | keyword |
mimecast.category | The category of the URL clicked. | keyword |
mimecast.creationMethod | The description how event occurred. | keyword |
mimecast.emailPartsDescription | An array of components of the messge where the URL was found. | keyword |
mimecast.fromUserEmailAddress | The email of user who triggers the event. | keyword |
mimecast.messageId | The message-id value of the message. | keyword |
mimecast.route | The route of the email that contained the link. | keyword |
mimecast.scanResult | The result of the URL scan. | keyword |
mimecast.sendingIp | The IP of user who triggers the event. | keyword |
mimecast.subject | The subject of the email. | keyword |
mimecast.tagMap.DangerousFileExt.ContentCheck_ContentScannersBlocked | keyword | |
mimecast.tagMap.DangerousFileExt.ContentCheck_DangerousExtsUrlFileDownload | keyword | |
mimecast.tagMap.DangerousFileExt.ContentCheck_DangerousMimetypesUrlFileDownload | keyword | |
mimecast.tagMap.DangerousFileExt.Inspect_FileExts | keyword | |
mimecast.tagMap.DangerousFileExt.Inspect_MimeTypes | keyword | |
mimecast.tagMap.DangerousFileExt.Status | keyword | |
mimecast.tagMap.UrlReputationScan.Status | keyword | |
mimecast.tagMap.UrlReputationScan.Type | keyword | |
mimecast.tagMap.UrlReputationScan.Url | keyword | |
mimecast.tagMap.UrlReputationScan.UrlBlock | keyword | |
mimecast.ttpDefinition | The description of the definition that triggered the URL to be rewritten by Mimecast. | keyword |
mimecast.url | The url clicked. | keyword |
mimecast.userAwarenessAction | The action taken by the user if user awareness was applied. | keyword |
mimecast.userEmailAddress | The email address of the user who clicked the link. | keyword |
mimecast.userOverride | The action requested by the user. | keyword |
**Changelog**
Version | Details | Kibana version(s) |
---|---|---|
2.4.1 | pass:[] Bug fix (View pull request) Remove invalid remove processor. |
8.15.0 or higher |
2.4.0 | pass:[] Enhancement (View pull request) Do not remove event.original in main ingest pipeline. |
8.15.0 or higher |
2.3.0 | pass:[] Enhancement (View pull request) Add cloud_integrated_logs data stream. |
8.15.0 or higher |
2.2.0 | pass:[] Enhancement (View pull request) Add "preserve_original_event" tag to documents with event.kind set to "pipeline_error". |
8.15.0 or higher |
2.1.0 | pass:[] Enhancement (View pull request) Add v2 API client for siem_logs . |
8.15.0 or higher |
2.0.0 | pass:[] Breaking change (View pull request) Migrate message release logs data stream to Mimecast v2 API. pass:[] Enhancement (View pull request) Add v2 API clients for archive_search_logs , audit_events , dlp_logs , threat_intel_malware_customer , threat_intel_malware_grid , ttp_ap_logs , ttp_ip_logs , and ttp_url_logs . |
8.14.0 or higher |
1.27.4 | pass:[] Bug fix (View pull request) Fix handling of time values with short timezone IDs. |
8.14.0 or higher |
1.27.3 | pass:[] Bug fix (View pull request) Fix parsing of "logon-authentication-failed" events. |
8.14.0 or higher |
1.27.2 | pass:[] Bug fix (View pull request) Use triple-brace Mustache templating when referencing variables in ingest pipelines. |
8.14.0 or higher |
1.27.1 | pass:[] Bug fix (View pull request) Use triple-brace Mustache templating when referencing variables in ingest pipelines. |
8.14.0 or higher |
1.27.0 | pass:[] Enhancement (View pull request) Add support for message release logs. |
8.14.0 or higher |
1.26.1 | pass:[] Bug fix (View pull request) Fix handling of email addresses with comma in quoted name. |
8.13.0 or higher |
1.26.0 | pass:[] Enhancement (View pull request) Update the kibana constraint to ^8.13.0. Modified the field definitions to remove ECS fields made redundant by the ecs@mappings component template. |
8.13.0 or higher |
1.25.0 | pass:[] Enhancement (View pull request) Improve handling of empty responses. |
8.12.0 or higher |
1.24.0 | pass:[] Enhancement (View pull request) Log processing stage and improve document fingerprinting. |
8.12.0 or higher |
1.23.0 | pass:[] Enhancement (View pull request) Set sensitive values as secret. |
8.12.0 or higher |
1.22.1 | pass:[] Enhancement (View pull request) Changed owners |
8.7.1 or higher |
1.22.0 | pass:[] Enhancement (View pull request) Limit request tracer log count to five. |
8.7.1 or higher |
1.21.0 | pass:[] Enhancement (View pull request) ECS version updated to 8.11.0. |
8.7.1 or higher |
1.20.0 | pass:[] Enhancement (View pull request) Improve event.original check to avoid errors if set. |
8.7.1 or higher |
1.19.0 | pass:[] Enhancement (View pull request) Set partner owner type. |
8.7.1 or higher |
1.18.0 | pass:[] Enhancement (View pull request) ECS version updated to 8.10.0. |
8.7.1 or higher |
1.17.0 | pass:[] Enhancement (View pull request) The format_version in the package manifest changed from 2.11.0 to 3.0.0. Removed dotted YAML keys from package manifest. Added owner.type: elastic to package manifest. |
8.7.1 or higher |
1.16.0 | pass:[] Enhancement (View pull request) Add tags.yml file so that integration’s dashboards and saved searches are tagged with "Security Solution" and displayed in the Security Solution UI. |
8.7.1 or higher |
1.15.0 | pass:[] Enhancement (View pull request) Add support for Archive Search Logs |
8.7.1 or higher |
1.14.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.9.0. |
8.7.1 or higher |
1.13.0 | pass:[] Enhancement (View pull request) Update package-spec to 2.9.0. |
8.7.1 or higher |
1.12.0 | pass:[] Enhancement (View pull request) Document valid duration units. |
8.7.1 or higher |
1.11.0 | pass:[] Enhancement (View pull request) Ensure event.kind is correctly set for pipeline errors. |
8.7.1 or higher |
1.10.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.8.0. |
8.7.1 or higher |
1.9.1 | pass:[] Bug fix (View pull request) Fix parsing of Logon Authentication Failed audit event. |
8.7.1 or higher |
1.9.0 | pass:[] Enhancement (View pull request) Change Request trace filename |
8.7.1 or higher |
1.8.1 | pass:[] Bug fix (View pull request) Check ttp URL source IP values for type conformity. |
8.5.0 or higher |
1.8.0 | pass:[] Enhancement (View pull request) Add toggle to enable request tracing. |
8.5.0 or higher |
1.7.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.7.0. |
8.3.0 or higher |
1.6.5 | pass:[] Enhancement (View pull request) Added categories and/or subcategories. |
8.3.0 or higher |
1.6.4 | pass:[] Bug fix (View pull request) Define mimecast.SpamProcessingDetail as flattened. |
8.3.0 or higher |
1.6.3 | pass:[] Bug fix (View pull request) Fingerprint events to prevent duplicate document ingestion. |
8.3.0 or higher |
1.6.2 | pass:[] Bug fix (View pull request) Fix mimecast template config |
8.3.0 or higher |
1.6.1 | pass:[] Bug fix (View pull request) Drop empty event sets in data streams. |
8.3.0 or higher |
1.6.0 | pass:[] Enhancement (View pull request) Fingerprint audit events on their ID. |
8.3.0 or higher |
1.5.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.6.0. |
8.3.0 or higher |
1.4.3 | pass:[] Bug fix (View pull request) Fix timezone format in httpjson input in multiple datastreams |
8.3.0 or higher |
1.4.2 | pass:[] Enhancement (View pull request) Migrate the visualizations to by value in dashboards to minimize the saved object clutter and reduce time to load |
8.3.0 or higher |
1.4.1 | pass:[] Bug fix (View pull request) Remove duplicate fields. |
8.3.0 or higher |
1.4.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.5.0. |
8.3.0 or higher |
1.3.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.4.0 |
8.3.0 or higher |
1.2.1 | pass:[] Bug fix (View pull request) Fix compression for SIEM logs. |
8.3.0 or higher |
1.2.0 | pass:[] Enhancement (View pull request) Update categories to include threat_intel . |
8.3.0 or higher |
1.1.2 | pass:[] Enhancement (View pull request) Tidy up Markdown syntax in readme. |
8.3.0 or higher |
1.1.1 | pass:[] Enhancement (View pull request) Update package name and description to align with standard wording |
8.3.0 or higher |
1.1.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.3.0. |
8.3.0 or higher |
1.0.0 | pass:[] Enhancement (View pull request) Make ga with zip support for SIEM events. pass:[] Enhancement (View pull request) Move auth vars to the common manifest. |
8.3.0 or higher |
0.0.12 | pass:[] Enhancement (View pull request) Add more use cases for parsing audit events. |
— |
0.0.11 | pass:[] Enhancement (View pull request) Update integration description for consistency with other integrations. pass:[] Bug fix (View pull request) Add missing ECS event.* field mappings. |
— |
0.0.10 | pass:[] Enhancement (View pull request) Add more use cases to audit_events pipeline pass:[] Enhancement (View pull request) Implement geo.ip for siem logs pass:[] Enhancement (View pull request) Remove user part for ttp-url logs and add email.to.address for recipient |
— |
0.0.9 | pass:[] Enhancement (View pull request) Update ecs to version 8.2.0 and implement better practice for email ECS fields. |
— |
0.0.8 | pass:[] Enhancement (View pull request) Add documentation for multi-fields |
— |
0.0.7 | pass:[] Bug fix (View pull request) Add content-disposition to test mock to properly create sample event from SIEM logs. |
— |
0.0.6 | pass:[] Enhancement (View pull request) Add use cases for audit events and update sample events and docs |
— |
0.0.5 | pass:[] Bug fix (View pull request) Fix typo pass:[] Bug fix (View pull request) Add 8.0.0 compatibility, fix team name in manifest, and remove redundant event.ingested from pipelines. |
— |
0.0.4 | pass:[] Bug fix (View pull request) Regenerate test files using the new GeoIP database |
— |
0.0.3 | pass:[] Bug fix (View pull request) Change test public IPs to the supported subset |
— |
0.0.2 | pass:[] Enhancement (View pull request) Tweaking the dashboards |
— |
0.0.1 | pass:[] Enhancement (View pull request) Initial draft of the package |
— |