Trellix ePO Cloud
<div class="condensed-table">
| | |
| --- | --- |
| Version | 1.14.0 (View all) |
| Compatible Kibana version(s) | 8.13.0 or higher |
| Supported Serverless project types
What’s this? | Security
Observability |
| Subscription level
What’s this? | Basic |
| Level of support
What’s this? | Elastic |
</div>
The Trellix ePO Cloud integration allows users to monitor devices, events and groups. Trellix ePolicy Orchestrator is centralized security management platform to orchestrate and manage all your endpoints.
Use the Trellix ePO integration to collect and parse data from ePO Cloud. This integration does not support on-premises installations of ePO. Then visualize that data from Trellix to identify threats through search, correlation and visualisation within Elastic Security.
The Trellix ePO Cloud integration collects three types of data: devices, events and groups.
Devices fetch all devices.
Events fetch all events.
Groups fetch all groups.
Reference for Rest APIs of Trellix ePO Cloud.
Elastic Agent must be installed. For more information, refer to the link here.
The minimum kibana.version required is 8.7.1.
This module has been tested against the Trellix ePO Cloud API Version v2.
Go to the Trellix Developer Portal and Login by entering an email address and password.
Go to Self Service → API Access Management.
Enter Client Type.
Select IAM Scopes as below:
APIs Method Types Devices GET Events GET Groups GET Click Request.
Copy Client ID, Client Secret and API Key.
Go to kibana and select integration → Trellix ePO Cloud.
Click Add Trellix ePO Cloud.
Provide Client ID, Client Secret and API Key that we’ve copied from Trellix.
NOTE:
- The data retention period for events available via this API is 3 days.
This is the Device
dataset.
**Example**
An example event for device
looks as following:
{
"@timestamp": "2023-05-04T11:10:21.063Z",
"agent": {
"ephemeral_id": "4805b569-e5ef-4c14-a54b-ef2dfe988fa7",
"id": "09aeef39-f21d-41e4-b3a6-c1551488d075",
"name": "docker-fleet-agent",
"type": "filebeat",
"version": "8.7.1"
},
"data_stream": {
"dataset": "trellix_epo_cloud.device",
"namespace": "ep",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "09aeef39-f21d-41e4-b3a6-c1551488d075",
"snapshot": true,
"version": "8.7.1"
},
"event": {
"agent_id_status": "verified",
"category": [
"host"
],
"dataset": "trellix_epo_cloud.device",
"ingested": "2023-05-04T11:10:25Z",
"kind": "event",
"original": "{\"attributes\":{\"agentGuid\":\"3AF594B1-00A0-AA00-87C6-005056833A00\",\"agentPlatform\":\"LINUX\",\"agentState\":0,\"agentVersion\":\"5.7.9.139\",\"computerName\":\"localhost\",\"cpuSpeed\":2100,\"cpuType\":\"Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz\",\"domainName\":\"(none)\",\"excludedTags\":\"\",\"ipAddress\":\"1.128.0.0\",\"ipHostName\":\"localhost\",\"isPortable\":\"non-portable\",\"lastUpdate\":\"2023-04-17T07:38:35.563+00:00\",\"macAddress\":\"00005E005300\",\"managed\":\"1\",\"managedState\":1,\"name\":\"localhost\",\"nodeCreatedDate\":\"2023-03-29T12:06:05.877+00:00\",\"nodePath\":null,\"numOfCpu\":4,\"osBuildNumber\":0,\"osPlatform\":\"Server\",\"osType\":\"Linux\",\"osVersion\":\"3.10\",\"parentId\":123456,\"subnetAddress\":\"\",\"systemBootTime\":\"2023-03-24T16:54:27.000+00:00\",\"systemManufacturer\":\"VMware, Inc.\",\"systemModel\":\"VMware Virtual Platform\",\"systemRebootPending\":0,\"systemSerialNumber\":\"VMware-12 02 1a a1 1c 31 9c eb-0e a6 00 41 54 14 91 f5\",\"tags\":\"Deployment 2, Deployment, Server\",\"tenantId\":12345,\"totalPhysicalMemory\":12409634816,\"userName\":\"N/A\"},\"id\":\"123456\",\"links\":{\"self\":\"https://api.manage.trellix.com/epo/v2/devices/123456\"},\"relationships\":{\"installedProducts\":{\"links\":{\"related\":\"https://api.manage.trellix.com/epo/v2/devices/123456/installedProducts\",\"self\":\"https://api.manage.trellix.com/epo/v2/devices/123456/relationships/installedProducts\"}}},\"type\":\"devices\"}",
"reference": "https://api.manage.trellix.com/epo/v2/devices/123456",
"type": [
"info"
]
},
"host": {
"id": "123456",
"ip": [
"1.128.0.0"
],
"mac": [
"00-00-5E-00-53-00"
],
"name": "localhost",
"os": {
"platform": "Server",
"type": "linux",
"version": "3.10"
}
},
"input": {
"type": "cel"
},
"observer": {
"serial_number": "VMware-12 02 1a a1 1c 31 9c eb-0e a6 00 41 54 14 91 f5"
},
"related": {
"hosts": [
"123456",
"localhost"
],
"ip": [
"1.128.0.0"
]
},
"tags": [
"preserve_original_event",
"preserve_duplicate_custom_fields",
"forwarded",
"trellix_epo_cloud-device"
],
"trellix_epo_cloud": {
"device": {
"attributes": {
"agent": {
"guid": "3AF594B1-00A0-AA00-87C6-005056833A00",
"platform": "LINUX",
"state": false,
"version": "5.7.9.139"
},
"computer_name": "localhost",
"cpu": {
"speed": 2100,
"type": "Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz"
},
"domain_name": "(none)",
"ip_address": "1.128.0.0",
"ip_host_name": "localhost",
"is_portable": "non-portable",
"last_update": "2023-04-17T07:38:35.563Z",
"mac_address": "00-00-5E-00-53-00",
"managed": "1",
"managed_state": false,
"name": "localhost",
"node": {
"created_date": "2023-03-29T12:06:05.877Z"
},
"num_of_cpu": 4,
"os": {
"build_number": 0,
"platform": "Server",
"type": "Linux",
"version": "3.10"
},
"parent": {
"id": "123456"
},
"system": {
"boot_time": "2023-03-24T16:54:27.000Z",
"manufacturer": "VMware, Inc.",
"model": "VMware Virtual Platform",
"reboot_pending": false,
"serial_number": "VMware-12 02 1a a1 1c 31 9c eb-0e a6 00 41 54 14 91 f5"
},
"tags": [
"Deployment 2",
"Deployment",
"Server"
],
"tenant": {
"id": "12345"
},
"total_physical_memory": 12409634816,
"user_name": "N/A"
},
"id": "123456",
"links": {
"self": "https://api.manage.trellix.com/epo/v2/devices/123456"
},
"relationships": {
"installed_products": {
"links": {
"related": "https://api.manage.trellix.com/epo/v2/devices/123456/installedProducts",
"self": "https://api.manage.trellix.com/epo/v2/devices/123456/relationships/installedProducts"
}
}
}
},
"type": "devices"
}
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset. | constant_keyword |
event.module | Event module. | constant_keyword |
input.type | Type of Filebeat input. | keyword |
log.offset | Log offset. | long |
trellix_epo_cloud.device.attributes.agent.guid | keyword | |
trellix_epo_cloud.device.attributes.agent.platform | keyword | |
trellix_epo_cloud.device.attributes.agent.state | boolean | |
trellix_epo_cloud.device.attributes.agent.version | keyword | |
trellix_epo_cloud.device.attributes.computer_name | keyword | |
trellix_epo_cloud.device.attributes.cpu.speed | long | |
trellix_epo_cloud.device.attributes.cpu.type | keyword | |
trellix_epo_cloud.device.attributes.domain_name | keyword | |
trellix_epo_cloud.device.attributes.excluded_tags | keyword | |
trellix_epo_cloud.device.attributes.ip_address | ip | |
trellix_epo_cloud.device.attributes.ip_host_name | keyword | |
trellix_epo_cloud.device.attributes.is_portable | keyword | |
trellix_epo_cloud.device.attributes.last_update | date | |
trellix_epo_cloud.device.attributes.mac_address | keyword | |
trellix_epo_cloud.device.attributes.managed | keyword | |
trellix_epo_cloud.device.attributes.managed_state | boolean | |
trellix_epo_cloud.device.attributes.name | keyword | |
trellix_epo_cloud.device.attributes.node.created_date | date | |
trellix_epo_cloud.device.attributes.node.path | keyword | |
trellix_epo_cloud.device.attributes.num_of_cpu | long | |
trellix_epo_cloud.device.attributes.os.build_number | long | |
trellix_epo_cloud.device.attributes.os.platform | keyword | |
trellix_epo_cloud.device.attributes.os.type | keyword | |
trellix_epo_cloud.device.attributes.os.version | keyword | |
trellix_epo_cloud.device.attributes.parent.id | keyword | |
trellix_epo_cloud.device.attributes.subnet_address | keyword | |
trellix_epo_cloud.device.attributes.system.boot_time | date | |
trellix_epo_cloud.device.attributes.system.manufacturer | keyword | |
trellix_epo_cloud.device.attributes.system.model | keyword | |
trellix_epo_cloud.device.attributes.system.reboot_pending | boolean | |
trellix_epo_cloud.device.attributes.system.serial_number | keyword | |
trellix_epo_cloud.device.attributes.tags | keyword | |
trellix_epo_cloud.device.attributes.tenant.id | keyword | |
trellix_epo_cloud.device.attributes.total_physical_memory | long | |
trellix_epo_cloud.device.attributes.user_name | keyword | |
trellix_epo_cloud.device.id | keyword | |
trellix_epo_cloud.device.links.self | keyword | |
trellix_epo_cloud.device.relationships.devices.data.id | keyword | |
trellix_epo_cloud.device.relationships.devices.data.type | keyword | |
trellix_epo_cloud.device.relationships.devices.links.related | keyword | |
trellix_epo_cloud.device.relationships.devices.links.self | keyword | |
trellix_epo_cloud.device.relationships.installed_products.links.related | keyword | |
trellix_epo_cloud.device.relationships.installed_products.links.self | keyword | |
trellix_epo_cloud.type | keyword |
This is the Event
dataset.
**Example**
An example event for event
looks as following:
{
"@timestamp": "2023-04-06T23:36:14.041Z",
"agent": {
"ephemeral_id": "7dd32c2b-4f80-4ff8-9dd6-873cbbf02295",
"id": "09aeef39-f21d-41e4-b3a6-c1551488d075",
"name": "docker-fleet-agent",
"type": "filebeat",
"version": "8.7.1"
},
"data_stream": {
"dataset": "trellix_epo_cloud.event",
"namespace": "ep",
"type": "logs"
},
"destination": {
"ip": [
"89.160.20.115",
"2a02:cf40::3"
],
"mac": "00-00-5E-00-53-00",
"user": {
"name": "root"
}
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "09aeef39-f21d-41e4-b3a6-c1551488d075",
"snapshot": true,
"version": "8.7.1"
},
"event": {
"agent_id_status": "verified",
"category": [
"threat"
],
"dataset": "trellix_epo_cloud.event",
"id": "0102be3a-41db-448c-9a68-bce7c480d443",
"ingested": "2023-05-04T11:11:36Z",
"kind": "alert",
"original": "{\"attributes\":{\"agentguid\":\"8630b925-cbd2-ed11-1234-abcdefghijklmn\",\"analyzer\":\"ENDP_AM_1070LYNX\",\"analyzerdatversion\":\"5298.0\",\"analyzerdetectionmethod\":\"quick scan\",\"analyzerengineversion\":\"6600.9927\",\"analyzerhostname\":\"ub20\",\"analyzeripv4\":\"81.2.69.142\",\"analyzeripv6\":\"/2a02:cf40::1\",\"analyzermac\":\"00005E005300\",\"analyzername\":\"Trellix Endpoint Security\",\"analyzerversion\":\"10.7.14.38\",\"autoguid\":\"9fcf439b-82d7-425c-1234-abcdefghijklmn\",\"detectedutc\":\"1680823939000\",\"nodepath\":\"1\\\\\854691\\\\\901751\",\"receivedutc\":\"1680824174041\",\"sourcefilepath\":null,\"sourcehostname\":null,\"sourceipv4\":\"89.160.20.112\",\"sourceipv6\":\"/2a02:cf40::2\",\"sourcemac\":\"00005E005300\",\"sourceprocesshash\":null,\"sourceprocessname\":null,\"sourceprocesssigned\":null,\"sourceprocesssigner\":null,\"sourceurl\":\"https://example.com\",\"sourceusername\":null,\"targetfilename\":\"/var/log/secure\",\"targethash\":null,\"targethostname\":null,\"targetipv4\":\"89.160.20.115\",\"targetipv6\":\"/2a02:cf40::3\",\"targetmac\":\"00005E005300\",\"targetport\":null,\"targetprocessname\":\"/usr/sbin/logrotate\",\"targetprotocol\":null,\"targetusername\":\"root\",\"threatactiontaken\":\"IDS_ALERT_ACT_TAK_DEN\",\"threatcategory\":\"ops.update.end\",\"threateventid\":1119,\"threathandled\":true,\"threatname\":\"None\",\"threatseverity\":\"6\",\"threattype\":\"IDS_ALERT_DET_TYP_NOT\",\"timestamp\":\"2023-04-06T23:36:14.041Z\"},\"id\":\"0102be3a-41db-448c-9a68-bce7c480d443\",\"links\":{\"self\":\"/epo/v2/events/0102be3a-41db-448c-9a68-bce7c480d443\"},\"type\":\"MVEvents\"}",
"reference": "/epo/v2/events/0102be3a-41db-448c-9a68-bce7c480d443",
"severity": 6,
"type": [
"indicator"
]
},
"file": {
"name": "/var/log/secure"
},
"input": {
"type": "cel"
},
"related": {
"hosts": [
"https://example.com",
"ub20"
],
"ip": [
"89.160.20.115",
"2a02:cf40::3",
"89.160.20.112",
"2a02:cf40::2",
"81.2.69.142",
"2a02:cf40::1"
],
"user": [
"root"
]
},
"source": {
"address": "https://example.com",
"domain": "https://example.com",
"ip": [
"89.160.20.112",
"2a02:cf40::2"
],
"mac": "00-00-5E-00-53-00",
"registered_domain": "https://example.com",
"top_level_domain": "com"
},
"tags": [
"preserve_original_event",
"preserve_duplicate_custom_fields",
"forwarded",
"trellix_epo_cloud-event"
],
"threat": {
"indicator": {
"description": "IDS_ALERT_ACT_TAK_DEN"
}
},
"trellix_epo_cloud": {
"event": {
"attributes": {
"agent": {
"guid": "8630b925-cbd2-ed11-1234-abcdefghijklmn"
},
"analyzer": {
"dat_version": "5298.0",
"detection_method": "quick scan",
"engine_version": "6600.9927",
"hostname": "ub20",
"ipv4": "81.2.69.142",
"ipv6": "2a02:cf40::1",
"mac": "00-00-5E-00-53-00",
"name": "Trellix Endpoint Security",
"value": "ENDP_AM_1070LYNX",
"version": "10.7.14.38"
},
"auto_guid": "9fcf439b-82d7-425c-1234-abcdefghijklmn",
"detected_utc": "2023-04-06T23:32:19.000Z",
"node": {
"path": "1\\854691\\901751"
},
"received_utc": "2023-04-06T23:36:14.041Z",
"source": {
"ipv4": "89.160.20.112",
"ipv6": "2a02:cf40::2",
"mac": "00-00-5E-00-53-00",
"url": "https://example.com"
},
"target": {
"file_name": "/var/log/secure",
"ipv4": "89.160.20.115",
"ipv6": "2a02:cf40::3",
"mac": "00-00-5E-00-53-00",
"process_name": "/usr/sbin/logrotate",
"user_name": "root"
},
"threat": {
"action_taken": "IDS_ALERT_ACT_TAK_DEN",
"category": "ops.update.end",
"event": {
"id": "1119"
},
"handled": true,
"name": "None",
"severity": 6,
"type": "IDS_ALERT_DET_TYP_NOT"
},
"timestamp": "2023-04-06T23:36:14.041Z"
},
"id": "0102be3a-41db-448c-9a68-bce7c480d443",
"links": {
"self": "/epo/v2/events/0102be3a-41db-448c-9a68-bce7c480d443"
}
},
"type": "MVEvents"
}
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset. | constant_keyword |
event.module | Event module. | constant_keyword |
input.type | Type of Filebeat input. | keyword |
log.offset | Log offset. | long |
trellix_epo_cloud.event.attributes.agent.guid | keyword | |
trellix_epo_cloud.event.attributes.analyzer.dat_version | keyword | |
trellix_epo_cloud.event.attributes.analyzer.detection_method | keyword | |
trellix_epo_cloud.event.attributes.analyzer.domain | keyword | |
trellix_epo_cloud.event.attributes.analyzer.engine_version | keyword | |
trellix_epo_cloud.event.attributes.analyzer.hostname | keyword | |
trellix_epo_cloud.event.attributes.analyzer.ipv4 | ip | |
trellix_epo_cloud.event.attributes.analyzer.ipv6 | ip | |
trellix_epo_cloud.event.attributes.analyzer.mac | keyword | |
trellix_epo_cloud.event.attributes.analyzer.name | keyword | |
trellix_epo_cloud.event.attributes.analyzer.registered_domain | keyword | |
trellix_epo_cloud.event.attributes.analyzer.subdomain | keyword | |
trellix_epo_cloud.event.attributes.analyzer.top_level_domain | keyword | |
trellix_epo_cloud.event.attributes.analyzer.value | keyword | |
trellix_epo_cloud.event.attributes.analyzer.version | keyword | |
trellix_epo_cloud.event.attributes.auto_guid | keyword | |
trellix_epo_cloud.event.attributes.detected_utc | date | |
trellix_epo_cloud.event.attributes.node.path | keyword | |
trellix_epo_cloud.event.attributes.received_utc | date | |
trellix_epo_cloud.event.attributes.source.file_path | keyword | |
trellix_epo_cloud.event.attributes.source.hostname | keyword | |
trellix_epo_cloud.event.attributes.source.ipv4 | ip | |
trellix_epo_cloud.event.attributes.source.ipv6 | ip | |
trellix_epo_cloud.event.attributes.source.mac | keyword | |
trellix_epo_cloud.event.attributes.source.process.hash | keyword | |
trellix_epo_cloud.event.attributes.source.process.name | keyword | |
trellix_epo_cloud.event.attributes.source.process.signed | keyword | |
trellix_epo_cloud.event.attributes.source.process.signer | keyword | |
trellix_epo_cloud.event.attributes.source.url | keyword | |
trellix_epo_cloud.event.attributes.source.user_name | keyword | |
trellix_epo_cloud.event.attributes.target.file_name | keyword | |
trellix_epo_cloud.event.attributes.target.hash | keyword | |
trellix_epo_cloud.event.attributes.target.hostname | keyword | |
trellix_epo_cloud.event.attributes.target.ipv4 | ip | |
trellix_epo_cloud.event.attributes.target.ipv6 | ip | |
trellix_epo_cloud.event.attributes.target.mac | keyword | |
trellix_epo_cloud.event.attributes.target.port | long | |
trellix_epo_cloud.event.attributes.target.process_name | keyword | |
trellix_epo_cloud.event.attributes.target.protocol | keyword | |
trellix_epo_cloud.event.attributes.target.user_name | keyword | |
trellix_epo_cloud.event.attributes.threat.action_taken | keyword | |
trellix_epo_cloud.event.attributes.threat.category | keyword | |
trellix_epo_cloud.event.attributes.threat.event.id | keyword | |
trellix_epo_cloud.event.attributes.threat.handled | boolean | |
trellix_epo_cloud.event.attributes.threat.name | keyword | |
trellix_epo_cloud.event.attributes.threat.severity | long | |
trellix_epo_cloud.event.attributes.threat.type | keyword | |
trellix_epo_cloud.event.attributes.timestamp | date | |
trellix_epo_cloud.event.id | keyword | |
trellix_epo_cloud.event.links.self | keyword | |
trellix_epo_cloud.type | keyword |
This is the Group
dataset.
**Example**
An example event for group
looks as following:
{
"@timestamp": "2023-05-04T11:12:41.040Z",
"agent": {
"ephemeral_id": "5b5537a7-dc4b-40b1-b9a2-c7d322502909",
"id": "09aeef39-f21d-41e4-b3a6-c1551488d075",
"name": "docker-fleet-agent",
"type": "filebeat",
"version": "8.7.1"
},
"data_stream": {
"dataset": "trellix_epo_cloud.group",
"namespace": "ep",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "09aeef39-f21d-41e4-b3a6-c1551488d075",
"snapshot": true,
"version": "8.7.1"
},
"event": {
"agent_id_status": "verified",
"category": [
"iam"
],
"dataset": "trellix_epo_cloud.group",
"ingested": "2023-05-04T11:12:44Z",
"kind": "event",
"original": "{\"attributes\":{\"groupTypeId\":7,\"l1ParentId\":null,\"l2ParentId\":null,\"name\":\"GlobalRoot\",\"nodePath\":\"1\",\"nodeTextPath\":\"GlobalRoot\",\"nodeTextPath2\":\"\\\\\\",\"notes\":null,\"parentId\":0},\"id\":\"1\",\"links\":{\"self\":\"https://api.manage.trellix.com/epo/v2/groups/1\"},\"relationships\":{\"subGroups\":{\"links\":{\"related\":\"https://api.manage.trellix.com/epo/v2/groups/1/subGroups\",\"self\":\"https://api.manage.trellix.com/epo/v2/groups/1/relationships/subGroups\"}}},\"type\":\"groups\"}",
"reference": "https://api.manage.trellix.com/epo/v2/groups/1",
"type": [
"group"
]
},
"group": {
"id": "1",
"name": "GlobalRoot"
},
"input": {
"type": "cel"
},
"tags": [
"preserve_original_event",
"preserve_duplicate_custom_fields",
"forwarded",
"trellix_epo_cloud-group"
],
"trellix_epo_cloud": {
"group": {
"attributes": {
"group_type": {
"id": "7"
},
"name": "GlobalRoot",
"node": {
"path": "1",
"text_path": "GlobalRoot",
"text_path2": "\\"
},
"parent": {
"id": "0"
}
},
"id": "1",
"links": {
"self": "https://api.manage.trellix.com/epo/v2/groups/1"
},
"relationships": {
"sub_groups": {
"links": {
"related": "https://api.manage.trellix.com/epo/v2/groups/1/subGroups",
"self": "https://api.manage.trellix.com/epo/v2/groups/1/relationships/subGroups"
}
}
}
},
"type": "groups"
}
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset. | constant_keyword |
event.module | Event module. | constant_keyword |
input.type | Type of Filebeat input. | keyword |
log.offset | Log offset. | long |
trellix_epo_cloud.group.attributes.group_type.id | keyword | |
trellix_epo_cloud.group.attributes.l1_parent.id | keyword | |
trellix_epo_cloud.group.attributes.l2_parent.id | keyword | |
trellix_epo_cloud.group.attributes.name | keyword | |
trellix_epo_cloud.group.attributes.node.path | keyword | |
trellix_epo_cloud.group.attributes.node.text_path | keyword | |
trellix_epo_cloud.group.attributes.node.text_path2 | keyword | |
trellix_epo_cloud.group.attributes.notes | keyword | |
trellix_epo_cloud.group.attributes.parent.id | keyword | |
trellix_epo_cloud.group.id | keyword | |
trellix_epo_cloud.group.links.self | keyword | |
trellix_epo_cloud.group.relationships.groups.data.id | keyword | |
trellix_epo_cloud.group.relationships.groups.data.type | keyword | |
trellix_epo_cloud.group.relationships.groups.links.related | keyword | |
trellix_epo_cloud.group.relationships.groups.links.self | keyword | |
trellix_epo_cloud.group.relationships.sub_groups.links.related | keyword | |
trellix_epo_cloud.group.relationships.sub_groups.links.self | keyword | |
trellix_epo_cloud.type | keyword |
**Changelog**
Version | Details | Kibana version(s) |
---|---|---|
1.14.0 | pass:[] Enhancement (View pull request) Add "preserve_original_event" tag to documents with event.kind manually set to "pipeline_error". |
8.13.0 or higher |
1.13.0 | pass:[] Enhancement (View pull request) Do not remove event.original in main ingest pipeline. |
8.13.0 or higher |
1.12.0 | pass:[] Enhancement (View pull request) Add "preserve_original_event" tag to documents with event.kind set to "pipeline_error". |
8.13.0 or higher |
1.11.0 | pass:[] Enhancement (View pull request) Removed import_mappings. Update the kibana constraint to ^8.13.0. Modified the field definitions to remove ECS fields made redundant by the ecs@mappings component template. |
8.13.0 or higher |
1.10.0 | pass:[] Enhancement (View pull request) Set sensitive values as secret. |
8.12.0 or higher |
1.9.1 | pass:[] Enhancement (View pull request) Changed owners |
8.7.1 or higher |
1.9.0 | pass:[] Enhancement (View pull request) Limit request tracer log count to five. |
8.7.1 or higher |
1.8.0 | pass:[] Enhancement (View pull request) ECS version updated to 8.11.0. |
8.7.1 or higher |
1.7.0 | pass:[] Enhancement (View pull request) Improve event.original check to avoid errors if set. |
8.7.1 or higher |
1.6.0 | pass:[] Enhancement (View pull request) ECS version updated to 8.10.0. |
8.7.1 or higher |
1.5.0 | pass:[] Enhancement (View pull request) The format_version in the package manifest changed from 2.11.0 to 3.0.0. Removed dotted YAML keys from package manifest. Added owner.type: elastic to package manifest. |
8.7.1 or higher |
1.4.0 | pass:[] Enhancement (View pull request) Add tags.yml file so that integration’s dashboards and saved searches are tagged with "Security Solution" and displayed in the Security Solution UI. |
8.7.1 or higher |
1.3.0 | pass:[] Enhancement (View pull request) Add support for HTTP request trace logs. |
8.7.1 or higher |
1.2.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.9.0. |
8.7.1 or higher |
1.1.0 | pass:[] Enhancement (View pull request) Document duration units. |
8.7.1 or higher |
1.0.2 | pass:[] Bug fix (View pull request) Remove confusing error message tag prefix. |
8.7.1 or higher |
1.0.1 | pass:[] Bug fix (View pull request) Work around CEL now static global behaviour. |
8.7.1 or higher |
1.0.0 | pass:[] Enhancement (View pull request) Release Trellix ePO Cloud as GA. |
8.7.1 or higher |
0.2.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.8.0. |
— |
0.1.1 | pass:[] Bug fix (View pull request) Ensure API key does not leak into debug logs. |
— |
0.1.0 | pass:[] Enhancement (View pull request) Initial release. |
— |