Mimecast Integration
Version | 2.7.0 (View all) |
Compatible Kibana version(s) | 8.15.0 or higher 9.0.0 or higher |
Supported Serverless project types What's this? |
Security Observability |
Subscription level What's this? |
Basic |
Level of support What's this? |
Partner |
The Mimecast integration collects events from the Mimecast API.
Authorization parameters for the Mimecast API (Application Key
, Application ID
, Access Key
, and Secret Key
) should be provided by a Mimecast
representative for this integration. Under Advanced options
you can set the
time interval between two API requests as well as the API URL. A Mimecast
representative should also be able to give you this information in case you need
to change the defaults.
Rate limit quotas may require you to set up different credentials for the different available log types.
Authorization parameters for the Mimecast API (Client ID
and Client Key
) should
be provided by a Mimecast representative for this integration. Under Advanced options
you can set the time interval between two API requests as well as the API URL. A Mimecast
representative should also be able to give you this information in case you need
to change the defaults.
Rate limit quotas may require you to set up different credentials for the different available log types.
This is the mimecast.archive_search_logs
dataset. These logs contain Mimecast archive
search logs with the following details: search source, description and detailed
information about the search performed. More information about these logs is available here.
Example
{
"@timestamp": "2024-11-12T16:21:27.000Z",
"agent": {
"ephemeral_id": "d3b97519-7fb6-43c4-8b77-64243fb1a1a3",
"id": "c25a1c6b-6203-415b-8548-b4a1b5c845e0",
"name": "elastic-agent-14690",
"type": "filebeat",
"version": "8.14.0"
},
"data_stream": {
"dataset": "mimecast.archive_search_logs",
"namespace": "34146",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "c25a1c6b-6203-415b-8548-b4a1b5c845e0",
"snapshot": false,
"version": "8.14.0"
},
"event": {
"agent_id_status": "verified",
"category": [
"api"
],
"created": "2024-11-12T16:21:27.000Z",
"dataset": "mimecast.archive_search_logs",
"ingested": "2024-12-05T00:48:50Z",
"kind": "event",
"original": "{\"createTime\":\"2024-11-12T16:21:27+0000\",\"description\":\"Message Tracking Search\",\"emailAddr\":\"\\u003c\\u003e\",\"searchReason\":\"\",\"searchText\":\"[User : dhamilton@mimecast.local]\",\"source\":\"archive\"}",
"type": [
"admin"
]
},
"input": {
"type": "cel"
},
"mimecast": {
"search_details": {
"description": "Message Tracking Search",
"source": "archive",
"text": "[User : dhamilton@mimecast.local]"
}
},
"related": {
"user": [
"<>"
]
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-archive-search-logs"
],
"user": {
"email": "<>"
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.email.address | The email address of the user who performed the search. | keyword |
mimecast.search_details.description | The description of the search if any. | keyword |
mimecast.search_details.path | The search path if any. | keyword |
mimecast.search_details.reason | The search reason entered when the search was executed if any. | keyword |
mimecast.search_details.source | The search source context | keyword |
mimecast.search_details.text | The text used in the search. | keyword |
This is the mimecast.audit_events
dataset. These logs contain Mimecast audit
events with the following details: audit type, event category and detailed
information about the event. More information about these logs.
Example
{
"@timestamp": "2024-10-17T02:06:50.000Z",
"agent": {
"ephemeral_id": "9d307917-d823-49c5-99de-422de2e4de90",
"id": "38f355c8-68cd-43d6-bd0a-1e57a3d29eea",
"name": "elastic-agent-60619",
"type": "filebeat",
"version": "8.15.0"
},
"client": {
"ip": "203.59.201.168"
},
"data_stream": {
"dataset": "mimecast.audit_events",
"namespace": "26694",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "38f355c8-68cd-43d6-bd0a-1e57a3d29eea",
"snapshot": false,
"version": "8.15.0"
},
"event": {
"action": "api-application-updated",
"agent_id_status": "verified",
"category": [
"email"
],
"created": "2024-10-17T02:06:50.000Z",
"dataset": "mimecast.audit_events",
"id": "eNoVzk0PgiAAgOH_wrUO4SizrYOasxUzs6jWLYURfqEg6Wr99-z-bs_7AZplRjFBwQp4E3y5t3G7w1SVz9KxwxtJj7mVNripeP7WV3N2-3AohNUFGw0DmMY2aqOeq7MZfCKqyME1jeUMv_qAdVub6MJdnprZIYz2PS3u-bNuB54kfA2m4GGo6ErJ_zZCi4UD51OQGd3JiqlMUjYu-eTkIdey0di_mNJC1mAFvz-isz1f",
"ingested": "2025-02-13T15:17:26Z",
"original": "{\"auditType\":\"API Application Updated\",\"category\":\"account_logs\",\"eventInfo\":\"API Gateway Application testing Updated. Application Program Interface Addendum (22 September 2022) acknowledged, Date: 2024-10-17, Time: 02:06:50+0000, IP: 203.59.201.168, Application: Administration Console\",\"eventTime\":\"2024-10-17T02:06:50+0000\",\"id\":\"eNoVzk0PgiAAgOH_wrUO4SizrYOasxUzs6jWLYURfqEg6Wr99-z-bs_7AZplRjFBwQp4E3y5t3G7w1SVz9KxwxtJj7mVNripeP7WV3N2-3AohNUFGw0DmMY2aqOeq7MZfCKqyME1jeUMv_qAdVub6MJdnprZIYz2PS3u-bNuB54kfA2m4GGo6ErJ_zZCi4UD51OQGd3JiqlMUjYu-eTkIdey0di_mNJC1mAFvz-isz1f\",\"user\":\"user.name@company.mime-api.com\"}"
},
"input": {
"type": "cel"
},
"mimecast": {
"application": "Administration Console",
"category": "account_logs",
"eventInfo": "API Gateway Application testing Updated. Application Program Interface Addendum (22 September 2022) acknowledged, Date: 2024-10-17, Time: 02:06:50+0000, IP: 203.59.201.168, Application: Administration Console"
},
"related": {
"ip": [
"203.59.201.168"
],
"user": [
"user.name",
"user.name@company.mime-api.com"
]
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-audit-events"
],
"user": {
"domain": "company.mime-api.com",
"email": "user.name@company.mime-api.com",
"name": "user.name"
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.2FA | Info about two-factor authentication. | keyword |
mimecast.application | The Mimecast unique id of the event. | keyword |
mimecast.category | The category of the event. | keyword |
mimecast.email.address | Email address from event info. | keyword |
mimecast.email.metadata | The email meta data from audit info. | keyword |
mimecast.eventInfo | The detailed event information. | keyword |
mimecast.method | Method which triggers audit events. | keyword |
mimecast.remote | Info about remote IP trying to access the API. | keyword |
mimecast.remote_ip | Remote IP. | ip |
mimecast.timezone | Timezone reported in the event message. | keyword |
This is the mimecast.cloud_integrated_logs
dataset. These logs contain Mimecast
threats and security events with the following details: entities, mail flows and URL
protected events. More information about these logs.
Example
{
"@timestamp": "2024-11-21T18:03:26.960Z",
"agent": {
"ephemeral_id": "d0571978-95ee-4d4e-9fc1-2c0b57f47a64",
"id": "27a1a18b-9cc1-424a-8573-425423e11318",
"name": "elastic-agent-77334",
"type": "filebeat",
"version": "8.15.0"
},
"data_stream": {
"dataset": "mimecast.cloud_integrated_logs",
"namespace": "67059",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "27a1a18b-9cc1-424a-8573-425423e11318",
"snapshot": false,
"version": "8.15.0"
},
"email": {
"message_id": "<2ae37333-38e7-89ff-dc36-c8d48c6e3df3@demovation-ci.b41.one>"
},
"event": {
"agent_id_status": "verified",
"category": [
"email"
],
"created": "2024-11-21T18:03:26.960Z",
"dataset": "mimecast.cloud_integrated_logs",
"ingested": "2024-12-09T23:17:44Z",
"original": "{\"_offset\":1803841,\"_partition\":53,\"accountId\":\"AUS2474\",\"aggregateId\":\"4XvR1B4m7BzFB8L-qk59b4szrgayciaagczc977rzb_1732212206\",\"authResults\":[{\"aligned\":true,\"result\":\"pass\",\"type\":\"SPF\"},{\"aligned\":false,\"result\":\"none\",\"type\":\"DKIM\"},{\"aligned\":null,\"result\":\"pass\",\"type\":\"DMARC\"}],\"messageId\":\"\\u003c2ae37333-38e7-89ff-dc36-c8d48c6e3df3@demovation-ci.b41.one\\u003e\",\"processingId\":\"c40337e6860db0301575d8d09362bff214c0b010d6c4d41da9d770759ff54d10_1732212206\",\"subtype\":null,\"timestamp\":1732212206960,\"type\":\"mailflow\"}"
},
"input": {
"type": "cel"
},
"mimecast": {
"accountId": "AUS2474",
"aggregateId": "4XvR1B4m7BzFB8L-qk59b4szrgayciaagczc977rzb_1732212206",
"authResults": [
{
"aligned": true,
"result": "pass",
"type": "SPF"
},
{
"aligned": false,
"result": "none",
"type": "DKIM"
},
{
"result": "pass",
"type": "DMARC"
}
],
"log_type": "mailflow",
"processingId": "c40337e6860db0301575d8d09362bff214c0b010d6c4d41da9d770759ff54d10_1732212206"
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-cloud-integrated-logs"
]
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.accountId | The Mimecast account code for your account. | keyword |
mimecast.action | The action taken for this message. | keyword |
mimecast.aggregateId | Unique identifier that allows you to correlate/group related events. | keyword |
mimecast.attachments | The filenames of all attachments on the emai. | keyword |
mimecast.authResults.aligned | boolean | |
mimecast.authResults.result | keyword | |
mimecast.authResults.type | keyword | |
mimecast.direction | The direction of the email based on the sending and receiving domains. | keyword |
mimecast.historicalMail | Identifies whether the scan was from historical email (prior to Mimecast). | boolean |
mimecast.log_type | keyword | |
mimecast.messageId | The internet message id of the email. | keyword |
mimecast.originalUrl | The original URL Clicked. | keyword |
mimecast.policiesApplied.action | keyword | |
mimecast.policiesApplied.mode | keyword | |
mimecast.policiesApplied.name | keyword | |
mimecast.processingId | Unique identifier that allows you to correlate/group related events. | keyword |
mimecast.recipients | The recipient of the email. | keyword |
mimecast.redirectUrl | The redirect URL, following original URL click. | keyword |
mimecast.senderEnvelope | The sender of the email. | keyword |
mimecast.senderHeader | The sender address found in the from header of the email. | keyword |
mimecast.senderIp | The source IP of the sending mail server. | keyword |
mimecast.source | keyword | |
mimecast.sourceIp | The source IP of the original message. | keyword |
mimecast.subject | The subject of the email, limited to 150 characters. | keyword |
mimecast.subtype | keyword | |
mimecast.tags | The determination if the email was untrustworthy. | keyword |
mimecast.threatState | The action taken. | keyword |
mimecast.threatType | The type of threat identified where applicable. no detections= allowed. | keyword |
mimecast.timestamp | The date and time of event. | keyword |
This is the mimecast.dlp_logs
dataset. These logs contain information about
messages that triggered a DLP or Content Examination policy. More information
about these logs.
Example
{
"@timestamp": "2024-11-17T19:47:39.000Z",
"agent": {
"ephemeral_id": "6a8bd8fb-21cf-4c1e-a294-35bddf3ebeba",
"id": "890bb494-8ddc-489b-8bfe-48aea81e2d36",
"name": "elastic-agent-24674",
"type": "filebeat",
"version": "8.14.0"
},
"data_stream": {
"dataset": "mimecast.dlp_logs",
"namespace": "14088",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "890bb494-8ddc-489b-8bfe-48aea81e2d36",
"snapshot": false,
"version": "8.14.0"
},
"email": {
"direction": "inbound",
"from": {
"address": [
"webmaster@empirepartners.b41.one"
]
},
"message_id": "<ae9f2f0678ed116f-152138@hapi.b41.one>",
"subject": "New CERA.com Coming Soon! - CERA Alert",
"to": {
"address": [
"vkamins@demo-int.elastic.mime-api.com"
]
}
},
"event": {
"action": "hold",
"agent_id_status": "verified",
"category": [
"email"
],
"created": "2024-11-17T19:47:39+0000",
"dataset": "mimecast.dlp_logs",
"ingested": "2024-12-05T00:57:34Z",
"original": "{\"action\":\"hold\",\"eventTime\":\"2024-11-17T19:47:39+0000\",\"messageId\":\"\\u003cae9f2f0678ed116f-152138@hapi.b41.one\\u003e\",\"policy\":\"Confidential\",\"recipientAddress\":\"vkamins@demo-int.elastic.mime-api.com\",\"route\":\"inbound\",\"senderAddress\":\"webmaster@empirepartners.b41.one\",\"subject\":\"New CERA.com Coming Soon! - CERA Alert\"}"
},
"input": {
"type": "cel"
},
"rule": {
"name": "Confidential"
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-dlp-logs"
]
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
This is the mimecast.message_release_logs
dataset. These logs contain information about
messages that were either released to the recipient, with details about the user that
processed the release. More information about these logs.
Example
{
"@timestamp": "2024-10-28T14:16:51.000Z",
"agent": {
"ephemeral_id": "7afd67cc-d1eb-44e6-9ae3-d6cdd6a2930a",
"id": "019f79cd-9e55-4eaf-863d-78181137d95d",
"name": "elastic-agent-60936",
"type": "filebeat",
"version": "8.14.0"
},
"data_stream": {
"dataset": "mimecast.message_release_logs",
"namespace": "39938",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "019f79cd-9e55-4eaf-863d-78181137d95d",
"snapshot": false,
"version": "8.14.0"
},
"email": {
"direction": "inbound",
"from": {
"address": [
"yahoo-delivers@evaluation-fuzz.b41.one"
]
},
"local_id": "eNoNjt0KgjAYQN9ltwlNMVZBF...",
"subject": "Yahoo! Newsletter, November 2001",
"to": {
"address": [
"monika.causholli@demo-int.elastic.mime-api.com"
]
}
},
"event": {
"action": "rejected",
"agent_id_status": "verified",
"dataset": "mimecast.message_release_logs",
"id": "eNoNjt0KgjAYQN9ltwlNMVZBF...",
"ingested": "2024-11-21T02:12:00Z",
"kind": "event",
"original": "{\"attachments\":true,\"detectionLevel\":\"relaxed\",\"fromEnv\":{\"emailAddress\":\"yahoo-delivers@evaluation-fuzz.b41.one\"},\"fromHdr\":{\"emailAddress\":\"yahoo-delivers@evaluation-fuzz.b41.one\"},\"heldReason\":\"Default Spam Scanning Definition\",\"id\":\"eNoNjt0KgjAYQN9ltwlNMVZBF...\",\"messageInfo\":\"Graymail\",\"operator\":{\"emailAddress\":\"monika.causholli@demo-int.elastic.mime-api.com\"},\"policy\":\"Default Spam Scanning Definition\",\"rejectReason\":\"Message goes against email policies\",\"released\":\"2024-10-28T14:16:51+0000\",\"route\":\"inbound\",\"size\":3670056,\"spamProcessingDetail\":{\"dkim\":{\"allow\":true,\"info\":\"unknown\"},\"dmarc\":{\"allow\":true,\"info\":\"allow\"},\"greyEmail\":false,\"managedSender\":{\"allow\":true,\"info\":\"unknown\"},\"permittedSender\":{\"allow\":true,\"info\":\"none\"},\"rbl\":{\"allow\":true,\"info\":\"\"},\"spf\":{\"allow\":true,\"info\":\"allow\"},\"verdict\":{\"categories\":[{\"name\":\"spam\",\"risk\":\"high\",\"subcategories\":[{\"augmentations\":[],\"name\":\"technology_feed\",\"risk\":\"high\"},{\"augmentations\":[{\"name\":\"body\",\"risk\":\"negligible\"}],\"name\":\"content\",\"risk\":\"negligible\"}]},{\"name\":\"graymail\",\"risk\":\"negligible\",\"subcategories\":[]}],\"decision\":\"spam\",\"description\":\"\",\"risk\":\"high\"}},\"spamScore\":20,\"status\":\"rejected\",\"subject\":\"Yahoo! Newsletter, November 2001\",\"to\":[{\"emailAddress\":\"monika.causholli@demo-int.elastic.mime-api.com\"}]}",
"reason": "Message goes against email policies",
"risk_score": 20,
"type": [
"info"
]
},
"input": {
"type": "cel"
},
"mimecast": {
"message_release_logs": {
"attachments": true,
"detectionLevel": "relaxed",
"fromEnv": {
"emailAddress": "yahoo-delivers@evaluation-fuzz.b41.one"
},
"fromHdr": {
"emailAddress": "yahoo-delivers@evaluation-fuzz.b41.one"
},
"heldReason": "Default Spam Scanning Definition",
"id": "eNoNjt0KgjAYQN9ltwlNMVZBF...",
"messageInfo": "Graymail",
"operator": "monika.causholli@demo-int.elastic.mime-api.com",
"policy": "Default Spam Scanning Definition",
"rejectReason": "Message goes against email policies",
"released": "2024-10-28T14:16:51+0000",
"route": "inbound",
"size": 3670056,
"spamProcessingDetail": {
"dkim": {
"allow": true,
"info": "unknown"
},
"dmarc": {
"allow": true,
"info": "allow"
},
"greyEmail": false,
"managedSender": {
"allow": true,
"info": "unknown"
},
"permittedSender": {
"allow": true,
"info": "none"
},
"rbl": {
"allow": true
},
"spamVerdict": {
"categories": [
{
"name": "spam",
"risk": "high",
"subcategories": [
{
"name": "technology_feed",
"risk": "high"
},
{
"augmentations": [
{
"name": "body",
"risk": "negligible"
}
],
"name": "content",
"risk": "negligible"
}
]
},
{
"name": "graymail",
"risk": "negligible"
}
],
"decision": "spam",
"risk": "high"
},
"spf": {
"allow": true,
"info": "allow"
}
},
"spamScore": 20,
"status": "rejected",
"subject": "Yahoo! Newsletter, November 2001",
"to": [
{
"emailAddress": "monika.causholli@demo-int.elastic.mime-api.com"
}
]
}
},
"related": {
"hosts": [
"demo-int.elastic.mime-api.com",
"evaluation-fuzz.b41.one"
],
"user": [
"monika.causholli",
"monika.causholli@demo-int.elastic.mime-api.com",
"yahoo-delivers",
"yahoo-delivers@evaluation-fuzz.b41.one"
]
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-message-release-logs"
],
"user": {
"email": [
"monika.causholli@demo-int.elastic.mime-api.com"
]
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.message_release_logs.attachments | Indicates whether the message contains attachments. | boolean |
mimecast.message_release_logs.detectionLevel | Spam detection level, if held by a spam policy. Possible values are: relaxed, moderate, aggressive, cluster or whitelisted_cluster. | keyword |
mimecast.message_release_logs.fromEnv.displayableName | Display name of the user address from the "from" envelope. If none exists, this field will be empty. | keyword |
mimecast.message_release_logs.fromEnv.emailAddress | The routable email address of the user from the "from" envelope. | keyword |
mimecast.message_release_logs.fromHdr.displayableName | Display name of the user address from the "from" header. If none exists, this field will be empty. | keyword |
mimecast.message_release_logs.fromHdr.emailAddress | The routable email address of the user from the "from" header. | keyword |
mimecast.message_release_logs.heldGroup | The recipient group of the held message, if message was sent to a group. | keyword |
mimecast.message_release_logs.heldReason | Detail around the reason the message was initially held. If held by a specific policy definition, this will be the name of the policy definition that triggered the message to be held. | keyword |
mimecast.message_release_logs.id | The Mimecast secure ID of the specific message release log. | keyword |
mimecast.message_release_logs.messageInfo | Additional information around the release reason. | text |
mimecast.message_release_logs.operator | Email address of the user that released the message. | keyword |
mimecast.message_release_logs.policy | Name of the policy definition that triggered the message to be held. | keyword |
mimecast.message_release_logs.rejectReason | Detail on the reason a message was rejected, if message was rejected. | keyword |
mimecast.message_release_logs.released | Timestamp of the message release action in ISO 8601 format. | keyword |
mimecast.message_release_logs.route | Message direction. Possible values are: inbound or outbound. | keyword |
mimecast.message_release_logs.size | Total size of the message, in bytes. | long |
mimecast.message_release_logs.spamProcessingDetail.dkim.allow | Indicates checks for whether the message passed DKIM checks are performed. | boolean |
mimecast.message_release_logs.spamProcessingDetail.dkim.info | Details about the check result. | keyword |
mimecast.message_release_logs.spamProcessingDetail.dmarc.allow | Indicates checks for whether the message passed DMARC checks are performed. | boolean |
mimecast.message_release_logs.spamProcessingDetail.dmarc.info | Details about the check result. | keyword |
mimecast.message_release_logs.spamProcessingDetail.grayEmail | Indicates with the spam was classified as graymail or bulk. Note that this API uses graymail and greymail interchangeably. | boolean |
mimecast.message_release_logs.spamProcessingDetail.greyEmail | Indicates with the spam was classified as graymail or bulk. Note that this API uses graymail and greymail interchangeably. | boolean |
mimecast.message_release_logs.spamProcessingDetail.managedSender.allow | Indicates checks for whether the sender has been permitted by a Managed Sender entry are performed. | boolean |
mimecast.message_release_logs.spamProcessingDetail.managedSender.info | Details about the check result. | keyword |
mimecast.message_release_logs.spamProcessingDetail.permittedSender.allow | Indicates checks for whether the sender has been permitted by policy are performed. | boolean |
mimecast.message_release_logs.spamProcessingDetail.permittedSender.info | Details about the check result. | keyword |
mimecast.message_release_logs.spamProcessingDetail.rbl.allow | Indicates checks for whether the message passed RBL checks are performed. | boolean |
mimecast.message_release_logs.spamProcessingDetail.rbl.info | Details about the check result. | keyword |
mimecast.message_release_logs.spamProcessingDetail.spamVerdict.categories | Spam detection type categories. | flattened |
mimecast.message_release_logs.spamProcessingDetail.spamVerdict.decision | Indicating what the ultimate verdict was for the message. | keyword |
mimecast.message_release_logs.spamProcessingDetail.spamVerdict.description | Description of the spam verdict decision. | keyword |
mimecast.message_release_logs.spamProcessingDetail.spamVerdict.risk | Identified risk level within the spam detection. Possible values are: negligible, low, high. | keyword |
mimecast.message_release_logs.spamProcessingDetail.spf.allow | Indicates checks for whether the message passed SPF checks are performed. | boolean |
mimecast.message_release_logs.spamProcessingDetail.spf.info | Details about the check result. | keyword |
mimecast.message_release_logs.spamScore | The message spam score, based on the applied spam scanning policy definition. | double |
mimecast.message_release_logs.status | Status of the message. Possible values are released or rejected. | keyword |
mimecast.message_release_logs.subject | The released message's subject line. | keyword |
mimecast.message_release_logs.to.displayableName | Display name of the user address from the "to" header. If none exists, this field will be empty. | keyword |
mimecast.message_release_logs.to.emailAddress | The routable email address of the user from the "to" header. | keyword |
This is the mimecast.siem_logs
dataset. These logs contain information about
messages that contains MTA (message transfer agent) log – all inbound,
outbound, and internal messages. More about these logs.
Example
{
"@timestamp": "2024-11-12T18:52:07.130Z",
"agent": {
"ephemeral_id": "3d21ae78-86cd-4666-84a7-c6309a29e2e5",
"id": "260b2d28-beb4-4e1e-83aa-9fd450347db8",
"name": "elastic-agent-64770",
"type": "filebeat",
"version": "8.15.0"
},
"data_stream": {
"dataset": "mimecast.siem_logs",
"namespace": "18433",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "260b2d28-beb4-4e1e-83aa-9fd450347db8",
"snapshot": false,
"version": "8.15.0"
},
"email": {
"direction": "outbound",
"from": {
"address": [
"chris.germany@demo-int.elastic.mime-api.com"
]
},
"message_id": "<23b9843f48f8d349-99325@hapi.b41.one>",
"subject": "Out of office",
"to": {
"address": [
"dkinney@pacific-concept.b41.one"
]
}
},
"event": {
"action": "Acc",
"agent_id_status": "verified",
"category": [
"email"
],
"created": "2024-11-12T18:52:07.130Z",
"dataset": "mimecast.siem_logs",
"ingested": "2024-12-08T21:06:17Z",
"original": "{\"_offset\":70595,\"_partition\":60,\"accountId\":\"CUSB4A274\",\"action\":\"Acc\",\"aggregateId\":\"q1h3LjgrN46b12GlX0By9Q_1731437523\",\"direction\":\"Outbound\",\"messageId\":\"\\u003c23b9843f48f8d349-99325@hapi.b41.one\\u003e\",\"numberAttachments\":\"0\",\"processingId\":\"X7OQopo8177ryv7KXWXxytbksk3qv0Ct8NSYWcQkhJM_1731437523\",\"receiptErrors\":null,\"recipients\":\"dkinney@pacific-concept.b41.one\",\"rejectionCode\":null,\"rejectionInfo\":null,\"rejectionType\":null,\"senderEnvelope\":\"chris.germany@demo-int.elastic.mime-api.com\",\"senderHeader\":\"chris.germany@demo-int.elastic.mime-api.com\",\"senderIp\":\"54.236.186.184\",\"spamDetectionLevel\":\"28\",\"spamInfo\":\"[]\",\"spamProcessingDetail\":null,\"spamScore\":\"0\",\"subject\":\"Out of office\",\"subtype\":\"Acc\",\"timestamp\":1731437527130,\"tlsCipher\":\"TLS_AES_256_GCM_SHA384\",\"tlsVersion\":\"TLSv1.3\",\"type\":\"receipt\",\"virusFound\":null}",
"outcome": "unknown"
},
"input": {
"type": "cel"
},
"mimecast": {
"accountId": "CUSB4A274",
"aggregateId": "q1h3LjgrN46b12GlX0By9Q_1731437523",
"log_type": "receipt",
"numberAttachments": "0",
"processingId": "X7OQopo8177ryv7KXWXxytbksk3qv0Ct8NSYWcQkhJM_1731437523",
"senderHeader": "chris.germany@demo-int.elastic.mime-api.com",
"spamDetectionLevel": "28",
"spamInfo": "[]",
"spamScore": "0",
"subtype": "Acc",
"tlsVersion": "TLSv1.3"
},
"related": {
"user": [
"chris.germany@demo-int.elastic.mime-api.com",
"dkinney@pacific-concept.b41.one"
]
},
"source": {
"ip": "54.236.186.184"
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-siem-logs"
],
"tls": {
"cipher": "TLS_AES_256_GCM_SHA384"
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.AttCnt | The number of attachments on the email. | long |
mimecast.AttNames | The filenames of all attachments on the email. | keyword |
mimecast.Attempt | The count of attempts that the Mimecast MTA has made to deliver the email. | long |
mimecast.CustomName | The message has matched a custom name. | keyword |
mimecast.CustomThreatDictionary | The content of the email was detected to contain words in a custom threat dictionary. | keyword |
mimecast.CustomerIP | The source IP is one of the accounts authorised IPs or one of the authorised IPs belonging to an Umbrella Account, if the Account uses an Umbrella Account. | keyword |
mimecast.Hits | Number of items flagged for the message. | keyword |
mimecast.Hostname | keyword | |
mimecast.IPInternalName | For emails subject to Targeted Threat Protection - Impersonation Protect, if the email was detected to be from an internal user name. | keyword |
mimecast.IPNewDomain | For emails subject to Targeted Threat Protection - Impersonation Protect, if the email was detected to be from a new domain. | keyword |
mimecast.IPReplyMismatch | For emails subject to Targeted Threat Protection - Impersonation Protect, if the email was detetced to have a mismatch in the reply to address. | keyword |
mimecast.IPSimilarDomain | For emails subject to Targeted Threat Protection - Impersonation Protect, if the email was detetced to be from a similar domain to any domain you have registered as an Internal Domain. | keyword |
mimecast.IPThreadDict | For emails subject to Targeted Threat Protection - Impersonation Protect, if the content of the email was detected to contain words in the Mimecast threat dictionary. | keyword |
mimecast.InternalName | The email was detected to be from an internal user name. | keyword |
mimecast.Latency | The time in milliseconds that the delivery attempt took. | long |
mimecast.MimecastIP | The source IP is one of the Mimecast' IPs e.g. Mimecast Personal Portal. | keyword |
mimecast.MsgId | The internet message id of the email. | keyword |
mimecast.MsgSize | The total size of the email. | long |
mimecast.RcptActType | Action after reception. | keyword |
mimecast.RcptHdrType | Type of the receipt header. | keyword |
mimecast.ReceiptAck | The receipt acknowledgment message received by Mimecast from the receiving mail server. | keyword |
mimecast.Recipient | The recipient of the original message. | keyword |
mimecast.ReplyMismatch | The reply address does not correspond to the senders address. | keyword |
mimecast.Route | Email route. | keyword |
mimecast.ScanResultInfo | The reason that the click was blocked. | keyword |
mimecast.SenderDomainInternal | The sender domain is a registered internal domain. | keyword |
mimecast.SimilarCustomExternalDomain | The senders domain is similar to a custom external domain list. | keyword |
mimecast.SimilarInternalDomain | The senders domain is similar to a registered internal domain. | keyword |
mimecast.SimilarMimecastExternalDomain | The senders domain is similar to a Mimecast managed list of domains. | keyword |
mimecast.Snt | The amount of data in bytes that were delivered. | long |
mimecast.SpamInfo | Information from Mimecast Spam scanners for messages found to be Spam. | keyword |
mimecast.SpamLimit | The Spam limit defined for the given sender and recipient. | long |
mimecast.SpamProcessingDetail | The Spam processing details for DKIM, SPF, DMARC. | flattened |
mimecast.SpamScore | The Spam score the email was given. | long |
mimecast.Subject | The subject of the email, limited to 150 characters. | keyword |
mimecast.TaggedExternal | The message has been tagged as originating from a external source. | keyword |
mimecast.TaggedMalicious | The message has been tagged as malicious. | keyword |
mimecast.ThreatDictionary | The content of the email was detected to contain words in the Mimecast threat dictionary. | keyword |
mimecast.UrlCategory | The category of the URL that was clicked. | keyword |
mimecast.Virus | The name of the virus found on the email, if applicable. | keyword |
mimecast.acc | The Mimecast account code for your account. | keyword |
mimecast.accountId | The Mimecast account code for your account | keyword |
mimecast.action | The action taken at the receipt stage. Receipt logs:(Rej; Acc; Ign; Bnc), Process logs:(Acc; Hld; Bnc; Sdbx; Rty), Impersonation Protect logs:(None; Hold), URL Protect logs:(Block). | keyword |
mimecast.aggregateId | Unique identifier that allows you to correlate/group related events. | keyword |
mimecast.analysis | The senders domain is similar to a custom external domain list. | keyword |
mimecast.attachments | The filenames of all attachments on the email | keyword |
mimecast.blockReason | The reason click was blocked. (Unknown; File Detected; Clean; Malicious; Suspicious) | keyword |
mimecast.credentialTheft | The info about credential theft. | keyword |
mimecast.customNameMatch | The message has matched a custom name. True; False | keyword |
mimecast.customThreatDictionary | The content of the email was detected to contain words in the client custom threat dictionary. (True; False) | keyword |
mimecast.customerIp | The source IP is one of the accounts authorised IPs or one of the authorised IPs belonging to an Umbrella Account, if the Account uses an Umbrella Account. | keyword |
mimecast.delivered | * If the email was delivered successfully or not. False; True | keyword |
mimecast.delivery | Attempts The count of attempts that the Mimecast MTA has made to deliver the email. | keyword |
mimecast.deliveryAttempts | keyword | |
mimecast.deliveryErrors | Information about any errors that occurred on the delivery attempt. | keyword |
mimecast.deliveryTime | The time in milliseconds that the delivery attempt took. | keyword |
mimecast.destinationIp | The destination IP address for the delivery attempt. | keyword |
mimecast.direction | The direction of the email based on the sending and receiving domains. (Inbound; Outbound; Internal; External) | keyword |
mimecast.emailSize | The amount of data in bytes that were delivered. | keyword |
mimecast.fileExtension | The file extension. | keyword |
mimecast.fileName | The name of file. | keyword |
mimecast.holdReason | The reason the email was held for review (quarantined), if applicable. (Spm; Att; RcptLimit; Exp; Imp; Sbx; Oth; Url; Ctnt; Dpp; RBL; (absent)) | keyword |
mimecast.internalUserName | The email was detected to be from an internal user name. (Hit; No Hit) | keyword |
mimecast.ipNewDomain | For emails subject to Targeted Threat Protection: Impersonation Protect, if the email was detected to be from a new domain. | keyword |
mimecast.ipReplyMismatch | For emails subject to Targeted Threat Protection: Impersonation Protect, if the email was detetced to have a mismatch in the reply to address. | keyword |
mimecast.ipSimilarDomain | For emails subject to Targeted Threat Protection: Impersonation Protect, if the email was detetced to be from a similar domain to any domain you have registered as an Internal Domain. | keyword |
mimecast.ipThreatDictionary | For emails subject to Targeted Threat Protection: Impersonation Protect, if the content of the email was detected to contain words in the Mimecast threat dictionary. | keyword |
mimecast.ipUserName | For emails subject to Targeted Threat Protection: Impersonation Protect, if the email was detected to be from an internal user name. | keyword |
mimecast.itemsDetected | Number of items flagged for the message. | keyword |
mimecast.log_type | String to get type of SIEM log. | keyword |
mimecast.md5 | MD5 Hash. | keyword |
mimecast.messageId | The internet message id of the email. | keyword |
mimecast.mimecastThreatDictionary | The content of the email was detected to contain words in the Mimecast threat dictionary. (True; False) | keyword |
mimecast.monitoredDomainSource | the source of the URL match based on Mimecast's heuristic scanning techniques | keyword |
mimecast.msgid | The internet message id of the email. | keyword |
mimecast.newDomain | The email was detected to be from a new domain (True; False) | keyword |
mimecast.numberAttachments | The number of attachments on the email. | keyword |
mimecast.policyDefinition | The definition of policy triggered. | keyword |
mimecast.processingId | Unique identifier that allows you to correlate/group related events. | keyword |
mimecast.receiptErrors | Information about any errors that occurred during receipt. | keyword |
mimecast.recipients | The recipient of the email. | keyword |
mimecast.rejectionCode | The rejection code, for messages rejected by the receiving mail server. | keyword |
mimecast.rejectionInfo | The rejection information if the email was rejected at the receipt stage. | keyword |
mimecast.rejectionType | The rejection type, for messages rejected by the receiving mail server. | keyword |
mimecast.replyMismatch | The reply address does not correspond to the senders address. (True; False) | keyword |
mimecast.route | The route of the message. (Inbound; Outbound; Internal; External) | keyword |
mimecast.scanResults | The reason that the click was blocked. | keyword |
mimecast.senderDomain | The sender domain. | keyword |
mimecast.senderDomainInternal | The sender domain is a registered internal domain. | keyword |
mimecast.senderEnvelope | The sender of the email. | keyword |
mimecast.senderHeader | Sender address found in the from header of the email. | keyword |
mimecast.senderIp | The source IP of the original message or sending mail server. | keyword |
mimecast.sha1 | SHA1 hash. | keyword |
mimecast.sha256 | SHA256 hash. | keyword |
mimecast.similarCustomExternalDomain | The senders domain is similar to a custom external domain list. (True; False) | keyword |
mimecast.similarDomain | The domain is similar to a registered domain. | keyword |
mimecast.similarInternalDomain | The senders domain is similar to a registered internal domain. (True; False) | keyword |
mimecast.similarMimecastExternalDomain | The senders domain is similar to a Mimecast managed list of domains. (True; False) | keyword |
mimecast.similarMimecastExternalDomainResults | Advanced phishing detection results from scanners | keyword |
mimecast.sizeAttachment | The size (in bytes) of the malicious file. | keyword |
mimecast.sourceIp | The source IP of the original message. | keyword |
mimecast.spamDetectionLevel | The detection level defined for the given sender and recipient. | keyword |
mimecast.spamInfo | Information from Mimecast Spam scanners for messages found to be Spam. | keyword |
mimecast.spamProcessingDetail | The Spam processing details for DKIM, SPF, DMARC | keyword |
mimecast.spamScore | The metric that measures the likelihood of the event being considered spam. | keyword |
mimecast.subject | The subject of the email. | keyword |
mimecast.subtype | keyword | |
mimecast.taggedExternal | The message has been tagged as originating from a external source. (True; False) | keyword |
mimecast.taggedMalicious | The message has been tagged as malicious. (True; False) | keyword |
mimecast.timestamp | The date and time of event. | keyword |
mimecast.tlsCipher | The TLS Cipher used if the email was delivered or received using TLS. | keyword |
mimecast.tlsUsed | If the message was delivered using TLS or not. (Yes; No) | keyword |
mimecast.tlsVersion | The TLS version used if the email was delivered or received using TLS. | keyword |
mimecast.totalSizeAttachments | The total size of all attachments on the email. | keyword |
mimecast.url | URL Clicked | keyword |
mimecast.urlCategory | The category of the URL that was clicked. | keyword |
mimecast.virusFound | The name or signature of the virus found on the email, if applicable. | keyword |
This is the mimecast.threat_intel_malware_customer
dataset. These logs contain
information about messages that return identified malware threats at a customer
level. Learn more about these logs.
Example
{
"@timestamp": "2024-11-18T16:08:27.231Z",
"agent": {
"ephemeral_id": "d1f430e4-51c4-4477-b0c8-c09935910589",
"id": "2f4dbe4d-f9d3-4bb4-b16e-cc670095357a",
"name": "elastic-agent-69346",
"type": "filebeat",
"version": "8.14.0"
},
"data_stream": {
"dataset": "mimecast.threat_intel_malware_customer",
"namespace": "60530",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "2f4dbe4d-f9d3-4bb4-b16e-cc670095357a",
"snapshot": false,
"version": "8.14.0"
},
"event": {
"agent_id_status": "verified",
"category": [
"threat",
"email",
"malware"
],
"dataset": "mimecast.threat_intel_malware_customer",
"ingested": "2024-12-05T01:02:33Z",
"kind": "enrichment",
"original": "{\"created\":\"2024-11-18T16:08:27.231Z\",\"id\":\"indicator--dd9dd839-2362-4e60-9685-7d0b3b8e9497\",\"labels\":[\"malicious-activity\"],\"modified\":\"2024-11-18T16:08:27.231Z\",\"pattern\":\"[file:hashes.'SHA-256' = '275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f']\",\"type\":\"indicator\",\"valid_from\":\"2024-11-18T16:08:27.231Z\"}",
"type": [
"indicator"
]
},
"input": {
"type": "cel"
},
"mimecast": {
"id": "indicator--dd9dd839-2362-4e60-9685-7d0b3b8e9497",
"labels": [
"malicious-activity"
],
"pattern": "[file:hashes.'SHA-256' = '275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f']",
"type": "indicator"
},
"related": {
"hash": [
"275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f"
]
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-threat-intel-feed-malware-customer",
"malicious-activity"
],
"threat": {
"indicator": {
"file": {
"hash": {
"sha256": "275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f"
}
},
"first_seen": "2024-11-18T16:08:27.231Z",
"modified_at": "2024-11-18T16:08:27.231Z",
"type": "file"
}
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.created | When the indicator was last created. | date |
mimecast.hashtype | The hash type. | keyword |
mimecast.id | The ID of the indicator. | keyword |
mimecast.labels | The labels related to the indicator. | keyword |
mimecast.log_type | String to get type of Threat intel feed. | keyword |
mimecast.modified | When the indicator was last modified. | date |
mimecast.name | Name of the file. | keyword |
mimecast.pattern | The pattern. | keyword |
mimecast.relationship_type | Type of the relationship. | keyword |
mimecast.source_ref | Source of the reference. | keyword |
mimecast.target_ref | Reference target. | keyword |
mimecast.type | The indicator type, can for example be "domain, email, FileHash-SHA256". | keyword |
mimecast.valid_from | The valid from date. | date |
mimecast.value | The value of the indicator. | keyword |
threat.indicator.first_seen | The date and time when intelligence source first reported sighting this indicator. | date |
threat.indicator.modified_at | The date and time when intelligence source last modified information for this indicator. | date |
This is the mimecast.threat_intel_malware_grid
dataset. These logs contain
information about messages that return identified malware threats at a regional
grid level. More about these logs.
Example
{
"@timestamp": "2024-11-18T23:45:40.537Z",
"agent": {
"ephemeral_id": "5324b627-0cb0-4c9c-ade5-b381ee81af8f",
"id": "e14a2fc5-d58b-4d98-a9ee-46df63eab758",
"name": "elastic-agent-94233",
"type": "filebeat",
"version": "8.14.0"
},
"data_stream": {
"dataset": "mimecast.threat_intel_malware_grid",
"namespace": "50567",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "e14a2fc5-d58b-4d98-a9ee-46df63eab758",
"snapshot": false,
"version": "8.14.0"
},
"event": {
"agent_id_status": "verified",
"category": [
"threat",
"email",
"malware"
],
"dataset": "mimecast.threat_intel_malware_grid",
"ingested": "2024-12-05T01:20:52Z",
"kind": "enrichment",
"original": "{\"created\":\"2024-11-18T23:45:40.537Z\",\"id\":\"indicator--9633476b-0235-41cb-b9fb-6cc48b15391f\",\"labels\":[\"malicious-activity\"],\"modified\":\"2024-11-18T23:45:40.537Z\",\"pattern\":\"[file:hashes.'SHA-256' = '838c3483b20a3f81a199c49e7dc30b39d8d23a9810608f2bb7bb5ca059d42a72']\",\"type\":\"indicator\",\"valid_from\":\"2024-11-18T23:45:40.537Z\"}",
"type": [
"indicator"
]
},
"input": {
"type": "cel"
},
"mimecast": {
"id": "indicator--9633476b-0235-41cb-b9fb-6cc48b15391f",
"labels": [
"malicious-activity"
],
"pattern": "[file:hashes.'SHA-256' = '838c3483b20a3f81a199c49e7dc30b39d8d23a9810608f2bb7bb5ca059d42a72']",
"type": "indicator"
},
"related": {
"hash": [
"838c3483b20a3f81a199c49e7dc30b39d8d23a9810608f2bb7bb5ca059d42a72"
]
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-threat-intel-feed-malware-grid",
"malicious-activity"
],
"threat": {
"indicator": {
"file": {
"hash": {
"sha256": "838c3483b20a3f81a199c49e7dc30b39d8d23a9810608f2bb7bb5ca059d42a72"
}
},
"first_seen": "2024-11-18T23:45:40.537Z",
"modified_at": "2024-11-18T23:45:40.537Z",
"type": "file"
}
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.created | When the indicator was last created. | date |
mimecast.hashtype | The hash type. | keyword |
mimecast.id | The ID of the indicator. | keyword |
mimecast.labels | The labels related to the indicator. | keyword |
mimecast.log_type | String to get type of Threat intel feed. | keyword |
mimecast.modified | When the indicator was last modified. | date |
mimecast.name | Name of the file. | keyword |
mimecast.pattern | The pattern. | keyword |
mimecast.relationship_type | Type of the relationship. | keyword |
mimecast.source_ref | Source of the reference. | keyword |
mimecast.target_ref | Reference target. | keyword |
mimecast.type | The indicator type, can for example be "domain, email, FileHash-SHA256". | keyword |
mimecast.valid_from | The valid from date. | date |
mimecast.value | The value of the indicator. | keyword |
threat.indicator.first_seen | The date and time when intelligence source first reported sighting this indicator. | date |
threat.indicator.modified_at | The date and time when intelligence source last modified information for this indicator. | date |
This is the mimecast.ttp_ap_logs
dataset. These logs contain Mimecast TTP
attachment protection logs with the following details: result of attachment
analysis (if it is malicious or not etc.), date when file is released, sender
and recipient address, filename and type, action triggered for the attachment,
the route of the original email containing the attachment and details.
Learn more about these logs.
Example
{
"@timestamp": "2024-11-17T00:52:30.000Z",
"agent": {
"ephemeral_id": "10879bb9-44da-4174-a9f3-9c7a620c6a1b",
"id": "e12e39dc-5a8b-4aef-864e-fe617a5507e2",
"name": "elastic-agent-80555",
"type": "filebeat",
"version": "8.14.0"
},
"data_stream": {
"dataset": "mimecast.ttp_ap_logs",
"namespace": "21632",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "e12e39dc-5a8b-4aef-864e-fe617a5507e2",
"snapshot": false,
"version": "8.14.0"
},
"email": {
"attachments": {
"file": {
"extension": "xlsx",
"hash": {
"sha256": "168dde02cf41aed3bf31ad831b75d8ee0b738304baa6957c40e29b2487f15116"
},
"mime_type": "application/vnd.openxmlformats-officedocument.spreadsheetml.sheet",
"name": "Sandbox Test.xlsx"
}
},
"direction": "internal",
"from": {
"address": [
"eric.boyt@demo-int.elastic.mime-api.com"
]
},
"message_id": "<675ddc8ccedda6a7-363046@hapi.b41.one>",
"subject": "RE",
"to": {
"address": [
"charles.weldon@demo-int.elastic.mime-api.com"
]
}
},
"event": {
"action": "none",
"agent_id_status": "verified",
"category": [
"email"
],
"created": "2024-11-17T00:52:30+0000",
"dataset": "mimecast.ttp_ap_logs",
"ingested": "2024-12-05T01:08:12Z",
"original": "{\"actionTriggered\":\"none\",\"date\":\"2024-11-17T00:52:30+0000\",\"definition\":\"Default Internal Attachment Protect Definition\",\"details\":\"Malicious \\r\\nTime taken: 0 hrs, 0 min, 1 sec\",\"fileHash\":\"168dde02cf41aed3bf31ad831b75d8ee0b738304baa6957c40e29b2487f15116\",\"fileName\":\"Sandbox Test.xlsx\",\"fileType\":\"application/vnd.openxmlformats-officedocument.spreadsheetml.sheet\",\"messageId\":\"\\u003c675ddc8ccedda6a7-363046@hapi.b41.one\\u003e\",\"recipientAddress\":\"charles.weldon@demo-int.elastic.mime-api.com\",\"result\":\"malicious\",\"route\":\"internal\",\"senderAddress\":\"eric.boyt@demo-int.elastic.mime-api.com\",\"subject\":\"RE\"}"
},
"input": {
"type": "cel"
},
"mimecast": {
"details": "Malicious \r\nTime taken: 0 hrs, 0 min, 1 sec",
"result": "malicious"
},
"related": {
"hash": [
"168dde02cf41aed3bf31ad831b75d8ee0b738304baa6957c40e29b2487f15116"
]
},
"rule": {
"name": "Default Internal Attachment Protect Definition"
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-ttp-ap"
]
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.actionTriggered | The action triggered for the attachment. | keyword |
mimecast.definition | The definition. | keyword |
mimecast.details | Detailed output of the attachment sandbox processing. | keyword |
mimecast.fileHash | The hash of the attachment. | keyword |
mimecast.fileName | The file name of the original attachment. | keyword |
mimecast.fileType | The file type of the attachment. | keyword |
mimecast.messageId | The internet message id of the email. | keyword |
mimecast.recipientAddress | The address of the user that received the attachment. | keyword |
mimecast.result | The result of the attachment analysis - clean, malicious, unknown, or timeout. | keyword |
mimecast.route | The route of the original email containing the attachment, either - inbound, outbound, internal, or external. | keyword |
mimecast.senderAddress | The sender of the attachment. | keyword |
mimecast.subject | The subject of the email. | keyword |
This is the mimecast.ttp_ip_logs
dataset. These logs contain information about
messages containing information flagged by an Impersonation Protection
configuration. Learn more about [these logs]
(https://integrations.mimecast.com/documentation/endpoint-reference/logs-and-statistics/get-ttp-impersonation-protect-logs/).
Example
{
"@timestamp": "2021-11-12T15:27:14.000Z",
"agent": {
"ephemeral_id": "7b14936f-f3a2-4c0d-84ca-343382ff527a",
"id": "628d55fb-6e16-49d4-a0ba-b6db1b4d2281",
"name": "elastic-agent-89042",
"type": "filebeat",
"version": "8.14.0"
},
"data_stream": {
"dataset": "mimecast.ttp_ip_logs",
"namespace": "61588",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "628d55fb-6e16-49d4-a0ba-b6db1b4d2281",
"snapshot": false,
"version": "8.14.0"
},
"email": {
"from": {
"address": [
"johndoe@example.com"
]
},
"message_id": "<2-MN2PR16MB2719879CA4DB60C265F7FD8FB0959@MN2PR16MB2719.namprd16.example.outlook.com>",
"subject": "Don't read, just fill out!",
"to": {
"address": [
"johndoejr@exampple.com"
]
}
},
"event": {
"action": "none",
"agent_id_status": "verified",
"category": [
"email"
],
"created": "2021-11-12T15:27:14+0000",
"dataset": "mimecast.ttp_ip_logs",
"id": "MTOKEN:eNqrVkouLS7Jz00tSs5PSVWyUnI2MXM0N1XSUcpMUbIyMjM3MzCw0FEqSy0qzszPU7Iy1FEqyQMrNDAwV6oFAGP7Ehc",
"ingested": "2024-12-05T01:13:21Z",
"original": "{\"action\":\"none\",\"definition\":\"IP - 1 hit (Tag email)\",\"eventTime\":\"2021-11-12T15:27:14+0000\",\"hits\":1,\"id\":\"MTOKEN:eNqrVkouLS7Jz00tSs5PSVWyUnI2MXM0N1XSUcpMUbIyMjM3MzCw0FEqSy0qzszPU7Iy1FEqyQMrNDAwV6oFAGP7Ehc\",\"identifiers\":[\"internal_user_name\"],\"impersonationResults\":[{\"checkerResult\":\"hit\",\"impersonationDomainSource\":\"internal_user_name\",\"similarDomain\":\"John Doe \\u003cjohndoe_nu@example.com\\u003e\",\"stringSimilarToDomain\":\"John Doe\"}],\"messageId\":\"\\u003c2-MN2PR16MB2719879CA4DB60C265F7FD8FB0959@MN2PR16MB2719.namprd16.example.outlook.com\\u003e\",\"recipientAddress\":\"johndoejr@exampple.com\",\"senderAddress\":\"johndoe@example.com\",\"senderIpAddress\":\"8.8.8.8\",\"subject\":\"Don't read, just fill out!\",\"taggedExternal\":false,\"taggedMalicious\":true}"
},
"input": {
"type": "cel"
},
"mimecast": {
"hits": 1,
"identifiers": [
"internal_user_name"
],
"impersonationResults": [
{
"checkerResult": "hit",
"impersonationDomainSource": "internal_user_name",
"similarDomain": "John Doe <johndoe_nu@example.com>",
"stringSimilarToDomain": "John Doe"
}
],
"taggedExternal": false,
"taggedMalicious": true
},
"related": {
"ip": [
"8.8.8.8"
]
},
"rule": {
"name": "IP - 1 hit (Tag email)"
},
"source": {
"ip": "8.8.8.8"
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-ttp-ip"
]
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.action | The action triggered by the email. | keyword |
mimecast.definition | The name of the policy definition that triggered the log. | keyword |
mimecast.hits | The number of identifiers that the message triggered. | long |
mimecast.id | A token that can be used to retrieve this log again. | keyword |
mimecast.identifiers | The properties of the message that triggered the action - similar_internal_domain, newly_observed_domain, internal_user_name, reply_address_mismatch, and/or targeted_threat_dictionary. | keyword |
mimecast.impersonationResults.checkerResult | Result checker. | keyword |
mimecast.impersonationResults.impersonationDomainSource | Impersonation domain source. | keyword |
mimecast.impersonationResults.similarDomain | Similar domain. | keyword |
mimecast.impersonationResults.stringSimilarToDomain | The string that is suspiciously similar to a known value within the Mimecast configuration. Multiple triggers will be comma-separated. | keyword |
mimecast.messageId | The message-id of the identified message. | keyword |
mimecast.recipientAddress | The email address of the recipient of the email. | keyword |
mimecast.senderAddress | The email address of the sender of the message. | keyword |
mimecast.senderIpAddress | The source IP address of the message. | keyword |
mimecast.subject | The subject of the email. | keyword |
mimecast.taggedExternal | Whether the message was tagged as coming from an external address. | boolean |
mimecast.taggedMalicious | Whether the message was tagged as malicious. | boolean |
This is the mimecast.ttp_url_logs
dataset. These logs contain Mimecast TTP
attachment protection logs with the following details: the category of the URL
clicked, the email address of the user who clicked the link, the url clicked,
the action taken by the user if user awareness was applied, the route of the
email that contained the link, the action defined by the administrator for the
URL, the date that the URL was clicked, url scan result, the action that was
taken for the click, the description of the definition that triggered the URL to
be rewritten by Mimecast, the action requested by the user, an array of
components of the message where the URL was found. More about these logs.
Example
{
"@timestamp": "2024-11-13T13:03:11.000Z",
"agent": {
"ephemeral_id": "675bf199-2969-46bf-a9c1-8f880acc18f4",
"id": "d0b37a9a-11c1-4a25-898d-0ddb211b9fd2",
"name": "elastic-agent-71893",
"type": "filebeat",
"version": "8.14.0"
},
"data_stream": {
"dataset": "mimecast.ttp_url_logs",
"namespace": "65054",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "d0b37a9a-11c1-4a25-898d-0ddb211b9fd2",
"snapshot": false,
"version": "8.14.0"
},
"email": {
"direction": "inbound",
"from": {
"address": [
"gregoryhunt@thejunglegroup.b41.one"
]
},
"message_id": "<cc11f61d32d018de-152846@hapi.b41.one>",
"subject": "Re",
"to": {
"address": [
"mike.a.roberts@demo-int.elastic.mime-api.com"
]
}
},
"event": {
"action": "N/A",
"agent_id_status": "verified",
"category": [
"email"
],
"created": "2024-11-13T13:03:11+0000",
"dataset": "mimecast.ttp_url_logs",
"ingested": "2024-12-05T01:17:02Z",
"original": "{\"action\":\"warn\",\"actions\":\"Block\",\"adminOverride\":\"N/A\",\"category\":\"Dangerous file extension\",\"creationMethod\":\"Entry Scan\",\"date\":\"2024-11-13T13:03:11+0000\",\"emailPartsDescription\":[\"Attachment\"],\"fromUserEmailAddress\":\"gregoryhunt@thejunglegroup.b41.one\",\"messageId\":\"\\u003ccc11f61d32d018de-152846@hapi.b41.one\\u003e\",\"route\":\"inbound\",\"scanResult\":\"malicious\",\"sendingIp\":\"54.243.138.179\",\"subject\":\"Re\",\"tagMap\":{\"DangerousFileExt\":{\"ContentCheck:ContentScannersBlocked\":[\".exe\"],\"ContentCheck:DangerousExtsUrlFileDownload\":[\"dll\"],\"ContentCheck:DangerousMimetypesUrlFileDownload\":[\"application/x-msdownload\"],\"Inspect:FileExts\":[\"[exe]\"],\"Inspect:MimeTypes\":[\"[]\"],\"Status\":[\"CustomerSpecific\",\"VerdictBlock\"]}},\"ttpDefinition\":\"Default Inbound URL Protect Definition\",\"url\":\"https://oneclient.sfx.ms/Win/Preview/OneDriveSetup.exe\",\"userAwarenessAction\":\"N/A\",\"userEmailAddress\":\"mike.a.roberts@demo-int.elastic.mime-api.com\",\"userOverride\":\"None\"}"
},
"input": {
"type": "cel"
},
"mimecast": {
"action": "warn",
"actions": "Block",
"adminOverride": "N/A",
"category": "Dangerous file extension",
"creationMethod": "Entry Scan",
"emailPartsDescription": [
"Attachment"
],
"scanResult": "malicious",
"tagMap": {
"DangerousFileExt": {
"ContentCheck_ContentScannersBlocked": [
".exe"
],
"ContentCheck_DangerousExtsUrlFileDownload": [
"dll"
],
"ContentCheck_DangerousMimetypesUrlFileDownload": [
"application/x-msdownload"
],
"Inspect_FileExts": [
"[exe]"
],
"Inspect_MimeTypes": [
"[]"
],
"Status": [
"CustomerSpecific",
"VerdictBlock"
]
}
},
"userOverride": "None"
},
"related": {
"ip": [
"54.243.138.179"
],
"user": [
"gregoryhunt@thejunglegroup.b41.one",
"mike.a.roberts@demo-int.elastic.mime-api.com"
]
},
"rule": {
"name": "Default Inbound URL Protect Definition"
},
"source": {
"ip": "54.243.138.179"
},
"tags": [
"preserve_original_event",
"forwarded",
"mimecast-ttp-url"
],
"url": {
"domain": "oneclient.sfx.ms",
"extension": "exe",
"original": "https://oneclient.sfx.ms/Win/Preview/OneDriveSetup.exe",
"path": "/Win/Preview/OneDriveSetup.exe",
"scheme": "https"
},
"user": {
"email": [
"mike.a.roberts@demo-int.elastic.mime-api.com"
]
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Event module | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
mimecast.action | The action that was taken for the click. | keyword |
mimecast.actions | The actions that were taken. | keyword |
mimecast.adminOverride | The action defined by the administrator for the URL. | keyword |
mimecast.category | The category of the URL clicked. | keyword |
mimecast.creationMethod | The description how event occurred. | keyword |
mimecast.emailPartsDescription | An array of components of the messge where the URL was found. | keyword |
mimecast.fromUserEmailAddress | The email of user who triggers the event. | keyword |
mimecast.messageId | The message-id value of the message. | keyword |
mimecast.route | The route of the email that contained the link. | keyword |
mimecast.scanResult | The result of the URL scan. | keyword |
mimecast.sendingIp | The IP of user who triggers the event. | keyword |
mimecast.subject | The subject of the email. | keyword |
mimecast.tagMap.DangerousFileExt.ContentCheck_ContentScannersBlocked | keyword | |
mimecast.tagMap.DangerousFileExt.ContentCheck_DangerousExtsUrlFileDownload | keyword | |
mimecast.tagMap.DangerousFileExt.ContentCheck_DangerousMimetypesUrlFileDownload | keyword | |
mimecast.tagMap.DangerousFileExt.Inspect_FileExts | keyword | |
mimecast.tagMap.DangerousFileExt.Inspect_MimeTypes | keyword | |
mimecast.tagMap.DangerousFileExt.Status | keyword | |
mimecast.tagMap.UrlReputationScan.Status | keyword | |
mimecast.tagMap.UrlReputationScan.Type | keyword | |
mimecast.tagMap.UrlReputationScan.Url | keyword | |
mimecast.tagMap.UrlReputationScan.UrlBlock | keyword | |
mimecast.ttpDefinition | The description of the definition that triggered the URL to be rewritten by Mimecast. | keyword |
mimecast.url | The url clicked. | keyword |
mimecast.userAwarenessAction | The action taken by the user if user awareness was applied. | keyword |
mimecast.userEmailAddress | The email address of the user who clicked the link. | keyword |
mimecast.userOverride | The action requested by the user. | keyword |
Changelog
Version | Details | Kibana version(s) |
---|---|---|
2.7.0 | Enhancement (View pull request) Enable request trace log removal. |
8.15.0 or higher 9.0.0 or higher |
2.6.2 | Enhancement (View pull request) Handle empty events within a time window inside threat events. |
8.15.0 or higher 9.0.0 or higher |
2.6.1 | Bug fix (View pull request) Prevent pageToken from incorrectly reappearing in interval requests in multiple data streams. |
8.15.0 or higher 9.0.0 or higher |
2.6.0 | Enhancement (View pull request) Set event.kind:"alert" for relevant events. |
8.15.0 or higher 9.0.0 or higher |
2.5.2 | Bug fix (View pull request) Add missing ECS field mappings. |
8.15.0 or higher 9.0.0 or higher |
2.5.1 | Bug fix (View pull request) Prevent pageToken from incorrectly reappearing in interval requests. |
8.15.0 or higher 9.0.0 or higher |
2.5.0 | Enhancement (View pull request) Update Kibana constraint to support 9.0.0. |
8.15.0 or higher 9.0.0 or higher |
2.4.3 | Bug fix (View pull request) Fix rendering of CEL programs in configuration. |
8.15.0 or higher |
2.4.2 | Bug fix (View pull request) Fix cursor time formatting and selection. |
8.15.0 or higher |
2.4.1 | Bug fix (View pull request) Remove invalid remove processor. |
8.15.0 or higher |
2.4.0 | Enhancement (View pull request) Do not remove event.original in main ingest pipeline. |
8.15.0 or higher |
2.3.0 | Enhancement (View pull request) Add cloud_integrated_logs data stream. |
8.15.0 or higher |
2.2.0 | Enhancement (View pull request) Add "preserve_original_event" tag to documents with event.kind set to "pipeline_error". |
8.15.0 or higher |
2.1.0 | Enhancement (View pull request) Add v2 API client for siem_logs . |
8.15.0 or higher |
2.0.0 | Breaking change (View pull request) Migrate message release logs data stream to Mimecast v2 API. Enhancement (View pull request) Add v2 API clients for archive_search_logs , audit_events , dlp_logs , threat_intel_malware_customer , threat_intel_malware_grid , ttp_ap_logs , ttp_ip_logs , and ttp_url_logs . |
8.14.0 or higher |
1.27.4 | Bug fix (View pull request) Fix handling of time values with short timezone IDs. |
8.14.0 or higher |
1.27.3 | Bug fix (View pull request) Fix parsing of "logon-authentication-failed" events. |
8.14.0 or higher |
1.27.2 | Bug fix (View pull request) Use triple-brace Mustache templating when referencing variables in ingest pipelines. |
8.14.0 or higher |
1.27.1 | Bug fix (View pull request) Use triple-brace Mustache templating when referencing variables in ingest pipelines. |
8.14.0 or higher |
1.27.0 | Enhancement (View pull request) Add support for message release logs. |
8.14.0 or higher |
1.26.1 | Bug fix (View pull request) Fix handling of email addresses with comma in quoted name. |
8.13.0 or higher |
1.26.0 | Enhancement (View pull request) Update the kibana constraint to ^8.13.0. Modified the field definitions to remove ECS fields made redundant by the ecs@mappings component template. |
8.13.0 or higher |
1.25.0 | Enhancement (View pull request) Improve handling of empty responses. |
8.12.0 or higher |
1.24.0 | Enhancement (View pull request) Log processing stage and improve document fingerprinting. |
8.12.0 or higher |
1.23.0 | Enhancement (View pull request) Set sensitive values as secret. |
8.12.0 or higher |
1.22.1 | Enhancement (View pull request) Changed owners |
8.7.1 or higher |
1.22.0 | Enhancement (View pull request) Limit request tracer log count to five. |
8.7.1 or higher |
1.21.0 | Enhancement (View pull request) ECS version updated to 8.11.0. |
8.7.1 or higher |
1.20.0 | Enhancement (View pull request) Improve 'event.original' check to avoid errors if set. |
8.7.1 or higher |
1.19.0 | Enhancement (View pull request) Set 'partner' owner type. |
8.7.1 or higher |
1.18.0 | Enhancement (View pull request) ECS version updated to 8.10.0. |
8.7.1 or higher |
1.17.0 | Enhancement (View pull request) The format_version in the package manifest changed from 2.11.0 to 3.0.0. Removed dotted YAML keys from package manifest. Added 'owner.type: elastic' to package manifest. |
8.7.1 or higher |
1.16.0 | Enhancement (View pull request) Add tags.yml file so that integration's dashboards and saved searches are tagged with "Security Solution" and displayed in the Security Solution UI. |
8.7.1 or higher |
1.15.0 | Enhancement (View pull request) Add support for Archive Search Logs |
8.7.1 or higher |
1.14.0 | Enhancement (View pull request) Update package to ECS 8.9.0. |
8.7.1 or higher |
1.13.0 | Enhancement (View pull request) Update package-spec to 2.9.0. |
8.7.1 or higher |
1.12.0 | Enhancement (View pull request) Document valid duration units. |
8.7.1 or higher |
1.11.0 | Enhancement (View pull request) Ensure event.kind is correctly set for pipeline errors. |
8.7.1 or higher |
1.10.0 | Enhancement (View pull request) Update package to ECS 8.8.0. |
8.7.1 or higher |
1.9.1 | Bug fix (View pull request) Fix parsing of Logon Authentication Failed audit event. |
8.7.1 or higher |
1.9.0 | Enhancement (View pull request) Change Request trace filename |
8.7.1 or higher |
1.8.1 | Bug fix (View pull request) Check ttp URL source IP values for type conformity. |
8.5.0 or higher |
1.8.0 | Enhancement (View pull request) Add toggle to enable request tracing. |
8.5.0 or higher |
1.7.0 | Enhancement (View pull request) Update package to ECS 8.7.0. |
8.3.0 or higher |
1.6.5 | Enhancement (View pull request) Added categories and/or subcategories. |
8.3.0 or higher |
1.6.4 | Bug fix (View pull request) Define mimecast.SpamProcessingDetail as flattened. |
8.3.0 or higher |
1.6.3 | Bug fix (View pull request) Fingerprint events to prevent duplicate document ingestion. |
8.3.0 or higher |
1.6.2 | Bug fix (View pull request) Fix mimecast template config |
8.3.0 or higher |
1.6.1 | Bug fix (View pull request) Drop empty event sets in data streams. |
8.3.0 or higher |
1.6.0 | Enhancement (View pull request) Fingerprint audit events on their ID. |
8.3.0 or higher |
1.5.0 | Enhancement (View pull request) Update package to ECS 8.6.0. |
8.3.0 or higher |
1.4.3 | Bug fix (View pull request) Fix timezone format in httpjson input in multiple datastreams |
8.3.0 or higher |
1.4.2 | Enhancement (View pull request) Migrate the visualizations to by value in dashboards to minimize the saved object clutter and reduce time to load |
8.3.0 or higher |
1.4.1 | Bug fix (View pull request) Remove duplicate fields. |
8.3.0 or higher |
1.4.0 | Enhancement (View pull request) Update package to ECS 8.5.0. |
8.3.0 or higher |
1.3.0 | Enhancement (View pull request) Update package to ECS 8.4.0 |
8.3.0 or higher |
1.2.1 | Bug fix (View pull request) Fix compression for SIEM logs. |
8.3.0 or higher |
1.2.0 | Enhancement (View pull request) Update categories to include threat_intel . |
8.3.0 or higher |
1.1.2 | Enhancement (View pull request) Tidy up Markdown syntax in readme. |
8.3.0 or higher |
1.1.1 | Enhancement (View pull request) Update package name and description to align with standard wording |
8.3.0 or higher |
1.1.0 | Enhancement (View pull request) Update package to ECS 8.3.0. |
8.3.0 or higher |
1.0.0 | Enhancement (View pull request) Make ga with zip support for SIEM events. Enhancement (View pull request) Move auth vars to the common manifest. |
8.3.0 or higher |
0.0.12 | Enhancement (View pull request) Add more use cases for parsing audit events. |
— |
0.0.11 | Enhancement (View pull request) Update integration description for consistency with other integrations. Bug fix (View pull request) Add missing ECS event.* field mappings. |
— |
0.0.10 | Enhancement (View pull request) Add more use cases to audit_events pipeline Enhancement (View pull request) Implement geo.ip for siem logs Enhancement (View pull request) Remove user part for ttp-url logs and add email.to.address for recipient |
— |
0.0.9 | Enhancement (View pull request) Update ecs to version 8.2.0 and implement better practice for email ECS fields. |
— |
0.0.8 | Enhancement (View pull request) Add documentation for multi-fields |
— |
0.0.7 | Bug fix (View pull request) Add content-disposition to test mock to properly create sample event from SIEM logs. |
— |
0.0.6 | Enhancement (View pull request) Add use cases for audit events and update sample events and docs |
— |
0.0.5 | Bug fix (View pull request) Fix typo Bug fix (View pull request) Add 8.0.0 compatibility, fix team name in manifest, and remove redundant event.ingested from pipelines. |
— |
0.0.4 | Bug fix (View pull request) Regenerate test files using the new GeoIP database |
— |
0.0.3 | Bug fix (View pull request) Change test public IPs to the supported subset |
— |
0.0.2 | Enhancement (View pull request) Tweaking the dashboards |
— |
0.0.1 | Enhancement (View pull request) Initial draft of the package |
— |