You are viewing docs on Elastic's new documentation system, currently in technical preview. For all other Elastic docs, visit elastic.co/guide.

Fortinet FortiGate Firewall Logs

Collect logs from Fortinet FortiGate firewalls with Elastic Agent.

Version
1.23.2 (View all)
Compatible Kibana version(s)
8.3.0 or higher
Supported Serverless project types

Security
Observability
Subscription level
Basic
Level of support
Elastic

This integration is for Fortinet FortiGate logs sent in the syslog format.

Compatibility

This integration has been tested against FortiOS versions 6.x and 7.x up to 7.4.1. Newer versions are expected to work but have not been tested.

Note

  • When using the TCP input, be careful with the configured TCP framing. According to the Fortigate reference, framing should be set to rfc6587 when the syslog mode is reliable.

Log

The log dataset collects Fortinet FortiGate logs.

An example event for log looks as following:

{
    "@timestamp": "2019-05-15T18:03:36.000Z",
    "agent": {
        "ephemeral_id": "65ad5a4b-72ad-4878-905c-6f7f2a959ee4",
        "id": "2f63344b-97c9-4998-9535-0fc6454ddd4b",
        "name": "docker-fleet-agent",
        "type": "filebeat",
        "version": "8.9.0"
    },
    "data_stream": {
        "dataset": "fortinet_fortigate.log",
        "namespace": "ep",
        "type": "logs"
    },
    "destination": {
        "as": {
            "number": 35908
        },
        "geo": {
            "continent_name": "Asia",
            "country_iso_code": "BT",
            "country_name": "Bhutan",
            "location": {
                "lat": 27.5,
                "lon": 90.5
            }
        },
        "ip": "67.43.156.14",
        "port": 443
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "2f63344b-97c9-4998-9535-0fc6454ddd4b",
        "snapshot": false,
        "version": "8.9.0"
    },
    "event": {
        "action": "app-ctrl-all",
        "agent_id_status": "verified",
        "category": [
            "network"
        ],
        "code": "1059028704",
        "dataset": "fortinet_fortigate.log",
        "ingested": "2023-10-26T15:15:25Z",
        "kind": "event",
        "original": "<190>date=2019-05-15 time=18:03:36 logid=\"1059028704\" type=\"utm\" subtype=\"app-ctrl\" eventtype=\"app-ctrl-all\" level=\"information\" vd=\"root\" eventtime=1557968615 appid=40568 srcip=10.1.100.22 dstip=67.43.156.14 srcport=50798 dstport=443 srcintf=\"port10\" srcintfrole=\"lan\" dstintf=\"port9\" dstintfrole=\"wan\" proto=6 service=\"HTTPS\" direction=\"outgoing\" policyid=1 sessionid=4414 applist=\"block-social.media\" appcat=\"Web.Client\" app=\"HTTPS.BROWSER\" action=\"pass\" hostname=\"www.dailymotion.com\" incidentserialno=1962906680 url=\"/\" msg=\"Web.Client: HTTPS.BROWSER,\" apprisk=\"medium\" scertcname=\"*.dailymotion.com\" scertissuer=\"DigiCert SHA2 High Assurance Server CA\"",
        "outcome": "success",
        "start": "2019-05-16T01:03:35.000Z",
        "type": [
            "allowed"
        ]
    },
    "fortinet": {
        "firewall": {
            "action": "pass",
            "appid": "40568",
            "apprisk": "medium",
            "dstintfrole": "wan",
            "incidentserialno": "1962906680",
            "sessionid": "4414",
            "srcintfrole": "lan",
            "subtype": "app-ctrl",
            "type": "utm",
            "vd": "root"
        }
    },
    "input": {
        "type": "tcp"
    },
    "log": {
        "level": "information",
        "source": {
            "address": "172.24.0.4:57264"
        },
        "syslog": {
            "facility": {
                "code": 23
            },
            "priority": 190,
            "severity": {
                "code": 6
            }
        }
    },
    "message": "Web.Client: HTTPS.BROWSER,",
    "network": {
        "application": "HTTPS.BROWSER",
        "direction": "outbound",
        "iana_number": "6",
        "protocol": "https",
        "transport": "tcp"
    },
    "observer": {
        "egress": {
            "interface": {
                "name": "port9"
            }
        },
        "ingress": {
            "interface": {
                "name": "port10"
            }
        },
        "product": "Fortigate",
        "type": "firewall",
        "vendor": "Fortinet"
    },
    "related": {
        "ip": [
            "10.1.100.22",
            "67.43.156.14"
        ]
    },
    "rule": {
        "category": "Web-Client",
        "id": "1",
        "ruleset": "block-social.media"
    },
    "source": {
        "ip": "10.1.100.22",
        "port": 50798
    },
    "tags": [
        "preserve_original_event",
        "fortinet-fortigate",
        "fortinet-firewall",
        "forwarded"
    ],
    "tls": {
        "server": {
            "issuer": "DigiCert SHA2 High Assurance Server CA",
            "x509": {
                "issuer": {
                    "common_name": [
                        "DigiCert SHA2 High Assurance Server CA"
                    ]
                },
                "subject": {
                    "common_name": [
                        "*.dailymotion.com"
                    ]
                }
            }
        }
    },
    "url": {
        "domain": "www.dailymotion.com",
        "path": "/"
    }
}

Exported fields

FieldDescriptionType
@timestamp
Event timestamp.
date
cloud.account.id
The cloud account or organization id used to identify different entities in a multi-tenant environment. Examples: AWS account id, Google Cloud ORG Id, or other unique identifier.
keyword
cloud.availability_zone
Availability zone in which this host is running.
keyword
cloud.image.id
Image ID for the cloud instance.
keyword
cloud.instance.id
Instance ID of the host machine.
keyword
cloud.instance.name
Instance name of the host machine.
keyword
cloud.machine.type
Machine type of the host machine.
keyword
cloud.project.id
Name of the project in Google Cloud.
keyword
cloud.provider
Name of the cloud provider. Example values are aws, azure, gcp, or digitalocean.
keyword
cloud.region
Region in which this host is running.
keyword
container.id
Unique container id.
keyword
container.image.name
Name of the image the container was built on.
keyword
container.labels
Image labels.
object
container.name
Container name.
keyword
data_stream.dataset
Data stream dataset.
constant_keyword
data_stream.namespace
Data stream namespace.
constant_keyword
data_stream.type
Data stream type.
constant_keyword
destination.address
Some event destination addresses are defined ambiguously. The event will sometimes list an IP, a domain or a unix socket. You should always store the raw address in the .address field. Then it should be duplicated to .ip or .domain, depending on which one it is.
keyword
destination.as.number
Unique number allocated to the autonomous system. The autonomous system number (ASN) uniquely identifies each network on the Internet.
long
destination.as.organization.name
Organization name.
keyword
destination.as.organization.name.text
Multi-field of destination.as.organization.name.
match_only_text
destination.bytes
Bytes sent from the destination to the source.
long
destination.domain
The domain name of the destination system. This value may be a host name, a fully qualified domain name, or another host naming format. The value may derive from the original event or be added from enrichment.
keyword
destination.geo.city_name
City name.
keyword
destination.geo.continent_name
Name of the continent.
keyword
destination.geo.country_iso_code
Country ISO code.
keyword
destination.geo.country_name
Country name.
keyword
destination.geo.location
Longitude and latitude.
geo_point
destination.geo.name
User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation.
keyword
destination.geo.region_iso_code
Region ISO code.
keyword
destination.geo.region_name
Region name.
keyword
destination.ip
IP address of the destination (IPv4 or IPv6).
ip
destination.mac
MAC address of the destination. The notation format from RFC 7042 is suggested: Each octet (that is, 8-bit byte) is represented by two [uppercase] hexadecimal digits giving the value of the octet as an unsigned integer. Successive octets are separated by a hyphen.
keyword
destination.nat.ip
Translated ip of destination based NAT sessions (e.g. internet to private DMZ) Typically used with load balancers, firewalls, or routers.
ip
destination.nat.port
Port the source session is translated to by NAT Device. Typically used with load balancers, firewalls, or routers.
long
destination.packets
Packets sent from the destination to the source.
long
destination.port
Port of the destination.
long
destination.user.email
User email address.
keyword
destination.user.name
Short name or login of the user.
keyword
destination.user.name.text
Multi-field of destination.user.name.
match_only_text
dns.id
The DNS packet identifier assigned by the program that generated the query. The identifier is copied to the response.
keyword
dns.question.class
The class of records being queried.
keyword
dns.question.name
The name being queried. If the name field contains non-printable characters (below 32 or above 126), those characters should be represented as escaped base 10 integers (\DDD). Back slashes and quotes should be escaped. Tabs, carriage returns, and line feeds should be converted to \t, \r, and \n respectively.
keyword
dns.question.registered_domain
The highest registered domain, stripped of the subdomain. For example, the registered domain for "foo.example.com" is "example.com". This value can be determined precisely with a list like the public suffix list (http://publicsuffix.org). Trying to approximate this by simply taking the last two labels will not work well for TLDs such as "co.uk".
keyword
dns.question.subdomain
The subdomain is all of the labels under the registered_domain. If the domain has multiple levels of subdomain, such as "sub2.sub1.example.com", the subdomain field should contain "sub2.sub1", with no trailing period.
keyword
dns.question.top_level_domain
The effective top level domain (eTLD), also known as the domain suffix, is the last part of the domain name. For example, the top level domain for example.com is "com". This value can be determined precisely with a list like the public suffix list (http://publicsuffix.org). Trying to approximate this by simply taking the last label will not work well for effective TLDs such as "co.uk".
keyword
dns.question.type
The type of record being queried.
keyword
dns.resolved_ip
Array containing all IPs seen in answers.data. The answers array can be difficult to use, because of the variety of data formats it can contain. Extracting all IP addresses seen in there to dns.resolved_ip makes it possible to index them as IP addresses, and makes them easier to visualize and query for.
ip
ecs.version
ECS version this event conforms to. ecs.version is a required field and must exist in all events. When querying across multiple indices -- which may conform to slightly different ECS versions -- this field lets integrations adjust to the schema version of the events.
keyword
email.cc.address
The email address of CC recipient
keyword
email.from.address
The email address of the sender, typically from the RFC 5322 From: header field.
keyword
email.sender.address
Per RFC 5322, specifies the address responsible for the actual transmission of the message.
keyword
email.subject
A brief summary of the topic of the message.
keyword
email.subject.text
Multi-field of email.subject.
match_only_text
email.to.address
The email address of recipient
keyword
error.code
Error code describing the error.
keyword
error.message
Error message.
match_only_text
event.category
This is one of four ECS Categorization Fields, and indicates the second level in the ECS category hierarchy. event.category represents the "big buckets" of ECS categories. For example, filtering on event.category:process yields all events relating to process activity. This field is closely related to event.type, which is used as a subcategory. This field is an array. This will allow proper categorization of some events that fall in multiple categories.
keyword
event.code
Identification code for this event, if one exists. Some event sources use event codes to identify messages unambiguously, regardless of message language or wording adjustments over time. An example of this is the Windows Event ID.
keyword
event.dataset
Name of the dataset.
constant_keyword
event.duration
Duration of the event in nanoseconds. If event.start and event.end are known this value should be the difference between the end and start time.
long
event.ingested
Timestamp when an event arrived in the central data store. This is different from @timestamp, which is when the event originally occurred. It's also different from event.created, which is meant to capture the first time an agent saw the event. In normal conditions, assuming no tampering, the timestamps should chronologically look like this: @timestamp < event.created < event.ingested.
date
event.kind
This is one of four ECS Categorization Fields, and indicates the highest level in the ECS category hierarchy. event.kind gives high-level information about what type of information the event contains, without being specific to the contents of the event. For example, values of this field distinguish alert events from metric events. The value of this field can be used to inform how these kinds of events should be handled. They may warrant different retention, different access control, it may also help understand whether the data is coming in at a regular interval or not.
keyword
event.message
Log message optimized for viewing in a log viewer.
text
event.module
Name of the module this data is coming from.
constant_keyword
event.outcome
This is one of four ECS Categorization Fields, and indicates the lowest level in the ECS category hierarchy. event.outcome simply denotes whether the event represents a success or a failure from the perspective of the entity that produced the event. Note that when a single transaction is described in multiple events, each event may populate different values of event.outcome, according to their perspective. Also note that in the case of a compound event (a single event that contains multiple logical events), this field should be populated with the value that best captures the overall success or failure from the perspective of the event producer. Further note that not all events will have an associated outcome. For example, this field is generally not populated for metric events, events with event.type:info, or any events for which an outcome does not make logical sense.
keyword
event.reference
Reference URL linking to additional information about this event. This URL links to a static definition of this event. Alert events, indicated by event.kind:alert, are a common use case for this field.
keyword
event.start
event.start contains the date when the event started or when the activity was first observed.
date
event.timezone
This field should be populated when the event's timestamp does not include timezone information already (e.g. default Syslog timestamps). It's optional otherwise. Acceptable timezone formats are: a canonical ID (e.g. "Europe/Amsterdam"), abbreviated (e.g. "EST") or an HH:mm differential (e.g. "-05:00").
keyword
event.type
This is one of four ECS Categorization Fields, and indicates the third level in the ECS category hierarchy. event.type represents a categorization "sub-bucket" that, when used along with the event.category field values, enables filtering events down to a level appropriate for single visualization. This field is an array. This will allow proper categorization of some events that fall in multiple event types.
keyword
file.extension
File extension, excluding the leading dot. Note that when the file name has multiple extensions (example.tar.gz), only the last one should be captured ("gz", not "tar.gz").
keyword
file.name
Name of the file including the extension, without the directory.
keyword
file.size
File size in bytes. Only relevant when file.type is "file".
long
fortinet.file.hash.crc32
CRC32 Hash of file
keyword
fortinet.firewall.acct_stat
Accounting state (RADIUS)
keyword
fortinet.firewall.acktime
Alarm Acknowledge Time
keyword
fortinet.firewall.action
Action
keyword
fortinet.firewall.activity
HA activity message
keyword
fortinet.firewall.addr
IP Address
ip
fortinet.firewall.addr_type
Address Type
keyword
fortinet.firewall.addrgrp
Address Group
keyword
fortinet.firewall.adgroup
AD Group Name
keyword
fortinet.firewall.admin
Admin User
keyword
fortinet.firewall.age
Time in seconds - time passed since last seen
integer
fortinet.firewall.agent
User agent - eg. agent="Mozilla/5.0"
keyword
fortinet.firewall.alarmid
Alarm ID
integer
fortinet.firewall.alert
Alert
keyword
fortinet.firewall.analyticscksum
The checksum of the file submitted for analytics
keyword
fortinet.firewall.analyticssubmit
The flag for analytics submission
keyword
fortinet.firewall.ap
Access Point
keyword
fortinet.firewall.app-type
Address Type
keyword
fortinet.firewall.appact
The security action from app control
keyword
fortinet.firewall.appid
Application ID
integer
fortinet.firewall.applist
Application Control profile
keyword
fortinet.firewall.apprisk
Application Risk Level
keyword
fortinet.firewall.apscan
The name of the AP, which scanned and detected the rogue AP
keyword
fortinet.firewall.apsn
Access Point
keyword
fortinet.firewall.apstatus
Access Point status
keyword
fortinet.firewall.aptype
Access Point type
keyword
fortinet.firewall.assigned
Assigned IP Address
ip
fortinet.firewall.assignip
Assigned IP Address
ip
fortinet.firewall.attachment
The flag for email attachement
keyword
fortinet.firewall.attack
Attack Name
keyword
fortinet.firewall.attackcontext
The trigger patterns and the packetdata with base64 encoding
keyword
fortinet.firewall.attackcontextid
Attack context id / total
keyword
fortinet.firewall.attackid
Attack ID
integer
fortinet.firewall.auditid
Audit ID
long
fortinet.firewall.auditreporttype
The audit report type
keyword
fortinet.firewall.auditscore
The Audit Score
keyword
fortinet.firewall.audittime
The time of the audit
long
fortinet.firewall.authgrp
Authorization group
keyword
fortinet.firewall.authid
Authentication ID
keyword
fortinet.firewall.authmsg
Authentication message
keyword
fortinet.firewall.authproto
The protocol that initiated the authentication
keyword
fortinet.firewall.authserver
Authentication server
keyword
fortinet.firewall.bandwidth
Bandwidth
keyword
fortinet.firewall.banned_rule
NAC quarantine Banned Rule Name
keyword
fortinet.firewall.banned_src
NAC quarantine Banned Source IP
keyword
fortinet.firewall.banword
Banned word
keyword
fortinet.firewall.bibandwidth
Icoming and outcoming bandwidth
keyword
fortinet.firewall.botnetdomain
Botnet Domain Name
keyword
fortinet.firewall.botnetip
Botnet IP Address
ip
fortinet.firewall.bssid
Service Set ID
keyword
fortinet.firewall.call_id
Caller ID
keyword
fortinet.firewall.carrier
The FortiOS Carrier
keyword
fortinet.firewall.carrier_ep
The FortiOS Carrier end-point identification
keyword
fortinet.firewall.cat
DNS category ID
integer
fortinet.firewall.category
Authentication category
keyword
fortinet.firewall.cc
CC Email Address
keyword
fortinet.firewall.cdrcontent
Cdrcontent
keyword
fortinet.firewall.centralnatid
Central NAT ID
integer
fortinet.firewall.cert
Certificate
keyword
fortinet.firewall.cert-type
Certificate type
keyword
fortinet.firewall.certhash
Certificate hash
keyword
fortinet.firewall.cfgattr
Configuration attribute
keyword
fortinet.firewall.cfgobj
Configuration object
keyword
fortinet.firewall.cfgpath
Configuration path
keyword
fortinet.firewall.cfgtid
Configuration transaction ID
keyword
fortinet.firewall.cfgtxpower
Configuration TX power
integer
fortinet.firewall.channel
Wireless Channel
integer
fortinet.firewall.channeltype
SSH channel type
keyword
fortinet.firewall.chassisid
Chassis ID
integer
fortinet.firewall.checksum
The checksum of the scanned file
keyword
fortinet.firewall.chgheaders
HTTP Headers
keyword
fortinet.firewall.cldobjid
Connector object ID
keyword
fortinet.firewall.client_addr
Wifi client address
keyword
fortinet.firewall.cloudaction
Cloud Action
keyword
fortinet.firewall.clouduser
Cloud User
keyword
fortinet.firewall.column
VOIP Column
integer
fortinet.firewall.command
CLI Command
keyword
fortinet.firewall.community
SNMP Community
keyword
fortinet.firewall.configcountry
Configuration country
keyword
fortinet.firewall.connection_type
FortiClient Connection Type
keyword
fortinet.firewall.conserve
Flag for conserve mode
keyword
fortinet.firewall.constraint
WAF http protocol restrictions
keyword
fortinet.firewall.contentdisarmed
Email scanned content
keyword
fortinet.firewall.contenttype
Content Type from HTTP header
keyword
fortinet.firewall.cookies
VPN Cookie
keyword
fortinet.firewall.count
Counts of action type
integer
fortinet.firewall.countapp
Number of App Ctrl logs associated with the session
integer
fortinet.firewall.countav
Number of AV logs associated with the session
integer
fortinet.firewall.countcifs
Number of CIFS logs associated with the session
integer
fortinet.firewall.countdlp
Number of DLP logs associated with the session
integer
fortinet.firewall.countdns
Number of DNS logs associated with the session
integer
fortinet.firewall.countemail
Number of email logs associated with the session
integer
fortinet.firewall.countff
Number of ff logs associated with the session
integer
fortinet.firewall.countips
Number of IPS logs associated with the session
integer
fortinet.firewall.countssh
Number of SSH logs associated with the session
integer
fortinet.firewall.countssl
Number of SSL logs associated with the session
integer
fortinet.firewall.countwaf
Number of WAF logs associated with the session
integer
fortinet.firewall.countweb
Number of Web filter logs associated with the session
integer
fortinet.firewall.cpu
CPU Usage
integer
fortinet.firewall.craction
Client Reputation Action
integer
fortinet.firewall.criticalcount
Number of critical ratings
integer
fortinet.firewall.crl
Client Reputation Level
keyword
fortinet.firewall.crlevel
Client Reputation Level
keyword
fortinet.firewall.crscore
Some description
integer
fortinet.firewall.cveid
CVE ID
keyword
fortinet.firewall.daemon
Daemon name
keyword
fortinet.firewall.datarange
Data range for reports
keyword
fortinet.firewall.date
Date
keyword
fortinet.firewall.ddnsserver
DDNS server
ip
fortinet.firewall.desc
Description
keyword
fortinet.firewall.detectionmethod
Detection method
keyword
fortinet.firewall.devcategory
Device category
keyword
fortinet.firewall.devintfname
HA device Interface Name
keyword
fortinet.firewall.devtype
Device type
keyword
fortinet.firewall.dhcp_msg
DHCP Message
keyword
fortinet.firewall.dintf
Destination interface
keyword
fortinet.firewall.disk
Assosciated disk
keyword
fortinet.firewall.disklograte
Disk logging rate
long
fortinet.firewall.dlpextra
DLP extra information
keyword
fortinet.firewall.docsource
DLP fingerprint document source
keyword
fortinet.firewall.domainctrlauthstate
CIFS domain auth state
integer
fortinet.firewall.domainctrlauthtype
CIFS domain auth type
integer
fortinet.firewall.domainctrldomain
CIFS domain auth domain
keyword
fortinet.firewall.domainctrlip
CIFS Domain IP
ip
fortinet.firewall.domainctrlname
CIFS Domain name
keyword
fortinet.firewall.domainctrlprotocoltype
CIFS Domain connection protocol
integer
fortinet.firewall.domainctrlusername
CIFS Domain username
keyword
fortinet.firewall.domainfilteridx
Domain filter ID
integer
fortinet.firewall.domainfilterlist
Domain filter name
keyword
fortinet.firewall.ds
Direction with distribution system
keyword
fortinet.firewall.dst_int
Destination interface
keyword
fortinet.firewall.dstcountry
Destination country
keyword
fortinet.firewall.dstdevcategory
Destination device category
keyword
fortinet.firewall.dstdevtype
Destination device type
keyword
fortinet.firewall.dstfamily
Destination OS family
keyword
fortinet.firewall.dsthwvendor
Destination HW vendor
keyword
fortinet.firewall.dsthwversion
Destination HW version
keyword
fortinet.firewall.dstinetsvc
Destination interface service
keyword
fortinet.firewall.dstintfrole
Destination interface role
keyword
fortinet.firewall.dstosname
Destination OS name
keyword
fortinet.firewall.dstosversion
Destination OS version
keyword
fortinet.firewall.dstserver
Destination server
integer
fortinet.firewall.dstssid
Destination SSID
keyword
fortinet.firewall.dstswversion
Destination software version
keyword
fortinet.firewall.dstunauthusersource
Destination unauthenticated source
keyword
fortinet.firewall.dstuuid
UUID of the Destination IP address
keyword
fortinet.firewall.duid
DHCP UID
keyword
fortinet.firewall.eapolcnt
EAPOL packet count
integer
fortinet.firewall.eapoltype
EAPOL packet type
keyword
fortinet.firewall.encrypt
Whether the packet is encrypted or not
integer
fortinet.firewall.encryption
Encryption method
keyword
fortinet.firewall.epoch
Epoch used for locating file
integer
fortinet.firewall.espauth
ESP Authentication
keyword
fortinet.firewall.esptransform
ESP Transform
keyword
fortinet.firewall.exch
Mail Exchanges from DNS response answer section
keyword
fortinet.firewall.exchange
Mail Exchanges from DNS response answer section
keyword
fortinet.firewall.expectedsignature
Expected SSL signature
keyword
fortinet.firewall.expiry
FortiGuard override expiry timestamp
keyword
fortinet.firewall.extrainfo
keyword
fortinet.firewall.fams_pause
Fortinet Analysis and Management Service Pause
integer
fortinet.firewall.fazlograte
FortiAnalyzer Logging Rate
long
fortinet.firewall.fctemssn
FortiClient Endpoint SSN
keyword
fortinet.firewall.fctuid
FortiClient UID
keyword
fortinet.firewall.field
NTP status field
keyword
fortinet.firewall.filefilter
The filter used to identify the affected file
keyword
fortinet.firewall.filehashsrc
Filehash source
keyword
fortinet.firewall.filtercat
DLP filter category
keyword
fortinet.firewall.filteridx
DLP filter ID
integer
fortinet.firewall.filtername
DLP rule name
keyword
fortinet.firewall.filtertype
DLP filter type
keyword
fortinet.firewall.fortiguardresp
Antispam ESP value
keyword
fortinet.firewall.forwardedfor
Email address forwarded
keyword
fortinet.firewall.fqdn
FQDN
keyword
fortinet.firewall.frametype
Wireless frametype
keyword
fortinet.firewall.freediskstorage
Free disk integer
integer
fortinet.firewall.from
From email address
keyword
fortinet.firewall.from_vcluster
Source virtual cluster number
integer
fortinet.firewall.fsaverdict
FSA verdict
keyword
fortinet.firewall.fwserver_name
Web proxy server name
keyword
fortinet.firewall.gateway
Gateway ip address for PPPoE status report
ip
fortinet.firewall.green
Memory status
keyword
fortinet.firewall.groupid
User Group ID
integer
fortinet.firewall.ha-prio
HA Priority
integer
fortinet.firewall.ha_group
HA Group
keyword
fortinet.firewall.ha_role
HA Role
keyword
fortinet.firewall.handshake
SSL Handshake
keyword
fortinet.firewall.hash
Hash value of downloaded file
keyword
fortinet.firewall.hbdn_reason
Heartbeat down reason
keyword
fortinet.firewall.healthcheck
Healtcheck name
keyword
fortinet.firewall.highcount
Highcount fabric summary
integer
fortinet.firewall.host
Hostname
keyword
fortinet.firewall.iaid
DHCPv6 id
keyword
fortinet.firewall.iccid
SIM Card ICCID number
keyword
fortinet.firewall.icmpcode
Destination Port of the ICMP message
keyword
fortinet.firewall.icmpid
Source port of the ICMP message
keyword
fortinet.firewall.icmptype
The type of ICMP message
keyword
fortinet.firewall.identifier
Network traffic identifier
integer
fortinet.firewall.imei
Device IMEI
keyword
fortinet.firewall.imsi
Subscriber IMSI
keyword
fortinet.firewall.in_spi
IPSEC inbound SPI
keyword
fortinet.firewall.inbandwidth
Icoming bandwidth
keyword
fortinet.firewall.incidentserialno
Incident serial number
integer
fortinet.firewall.infected
Infected MMS
integer
fortinet.firewall.infectedfilelevel
DLP infected file level
integer
fortinet.firewall.informationsource
Information source
keyword
fortinet.firewall.init
IPSEC init stage
keyword
fortinet.firewall.initiator
Original login user name for Fortiguard override
keyword
fortinet.firewall.interface
Related interface
keyword
fortinet.firewall.intf
Related interface
keyword
fortinet.firewall.invalidmac
The MAC address with invalid OUI
keyword
fortinet.firewall.ip
Related IP
ip
fortinet.firewall.iptype
Related IP type
keyword
fortinet.firewall.jitter
Communitation jitter
float
fortinet.firewall.keyword
Keyword used for search
keyword
fortinet.firewall.kind
VOIP kind
keyword
fortinet.firewall.kxproto
Key exchange protocol
keyword
fortinet.firewall.lanin
LAN incoming traffic in bytes
long
fortinet.firewall.lanout
LAN outbound traffic in bytes
long
fortinet.firewall.latency
Communication latency.
float
fortinet.firewall.lease
DHCP lease
integer
fortinet.firewall.license_limit
Maximum Number of FortiClients for the License
keyword
fortinet.firewall.limit
Virtual Domain Resource Limit
integer
fortinet.firewall.line
VOIP line
keyword
fortinet.firewall.live
Time in seconds
integer
fortinet.firewall.local
Local IP for a PPPD Connection
ip
fortinet.firewall.log
Log message
keyword
fortinet.firewall.login
SSH login
keyword
fortinet.firewall.lowcount
Fabric lowcount
integer
fortinet.firewall.mac
DHCP mac address
keyword
fortinet.firewall.malform_data
VOIP malformed data
integer
fortinet.firewall.malform_desc
VOIP malformed data description
keyword
fortinet.firewall.manuf
Manufacturer name
keyword
fortinet.firewall.masterdstmac
Master mac address for a host with multiple network interfaces
keyword
fortinet.firewall.mastersrcmac
The master MAC address for a host that has multiple network interfaces
keyword
fortinet.firewall.mediumcount
Fabric medium count
integer
fortinet.firewall.mem
Memory usage system statistics
integer
fortinet.firewall.meshmode
Wireless mesh mode
keyword
fortinet.firewall.message_type
VOIP message type
keyword
fortinet.firewall.method
HTTP method
keyword
fortinet.firewall.metric
Metric name
keyword
fortinet.firewall.mgmtcnt
The number of unauthorized client flooding managemet frames
integer
fortinet.firewall.mitm
Indicates if it SSL MITM inspection is enabled.
keyword
fortinet.firewall.mode
IPSEC mode
keyword
fortinet.firewall.module
PCI-DSS module
keyword
fortinet.firewall.monitor-name
Health Monitor Name
keyword
fortinet.firewall.monitor-type
Health Monitor Type
keyword
fortinet.firewall.mpsk
Wireless MPSK
keyword
fortinet.firewall.msgproto
Message Protocol Number
keyword
fortinet.firewall.mtu
Max Transmission Unit Value
integer
fortinet.firewall.name
Name
keyword
fortinet.firewall.nat
NAT IP Address
keyword
fortinet.firewall.netid
Connector NetID
keyword
fortinet.firewall.new_status
New status on user change
keyword
fortinet.firewall.new_value
New Virtual Domain Name
keyword
fortinet.firewall.newchannel
New Channel Number
integer
fortinet.firewall.newchassisid
New Chassis ID
integer
fortinet.firewall.newslot
New Slot Number
integer
fortinet.firewall.newvalue
New Value
keyword
fortinet.firewall.nextstat
Time interval in seconds for the next statistics.
integer
fortinet.firewall.nf_type
Notification Type
keyword
fortinet.firewall.noise
Wifi Noise
integer
fortinet.firewall.old_status
Original Status
keyword
fortinet.firewall.old_value
Original Virtual Domain name
keyword
fortinet.firewall.oldchannel
Original channel
integer
fortinet.firewall.oldchassisid
Original Chassis Number
integer
fortinet.firewall.oldslot
Original Slot Number
integer
fortinet.firewall.oldsn
Old Serial number
keyword
fortinet.firewall.oldvalue
Old Value
keyword
fortinet.firewall.oldwprof
Old Web Filter Profile
keyword
fortinet.firewall.onwire
A flag to indicate if the AP is onwire or not
keyword
fortinet.firewall.opercountry
Operating Country
keyword
fortinet.firewall.opertxpower
Operating TX power
integer
fortinet.firewall.osname
Operating System name
keyword
fortinet.firewall.osversion
Operating System version
keyword
fortinet.firewall.out_spi
Out SPI
keyword
fortinet.firewall.outbandwidth
Outcoming bandwidth
keyword
fortinet.firewall.outintf
Out interface
keyword
fortinet.firewall.packetloss
Packet loss percentage.
keyword
fortinet.firewall.passedcount
Fabric passed count
integer
fortinet.firewall.passwd
Changed user password information
keyword
fortinet.firewall.path
Path of looped configuration for security fabric
keyword
fortinet.firewall.peer
WAN optimization peer
keyword
fortinet.firewall.peer_notif
VPN peer notification
keyword
fortinet.firewall.phase2_name
VPN phase2 name
keyword
fortinet.firewall.phone
VOIP Phone
keyword
fortinet.firewall.phonenumber
Phone number
keyword
fortinet.firewall.pid
Process ID
integer
fortinet.firewall.plan
Subscriber plan
keyword
fortinet.firewall.policytype
Policy Type
keyword
fortinet.firewall.poluuid
Policy UUID
keyword
fortinet.firewall.poolname
IP Pool name
keyword
fortinet.firewall.port
Log upload error port
integer
fortinet.firewall.portbegin
IP Pool port number to begin
integer
fortinet.firewall.portend
IP Pool port number to end
integer
fortinet.firewall.probeproto
Link Monitor Probe Protocol
keyword
fortinet.firewall.process
URL Filter process
keyword
fortinet.firewall.processtime
Process time for reports
integer
fortinet.firewall.profile
Profile Name
keyword
fortinet.firewall.profile_vd
Virtual Domain Name
keyword
fortinet.firewall.profilegroup
Profile Group Name
keyword
fortinet.firewall.profiletype
Profile Type
keyword
fortinet.firewall.qtypeval
DNS question type value
integer
fortinet.firewall.quarskip
Quarantine skip explanation
keyword
fortinet.firewall.quotaexceeded
If quota has been exceeded
keyword
fortinet.firewall.quotamax
Maximum quota allowed - in seconds if time-based - in bytes if traffic-based
long
fortinet.firewall.quotatype
Quota type
keyword
fortinet.firewall.quotaused
Quota used - in seconds if time-based - in bytes if trafficbased)
long
fortinet.firewall.radioband
Radio band
keyword
fortinet.firewall.radioid
Radio ID
integer
fortinet.firewall.radioidclosest
Radio ID on the AP closest the rogue AP
integer
fortinet.firewall.radioiddetected
Radio ID on the AP which detected the rogue AP
integer
fortinet.firewall.rate
Wireless rogue rate value
keyword
fortinet.firewall.rawdata
Raw data value
keyword
fortinet.firewall.rawdataid
Raw data ID
keyword
fortinet.firewall.rcvddelta
Received bytes delta
keyword
fortinet.firewall.reason
Alert reason
keyword
fortinet.firewall.received
Server key exchange received
integer
fortinet.firewall.receivedsignature
Server key exchange received signature
keyword
fortinet.firewall.red
Memory information in red
keyword
fortinet.firewall.referralurl
Web filter referralurl
keyword
fortinet.firewall.remote
Remote PPP IP address
ip
fortinet.firewall.remotewtptime
Remote Wifi Radius authentication time
keyword
fortinet.firewall.reporttype
Report type
keyword
fortinet.firewall.reqtype
Request type
keyword
fortinet.firewall.request_name
VOIP request name
keyword
fortinet.firewall.result
VPN phase result
keyword
fortinet.firewall.role
VPN Phase 2 role
keyword
fortinet.firewall.rsrp
Reference signal received power
integer
fortinet.firewall.rsrq
Reference signal received quality
integer
fortinet.firewall.rssi
Received signal strength indicator
integer
fortinet.firewall.rsso_key
RADIUS SSO attribute value
keyword
fortinet.firewall.ruledata
Rule data
keyword
fortinet.firewall.ruletype
Rule type
keyword
fortinet.firewall.scanned
Number of Scanned MMSs
integer
fortinet.firewall.scantime
Scanned time
long
fortinet.firewall.scope
FortiGuard Override Scope
keyword
fortinet.firewall.security
Wireless rogue security
keyword
fortinet.firewall.sensitivity
Sensitivity for document fingerprint
keyword
fortinet.firewall.sensor
NAC Sensor Name
keyword
fortinet.firewall.sentdelta
Sent bytes delta
keyword
fortinet.firewall.seq
Sequence number
keyword
fortinet.firewall.serial
WAN optimisation serial
keyword
fortinet.firewall.serialno
Serial number
keyword
fortinet.firewall.server
AD server FQDN or IP
keyword
fortinet.firewall.session_id
Session ID
keyword
fortinet.firewall.sessionid
WAD Session ID
integer
fortinet.firewall.setuprate
Session Setup Rate
long
fortinet.firewall.severity
Severity
keyword
fortinet.firewall.shaperdroprcvdbyte
Received bytes dropped by shaper
integer
fortinet.firewall.shaperdropsentbyte
Sent bytes dropped by shaper
integer
fortinet.firewall.shaperperipdropbyte
Dropped bytes per IP by shaper
integer
fortinet.firewall.shaperperipname
Traffic shaper name (per IP)
keyword
fortinet.firewall.shaperrcvdname
Traffic shaper name for received traffic
keyword
fortinet.firewall.shapersentname
Traffic shaper name for sent traffic
keyword
fortinet.firewall.shapingpolicyid
Traffic shaper policy ID
integer
fortinet.firewall.signal
Wireless rogue API signal
integer
fortinet.firewall.signalstrength
Signal strength
integer
fortinet.firewall.sinr
Signal to interference and noise ratio
integer
fortinet.firewall.size
Email size in bytes
long
fortinet.firewall.ski
x509 Subject Key Identifier
keyword
fortinet.firewall.slamap
SLA map.
keyword
fortinet.firewall.slatargetid
ID of the targeted SLA.
keyword
fortinet.firewall.slot
Slot number
integer
fortinet.firewall.sn
Security fabric serial number
keyword
fortinet.firewall.snclosest
SN of the AP closest to the rogue AP
keyword
fortinet.firewall.sndetected
SN of the AP which detected the rogue AP
keyword
fortinet.firewall.snmeshparent
SN of the mesh parent
keyword
fortinet.firewall.spi
IPSEC SPI
keyword
fortinet.firewall.src_int
Source interface
keyword
fortinet.firewall.srccountry
Source country
keyword
fortinet.firewall.srcfamily
Source family
keyword
fortinet.firewall.srchwvendor
Source hardware vendor
keyword
fortinet.firewall.srchwversion
Source hardware version
keyword
fortinet.firewall.srcinetsvc
Source interface service
keyword
fortinet.firewall.srcintfrole
Source interface role
keyword
fortinet.firewall.srcname
Source name
keyword
fortinet.firewall.srcserver
Source server
integer
fortinet.firewall.srcssid
Source SSID
keyword
fortinet.firewall.srcswversion
Source software version
keyword
fortinet.firewall.srcuuid
Source UUID
keyword
fortinet.firewall.sscname
SSC name
keyword
fortinet.firewall.ssid
Base Service Set ID
keyword
fortinet.firewall.sslaction
SSL Action
keyword
fortinet.firewall.ssllocal
WAD SSL local
keyword
fortinet.firewall.sslremote
WAD SSL remote
keyword
fortinet.firewall.stacount
Number of stations/clients
integer
fortinet.firewall.stage
IPSEC stage
keyword
fortinet.firewall.stamac
802.1x station mac
keyword
fortinet.firewall.state
Admin login state
keyword
fortinet.firewall.status
Status
keyword
fortinet.firewall.stitch
Automation stitch triggered
keyword
fortinet.firewall.subject
Email subject
keyword
fortinet.firewall.submodule
Configuration Sub-Module Name
keyword
fortinet.firewall.subservice
AV subservice
keyword
fortinet.firewall.subtype
Log subtype
keyword
fortinet.firewall.suspicious
Number of Suspicious MMSs
integer
fortinet.firewall.switchproto
Protocol change information
keyword
fortinet.firewall.sync_status
The sync status with the master
keyword
fortinet.firewall.sync_type
The sync type with the master
keyword
fortinet.firewall.sysuptime
System uptime
keyword
fortinet.firewall.tamac
the MAC address of Transmitter, if none, then Receiver
keyword
fortinet.firewall.temperature
Temperature
integer
fortinet.firewall.threattype
WIDS threat type
keyword
fortinet.firewall.time
Time of the event
keyword
fortinet.firewall.timestamp
Timestamp of the event
keyword
fortinet.firewall.to
Email to field
keyword
fortinet.firewall.to_vcluster
destination virtual cluster number
integer
fortinet.firewall.total
Total memory
integer
fortinet.firewall.totalsession
Total Number of Sessions
integer
fortinet.firewall.trace_id
Session clash trace ID
keyword
fortinet.firewall.trandisp
NAT translation type
keyword
fortinet.firewall.tranip
NAT destination IP
ip
fortinet.firewall.transid
HTTP transaction ID
integer
fortinet.firewall.transip
NAT Source IP
ip
fortinet.firewall.translationid
DNS filter transaltion ID
keyword
fortinet.firewall.trigger
Automation stitch trigger
keyword
fortinet.firewall.trueclntip
File filter true client IP
ip
fortinet.firewall.tunnelid
IPSEC tunnel ID
integer
fortinet.firewall.tunnelip
IPSEC tunnel IP
ip
fortinet.firewall.tunneltype
IPSEC tunnel type
keyword
fortinet.firewall.type
Module type
keyword
fortinet.firewall.ui
Admin authentication UI type
keyword
fortinet.firewall.unauthusersource
Unauthenticated user source
keyword
fortinet.firewall.unit
Power supply unit
integer
fortinet.firewall.urlfilteridx
URL filter ID
integer
fortinet.firewall.urlfilterlist
URL filter list
keyword
fortinet.firewall.urlsource
URL filter source
keyword
fortinet.firewall.urltype
URL filter type
keyword
fortinet.firewall.used
Number of Used IPs
integer
fortinet.firewall.used_for_type
Connection for the type
integer
fortinet.firewall.utmaction
Security action performed by UTM
keyword
fortinet.firewall.utmref
UTM reference
keyword
fortinet.firewall.valid
integer
fortinet.firewall.vap
Virtual AP
keyword
fortinet.firewall.vapmode
Virtual AP mode
keyword
fortinet.firewall.vcluster
virtual cluster id
integer
fortinet.firewall.vcluster_member
Virtual cluster member
integer
fortinet.firewall.vcluster_state
Virtual cluster state
keyword
fortinet.firewall.vd
Virtual Domain Name
keyword
fortinet.firewall.vdname
Virtual Domain Name
keyword
fortinet.firewall.vendorurl
Vulnerability scan vendor name
keyword
fortinet.firewall.version
Version
keyword
fortinet.firewall.vip
Virtual IP
keyword
fortinet.firewall.virus
Virus name
keyword
fortinet.firewall.virusid
Virus ID (unique virus identifier)
integer
fortinet.firewall.voip_proto
VOIP protocol
keyword
fortinet.firewall.vpn
VPN description
keyword
fortinet.firewall.vpntunnel
IPsec Vpn Tunnel Name
keyword
fortinet.firewall.vpntype
The type of the VPN tunnel
keyword
fortinet.firewall.vrf
VRF number
integer
fortinet.firewall.vulncat
Vulnerability Category
keyword
fortinet.firewall.vulnid
Vulnerability ID
integer
fortinet.firewall.vulnname
Vulnerability name
keyword
fortinet.firewall.vwlid
VWL ID
integer
fortinet.firewall.vwlquality
VWL quality
keyword
fortinet.firewall.vwlservice
VWL service
keyword
fortinet.firewall.vwpvlanid
VWP VLAN ID
integer
fortinet.firewall.wanin
WAN incoming traffic in bytes
long
fortinet.firewall.wanoptapptype
WAN Optimization Application type
keyword
fortinet.firewall.wanout
WAN outgoing traffic in bytes
long
fortinet.firewall.weakwepiv
Weak Wep Initiation Vector
keyword
fortinet.firewall.xauthgroup
XAuth Group Name
keyword
fortinet.firewall.xauthuser
XAuth User Name
keyword
fortinet.firewall.xid
Wireless X ID
integer
host.architecture
Operating system architecture.
keyword
host.containerized
If the host is a container.
boolean
host.domain
Name of the domain of which the host is a member. For example, on Windows this could be the host's Active Directory domain or NetBIOS domain name. For Linux this could be the domain of the host's LDAP provider.
keyword
host.hostname
Hostname of the host. It normally contains what the hostname command returns on the host machine.
keyword
host.id
Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of beat.name.
keyword
host.ip
Host ip addresses.
ip
host.mac
Host mac addresses.
keyword
host.name
Name of the host. It can contain what hostname returns on Unix systems, the fully qualified domain name, or a name specified by the user. The sender decides which value to use.
keyword
host.os.build
OS build information.
keyword
host.os.codename
OS codename, if any.
keyword
host.os.family
OS family (such as redhat, debian, freebsd, windows).
keyword
host.os.kernel
Operating system kernel version as a raw string.
keyword
host.os.name
Operating system name, without the version.
keyword
host.os.name.text
Multi-field of host.os.name.
text
host.os.platform
Operating system platform (such centos, ubuntu, windows).
keyword
host.os.version
Operating system version as a raw string.
keyword
host.type
Type of host. For Cloud providers this can be the machine type like t2.medium. If vm, this could be the container, for example, or other information meaningful in your environment.
keyword
http.request.method
HTTP request method. The value should retain its casing from the original event. For example, GET, get, and GeT are all considered valid values for this field.
keyword
http.request.referrer
Referrer for this HTTP request.
keyword
input.type
Type of Filebeat input.
keyword
log.file.path
Path to the log file.
keyword
log.flags
Flags for the log file.
keyword
log.level
Original log level of the log event. If the source of the event provides a log level or textual severity, this is the one that goes in log.level. If your source doesn't specify one, you may put your event transport's severity here (e.g. Syslog severity). Some examples are warn, err, i, informational.
keyword
log.offset
Offset of the entry in the log file.
long
log.source.address
Source address from which the log event was read / sent from.
keyword
log.syslog.facility.code
The Syslog numeric facility of the log event, if available. According to RFCs 5424 and 3164, this value should be an integer between 0 and 23.
long
log.syslog.priority
Syslog numeric priority of the event, if available. According to RFCs 5424 and 3164, the priority is 8 * facility + severity. This number is therefore expected to contain a value between 0 and 191.
long
log.syslog.severity.code
The Syslog numeric severity of the log event, if available. If the event source publishing via Syslog provides a different numeric severity value (e.g. firewall, IDS), your source's numeric severity should go to event.severity. If the event source does not specify a distinct severity, you can optionally copy the Syslog severity to event.severity.
long
message
For log events the message field contains the log message, optimized for viewing in a log viewer. For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event. If multiple messages exist, they can be combined into one message.
match_only_text
network.application
When a specific application or service is identified from network connection details (source/dest IPs, ports, certificates, or wire format), this field captures the application's or service's name. For example, the original event identifies the network connection being from a specific web service in a https network connection, like facebook or twitter. The field value must be normalized to lowercase for querying.
keyword
network.bytes
Total bytes transferred in both directions. If source.bytes and destination.bytes are known, network.bytes is their sum.
long
network.direction
Direction of the network traffic. When mapping events from a host-based monitoring context, populate this field from the host's point of view, using the values "ingress" or "egress". When mapping events from a network or perimeter-based monitoring context, populate this field from the point of view of the network perimeter, using the values "inbound", "outbound", "internal" or "external". Note that "internal" is not crossing perimeter boundaries, and is meant to describe communication between two hosts within the perimeter. Note also that "external" is meant to describe traffic between two hosts that are external to the perimeter. This could for example be useful for ISPs or VPN service providers.
keyword
network.iana_number
IANA Protocol Number (https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml). Standardized list of protocols. This aligns well with NetFlow and sFlow related logs which use the IANA Protocol Number.
keyword
network.packets
Total packets transferred in both directions. If source.packets and destination.packets are known, network.packets is their sum.
long
network.protocol
In the OSI Model this would be the Application Layer protocol. For example, http, dns, or ssh. The field value must be normalized to lowercase for querying.
keyword
network.transport
Same as network.iana_number, but instead using the Keyword name of the transport layer (udp, tcp, ipv6-icmp, etc.) The field value must be normalized to lowercase for querying.
keyword
observer.egress.interface.name
Interface name as reported by the system.
keyword
observer.ingress.interface.name
Interface name as reported by the system.
keyword
observer.name
Custom name of the observer. This is a name that can be given to an observer. This can be helpful for example if multiple firewalls of the same model are used in an organization. If no custom name is needed, the field can be left empty.
keyword
observer.product
The product name of the observer.
keyword
observer.serial_number
Observer serial number.
keyword
observer.type
The type of the observer the data is coming from. There is no predefined list of observer types. Some examples are forwarder, firewall, ids, ips, proxy, poller, sensor, APM server.
keyword
observer.vendor
Vendor name of the observer.
keyword
related.hash
All the hashes seen on your event. Populating this field, then using it to search for hashes can help in situations where you're unsure what the hash algorithm is (and therefore which key name to search).
keyword
related.hosts
All hostnames or other host identifiers seen on your event. Example identifiers include FQDNs, domain names, workstation names, or aliases.
keyword
related.ip
All of the IPs seen on your event.
ip
related.user
All the user names or other user identifiers seen on the event.
keyword
rule.category
A categorization value keyword used by the entity using the rule for detection of this event.
keyword
rule.description
The description of the rule generating the event.
keyword
rule.id
A rule ID that is unique within the scope of an agent, observer, or other entity using the rule for detection of this event.
keyword
rule.name
The name of the rule or signature generating the event.
keyword
rule.ruleset
Name of the ruleset, policy, group, or parent category in which the rule used to generate this event is a member.
keyword
rule.uuid
A rule ID that is unique within the scope of a set or group of agents, observers, or other entities using the rule for detection of this event.
keyword
source.address
Some event source addresses are defined ambiguously. The event will sometimes list an IP, a domain or a unix socket. You should always store the raw address in the .address field. Then it should be duplicated to .ip or .domain, depending on which one it is.
keyword
source.as.number
Unique number allocated to the autonomous system. The autonomous system number (ASN) uniquely identifies each network on the Internet.
long
source.as.organization.name
Organization name.
keyword
source.as.organization.name.text
Multi-field of source.as.organization.name.
match_only_text
source.bytes
Bytes sent from the source to the destination.
long
source.geo.city_name
City name.
keyword
source.geo.continent_name
Name of the continent.
keyword
source.geo.country_iso_code
Country ISO code.
keyword
source.geo.country_name
Country name.
keyword
source.geo.location
Longitude and latitude.
geo_point
source.geo.name
User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation.
keyword
source.geo.region_iso_code
Region ISO code.
keyword
source.geo.region_name
Region name.
keyword
source.ip
IP address of the source (IPv4 or IPv6).
ip
source.mac
MAC address of the source. The notation format from RFC 7042 is suggested: Each octet (that is, 8-bit byte) is represented by two [uppercase] hexadecimal digits giving the value of the octet as an unsigned integer. Successive octets are separated by a hyphen.
keyword
source.nat.ip
Translated ip of source based NAT sessions (e.g. internal client to internet) Typically connections traversing load balancers, firewalls, or routers.
ip
source.nat.port
Translated port of source based NAT sessions. (e.g. internal client to internet) Typically used with load balancers, firewalls, or routers.
long
source.packets
Packets sent from the source to the destination.
long
source.port
Port of the source.
long
source.user.email
User email address.
keyword
source.user.group.name
Name of the group.
keyword
source.user.name
Short name or login of the user.
keyword
source.user.name.text
Multi-field of source.user.name.
match_only_text
source.user.roles
Array of user roles at the time of the event.
keyword
tags
List of keywords used to tag each event.
keyword
threat.feed.name
The name of the threat feed in UI friendly format.
keyword
tls.cipher
String indicating the cipher used during the current connection.
keyword
tls.client.issuer
Distinguished name of subject of the issuer of the x.509 certificate presented by the client.
keyword
tls.client.server_name
Also called an SNI, this tells the server which hostname to which the client is attempting to connect to. When this value is available, it should get copied to destination.domain.
keyword
tls.client.x509.issuer.common_name
List of common name (CN) of issuing certificate authority.
keyword
tls.client.x509.public_key_algorithm
Algorithm used to generate the public key.
keyword
tls.curve
String indicating the curve used for the given cipher, when applicable.
keyword
tls.established
Boolean flag indicating if the TLS negotiation was successful and transitioned to an encrypted tunnel.
boolean
tls.server.hash.sha1
Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the server. For consistency with other hash values, this value should be formatted as an uppercase hash.
keyword
tls.server.issuer
Subject of the issuer of the x.509 certificate presented by the server.
keyword
tls.server.not_after
Timestamp indicating when server certificate is no longer considered valid.
date
tls.server.not_before
Timestamp indicating when server certificate is first considered valid.
date
tls.server.x509.alternative_names
List of subject alternative names (SAN). Name types vary by certificate authority and certificate type but commonly contain IP addresses, DNS names (and wildcards), and email addresses.
keyword
tls.server.x509.issuer.common_name
List of common name (CN) of issuing certificate authority.
keyword
tls.server.x509.not_after
Time at which the certificate is no longer considered valid.
date
tls.server.x509.not_before
Time at which the certificate is first considered valid.
date
tls.server.x509.public_key_algorithm
Algorithm used to generate the public key.
keyword
tls.server.x509.public_key_size
The size of the public key space in bits.
long
tls.server.x509.serial_number
Unique serial number issued by the certificate authority. For consistency, if this value is alphanumeric, it should be formatted without colons and uppercase characters.
keyword
tls.server.x509.subject.common_name
List of common names (CN) of subject.
keyword
tls.version
Numeric part of the version parsed from the original string.
keyword
tls.version_protocol
Normalized lowercase protocol name parsed from original string.
keyword
url.domain
Domain of the url, such as "www.elastic.co". In some cases a URL may refer to an IP and/or port directly, without a domain name. In this case, the IP address would go to the domain field. If the URL contains a literal IPv6 address enclosed by [ and ] (IETF RFC 2732), the [ and ] characters should also be captured in the domain field.
keyword
url.path
Path of the request, such as "/search".
wildcard
user.name
Short name or login of the user.
keyword
user.name.text
Multi-field of user.name.
match_only_text
user.roles
Array of user roles at the time of the event.
keyword
user_agent.original
Unparsed user_agent string.
keyword
user_agent.original.text
Multi-field of user_agent.original.
match_only_text
vulnerability.category
The type of system or architecture that the vulnerability affects. These may be platform-specific (for example, Debian or SUSE) or general (for example, Database or Firewall). For example (https://qualysguard.qualys.com/qwebhelp/fo\_portal/knowledgebase/vulnerability\_categories.htm\[Qualys vulnerability categories]) This field must be an array.
keyword

Changelog

VersionDetailsKibana version(s)

1.23.2

Enhancement View pull request
Changed owners

8.3.0 or higher

1.23.1

Bug fix View pull request
Fix event.module value

8.3.0 or higher

1.23.0

Enhancement View pull request
Parse login events

Bug fix View pull request
Fix possible null value for startsWith in event pipeline.

8.3.0 or higher

1.22.2

Bug fix View pull request
Fix exclude_files pattern.

8.3.0 or higher

1.22.1

Enhancement View pull request
Fix processor indentation in template files.

8.3.0 or higher

1.22.0

Enhancement View pull request
ECS version updated to 8.11.0.

8.3.0 or higher

1.21.0

Enhancement View pull request
Add support for FortiOS 7.x.

Bug fix View pull request
Fix network options for udp and tcp inputs.

Enhancement View pull request
Add network processor in addition to interface based direction resolution.

Enhancement View pull request
Clean value templates and remove ctx null checks in pipelines.

8.3.0 or higher

1.20.0

Enhancement View pull request
Improve 'event.original' check to avoid errors if set.

8.3.0 or higher

1.19.0

Enhancement View pull request
ECS version updated to 8.10.0.

8.3.0 or higher

1.18.0

Enhancement View pull request
The format_version in the package manifest changed from 2.11.0 to 3.0.0. Removed dotted YAML keys from package manifest. Added 'owner.type: elastic' to package manifest.

8.3.0 or higher

1.17.0

Enhancement View pull request
Add tags.yml file so that integration's dashboards and saved searches are tagged with "Security Solution" and displayed in the Security Solution UI.

8.3.0 or higher

1.16.1

Bug fix View pull request
Enable RFC 6587 framing by default on TCP input.

8.3.0 or higher

1.16.0

Enhancement View pull request
Update package to ECS 8.9.0.

8.3.0 or higher

1.15.0

Enhancement View pull request
Allow syslog lines without a priority.

8.3.0 or higher

1.14.0

Enhancement View pull request
Ensure event.kind is correctly set for pipeline errors.

8.3.0 or higher

1.13.0

Enhancement View pull request
Update package to package-spec 2.7.0.

8.3.0 or higher

1.12.0

Enhancement View pull request
Update package to ECS 8.8.0.

8.3.0 or higher

1.11.0

Enhancement View pull request
Lowercase host.name field and add event.type denied when action is deny

8.3.0 or higher

1.10.1

Bug fix View pull request
Fix syslog KV split to take into account quoted values.

8.3.0 or higher

1.10.0

Enhancement View pull request
Update package to ECS 8.7.0.

8.3.0 or higher

1.9.0

Enhancement View pull request
Add user.name, host.name and dns.question.registered_domain

8.3.0 or higher

1.8.0

Enhancement View pull request
Include NAT and firewall IPs in related.ip.

8.3.0 or higher

1.7.0

Enhancement View pull request
Handle broader range of timezone formats.

8.3.0 or higher

1.6.1

Enhancement View pull request
Added categories and/or subcategories.

8.3.0 or higher

1.6.0

Enhancement View pull request
Update package to ECS 8.6.0.

8.3.0 or higher

1.5.0

Enhancement View pull request
Add udp_options to the UDP input.

8.3.0 or higher

1.4.0

Enhancement View pull request
Add source and destination NAT IPs to related.ip.

8.3.0 or higher

1.3.0

Enhancement View pull request
Update package to ECS 8.5.0.

8.3.0 or higher

1.2.5

Bug fix View pull request
Improve compatibility with newer versions of FortiOS.

8.3.0 or higher

1.2.4

Bug fix View pull request
Remove duplicate fields.

8.3.0 or higher

1.2.3

Bug fix View pull request
Remove duplicate field.

8.3.0 or higher

1.2.2

Bug fix View pull request
Ensure network.direction values conform to ECS.

8.3.0 or higher

1.2.1

Enhancement View pull request
Use ECS geo.location definition.

8.3.0 or higher

1.2.0

Enhancement View pull request
Update Ingest Pipeline with observer Fields

8.3.0 or higher

1.1.0

Enhancement View pull request
Add dashboard.

Enhancement View pull request
Process syslog priority and facility.

8.3.0 or higher

1.0.1

Bug fix View pull request
Fix handling of sip events.

7.14.1 or higher
8.0.0 or higher

1.0.0

Enhancement View pull request
Initial version of Fortinet FortiGate as separate package

7.14.1 or higher
8.0.0 or higher

On this page