Vectra Detect
Collect logs from Vectra Detect with Elastic Agent.
Version |
1.7.2 (View all) |
Compatible Kibana version(s) |
8.3.0 or higher |
Supported Serverless project types |
Security Observability |
Subscription level |
Basic |
Level of support |
Elastic |
The Vectra Detect integration allows you to monitor logs sent in the syslog format. Vectra Detect provides the fastest and most efficient way to prioritize and stop attacks across cloud, data center, applications and workloads as well as user & IoT devices and accounts. Vectra uses artificial intelligence to automate real-time cyberattack detection and response – from network users and IoT devices to data centers and the cloud. All internal traffic is continuously monitored to detect hidden attacks in progress. Detected threats are instantly correlated with host devices that are under attack and unique context shows where attackers are and what they are doing. Threats that pose the biggest risk to an organization are automatically scored and prioritized based on their severity and certainty, which enables security operations teams to quickly focus their time and resources on preventing and mitigating loss.
Vectra Detect integration can be used in two different input modes:
- TCP mode: Vectra Detect sends logs to an Elastic Agent-hosted TCP port.
- UDP mode: Vectra Detect sends logs to an Elastic Agent-hosted UDP port.
Data streams
The Vectra Detect integration collects logs for the following events:
Vectra Detect |
---|
Account Detection |
Account Lockdown |
Account Scoring |
Alert |
Audit |
Campaign |
Health |
Host Detection |
Host Lockdown |
Host Scoring |
NOTE: The Vectra Detect integration collects logs for different events, but we have combined all of those in one data stream named log
.
Compatibility
This integration has been tested against Vectra Detect 7.4. Versions above this are expected to work but have not been tested.
Requirements
You need Elasticsearch to store and search your data and Kibana for visualizing and managing it. You can use our hosted Elasticsearch Service on Elastic Cloud, which is recommended or self-manage the Elastic Stack on your hardware.
Setup
Please follow Vectra Platform Getting Started Guide to install and setup the Vectra AI platform. To configure the syslog, follow Vectra Syslog Guide. Syslog messages can be sent in 3 formats to the remote syslog server: standard syslog, CEF, or JSON. Consider sending JSON format as we are supporting only the JSON format.
Log Reference
The log
data stream collects Vectra Detect logs.
An example event for log
looks as following:
{
"@timestamp": "2023-02-14T08:52:22.000Z",
"agent": {
"ephemeral_id": "d1ccd3bb-36c3-4e60-a806-f450d426238c",
"id": "70808e18-f29a-48b6-8386-b77582d73652",
"name": "docker-fleet-agent",
"type": "filebeat",
"version": "8.3.0"
},
"data_stream": {
"dataset": "vectra_detect.log",
"namespace": "ep",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "70808e18-f29a-48b6-8386-b77582d73652",
"snapshot": false,
"version": "8.3.0"
},
"event": {
"action": "unlock",
"agent_id_status": "verified",
"category": [
"host"
],
"created": "2023-02-14T09:52:22.000Z",
"dataset": "vectra_detect.log",
"ingested": "2023-12-27T10:07:02Z",
"kind": "event",
"original": "vectra_json_host_lockdown -: {\"version\": \"7.4\", \"host_id\": 231, \"user\": \"vectrademo\", \"headend_addr\": \"89.160.20.112\", \"host_name\": \"conrad-t480\", \"href\": \"https://x29-1-13.sc.tvec/hosts/231\", \"action\": \"unlock\", \"success\": true, \"will_retry\": false, \"category\": \"HOST_LOCKDOWN\", \"edr_type\": \"sentinelone\", \"vectra_timestamp\": \"1676364742\"}",
"outcome": "success",
"reference": "https://x29-1-13.sc.tvec/hosts/231",
"type": [
"info"
]
},
"host": {
"hostname": "conrad-t480",
"id": "231"
},
"input": {
"type": "udp"
},
"log": {
"source": {
"address": "192.168.245.4:53106"
},
"syslog": {
"facility": {
"code": 1,
"name": "user-level"
},
"hostname": "A21000000000248",
"priority": 13,
"severity": {
"code": 5,
"name": "Notice"
}
}
},
"observer": {
"ip": [
"89.160.20.112"
],
"product": "Detect",
"serial_number": "A21000000000248",
"type": "sensor",
"vendor": "Vectra",
"version": "7.4"
},
"related": {
"hosts": [
"conrad-t480"
],
"ip": [
"89.160.20.112"
],
"user": [
"vectrademo"
]
},
"tags": [
"preserve_original_event",
"preserve_duplicate_custom_fields",
"forwarded",
"vectra_detect-log"
],
"url": {
"domain": "x29-1-13.sc.tvec",
"original": "https://x29-1-13.sc.tvec/hosts/231",
"path": "/hosts/231",
"scheme": "https"
},
"user": {
"name": "vectrademo"
},
"vectra_detect": {
"log": {
"action": "unlock",
"category": "HOST_LOCKDOWN",
"edr_type": "sentinelone",
"event_created": "2023-02-14T09:52:22.000Z",
"event_type": "vectra_json_host_lockdown",
"headend_addr": "89.160.20.112",
"host": {
"id": "231",
"name": "conrad-t480"
},
"href": "https://x29-1-13.sc.tvec/hosts/231",
"success": true,
"syslog": {
"facility": {
"code": 1,
"name": "user-level"
},
"hostname": "A21000000000248",
"priority": 13,
"severity": {
"code": 5,
"name": "Notice"
}
},
"user": {
"name": "vectrademo"
},
"vectra_timestamp": "2023-02-14T08:52:22.000Z",
"version": "7.4",
"will_retry": false
}
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset. | constant_keyword |
event.module | Event module. | constant_keyword |
input.type | Type of Filebeat input. | keyword |
log.offset | Log offset. | long |
log.source.address | Source address from which the log event was read / sent from. | keyword |
tags | User defined tags. | keyword |
vectra_detect.log.account.access_history.id | keyword | |
vectra_detect.log.account.access_history.last_seen | date | |
vectra_detect.log.account.access_history.privilege_category | keyword | |
vectra_detect.log.account.access_history.privilege_value | long | |
vectra_detect.log.account.access_history.uid | keyword | |
vectra_detect.log.account.domain | keyword | |
vectra_detect.log.account.id | The ID of the account. | keyword |
vectra_detect.log.account.info.account_uid | keyword | |
vectra_detect.log.account.info.counts | long | |
vectra_detect.log.account.info.host_luid | keyword | |
vectra_detect.log.account.name | The name of the account. | keyword |
vectra_detect.log.account.uid | The user ID of the account. | keyword |
vectra_detect.log.account.user_id | keyword | |
vectra_detect.log.accounts | The related accounts. | keyword |
vectra_detect.log.action | The action taken on the host or account (e.g., lock or unlock) OR The action that caused the message to be logged (e.g., START, TRIAGED, TIMEOUT). | keyword |
vectra_detect.log.alert.category | keyword | |
vectra_detect.log.alert.gid | keyword | |
vectra_detect.log.alert.rev | long | |
vectra_detect.log.alert.severity | long | |
vectra_detect.log.alert.signature.id | keyword | |
vectra_detect.log.alert.signature.value | keyword | |
vectra_detect.log.base_object | The base distinguished name. | keyword |
vectra_detect.log.bytes.received | The bytes of data received. | long |
vectra_detect.log.bytes.sent | The bytes of data sent. | long |
vectra_detect.log.campaign.id | The id of the campaign. | keyword |
vectra_detect.log.campaign.link | The link to the campaign in the UI. | keyword |
vectra_detect.log.campaign.name | The name of the campaign. | keyword |
vectra_detect.log.category | The category of the event (e.g., LOCKDOWN). | keyword |
vectra_detect.log.certainty | The certainty of the score assigned to this account. | long |
vectra_detect.log.client.name | The RDP client name. | keyword |
vectra_detect.log.client.token | The RDP client token. | keyword |
vectra_detect.log.cookie | The RDP client token. | keyword |
vectra_detect.log.count | The number of attempts. | long |
vectra_detect.log.d_type.name | The Vectra internal representation of detection name (e.g., smash_n_grab, or sql_injection). | keyword |
vectra_detect.log.d_type.vname | The name of the detection. | keyword |
vectra_detect.log.dd.bytes.rcvd | The number of bytes in the traffic that caused the detection. Does not apply to all detections. Defaults to 0. | long |
vectra_detect.log.dd.bytes.sent | Meaning differs depending on detection type. Does not apply to all detections. Defaults to 0. | long |
vectra_detect.log.dd.dst.dns | The destination domain name of detection event. | keyword |
vectra_detect.log.dd.dst.ip | The destination IP address of detection event. | ip |
vectra_detect.log.dd.dst.port | The port of the attacked host. Defaults to 80. | long |
vectra_detect.log.dd.proto | The protocol over which this detection fired (e.g., tcp). Does not apply to all detections. Defaults to empty string. | keyword |
vectra_detect.log.dest.id | The destination of the campaign. Defaults to 'external'. | keyword |
vectra_detect.log.dest.ip | The destination IP address the campaign is targeting. | ip |
vectra_detect.log.dest.name | The external domain of the campaign destination. | keyword |
vectra_detect.log.dest.port | long | |
vectra_detect.log.det_id | The ID of the detection that caused the campaign creation. | keyword |
vectra_detect.log.detection.id | The ID of the detection. | keyword |
vectra_detect.log.detection.profile.name | keyword | |
vectra_detect.log.detection.profile.scoring_detections | keyword | |
vectra_detect.log.detection.profile.vname | keyword | |
vectra_detect.log.dos_type | The DOS type. | keyword |
vectra_detect.log.dst.ips | The target subnets. | keyword |
vectra_detect.log.dst.key_asset | Whether there is a detection that is targeting this host and this host is a key asset. | boolean |
vectra_detect.log.dst.ports | keyword | |
vectra_detect.log.dvchost | The hostname of the Cognito Brain. | keyword |
vectra_detect.log.edr_type | keyword | |
vectra_detect.log.event_created | date | |
vectra_detect.log.event_type | keyword | |
vectra_detect.log.extensions | File extensions used. | keyword |
vectra_detect.log.function | The executed function. | keyword |
vectra_detect.log.headend_addr | The IP of the Cognito Brain. | ip |
vectra_detect.log.host.access_history.id | keyword | |
vectra_detect.log.host.access_history.last_seen | date | |
vectra_detect.log.host.access_history.name | keyword | |
vectra_detect.log.host.access_history.privilege_category | keyword | |
vectra_detect.log.host.access_history.privilege_value | long | |
vectra_detect.log.host.groups.can_delete | boolean | |
vectra_detect.log.host.groups.can_edit | boolean | |
vectra_detect.log.host.groups.cognito_managed | boolean | |
vectra_detect.log.host.groups.description | keyword | |
vectra_detect.log.host.groups.filter_count | long | |
vectra_detect.log.host.groups.group_type | keyword | |
vectra_detect.log.host.groups.id | keyword | |
vectra_detect.log.host.groups.impact | keyword | |
vectra_detect.log.host.groups.last_modified | date | |
vectra_detect.log.host.groups.last_modified_by | keyword | |
vectra_detect.log.host.groups.name | keyword | |
vectra_detect.log.host.groups.triage_filters.id | keyword | |
vectra_detect.log.host.groups.triage_filters.triage_as | keyword | |
vectra_detect.log.host.id | The ID of the host. | keyword |
vectra_detect.log.host.ip | The IP of the host being scored. | ip |
vectra_detect.log.host.name | The name of the host. | keyword |
vectra_detect.log.host.roles | keyword | |
vectra_detect.log.href | A link to the account in the UI. | keyword |
vectra_detect.log.http.method | The HTTP method. | keyword |
vectra_detect.log.http.response_code | The HTTP response code. | keyword |
vectra_detect.log.http_segment | The HTTP segment. | keyword |
vectra_detect.log.ip | The internal target host. | ip |
vectra_detect.log.keyboard.id | They keyboard layout ID. | keyword |
vectra_detect.log.keyboard.name | They keyboard layout name. | keyword |
vectra_detect.log.last_detection_type | The most recent type of detection associated with this host. | keyword |
vectra_detect.log.mac.address | The MAC address of this host. | keyword |
vectra_detect.log.mac.vendor | The vendor of the MAC address of this host. | keyword |
vectra_detect.log.matched.domain | The matched domain. | keyword |
vectra_detect.log.matched.ip | The matched IP. | ip |
vectra_detect.log.matched.user_agent | The matched user-agent. | keyword |
vectra_detect.log.message | A message explains the cause/nature of the log. | keyword |
vectra_detect.log.named_pipe | The named pipe. | keyword |
vectra_detect.log.networks | The target subnets. | keyword |
vectra_detect.log.normal.admins | The normal admins observed. | keyword |
vectra_detect.log.normal.servers | The normal servers observed. | keyword |
vectra_detect.log.num_attempts | The number of attempts. | long |
vectra_detect.log.port | The external port used. | keyword |
vectra_detect.log.ports | Ports scanned. | keyword |
vectra_detect.log.privilege | The observed privilege level of the host. | long |
vectra_detect.log.product_id | The unusual product ID. | keyword |
vectra_detect.log.proto | keyword | |
vectra_detect.log.protocol | The external protocol used. | keyword |
vectra_detect.log.proxied_dst | The domain name or IP of the proxy. | keyword |
vectra_detect.log.quadrant | keyword | |
vectra_detect.log.ransom_notes | Ransome notes found. | keyword |
vectra_detect.log.reason | The reason this is suspicious OR the event name of the campaign. | keyword |
vectra_detect.log.received.normal_pattern | Example received normal pattern. | keyword |
vectra_detect.log.received.pattern | The received pattern. | keyword |
vectra_detect.log.referer | The referer. | keyword |
vectra_detect.log.reply_cache_control | The replay cache control setting. | keyword |
vectra_detect.log.request | The LDAP request. | keyword |
vectra_detect.log.result | A string indicating either a success or failure. | keyword |
vectra_detect.log.role | Role of the user who caused the log (e.g., admin, super admin, etc.). | keyword |
vectra_detect.log.scans | The number of attempts. | keyword |
vectra_detect.log.score_decreases | Indicates whether both Threat and Certainty scores are decreasing. | boolean |
vectra_detect.log.sensor | The sensor associated with this host. | keyword |
vectra_detect.log.sent.normal_pattern | Example sent normal pattern. | keyword |
vectra_detect.log.sent.pattern | The sent pattern. | keyword |
vectra_detect.log.service.access_history.id | keyword | |
vectra_detect.log.service.access_history.last_seen | date | |
vectra_detect.log.service.access_history.privilege_category | keyword | |
vectra_detect.log.service.access_history.privilege_value | long | |
vectra_detect.log.service.access_history.uid | keyword | |
vectra_detect.log.service.info.account_uid | keyword | |
vectra_detect.log.service.info.counts | long | |
vectra_detect.log.service.info.host_luid | keyword | |
vectra_detect.log.service.name | The service name. | keyword |
vectra_detect.log.severity | A score proportional to threat. | double |
vectra_detect.log.shares | The related files shares. | keyword |
vectra_detect.log.source.ip | IP address of the machine that initiated the action. | ip |
vectra_detect.log.sql_fragment | The SQL fragment. | keyword |
vectra_detect.log.src.hid | The original host ID of the member host in this campaign. | keyword |
vectra_detect.log.src.ip | The host IP of the source host. | ip |
vectra_detect.log.src.key_asset | Whether the host being scored is marked as a key asset. | boolean |
vectra_detect.log.src.name | The host name of the source host. | keyword |
vectra_detect.log.src.port | long | |
vectra_detect.log.success | Confirmation if the lockdown action was successful. | boolean |
vectra_detect.log.successes | The number of successes. | keyword |
vectra_detect.log.syslog.facility.code | long | |
vectra_detect.log.syslog.facility.name | keyword | |
vectra_detect.log.syslog.hostname | keyword | |
vectra_detect.log.syslog.priority | The syslog priority of the event. | long |
vectra_detect.log.syslog.severity.code | long | |
vectra_detect.log.syslog.severity.name | keyword | |
vectra_detect.log.tags | A list of tags applied to the host. | keyword |
vectra_detect.log.threat.feeds | The name of the threat feed. | keyword |
vectra_detect.log.threat.score | Newly calculated host threat. | long |
vectra_detect.log.timestamp | The epoch timestamp for when syslog received the message (e.g., 1550014653). | date |
vectra_detect.log.triaged | Whether the detection has been triaged yet or not. | boolean |
vectra_detect.log.tunnel_type | The type of hidden tunnel. | keyword |
vectra_detect.log.type | A string to indicate what type of health message this is. Valid types include sensor_connectivity, disk_hardware_raid_check, system_cpuflags_valid, disk_ro_mount_check, capture_interface_flap_status, capture_interface_bandwidth_status,colossus_packet_drop_rate, heartbeat_check, and stream_health. | keyword |
vectra_detect.log.url | The suspicous URL. | keyword |
vectra_detect.log.user.agent | The user agent. | keyword |
vectra_detect.log.user.domain | keyword | |
vectra_detect.log.user.name | Username of the user who caused the log. | keyword |
vectra_detect.log.user.registered_domain | keyword | |
vectra_detect.log.user.subdomain | keyword | |
vectra_detect.log.user.top_level_domain | keyword | |
vectra_detect.log.uuid | The RPC UUID. | keyword |
vectra_detect.log.vectra_timestamp | The epoch timestamp for when the event occurred (e.g., 1550014653). | date |
vectra_detect.log.version | The version of Vectra platform running the Cognito Brain. | keyword |
vectra_detect.log.will_retry | When a Lockdown action has failed, this indicates whether the system will retry the action. | boolean |
Changelog
Version | Details | Kibana version(s) |
---|---|---|
1.7.2 | Bug fix View pull request | 8.3.0 or higher |
1.7.1 | Enhancement View pull request | 8.3.0 or higher |
1.7.0 | Enhancement View pull request | 8.3.0 or higher |
1.6.0 | Enhancement View pull request | 8.3.0 or higher |
1.5.0 | Enhancement View pull request | 8.3.0 or higher |
1.4.0 | Enhancement View pull request | 8.3.0 or higher |
1.3.0 | Enhancement View pull request | 8.3.0 or higher |
1.2.0 | Enhancement View pull request | 8.3.0 or higher |
1.1.0 | Enhancement View pull request | 8.3.0 or higher |
1.0.1 | Bug fix View pull request | 8.3.0 or higher |
1.0.0 | Enhancement View pull request | 8.3.0 or higher |
0.4.0 | Enhancement View pull request | — |
0.3.0 | Enhancement View pull request | — |
0.2.0 | Enhancement View pull request | — |
0.1.0 | Enhancement View pull request | — |