Strata Logging Service
UserID
Table of Contents
Expand All
|
Collapse All
UserID
User ID logs contain IP address-to-username mappings, authentication timestamps, the sources
of the IP-to-username mappings, and so forth.
Next-generation firewalls can be configured to perform IP-to-username mappings for a network
session. This mapping requires a variety of techniques so that users in all locations,
regardless of access method or operating system, can be identified by the firewall. In
addition to allowing the firewall to map an IP address to a username, this integration also
allow the firewall to recognize when a user has logged in or logged out of a networked
resource.
User-ID logs are generated whenever a user authentication event occurs using a resource to
which the firewall has visibility. For example, a User-ID agent can be installed on the
network so that the firewall has visibility to authentication events on domain controllers,
Microsoft Exchange servers, or even Windows clients.
See the following for information related to supported log formats:
USERID Field
(Display Name)
|
Description
|
---|---|
auth_completion_time
(AUTH COMPLETION TIME)
|
Time when the authentication was completed. This string contains a
timestamp value that is the number of microseconds since the Unix epoch.
Syslog field name: Syslog Field Order
CEF field name: end
EMAIL field name: AuthCompletionTime
HTTPS field name: AuthCompletionTime
LEEF field name: AuthCompletionTime
|
auth_factor_num
(AUTH FACTOR NO)
|
Indicates the use of primary authentication (1) or additional factors (2, 3).
Syslog field name: Syslog Field Order
CEF field name: cn1
EMAIL field name: AuthFactorNo
HTTPS field name: AuthFactorNo
LEEF field name: AuthFactorNo
|
authenticated_user_info.domain
(AUTHENTICATED USER DOMAIN)
|
Domain to which the user who is being authenticated belongs.
CEF field name: dntdom
EMAIL field name: AuthenticatedUserDomain
HTTPS field name: AuthenticatedUserDomain
LEEF field name: AuthenticatedUserDomain
|
authenticated_user_info.name
(AUTHENTICATED USER NAME)
|
Name of the user who is being authenticated.
CEF field name: duser
EMAIL field name: AuthenticatedUserName
HTTPS field name: AuthenticatedUserName
LEEF field name: AuthenticatedUserName
|
authenticated_user_info.uuid
(AUTHENTICATED USER UUID)
|
Unique identifier assigned to the user who is being authenticated.
CEF field name: duid
EMAIL field name: AuthenticatedUserUUID
HTTPS field name: AuthenticatedUserUUID
LEEF field name: AuthenticatedUserUUID
|
config_version.value
(CONFIG VERSION)
|
Version number of the firewall operating system that wrote this log record.
Syslog field name: Syslog Field Order
CEF field name: PanOSConfigVersion
EMAIL field name: ConfigVersion
HTTPS field name: ConfigVersion
LEEF field name: ConfigVersion
|
count_of_repeats
(COUNT OF REPEATS)
|
Number of sessions with same Source IP, Destination IP, Application, and Content/Threat Type seen for the summary interval.
Syslog field name: Syslog Field Order
CEF field name: cnt
EMAIL field name: CountofRepeats
HTTPS field name: CountofRepeats
LEEF field name: CountofRepeats
|
customer_id
(CORTEX DATA LAKE TENANT ID)
|
The ID that uniquely identifies the Cortex Data Lake instance which received this log record.
CEF field name: PanOSCortexDataLakeTenantID
EMAIL field name: CortexDataLakeTenantID
HTTPS field name: CortexDataLakeTenantID
LEEF field name: CortexDataLakeTenantID
|
dest_port
(DESTINATION PORT)
|
Network traffic's destination port. If this value is 0, then the app is using its standard port.
Syslog field name: Syslog Field Order
CEF field name: dpt
EMAIL field name: DestinationPort
HTTPS field name: DestinationPort
LEEF field name: dstPort
|
dg_hier_level_1
(DG HIERARCHY LEVEL 1)
|
A sequence of identification numbers that indicate the device group’s location within a device group hierarchy.
Syslog field name: Syslog Field Order
CEF field name: PanOSDGHierarchyLevel1
EMAIL field name: DGHierarchyLevel1
HTTPS field name: DGHierarchyLevel1
LEEF field name: DGHierarchyLevel1
|
dg_hier_level_2
(DG HIERARCHY LEVEL 2)
|
A sequence of identification numbers that indicate the device group’s location within a device group hierarchy.
Syslog field name: Syslog Field Order
CEF field name: PanOSDGHierarchyLevel2
EMAIL field name: DGHierarchyLevel2
HTTPS field name: DGHierarchyLevel2
LEEF field name: DGHierarchyLevel2
|
dg_hier_level_3
(DG HIERARCHY LEVEL 3)
|
A sequence of identification numbers that indicate the device group’s location within a device group hierarchy.
Syslog field name: Syslog Field Order
CEF field name: PanOSDGHierarchyLevel3
EMAIL field name: DGHierarchyLevel3
HTTPS field name: DGHierarchyLevel3
LEEF field name: DGHierarchyLevel3
|
dg_hier_level_4
(DG HIERARCHY LEVEL 4)
|
A sequence of identification numbers that indicate the device group’s location within a device group hierarchy.
Syslog field name: Syslog Field Order
CEF field name: PanOSDGHierarchyLevel4
EMAIL field name: DGHierarchyLevel4
HTTPS field name: DGHierarchyLevel4
LEEF field name: DGHierarchyLevel4
|
event_id
(EVENT ID)
|
The event's unique identifier.
Syslog field name: Syslog Field Order
CEF field name: cat
EMAIL field name: EventID
HTTPS field name: EventID
LEEF field name: EventIdName
|
is_dup_log
(IS DUPLICATE LOG)
|
Indicates whether this log data is available in multiple locations, such as from Cortex Data Lake as well as from an on-premise log collector.
CEF field name: PanOSIsDuplicateLog
EMAIL field name: IsDuplicateLog
HTTPS field name: IsDuplicateLog
LEEF field name: IsDuplicateLog
|
is_duplicate_user
(IS DUPLICATE USER)
|
Indicates whether duplicate users were found in a user group.
CEF field name: PanOSIsDuplicateUser
EMAIL field name: IsDuplicateUser
HTTPS field name: IsDuplicateUser
LEEF field name: IsDuplicateUser
|
is_exported
(LOG EXPORTED)
|
Indicates if this log was exported from the firewall using the firewall's log export function.
CEF field name: PanOSLogExported
EMAIL field name: LogExported
HTTPS field name: LogExported
LEEF field name: LogExported
|
is_forwarded
(LOG FORWARDED)
|
Internal-use field that indicates if the log is being forwarded.
CEF field name: PanOSLogForwarded
EMAIL field name: LogForwarded
HTTPS field name: LogForwarded
LEEF field name: LogForwarded
|
is_prisma_branch
(IS PRISMA NETWORKS)
|
Internal-use field. If set to 1, the log was generated on a cloud-based firewall. If 0, the firewall was running on-premise.
CEF field name: PanOSIsPrismaNetworks
EMAIL field name: IsPrismaNetworks
HTTPS field name: IsPrismaNetworks
LEEF field name: IsPrismaNetworks
|
is_prisma_mobile
(IS PRISMA USERS)
|
Internal use field. If set to 1, the log record was generated using a cloud-based GlobalProtect instance. If 0, GlobalProtect was hosted on-premise.
CEF field name: PanOSIsPrismaUsers
EMAIL field name: IsPrismaUsers
HTTPS field name: IsPrismaUsers
LEEF field name: IsPrismaUsers
|
log_source
(LOG SOURCE)
|
Identifies the origin of the data. That is, the system that produced the data.
CEF field name: PanOSLogSource
EMAIL field name: LogSource
HTTPS field name: LogSource
LEEF field name: LogSource
|
log_source_group_id
(LOG SOURCE GROUP ID)
|
ID that uniquely identifies the logSourceGroupId of the log. That is, the log_source_id of the group.
CEF field name: LogSourceGroupID
EMAIL field name: LogSourceGroupID
HTTPS field name: LogSourceGroupID
LEEF field name: LogSourceGroupID
|
log_source_id
(DEVICE SN)
|
ID that uniquely identifies the source of the log. That is, the serial number of the firewall that generated the log.
If the log is generated by Prisma Access, the serial number is not displayed.
Syslog field name: Syslog Field Order
CEF field name: deviceExternalId
EMAIL field name: DeviceSN
HTTPS field name: DeviceSN
LEEF field name: DeviceSN
|
log_source_name
(DEVICE NAME)
|
Name of the source of the log. That is, the hostname of the firewall that logged the network traffic.
Syslog field name: Syslog Field Order
CEF field name: dvchost
EMAIL field name: DeviceName
HTTPS field name: DeviceName
LEEF field name: DeviceName
|
log_source_tz_offset
(LOG SOURCE TIMEZONE OFFSET)
|
Time Zone offset from GMT of the source of the log.
CEF field name: PanOSLogSourceTimeZoneOffset
EMAIL field name: LogSourceTimeZoneOffset
HTTPS field name: LogSourceTimeZoneOffset
LEEF field name: LogSourceTimeZoneOffset
|
log_time
(TIME RECEIVED)
|
Time the log was received in . This string contains a
timestamp value that is the number of microseconds since the Unix epoch.
Syslog field name: Syslog Field Order
CEF field name: rt
EMAIL field name: TimeReceived
HTTPS field name: TimeReceived
LEEF field name: TimeReceived
|
log_type.value
(LOG TYPE)
|
Identifies the log type.
Syslog field name: Syslog Field Order
CEF field name: Device Event Class ID
EMAIL field name: LogType
HTTPS field name: LogType
LEEF field name: cat
|
mapping_data_source.value
(MAPPING DATA SOURCE)
|
Source from which mapping information is collected.
Syslog field name: Syslog Field Order
CEF field name: cs5
EMAIL field name: MappingDataSource
HTTPS field name: MappingDataSource
LEEF field name: MappingDataSource
|
mapping_data_source_name
(MAPPING DATA SOURCE NAME)
|
User-ID source that sends the IP (Port)-User Mapping.
Syslog field name: Syslog Field Order
CEF field name: cs4
EMAIL field name: MappingDataSourceName
HTTPS field name: MappingDataSourceName
LEEF field name: MappingDataSourceName
|
mapping_data_source_type.value
(MAPPING DATA SOURCE TYPE)
|
Mechanism used to identify the IP/User mappings within a data source.
Syslog field name: Syslog Field Order
CEF field name: cs6
EMAIL field name: MappingDataSourceType
HTTPS field name: MappingDataSourceType
LEEF field name: MappingDataSourceType
|
mapping_timeout
(MAPPING TIMEOUT)
|
Timeout interval after which the IP/User Mappings are cleared.
Syslog field name: Syslog Field Order
CEF field name: cn3
EMAIL field name: MappingTimeout
HTTPS field name: MappingTimeout
LEEF field name: MappingTimeout
|
mfa_factor_type
(MFA FACTOR TYPE)
|
The vendor used to authenticate a user when multi-factor authentication is present.
Syslog field name: Syslog Field Order
CEF field name: cs1
EMAIL field name: MFAFactorType
HTTPS field name: MFAFactorType
LEEF field name: MFAFactorType
|
panorama_serial
(PANORAMA SN)
|
Panorama Serial associated with CDL.
CEF field name: PanOSPanoramaSN
EMAIL field name: PanoramaSN
HTTPS field name: PanoramaSN
LEEF field name: PanoramaSN
|
platform_type
(PLATFORM TYPE)
|
The platform type (Valid types are VM, PA, NGFW, CNGFW).
CEF field name: PlatformType
EMAIL field name: PlatformType
HTTPS field name: PlatformType
LEEF field name: PlatformType
|
sequence_no
(SEQUENCE NO)
|
The log entry identifier, which is incremented sequentially. Each log type has a unique number space.
Syslog field name: Syslog Field Order
CEF field name: externalId
EMAIL field name: SequenceNo
HTTPS field name: SequenceNo
LEEF field name: SequenceNo
|
source_port
(SOURCE PORT)
|
Source port utilized by the session.
Syslog field name: Syslog Field Order
CEF field name: spt
EMAIL field name: SourcePort
HTTPS field name: SourcePort
LEEF field name: srcPort
|
sub_type.value
(SUBTYPE)
|
Identifies the log subtype.
Syslog field name: Syslog Field Order
CEF field name: Name
EMAIL field name: Subtype
HTTPS field name: Subtype
LEEF field name: EventID
|
tag_name
(TAG)
|
The tag mapped to the user.
Syslog field name: Syslog Field Order
CEF field name: PanOSTag
EMAIL field name: Tag
HTTPS field name: Tag
LEEF field name: Tag
|
time_generated
(TIME GENERATED)
|
Time when the log was generated on the firewall's data plane. This string contains a
timestamp value that is the number of microseconds since the Unix epoch.
Syslog field name: Syslog Field Order
CEF field name: start
EMAIL field name: TimeGenerated
HTTPS field name: TimeGenerated
LEEF field name: devTime
|
time_generated_high_res
(TIME GENERATED HIGH RESOLUTION)
|
Time the log was generated in data plane with millisec granularity in format YYYY-MM-DDTHH:MM:SS[.DDDDDD]Z.
Syslog field name: Syslog Field Order
CEF field name: PanOSTimeGeneratedHighResolution
EMAIL field name: TimeGeneratedHighResolution
HTTPS field name: TimeGeneratedHighResolution
LEEF field name: TimeGeneratedHighResolution
|
ug_flags
(UG FLAGS)
|
Bit field used to indicate the status of user and group information when the next-generation firewall is performing an IP-to-username mapping.
Syslog field name: Syslog Field Order
CEF field name: PanOSUGFlags
EMAIL field name: UGFlags
HTTPS field name: UGFlags
LEEF field name: UGFlags
|
user
(USER)
|
End user being authenticated.
Syslog field name: Syslog Field Order
CEF field name: duser
EMAIL field name: User
HTTPS field name: User
LEEF field name: usrName
|
user_group_found
(USER GROUP FOUND)
|
Indicates whether the user could be mapped to a group.
CEF field name: PanOSUserGroupFound
EMAIL field name: UserGroupFound
HTTPS field name: UserGroupFound
LEEF field name: UserGroupFound
|
user_identified_by_source_as
(USER IDENTIFIED BY SOURCE)
|
The user name as sent by the data source.
Syslog field name: Syslog Field Order
CEF field name: PanOSUserIdentifiedBySource
EMAIL field name: UserIdentifiedBySource
HTTPS field name: UserIdentifiedBySource
LEEF field name: UserIdentifiedBySource
|
vendor_name
(VENDOR NAME)
|
Identifies the vendor that produced the data.
CEF field name: Device Vendor
EMAIL field name: VendorName
HTTPS field name: VendorName
LEEF field name: Vendor
|
vsys
(VIRTUAL LOCATION)
|
String representation of the unique identifier for a virtual system on a Palo Alto Networks firewall.
Syslog field name: Syslog Field Order
CEF field name: cs3
EMAIL field name: VirtualLocation
HTTPS field name: VirtualLocation
LEEF field name: VirtualLocation
|
vsys_id
(VIRTUAL SYSTEM ID)
|
A unique identifier for a virtual system on a Palo Alto Networks firewall.
Syslog field name: Syslog Field Order
CEF field name: cn2
EMAIL field name: VirtualSystemID
HTTPS field name: VirtualSystemID
LEEF field name: VirtualSystemID
|
vsys_name
(VIRTUAL SYSTEM NAME)
|
The name of the virtual system associated with the network traffic.
Syslog field name: Syslog Field Order
CEF field name: PanOSVirtualSystemName
EMAIL field name: VirtualSystemName
HTTPS field name: VirtualSystemName
LEEF field name: VirtualSystemName
|