Akamai Enterprise Threat Protector¶

About¶
Built on the Akamai Intelligent Platform™ and Akamai's AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing.
Product Details¶
Vendor URL: Akamai
Product Type: Web Gateway
Product Tier: Tier II
Integration Method: API
Integration URL: Akamai ETP
Parser Details¶
Log Format: JSON
Expected Normalization Rate: near 100%
Data Label: AKAMAI_ETP
UDM Fields (list of all UDM fields leveraged in the Parser):
| Log File Field | UDM Field |
|---|---|
| "Akamai" | metadata.vendor_name |
| "ETP" | metadata.product_name |
| l7Protocol | metadata.product_event_type |
| type | metadata.product_event_type |
| sys_host | observer.hostname |
| event.siteName | observer.application |
| "DNS" | network.application_protocol |
| query.uuid | network.dns.additional.data |
| qtype | network.dns.answers.type |
| answers.name | network.dns.answers.response |
| query.dnsip | network.dns.authority.name |
| query.domain | network.dns.questions.name |
| qtype | network.dns.questions.type |
| query.domain | target.domain.name |
| threat.interpreterFileAttrs.path | target.file.full_path |
| threat.interpreterFileAttrs.md5 | target.file.md5 |
| threat.interpreterFileAttrs.sha256 | target.file.sha256 |
| origin | principal.application |
| data_source | principal.application |
| query.clientIp | principal.ip |
| MAGUID:%{threat.maGuid} | principal.asset_id |
| id | principal.resource_id |
| user | principal.user.userid |
| event.policyId | security_result.rule_id |
| indicator_id | security_result.rule_id |
| event.listName | security_result.rule_name |
| indicator_name | security_result.rule_name |
| event.threatId | security_result.threat_id |
| threat.id | security_result.threat_id |
| event.threatName | security_result.threat_name |
| threat.threatAttrs.name | security_result.threat_name |
| event.actionName | security_result.action_details |
| event.confidenceId | security_result.confidence_details |
| event.severityId | security_result.severity_details |
| event.confidenceName | security_result.priority_details |
| threat.score | security_result.confidence_details |
| threat.severity | security_result.severity_details |
| threat.rank | security_result.priority_details |
| event.severityLevel | security_result.severity |
| severity | security_result.severity |
| catname.name | security_result.category_details |
| threat.threatType | security_result.category_details |
| indicator_category | security_result.category_details |
| Statically defined | security_result.category |
| event.reason | security_result.summary |
| threat.detectionTags | security_result.detection_fields |
| threat.threatAttrs.path | security_result.about.file.full_path |
| threat.threatAttrs.md5 | security_result.about.file.md5 |
| threat.threatAttrs.sha256 | security_result.about.file.sha256 |
| alexaRanking | additional.fields |
Product Event Types¶
| Event | UDM Event Classification |
|---|---|
| l7Protocol | NETWORK_DNS |
| DEFAULT | GENERIC_EVENT |
Log Sample¶
{"configId":"configidnumber","event":{"actionId":"1","actionName":"Monitor","applicationId":"appidnumber","applicationName":"Google Drive","aupCategories":[{"id":"20","name":"File Sharing"}],"catalogId":"catalogidnumber","categoryId":"20","categoryName":"20","cidr":"","clientAgents":["N/A"],"clientRequestId":"","confidenceId":"-1","confidenceName":"Unknown","correlatedSinkholeEvents":[],"deepScanned":false,"description":"None","detectionTime":"2023-10-24T23:12:24Z","detectionType":"inline","dohAttribution":"","encryptedInternalClientIP":"","encryptedInternalClientName":"","eventType":"aup","internalClientIP":"N/A","listId":"20","listName":"DNS Tunneling","observedAupCategories":[20],"onRamp":"No","onrampType":"dns","policyEvaluationSource":"dns","policyId":"47410","policyName":"Unidentified Location Policy","reason":"Category","riskId":"4","riskName":"Very High","scId":"N/A","scName":"N/A","severityId":0,"severityLevel":"Unclassified","siteId":"-1","siteName":"Unidentified IPs","sublocationId":"-1","sublocationName":"N/A","threatId":2000,"threatName":"AUP","transportType":"dou","trigger":"domain"},"id":"153","l7Protocol":"DNS","query":{"clientIp":"10.10.10.113","deviceId":"N/A","deviceName":"Not Available","deviceOwnerId":"Not Available","dnsIp":"10.10.10.52","domain":"sampledomain@sample.com.","queryType":"HTTPS","resolved":[{"asn":"N/A","asname":"N/A","response":"N/A","type":"N/A"}],"time":"2023-10-24T23:12:24Z","uuid":"10.10.10.52-10.10.10.20-1698189144-8983-26834"}}
Sample Parsing¶
metadata.event_timestamp = "1698189144"
metadata.event_type = "NETWORK_DNS"
metadata.vendor_name = "Akamai"
metadata.product_name = "ETP"
metadata.product_event_type = "DNS"
principal.ip = "10.10.10.113"
target.domain.name = "sampledomain@sample.com"
observer.application = "Unidentified IPs"
security_result.category_details = "File Sharing"
security_result.threat_name = "AUP"
security_result.rule_id = "47410"
security_result.rule_name = "DNS Tunneling"
security_result.summary = "Category"
security_result.action_details = "Monitor"
security_result.severity_details = "0"
security_result.confidence_details = "-1"
security_result.priority_details = "Unknown"
security_result.threat_id = "2000"
network.application_protocol = "DNS"
network.dns.questions.name = "sampledomain@domain.com"
network.dns.answers.name = "N/A"
network.dns.authority.name = "10.10.10.52"
network.dns.additional.data = "10.10.10.52-10.10.10.20-1698189144-8983-26834"