Skip to content

ObserveIT

ObserveIT

About

Today, 30% of data breaches are insider-driven—and the cost of these incidents has doubled in the last three years. In the past, we’ve relied on prevention-heavy and log-analysis approaches. But they can’t keep pace with today’s cloud connected, distributed and highly collaborative workforces.

Now there’s a better way. With Proofpoint Insider Threat Management, you can protect your IP from malicious, negligent or compromised users across your organization. We correlate activity and data movement with clean, first-party endpoint visibility. This empowers your security team to identify user risk, detect insider-led data breaches, and accelerate their security incident response time.

Product Details

Vendor URL: ObserveIT | Proofpoint Insider Threat Management

Product Type: Insider Threat Management

Product Tier: Tier I

Integration Method: Syslog

Integration URL: ObserveIT | Data Integration

Log Guide: ObserveIT | Monitoring Log Files

Parser Details

Log Format: CEF

Expected Normalization Rate: 90%

Data Label: OBSERVEIT

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
cs1Label additional.fields
cs2Label additional.fields
cs3Label additional.fields
cs4Label additional.fields
cs5Label additional.fields
cs6Label additional.fields
cfp1Label additional.fields
cfp2Label additional.fields
cfp3Label additional.fields
description metadata.description
Statically Defined metadata.event_type
product_event metadata.product_event_type
product metadata.product_name
version metadata.product_version
vendor metadata.vendor_name
observer_domain observer.administrative_domain
observer observer.hostname
observer observer.ip
src_domain principal.administrative_domain
sproc principal.application
cs2 principal.asset.platform_software.platform
src principal.hostname
shost principal.hostname
src principal.ip
shost principal.ip
duser principal.user.user_display_name
duid principal.user.userid
Statically Defined security_result.action
Statically Defined security_result.alert_state
Statically Defined security_result.severity
cat security_result.summary
suser src.user.user_display_name
suid src.user.userid
dntdom target.administrative_domain
dst_domain target.administrative_domain
destinationServiceName target.application
dst target.hostname
dvchost target.hostname
dst target.ip
dvchost target.ip
request target.url
cs3 url_back_to_product

Product Event Types

type,subtype severity UDM Event Classification alerting enabled
Default GENERIC_EVENT
UserActivity USER_UNCATEGORIZED

Log Sample

hostname1.domain.com OBSERVEIT-NXLOG: Feb 14 2022 22:03:15 host CEF:0|ObserveIT|ObserveIT|7.12.1|400|ObserveITAlert|8|cat=[domain] Exfiltrating a file to the web by uploading externalId=1234567890 reason=An alert is triggered upon exfiltrating a file (both tracked file and non-tracked file) to the web by uploading it. Note that this rule will be triggered only for files that are specified in the dedicated list. cs1=File operation trigger:Upload;File name:WEBSITE-5.20.1.BETA-SETUP.EXE;:True;Original file name:WEBSITE-5.20.1.beta-Setup.exe;Original file name:WEBSITE-5.20.1.beta-Setup.exe;To website/web-application:WEBSITE_NET;:https_//WEBSITE1.com/download/WEBSITE-5.20.1.beta-setup_exe;To website category:0;Originated from website:WEBSITE_NET;:https_//WEBSITE_NET/download/WEBSITE-5.20.1.beta-setup_exe cs1Label=AlertDetails cs5=HTTPS_//OBSERVER_HOSTNAME.COMPANYNAME_net/ObserveIT/SlideViewer.aspx?SessionID\=1234567890 cs5Label=AlertDetailsURL cs2=Windows cs2Label=OS dhost=DHOST_NAME dntdom=domain.com cs3=HTTPS_//hostname1.domain.com/ObserveIT/SlideViewer.aspx?SessionID\=1234567890 cs3Label=ViewURL cs4= cs4Label=ScreenShot dproc=ObserveIT duid=john.doe duser=n/a dvchost=(local) dvc= msg=Downloading WEBSITE-5.20.1.beta-Setup.exe :: WEBSITE — Mozilla Firefox rt=Feb 14 2022 22:03:15 shost=(local) sproc=firefox src= sntdom=n/a suser=n/a suid=n/a destinationServiceName=WEBSITE_NET deviceProcessName=firefox sourceServiceName=1234567890 requestMethod=1234567890 end=Feb 15 2022 04:03:15 start=Feb 15 2022 04:03:15

Sample Parsing

metadata.event_timestamp = "2022-02-14T22:03:15Z"
metadata.event_type = "GENERIC_EVENT"
metadata.vendor_name = "ObserveIT"
metadata.product_name = "ObserveIT"
metadata.product_version = "7.12.1"
metadata.product_event_type = "ObserveITAlert"
metadata.description = "Downloading WEBSITE-5.20.1.beta-Setup.exe :: WEBSITE — Mozilla Firefox"
additional.AlertDetailsURL = "HTTPS_//OBSERVER_HOSTNAME.COMPANYNAME_net/ObserveIT/SlideViewer.aspx?SessionID\=1234567890"
additional.AlertDetails = "File operation trigger:Upload;File name:WEBSITE-5.20.1.BETA-SETUP.EXE;:True;Original file name:WEBSITE-5.20.1.beta-Setup.exe;Original file name:WEBSITE-5.20.1.beta-Setup.exe;To website/web-application:WEBSITE_NET;:https_//WEBSITE_NET/download/WEBSITE-5.20.1.beta-setup_exe;To website category:0;Originated from website:WEBSITE_NET;:https_//WEBSITE_NET/download/WEBSITE-5.20.1.beta-setup_exe"
principal.hostname = "hostname2"
principal.user.userid = "john.doe"
principal.application = "firefox"
principal.asset.platform_software.platform = "WINDOWS"
target.administrative_domain = "domain.com"
target.application = "WEBSITE1.com"
observer.hostname = "hostname1"
observer.administrative_domain = "domain.com"
security_result.summary = "[domain] Exfiltrating a file to the web by uploading"
security_result.severity = "LOW"
security_result.url_back_to_product = "HTTPS_//hostname1.domain.com/ObserveIT/SlideViewer.aspx?SessionID\=1234567890"
security_result.alert_state = "ALERTING"

Parser Alerting

This product currently does not have any Parser-based Alerting

Rules

Coming Soon