Stream Activity Log Models

The Log Streaming Service can send user activity log information to any third-party log analytics tool, such as Splunk and Syslog.

The following table provides information about the activity logs models sent to Splunk and Syslog:

ZTNA Activity Log

The following model represent logs for ZTNA access events:

FieldDescriptionExample
sessionId <string>Session unique identifier"669bb0452cf7448b9a0e8d1d119eab37"
eventId <string>Unique ID for the displayed event - uuid format"3d0cac48-e37b-49c0-b488-b897714761de"
applicationId <string>Application unique identifier"3ace5d82-84f6-47bd-8b9d-32dac627c051"
applicationName <string>Application name as configured in the Management Console"Internal Web App"
applicationProtocol <string>The protocol used for accessing the application"RDP"
applicationAddress <string>Address and port used to access the application when connecting through a local network"acme.corp:443"
operationSystem <string>Client’s device operating system"Mac", "Windows", "IOS"
sourceIp <string>IP address of the users device"147.235.204.90"
geoLocation <string>Geo-location of the user (ip-based) - In the format of ISO_3166-1_alpha-2"US"
userId <string>User unique identifier, as appears in the IdP"046fea17a8b949e9bdc7418970bc355f|Natan"
username <string>For Axis IdPs: username as configured. For third party IdPs: alias"Jack Smith"
userDisplayName <string>User’s name as appears in the IdP"Jack Smith"
groups <List of strings>IDP groups that the user belongs to"Sales", "Marketing”
identityProviderId <string>Authenticating IdP unique identifier"18378644-1c6d-4645-8052-4681adc2988c
isBlocked <boolean>Boolean field indicating whether the event was blocked (true) or allowed (false) by policy.false
ruleId <string>Unique identifier for the policy rule that blocked/allowed the session"2889882e-233b-49e3-b21a-14292edad903"
ruleName <string>Name of the policy rule that blocked/allowed the session"RDP Access"
eventType <string>A user's activity within the application"Connect"
eventDescription <string>A sentence describing the activity"TCP connection established"
additionalData <JSON>actualApplicationAddress - full application address and port used for the connection{
"actualApplicationAddress": "signaler-pa.clients6.google.com:443"
}
tenantName <string>Axis tenant name"ACME Prod"
tenantId <string>Axis tenant unique ID"a823f5f3-6304-4605-85da-6f898bcb6e91"
time <string>Date and time of the event"2023-11-01T08:41:04.983Z"

DNS Request Activity Log

The following model represent logs for DNS Requests events:

FieldDescriptionExample
trafficSourceType <string>The method in which the user accessed"Agent"
userId <string>Unique ID for the user"046fea17a8b949e9bdc7418970bc355f|Natan"
userName <string>For Axis IdPs: username as configured. For third party IdPs: alias"Jack Smith"
userDisplayName <string>User’s name as appears in the IdP"Jack Smith"
userEmail <string>User email"[email protected]"
identityGroup <List of strings>IDP groups that the user belongs to"Sales", "Marketing”
identityProviderName <string>"Okta"
operatingSystem <string>Client’s device operating system"Mac", "Windows", "IOS"
sourceIp <string>IP address of the users device"147.235.204.90"
geoLocation <string>Geo-location of the user (ip-based) - In the format of ISO_3166-1_alpha-2"US"
hostname <string>Requested domain name"acme.com"
destinationInfo <JSON>- domainAge <integer>
- domainReputation <integer>
- categories <json format>
-- id <integer>
-- name<integer>
"destinationInfo": {
"categories": [
{
"id": 4,
"name": "Business and Economy"
},
{
"id": 5,
"name": "Computer and Internet Info"
}
],
"domainAgeMonths": 127,
"reputationLevel": "Trustworthy"
inlineCasb <JSON>SaaS fingerprinting for the accessed web page:
- appId <integer>
- appName <string>
- appCategoryId <integer>
- appCategoryName <string>
- suitId <integer>
- organizationId <integer>
- organizationName <string>
- functionId <integer>
- functionName <string>
"inlineCasb": {
"appId": 11624,
"appName": "Google Drive",
"categoryId": 2,
"suiteId": 2,
"organizationId": 2,
"functionId": 2,
"functionName": "Share"
}
eventType <string>The displayed event type : “DnsRequest”“DnsRequest”
activityType <string>The displayed activity type : “DnsRequest”“DnsRequest”
isBlocked <boolean>Boolean field indicating whether the event was blocked (true) or allowed (false) by policy.false
eventId <string>Unique ID for the displayed event - uuid format"873da43f-2b66-4437-948f-df73e61f1ba2"
correlationId <string>Unique ID of the event which is presented in the Exploration tool"UTUP-GHAL"
ruleId <string>Unique identifier for the policy rule that blocked/allowed the session"d99564aa-4d66-48bc-803b-af20400c9871"
ruleName <string>Name of the policy rule that blocked/allowed the session"Web Traffic Default"
tenantName <string>Axis tenant name"ACME Prod"
tenantId <string>Axis tenant unique ID"a823f5f3-6304-4605-85da-6f898bcb6e91"
time <string>Date and time of the event"2023-10-19T11:19:59.423Z"

SWG Activity Log

The following model represent logs for SWG related events:

FieldDescriptionExample
trafficSourceType <string>The method in which the user accessed"Agent"
applicationAddress <string>Full URL Address that the user accessed"acme.com/news"
ruleId <string>Unique ID for the policy rule the traffic was matched on"d99564aa-4d66-48bc-803b-af20400c9871"
ruleName <string>The name of the policy rule the traffic was matched on"Web Traffic Default"
hostname <string>Accessed domain name"acme.com"
path <string>The specific path the user accessed under the domain"/news"
method <string>HTTP method for the displayed event"GET"
httpStatus <integer>HTTP status for the displayed event200
destinationInfo <JSON>- domainAge <integer>
- domainReputation <integer>
- categories <json format>
-- id <integer>
-- name<integer>
"destinationInfo": {
"categories": [
{
"id": 4,
"name": "Business and Economy"
},
{
"id": 5,
"name": "Computer and Internet Info"
}
],
"domainAgeMonths": 127,
"reputationLevel": "Trustworthy"
inlineCasb <JSON>SaaS fingerprinting for the accessed web page:
- appId <integer>
- appName <string>
- appCategoryId <integer>
- appCategoryName <string>
- suitId <integer>
- organizationId <integer>
- organizationName <string>
- functionId <integer>
- functionName <string>
"inlineCasb": {
"appId": 11624,
"appName": "Google Drive",
"categoryId": 2,
"suiteId": 2,
"organizationId": 2,
"functionId": 2,
"functionName": "Share"
}
sourceIp <string>IP address of the users device"147.235.204.90"
userId <string>Unique ID for the user"046fea17a8b949e9bdc7418970bc355f|Natan"
username <string>The name of the user"Jack Smith"
userDisplayName <string>User’s name as appears in the IdP"Jack Smith"
userEmail <string>User Email"[email protected]"
operatingSystem <string>Client’s device operating system"Mac", "Windows", "IOS"
identityGroup <List of strings>IDP groups that the user belongs to"Sales", "Marketing”
geoLocation <string>Geo-location of the user (ip-based) - In the format of ISO_3166-1_alpha-2"US"
eventType <string>The displayed event type : “SWG”“SWG”
identityProviderName <string>Identity Provider Name"Okta"
activityType <string>HTTP Event Activity"View"
isBlocked <boolean>Boolean field indicating whether the event was blocked (true) or allowed (false) by policy.false
eventId <string>Unique ID for the displayed event"873da43f-2b66-4437-948f-df73e61f1ba2"
correlationId <string>Unique ID of the event which is presented in the Exploration tool"UTUP-GHAL"
tenantName <string>Axis tenant name"ACME Prod"
tenantId <string>Axis tenant unique ID"a823f5f3-6304-4605-85da-6f898bcb6e91"
time <string>Date and time of the event"2023-10-19T11:19:59.423Z"

IPsec Host Filtering Activity Log

The following model represent logs for IPsec tunnel originating traffic without SSL inspection events:

FieldDescriptionExample
trafficSourceType <string>The method in which the user accessed"Location"
destinationInfo <JSON>- domainAge <integer>
- domainReputation <integer>
- categories <json format>
-- id <integer>
-- name<integer>
"destinationInfo": {
"categories": [
{
"id": 4,
"name": "Business and Economy"
},
{
"id": 5,
"name": "Computer and Internet Info"
}
],
"domainAgeMonths": 127,
"reputationLevel": "Trustworthy"
}
inlineCasb <JSON>SaaS fingerprinting for the accessed web page:
- appId <integer>
- appName <string>
- appCategoryId <integer>
- appCategoryName <string>
- suitId <integer>
- organizationId <integer>
- organizationName <string>
- functionId <integer>
- functionName <string>
"inlineCasb": {
"appId": 11624,
"appName": "Google Drive",
"categoryId": 2,
"suiteId": 2,
"organizationId": 2,
"functionId": 2,
"functionName": "Share"
}
hostname <string>Accessed domain name"google.com"
ipSecLocation <string>The Location from which the traffic originated from"Boston Office"
ipSecSubLocation <string>The Sub-Location from which the traffic originated from"Guest WIFI"
ipSecTunnel <string>The Tunnel Name from which the traffic originated from"office tunnel 1"
tunnelSourceIP <string>The IP address of the device that initiated the IPsec tunnel"147.235.204.90"
internalSourceIp <string>The IP address of the device that created the event"192.168.110.43"
ruleId <string>Unique identifier for the policy rule that blocked/allowed the session"d99564aa-4d66-48bc-803b-af20400c9871"
ruleName <string>Name of the policy rule that blocked/allowed the session"Web Traffic Default"
eventType <string>The displayed event type : “IPSecHostFiltering”“IPSecHostFiltering”
activityType <string>HTTP Event Activity"Connect"
eventId <string>Unique ID for the displayed event "873da43f-2b66-4437-948f-df73e61f1ba2"
correlationId <string>Unique ID of the event which is presented in the Exploration tool"UTUP-GHAL"
isBlocked <boolean>Boolean field indicating whether the event was blocked (true) or allowed (false) by policy.false
tenantName <string>Axis tenant name"ACME Prod"
tenantId <string>Axis tenant unique ID"a823f5f3-6304-4605-85da-6f898bcb6e91"
time <string>Date and time of the event"2023-10-19T11:19:59.423Z"

IPsec Direct Activity Log

The following model represent logs for non HTTP/S IPsec tunnel originating traffic events:

FieldDescriptionExample
trafficSourceType <string>The method in which the user accessed"Location"
destinationIp <string>The destination IP address"8.8.8.8"
destinationPort <string>The destination port"53"
ipSecLocation <string>The Location from which the traffic originated from"Boston Office"
ipSecSubLocation <string>The Sub-Location from which the traffic originated from"Guest WIFI"
ipSecTunnel <string>The Tunnel Name from which the traffic originated from"office tunnel 1"
tunnelSourceIP <string>The IP address of the device that initiated the IPsec tunnel"147.235.204.90"
internalSourceIp <string>The IP address of the device that created the event"192.168.110.43"
eventType <string>The displayed event type : “IPSecDirect”“IPSecDirect”
eventId <string>Unique ID for the displayed event"d364ed67-4495-46d1-b548-65e739dcef91"
activityType <string>Session event activity"Connect"
isBlocked <boolean>Boolean field indicating whether the event was blocked (true) or allowed (false) by policy."d364ed67-4495-46d1-b548-65e739dcef91"
correlationId <string>Unique ID of the event which is presented in the Exploration tool"4I72-3VAU"
tenantName <string>Axis tenant name"ACME Prod"
tenantId <string>Axis tenant unique ID"a823f5f3-6304-4605-85da-6f898bcb6e91"
time <string>Date and time of the event"2023-10-19T11:19:59.423Z"