All Products
Search
Document Center

Security Center:Log types and field descriptions

Last Updated:Mar 31, 2026

Security Center's log analysis feature centralizes storage, querying, and analysis of host activity and security events, supporting security audits, incident tracing, and threat detection. This topic describes the log types Security Center supports, edition availability, log fields, and the __topic__ values needed to query each log type in Simple Log Service (SLS).

The log samples and field descriptions below are for reference only. Fields may change with product updates. For the most current field list, refer to the data collected in Simple Log Service.

Version support

The log types available depend on your edition or protection level.

Subscription editions

Host logs

Log typeBasicAnti-virusAdvancedEnterpriseUltimate
Logon logsNot supportedSupportedSupportedSupportedSupported
Network connection logsNot supportedSupportedSupportedSupportedSupported
Process startup logsNot supportedSupportedSupportedSupportedSupported
Brute-force attack logsNot supportedSupportedSupportedSupportedSupported
DNS query logsNot supportedSupportedSupportedSupportedSupported
Client event logsSupportedSupportedSupportedSupportedSupported
Account snapshot logsNot supportedNot supportedNot supportedSupportedSupported
Network snapshot logsNot supportedNot supportedNot supportedSupportedSupported
Process snapshot logsNot supportedNot supportedNot supportedSupportedSupported

Security logs

Log typeBasicAnti-virusAdvancedEnterpriseUltimate
Security alert logsSupported — only alerts available in the Basic editionSupportedSupportedSupportedSupported
Vulnerability logsSupported — only vulnerabilities detected in the Basic editionSupportedSupportedSupportedSupported
Network defense logsNot supportedSupportedSupportedSupportedSupported
Core file monitoring event logsNot supportedNot supportedNot supportedSupportedSupported
CSPM - Baseline check logsNot supportedNot supportedSupportedSupportedSupported

Value-added service logs

If you enable the following value-added services, Security Center analyzes the logs they generate:

  • Malicious File Detection

  • Agentless Detection

  • Application Protection

  • CSPM (Baseline Check logs and CSPM logs)

Pay-as-you-go: Host and Container Security

If you purchase the Host and Container Security pay-as-you-go service, available log types vary by the protection level bound to the server.

Host logs

Log typeUnprotectedAntivirusHost ProtectionHosts and Container Protection
Logon logsNot supportedSupportedSupportedSupported
Network connection logsNot supportedSupportedSupportedSupported
Process startup logsNot supportedSupportedSupportedSupported
Brute-force attack logsNot supportedSupportedSupportedSupported
DNS query logsNot supportedSupportedSupportedSupported
Client event logsSupportedSupportedSupportedSupported
Account snapshot logsNot supportedNot supportedSupportedSupported
Network snapshot logsNot supportedNot supportedSupportedSupported
Process snapshot logsNot supportedNot supportedSupportedSupported

Security logs

Log typeUnprotectedAntivirusHost ProtectionHosts and Container Protection
Security alert logsSupported — only alerts for the Unprotected levelSupportedSupportedSupported
Vulnerability logsSupported — only vulnerabilities not covered by a protection levelSupportedSupportedSupported
Network defense logsNot supportedSupportedSupportedSupported
Core file monitoring event logsNot supportedNot supportedSupportedSupported

Pay-as-you-go service logs

If you enable the following pay-as-you-go services, Security Center analyzes the logs they generate:

  • Malicious File Detection

  • Agentless Detection

  • Application Protection

  • CSPM (Baseline Check logs and CSPM logs)

Log type overview

Each log type has a __topic__ value that identifies it in SLS. Use this value in your SLS queries to filter for a specific log type.

Log type__topic__ valueCollection
Logon logsaegis-log-loginReal-time
Network connection logsaegis-log-networkReal-time
Process startup logsaegis-log-processReal-time
Brute-force attack logsaegis-log-crackReal-time
DNS query logsaegis-log-dns-queryReal-time
Client event logsaegis-log-clientReal-time
Account snapshot logsaegis-snapshot-hostAsset Fingerprints interval (default: once a day)
Network snapshot logsaegis-snapshot-portAsset Fingerprints interval (default: once a day)
Process snapshot logsaegis-snapshot-processAsset Fingerprints interval (default: once a day)
Vulnerability logssas-vul-logReal-time
CSPM - Baseline check logssas-hc-logReal-time
Security alert logssas-security-logReal-time
CSPM - Cloud platform configuration check logssas-cspm-logReal-time
Network defense logssas-net-blockReal-time
Application protection logssas-rasp-logReal-time
Malware detection logssas-filedetect-logReal-time
Core file monitoring event logsaegis-file-protect-logReal-time
Agentless detection logssas-agentless-logReal-time

Snapshot log collection: Snapshot logs (account, network, process) are collected automatically at the interval configured in Asset Fingerprints. If no interval is set, data is collected once a day. You can also trigger a manual collection.

Host log descriptions

Logon logs

`__topic__`: aegis-log-login

Records user logon events on servers, including source IP address, username, and logon result. Use these logs to monitor user activity and detect abnormal logon patterns.

Important

Security Center does not collect logon logs for Windows Server 2008.

Repeated logons within one minute are merged into a single log entry. A login_count of 3 means three logons occurred within the last minute.

Network connection logs

`__topic__`: aegis-log-network

Records network connection activity on the server in real time, including the connection 5-tuple and associated processes. Use these logs to detect abnormal connections and potential network attacks.

Important
  • The agent collects only a subset of connection states between establishment and termination.

  • Inbound traffic is not recorded.

Process startup logs

`__topic__`: aegis-log-process

Records startup events for all new processes, including process name, command-line parameters, and parent process. Use these logs to detect abnormal process activity, malware intrusions, and security threats. Logs are reported immediately after a process starts.

Brute-force attack logs

`__topic__`: aegis-log-crack

Records brute-force attack attempts, including logon and credential cracking attempts against systems, applications, or accounts. Use these logs to detect abnormal logons, weak passwords, and credential exposure.

Repeated logon attempts within one minute are merged into a single log entry. A login_count of 3 means three attempts within the last minute.

Account snapshot logs

`__topic__`: aegis-snapshot-host

Records detailed user account information, including username, password policy, and logon history. Compare snapshots across time to detect unauthorized access and abnormal account status changes.

Network snapshot logs

`__topic__`: aegis-snapshot-port

Records network connection information, including the connection 5-tuple, connection status, and associated processes. Use these logs to identify active connections and detect abnormal behavior.

Process snapshot logs

`__topic__`: aegis-snapshot-process

Records process activity, including process ID, name, and startup time. Use these logs to detect abnormal processes, high CPU usage, and memory leaks.

DNS query logs

`__topic__`: aegis-log-dns-query

Records DNS query requests initiated by the server, including queried domain name, query type, and source process. Use these logs to detect abnormal queries, domain hijacking, and DNS poisoning.

Important

Log collection is not supported for Linux servers with a kernel version earlier than 4.x.x.

Client event logs

`__topic__`: aegis-log-client

Records online and offline events of the Security Center agent, letting you monitor the agent's running status.

Security log descriptions

All security logs are collected in real time.

Vulnerability logs

`__topic__`: sas-vul-log

Records vulnerabilities found in your systems or applications, including vulnerability name, status, and handling action. Use these logs to track vulnerabilities, assess risk, and monitor remediation.

CSPM - Baseline check logs

`__topic__`: sas-hc-log

Records baseline risk check results, including baseline level, category, and risk level. Use these logs to understand baseline security status and identify configuration risks.

Important

Only check items that fail for the first time are recorded. Items that previously passed but now fail a new check are also recorded.

Security alert logs

`__topic__`: sas-security-log

Records security events and alerts, including alert data source, details, and alert level. Use these logs to track security events and coordinate response actions.

CSPM - Cloud platform configuration check logs

`__topic__`: sas-cspm-log

Records cloud platform configuration check results and whitelisting operations. Use these logs to detect configuration issues and potential security risks in your cloud environment.

Network defense logs

`__topic__`: sas-net-block

Records network attack events, including attack type and source and destination IP addresses. Use these logs to understand network threats and coordinate defense actions.

Application protection logs

`__topic__`: sas-rasp-log

Records attack alerts from Runtime Application Self-Protection (RASP), including attack type, behavioral data, and attacker IP address. Use these logs to detect and respond to application-layer attacks.

Malware detection logs

`__topic__`: sas-filedetect-log

Records detection results from the Malicious File Detection SDK, including file information, detection scenario, and results. Use these logs to identify and respond to malicious programs in offline files or cloud storage.

Core file monitoring event logs

`__topic__`: aegis-file-protect-log

Records alert events from the Core File Monitoring feature, including file path, operation type, and alert level. Use these logs to detect unauthorized access or tampering with critical files.

Agentless detection logs

`__topic__`: sas-agentless-log

Records security risks detected in cloud servers, disk snapshots, and images — including vulnerabilities, baseline failures, malicious samples, and sensitive files. Use these logs to track asset risk status over time and detect potential threats.

Common fields

The following fields appear in most log types. They are listed here once to avoid repetition in each field table.

FieldDescriptionExample
instance_idThe instance ID.i-2zeg4zldn8zypsfg****
host_ipThe IP address of the server.192.168.XX.XX
uuidThe UUID of the server.5d83b26b-b7ca-4a0a-9267-12****
sas_group_nameThe asset group of the server in Security Center.default
start_timeThe event timestamp, in seconds.1719472214

Host log fields

Logon logs

FieldDescriptionExample
src_ipThe source IP address of the logon.221.11.XX.XX
dst_portThe logon port.22
login_typeThe logon type. Values: SSHLOGIN, SSH (SSH logon); RDPLOGIN (Remote Desktop logon); IPCLOGIN (IPC connection logon).SSH
usernameThe logon username.admin
login_countThe number of logons. Repeated logons within one minute are merged into a single entry.3

Network connection logs

FieldDescriptionExample
cmd_chainThe process chain.[ { "9883":"bash -c kill -0 -- -'6274'" } ......]
cmd_chain_indexThe index of the process chain. Use this index to look up the process chain.B184
container_hostnameThe hostname in the container.nginx-ingress-controller-765f67fd4d-****
container_idThe container ID.4181de1e2b20c3397f1c409266dbd5631d1bc5be7af85246b0d****
container_image_idThe container image ID.registry-cn-beijing-vpc.ack.aliyuncs.com/acs/aliyun-ingress-controller@sha256:5f281994d9e71a1b1a087365271024991c5b0d0543c48f0****
container_image_nameThe container image name.registry-cn-beijing-vpc.ack.aliyuncs.com/acs/aliyun-ingress-****
container_nameThe container name.nginx-ingress-****
container_pidThe process ID in the container.0
net_connect_dirThe direction of the network connection. Values: in (inbound); out (outbound).
  • out: outbound.

in
dst_ipThe IP address of the connection receiver. If net_connect_dir is out, this is the peer host. If in, this is the local host.
  • If dir is out, this is the peer host.

  • If dir is in, this is the local host.

192.168.XX.XX
dst_portThe port of the connection receiver.443
parent_proc_nameThe filename of the parent process./usr/bin/bash
pidThe process ID.14275
ppidThe parent process ID.14268
proc_nameThe process name.nginx
proc_pathThe process path./usr/local/nginx/sbin/nginx
proc_start_timeThe process startup time.N/A
connection_typeThe protocol. Values: tcp; raw (raw socket).tcp
src_ipThe source IP address.100.127.XX.XX
src_portThe source port.41897
srv_commThe command name associated with the grandparent process.containerd-shim
statusThe network connection status. Values: 1 (Closed); 2 (Listening); 3 (SYN sent); 4 (SYN received); 5 (Established); 6 (Close wait); 7 (Closing); 8 (FIN wait 1); 9 (FIN wait 2); 10 (Time wait); 11 (TCB deleted).5
typeThe type of real-time network connection. Values: connect (active TCP connection initiated); accept (TCP connection received); listen (port is listening).listen
uidThe ID of the process user.101
usernameThe username of the process.root

Process startup logs

FieldDescriptionExample
cmd_chainThe process chain.[ { "9883":"bash -c kill -0 -- -'6274'" } ......]
cmd_chain_indexThe index of the process chain.B184
cmd_indexThe index of each parameter in the command line. Each pair of indexes marks the start and end of a parameter.0,3,5,8
cmdlineThe full command line used to start the process.ipset list KUBE-6-CLUSTER-IP
commThe command name associated with the process.N/A
container_hostnameThe hostname in the container.nginx-ingress-controller-765f67fd4d-****
container_idThe container ID.4181de1e2b20c3397f1c409266dbd5631d1bc5be7af85246b0d****
container_image_idThe container image ID.registry-cn-beijing-vpc.ack.aliyuncs.com/acs/aliyun-ingress-controller@sha256:5f281994d9e71a1b1a087365271024991c5b0d0543c48f0****
container_image_nameThe container image name.registry-cn-beijing-vpc.ack.aliyuncs.com/acs/aliyun-ingress-****
container_nameThe container name.nginx-ingress-****
container_pidThe process ID in the container.0
cwdThe working directory of the process.N/A
proc_nameThe process filename.ipset
proc_pathThe full path of the process file./usr/sbin/ipset
gidThe process group ID.0
groupnameThe user group name.group1
parent_cmd_lineThe command line of the parent process./usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=cn-beijing.192.168.XX.XX
parent_proc_nameThe parent process filename.kube-proxy
parent_proc_pathThe full path of the parent process file./usr/local/bin/kube-proxy
pidThe process ID.14275
ppidThe parent process ID.14268
proc_start_timeThe process startup time.2024-08-01 16:45:40
parent_proc_start_timeThe startup time of the parent process.2024-07-12 19:45:19
srv_cmdThe command line of the grandparent process./usr/bin/containerd
ttyThe logon terminal. N/A means the account has never logged on to a terminal.N/A
uidThe user ID.123
usernameThe username of the process.root

Brute-force attack logs

FieldDescriptionExample
login_countThe number of failed logon attempts. Repeated attempts within one minute are merged into a single entry.3
src_ipThe source IP address of the logon attempt.47.92.XX.XX
dst_portThe logon port.22
login_typeThe logon type. Values: SSHLOGIN, SSH (SSH logon); RDPLOGIN (Remote Desktop logon); IPCLOGIN (IPC connection logon); SQLSERVER (SQL Server logon failed).SSH
usernameThe logon username.user

Account snapshot logs

FieldDescriptionExample
account_expireThe account expiration date. never means the account never expires.never
domainThe domain or directory service the account belongs to. N/A means no domain.N/A
groupsThe group the account belongs to. N/A means no group.["nscd"]
home_dirThe home directory./Users/abc
last_chgThe date the password was last changed.2022-11-29
last_logonThe date and time of the last logon. N/A means the account has never been used.2023-08-18 09:21:21
login_ipThe remote IP address of the last logon. N/A means the account has never logged on.192.168.XX.XX
passwd_expireThe password expiration date. never means the password never expires.2024-08-24
permWhether the account has root permissions. Values: 0 (no root permissions); 1 (has root permissions).0
shellThe Linux shell./sbin/nologin
statusThe account status. Values: 0 (logon prohibited); 1 (logon permitted).0
ttyThe logon terminal. N/A means the account has never logged on to a terminal.N/A
usernameThe username.nscd
warn_timeThe password expiration reminder date. never means no reminder is set.2024-08-20

Network snapshot logs

FieldDescriptionExample
net_connect_dirThe direction of the network connection. in means inbound.in
dst_ipThe peer IP address. Generally empty.
dst_portThe port of the connection receiver.443
pidThe process ID.682
proc_nameThe process name.sshd
connection_typeThe protocol. Values: tcp4 (TCP over IPv4); tcp6 (TCP over IPv6).tcp4
src_ipThe local IP address.100.127.XX.XX
src_portThe listening port.41897
statusThe connection status. A value of 2 means the port is in a listening state; src_ip and src_port represent the listening address.
  • 1: Closed.

  • 3: SYN sent.

  • 4: SYN received.

  • 5: Established.

  • 6: Close wait.

  • 7: Closing.

  • 8: FIN wait 1.

  • 9: FIN wait 2.

  • 10: Wait for the TIME_WAIT state to complete, ensuring the remote party has received the acknowledgment of the close request.

  • 11: TCB deleted.

5

Process snapshot logs

FieldDescriptionExample
cmdlineThe full command line used to start the process./usr/local/share/assist-daemon/assist_daemon
md5The MD5 hash of the binary file. Not calculated for files larger than 1 MB.1086e731640751c9802c19a7f53a64f5
proc_nameThe process filename.assist_daemon
proc_pathThe full path of the process file./usr/local/share/assist-daemon/assist_daemon
pidThe process ID.1692
pnameThe parent process filename.systemd
proc_start_timeThe process startup time.2023-08-18 20:00:12
uidThe process user ID.101
usernameThe username of the process.root

DNS query logs

FieldDescriptionExample
domainThe queried domain name.example.aliyundoc.com
pidThe ID of the process that initiated the query.3544
ppidThe ID of the parent process that initiated the query.3408
cmd_chainThe process chain that initiated the query."3544":"\"C:\\\Program Files (x86)\\\Alibaba\\\Aegis\\\AliDetect\\\AliDetect.exe\""
cmdlineThe command line that initiated the query.C:\Program Files (x86)\Alibaba\Aegis\AliDetect\AliDetect.exe
proc_pathThe path of the process that initiated the query.C:/Program Files (x86)/Alibaba/Aegis/AliDetect/AliDetect.exe
timeThe time the DNS query event was captured. This is generally the same as when the query occurred.2023-08-17 20:05:04

Client event logs

FieldDescriptionExample
agent_versionThe client version.aegis_11_91
last_loginThe timestamp of the last logon, in milliseconds.1716444387617
platformThe operating system type. Values: windows; linux.linux
region_idThe region where the server resides.cn-beijing
statusThe agent status. Values: online; offline.online

Security log fields

Vulnerability logs

  • 1: Unfixed

  • 2: Fix failed

  • 3: Rollback failed

  • 4: Fixing

  • 5: Rolling back

  • 6: Verifying

  • 7: Fixed

  • 8: Fixed, restart required

  • 9: Rolled back

  • 10: Ignored

  • 11: Rolled back, restart required

  • 12: Does not exist

  • 13: Invalid

FieldDescriptionExample
vul_alias_nameThe vulnerability alias.CESA-2023:1335: openssl Security Update
risk_levelThe risk level. Values: asap (High); Later (Medium); nntf (Low).later
extend_contentExtended vulnerability information, in JSON format.{"cveList":["CVE-2023-0286"],...}
internet_ipThe public IP address of the asset.39.104.XX.XX
intranet_ipThe private IP address of the asset.192.168.XX.XX
instance_nameThe hostname.hhht-linux-***
vul_nameThe vulnerability name.centos:7:cesa-2023:1335
operationThe action performed on the vulnerability. Values: new (New); verify (Verify); fix (Fix).new
statusThe vulnerability status. Values: 1 (Unfixed); 2 (Fix failed); 3 (Rollback failed); 4 (Fixing); 5 (Rolling back); 6 (Verifying); 7 (Fixed); 8 (Fixed, restart required); 9 (Rolled back); 10 (Ignored); 11 (Rolled back, restart required); 12 (Does not exist); 13 (Invalid).1
tagThe vulnerability tag. Values: oval (Linux software vulnerability); system (Windows system vulnerability); cms (Web-CMS vulnerability). Tags for other vulnerability types are random strings.oval
typeThe vulnerability type. Values: sys (Windows system vulnerability); cve (Linux software vulnerability); cms (Web-CMS vulnerability); emg (Urgent vulnerability).sys

CSPM - Baseline check logs

FieldDescriptionExample
check_item_nameThe name of the check item.Set minimum interval for password changes
check_item_levelThe check severity level. Values: high; Medium; low.medium
check_typeThe type of the check item.Identity authentication
risk_levelThe risk level. Values: high; medium; low.medium
operationThe operation. Values: new (New); verity (Validation).new
risk_nameThe name of the risk item.Password policy compliance check
statusThe status. Values: 1 (Failed); 2 (Verifying); 6 (Ignored); 7 (Fixing).1
sub_type_alias_nameThe alias of the subtype.International security best practices - Ubuntu 16/18/20/22 security baseline check
sub_type_nameThe baseline subtype name. For valid values, see List of baseline types and subtypes.hc_ubuntu16_cis_rules
type_alias_nameThe alias of the type.International security best practices
type_nameThe baseline type. For valid values, see List of baseline types and subtypes.cis

Security alert logs

FieldDescriptionExample
data_sourceThe data source. Values: aegis_suspicious_event (anomalous host activity); aegis_suspicious_file_v2 (webshell); aegis_login_log (anomalous logon); honeypot (cloud honeypot alert); object_scan (file detection anomaly); security_event (Security Center anomaly); sas_ak_leak (AK leak event).aegis_login_log
detailA JSON object with detailed alert context. Fields vary by alert type. The alert_reason field (reason for anomaly) has these common values: reason1 (IP not from a common logon location); reason2 (API call failed); reason3 (IP not from a common logon location and API call failed).{"loginSourceIp":"221.11.XX.XX","loginDestinationPort":22,...}
internet_ipThe public IP address of the asset.39.104.XX.XX
intranet_ipThe private IP address of the asset.192.168.XX.XX
levelThe alert risk level. Values: serious (Urgent); suspicious (Suspicious); remind (Reminder).suspicious
nameThe alert name.Anomalous Logon - Unusual Account Logon to ECS
operationThe operation. Values: new (New); dealing (Processing); update (Updated).new
statusThe alert status. Values: 1 (Unhandled); 2 (Ignored); 8 (Whitelisted); 16 (Processing); 32 (Processed); 64 (Expired — alerts not processed within 30 days); 513 (Automatically blocked by the precise defense feature).1
unique_infoThe unique identifier of the alert.2536dd765f804916a1fa3b9516b5****
suspicious_event_idThe alert event ID.650226318
handle_timeThe timestamp of the operation.1765272845
alert_first_timeThe timestamp when the alert first occurred.1764226915
alert_last_timeThe timestamp when the alert last occurred.1765273425
strict_modeWhether this is a strict mode alert. Values: true; false.true
user_idThe account ID.1358******3357

CSPM - Cloud platform configuration check logs

FieldDescriptionExample
check_idThe check item ID. To get this ID, call the ListCheckResult operation.11
check_item_nameThe name of the check item.Origin fetch configuration
instance_nameThe instance name.lsm
instance_resultThe impact of the risk, as a JSON string.{"Checks":[{}],...}
instance_sub_typeThe instance subtype. Values depend on instance_type: for ECSINSTANCE, DISK, SECURITY_GROUP; for ACRREPOSITORY_ENTERPRISE, REPOSITORY_PERSON; for RAMALIAS, USER, POLICY, GROUP; for WAFDOMAIN; for all others — INSTANCE.INSTANCE
instance_typeThe instance type. Values: ECS; SLB; RDS; MONGODB; KVSTORE (Redis); ACR (Container Registry); CSK; VPC; ActionTrail; CDN; CAS (Certificate Management Service); RDC (Apsara DevOps); RAM; DDOS (Anti-DDoS); WAF; OSS; POLARDB; POSTGRESQL; MSE (Microservices Engine); NAS; SDDP (Sensitive Data Discovery and Protection); EIP.ECS
region_idThe region where the instance resides.cn-hangzhou
requirement_idThe requirement ID. To get this ID, call the ListCheckStandard operation.5
risk_levelThe risk level. Values: LOW; MEDIUM; HIGH.MEDIUM
section_idThe section ID. To get this ID, call the ListCheckResult operation.1
standard_idThe standard ID. To get this ID, call the ListCheckStandard operation.1
statusThe check item status. Values: NOT_CHECK (Not checked); CHECKING (Checking); PASS (Passed); NOT_PASS (Failed); WHITELIST (Whitelisted).PASS
vendorThe cloud service provider. Fixed value: ALIYUN.ALIYUN

Network defense logs

FieldDescriptionExample
cmdThe command line of the attacked process.nginx: master process nginx
cur_timeThe time the attack event occurred.2023-09-14 09:21:59
decode_payloadThe payload converted from HEX to characters.POST /Services/FileService/UserFiles/
dst_ipThe IP address of the attacked asset.172.16.XX.XX
dst_portThe port of the attacked asset.80
funcThe type of the intercepted event. Values: payload (malicious payload detected); tuple (malicious IP access detected).payload
rule_typeThe defense rule type. Values: alinet_payload (payload event rule); alinet_tuple (tuple event rule).alinet_payload
internet_ipThe public IP address of the attacked asset.39.104.XX.XX
intranet_ipThe private IP address of the attacked asset.192.168.XX.XX
final_actionThe defense action. Fixed value: block.block
payloadThe payload in HEX format.504f5354...****
pidThe ID of the attacked process.7107
platformThe OS type of the attacked asset. Values: windows; linux.linux
proc_pathThe path of the attacked process./usr/sbin/nginx
src_ipThe source IP address of the attack.106.11.XX.XX
src_portThe source port of the attack.29575

Application protection logs

FieldDescriptionExample
app_dirThe directory where the application resides./usr/local/aegis/rasp/apps/1111
app_idThe application ID.6492a391fc9b4e2aad94****
app_nameThe application name.test
confidence_levelThe detection algorithm confidence level. Values: high; medium; low.low
request_bodyThe request body.{"@type":"_com.sun.rowset.JdbcRowSetImpl_",...}
request_content_lengthThe length of the request body.112
dataThe hook point parameters.{"cmd":"bash -c kill -0 -- -'31098' "}
headersThe request headers.{"content-length":"112",...}
hostnameThe name of the host or network device.testhostname
host_ipThe private IP address of the host.172.16.XX.XX
is_clipedWhether the log was truncated because it was too long. Values: true (truncated); false (not truncated).false
jdk_versionThe JDK version.1.8.0_292
messageThe alert description.Unsafe class serial.
request_methodThe HTTP request method.Post
platformThe operating system type.Linux
archThe operating system architecture.amd64
kernel_versionThe operating system kernel version.3.10.0-1160.59.1.el7.x86_64
paramThe request parameters (GET parameters or application/x-www-form-urlencoded).{"url":["http://127.0.0.1.xip.io"]}
payloadThe effective attack payload.bash -c kill -0 -- -'31098'
payload_lengthThe length of the attack payload.27
rasp_idThe unique ID of the RASP probe.fa00223c8420e256c0c98ca0bd0d****
rasp_versionThe RASP probe version.0.8.5
src_ipThe IP address of the requester.172.0.XX.XX
final_actionThe alert handling result. Values: block (blocked); monitor (monitoring only).block
rule_actionThe alert handling method defined by the rule. Values: block; monitor.block
risk_levelThe risk level. Values: High; medium; low.high
stacktraceThe stack trace.[java.io.FileInputStream.<init>(FileInputStream.java:123),...]
timeThe time the alert was triggered.2023-10-09 15:19:15
timestampThe timestamp when the alert was triggered, in milliseconds.1696835955070
typeThe attack type. Values: attach (malicious attachment); beans (malicious beans binding); classloader (malicious class loading); dangerous_protocol (dangerous protocol); dns (malicious DNS query); engine (engine injection); expression (expression injection); file (malicious file read/write); file_delete (arbitrary file deletion); file_list (directory traversal); file_read (arbitrary file read); file_upload (malicious file upload); jndi (JNDI injection); jni (JNI injection); jstl (JSTL arbitrary file inclusion); memory_shell (in-memory webshell injection); rce (remote code execution); read_object (deserialization attack); reflect (malicious reflection call); sql (SQL injection); ssrf (malicious outbound connection); thread_inject (thread injection); xxe (XXE attack).rce
urlThe request URL.http://127.0.0.1:999/xxx
rasp_attack_uuidThe UUID of the attack event.18823b23-7ad4-47c0-b5ac-e5f036a2****
internet_ipThe public IP address of the host.1.2.XX.XX
intranet_ipThe private IP address of the host.172.16.XX.XX

Malware detection logs

FieldDescriptionExample
bucket_nameThe OSS bucket name.***-test
event_idThe alert ID.802210
event_nameThe alert name.Mining program
md5The MD5 hash of the file.6bc2bc******53d409b1
sha256The SHA256 hash of the file.f038f9525******7772981e87f85
resultThe detection result. Values: 0 (safe); 1 (malicious file detected).0
file_pathThe file path.test.zip/bin_test
etagThe OSS file identifier.6BC2B******853D409B1
risk_levelThe risk level. Values: serious (Urgent); suspicious (Suspicious); remind (Reminder).remind
sourceThe detection scenario. Values: OSS (file detection in an OSS bucket via the Security Center console); API (malicious file detection via the Java or Python SDK).OSS
parent_md5The MD5 hash of the parent file or archive.3d0f8045bb9******
parent_sha256The SHA256 hash of the parent file or archive.69b643d6******a3fb859fa
parent_file_pathThe name of the parent file or archive.test.zip
compress_file_numberThe position of this file in the archive, in the format [current]/[total].1/10 (this is file 1 of 10 in the archive)

Core file monitoring event logs

FieldDescriptionExample
file_pathThe file path./etc/passwd
proc_pathThe process path./usr/bin/bash
rule_idThe ID of the rule that was triggered.123
rule_nameThe rule name.file_test_rule
cmdlineThe command line.bash /opt/a
operationThe file operation type.READ
risk_levelThe alert level.2
pidThe process ID.45324
proc_permissionThe process permissions.rwxrwxrwx
internet_ipThe public IP address.192.0.2.1
intranet_ipThe private IP address.172.16.0.1
instance_nameThe instance name.aegis-test
platformThe operating system type.Linux

Agentless detection logs

Agentless detection logs share a set of common fields across all subtypes, plus subtype-specific fields.

Common fields

FieldDescriptionExample
internet_ipThe public IP address of the asset.39.104.XX.XX
intranet_ipThe private IP address of the asset.192.168.XX.XX

Vulnerability risk fields

FieldDescriptionExample
vul_nameThe vulnerability name.imgsca:java:gson:AVD-2022-25647
vul_alias_nameThe vulnerability alias.gson code issue vulnerability (CVE-2022-25647)
vul_primary_idThe primary key ID of the vulnerability.990174361
typeThe vulnerability type. Values: sys (Windows system vulnerability); cve (Linux software vulnerability); sca (application vulnerability, software component analysis type); emg (urgent vulnerability).sca
alert_levelThe vulnerability risk level. Values: asap (High); Later (Medium); nntf (Low).asap
instance_nameThe hostname.hhht-linux-***
operationThe action. Values: new (New); update (Updated).new
statusThe vulnerability status. Values: 1 (Unfixed); 7 (Fixed).1
tagThe vulnerability tag. Values: oval (Linux software vulnerability); system (Windows system vulnerability). Tags for other vulnerability types are random strings.oval

Baseline check fields

FieldDescriptionExample
check_item_nameThe name of the check item.Set password expiration time
check_item_levelThe check item severity. Values: high; medium; low.high
check_typeThe type of check item.Identity authentication
risk_levelThe risk level. Values: high; medium; low.low
operationThe action. Values: new (New); update (Updated).new
risk_nameThe name of the risk item.Password policy compliance check
statusThe check item status. Values: 1 (Failed); 3 (Passed).1
sub_type_alias_nameThe alias of the subtype.Alibaba Cloud standard - CentOS Linux 7/8 security baseline
sub_type_nameThe baseline subtype name. For valid values, see List of baseline types and subtypes.hc_centos7
type_nameThe baseline type name.hc_best_secruity
type_alias_nameThe alias of the type.Best practices
container_idThe container ID.b564567427272d46f9b1cc4ade06a85fdf55075c06fdb870818d5925fa86****
container_nameThe container name.k8s_gamify-answer-bol_gamify-answer-bol-5-6876d5dc78-vf6rb_study-gamify-answer-bol_483a1ed1-28b7-11eb-bc35-00163e01****_0

Malicious sample fields

FieldDescriptionExample
alert_levelThe risk level. Values: serious (Urgent); suspicious (Suspicious); remind (Reminder).suspicious
alert_nameThe name of the malicious sample alert.Suspicious Process - SSH-based
operationThe action. Values: new (New); update (Updated).new
statusThe risk status. Values: 0 (Unhandled); 3 (Whitelisted).0
suspicious_event_idThe alert event ID.909361

Sensitive file fields

FieldDescriptionExample
alert_levelThe risk level. Values: high; medium; low.high
rule_nameThe file type name.Ionic token
file_pathThe path of the sensitive file./Windows/Microsoft.NET/assembly/GAC_MSIL/System.WorkflowServices/...
resultThe check result.{"result":"[\"[\\\\\"mysql-uqjtwadmin-xxx"}

Appendix

List of baseline types and subtypes

Type nameSubtype nameDescription
hc_exploithc_exploit_redisImportant threat exploit: Unauthorized access to Redis
hc_exploit_activemqImportant threat exploit: Unauthorized access to ActiveMQ
hc_exploit_couchdbImportant threat exploit: Unauthorized access to CouchDB
hc_exploit_dockerImportant threat exploit: Unauthorized access to Docker
hc_exploit_esImportant threat exploit: Unauthorized access to Elasticsearch
hc_exploit_hadoopImportant threat exploit: Unauthorized access to Hadoop
hc_exploit_jbossImportant threat exploit: Unauthorized access to JBoss
hc_exploit_jenkinsImportant threat exploit: Unauthorized access to Jenkins
hc_exploit_k8s_apiImportant threat exploit: Unauthorized access to Kubernetes API server
hc_exploit_ldapImportant threat exploit: Unauthorized access to LDAP (Windows)
hc_exploit_ldap_linuxImportant threat exploit: Unauthorized access to OpenLDAP (Linux)
hc_exploit_memcacheImportant threat exploit: Unauthorized access to Memcached
hc_exploit_mongoImportant threat exploit: Unauthorized access to MongoDB
hc_exploit_pgsqlImportant threat exploit: Unauthorized access to PostgreSQL
hc_exploit_rabbitmqImportant threat exploit: Unauthorized access to RabbitMQ
hc_exploit_rsyncImportant threat exploit: Unauthorized access to rsync
hc_exploit_tomcatImportant threat exploit: Apache Tomcat AJP file inclusion vulnerability
hc_exploit_zookeeperImportant threat exploit: Unauthorized access to ZooKeeper
hc_containerhc_dockerAlibaba Cloud standard: Docker security baseline check
hc_middleware_ack_masterInternational security best practices: Kubernetes (ACK) master node security baseline check
hc_middleware_ack_nodeInternational security best practices: Kubernetes (ACK) node security baseline check
hc_middleware_k8sAlibaba Cloud standard: Kubernetes master node security baseline check
hc_middleware_k8s_nodeAlibaba Cloud standard: Kubernetes node security baseline check
cishc_suse 15_djbhMLPS 2.0 Level 3: SUSE 15 compliance baseline check
hc_aliyun_linux3_djbh_l3MLPS 2.0 Level 3: Alibaba Cloud Linux 3 compliance baseline check
hc_aliyun_linux_djbh_l3MLPS 2.0 Level 3: Alibaba Cloud Linux/Aliyun Linux 2 compliance baseline check
hc_bind_djbhMLPS 2.0 Level 3: Bind compliance baseline check
hc_centos 6_djbh_l3MLPS 2.0 Level 3: CentOS Linux 6 compliance baseline check
hc_centos 7_djbh_l3MLPS 2.0 Level 3: CentOS Linux 7 compliance baseline check
hc_centos 8_djbh_l3MLPS 2.0 Level 3: CentOS Linux 8 compliance baseline check
hc_debian_djbh_l3MLPS 2.0 Level 3: Debian Linux 8/9/10 compliance baseline check
hc_iis_djbhMLPS 2.0 Level 3: IIS compliance baseline check
hc_informix_djbhMLPS 2.0 Level 3: Informix compliance baseline check
hc_jboss_djbhMLPS 2.0 Level 3: JBoss compliance baseline check
hc_mongo_djbhMLPS 2.0 Level 3: MongoDB compliance baseline check
hc_mssql_djbhMLPS 2.0 Level 3: SQL Server compliance baseline check
hc_mysql_djbhMLPS 2.0 Level 3: MySQL compliance baseline check
hc_nginx_djbhMLPS 2.0 Level 3: Nginx compliance baseline check
hc_oracle_djbhMLPS 2.0 Level 3: Oracle compliance baseline check
hc_pgsql_djbhMLPS 2.0 Level 3: PostgreSQL compliance baseline check
hc_redhat 6_djbh_l3MLPS 2.0 Level 3: Red Hat Linux 6 compliance baseline check
hc_redhat_djbh_l3MLPS 2.0 Level 3: Red Hat Linux 7 compliance baseline check
hc_redis_djbhMLPS 2.0 Level 3: Redis compliance baseline check
hc_suse 10_djbh_l3MLPS 2.0 Level 3: SUSE 10 compliance baseline check
hc_suse 12_djbh_l3MLPS 2.0 Level 3: SUSE 12 compliance baseline check
hc_suse_djbh_l3MLPS 2.0 Level 3: SUSE 11 compliance baseline check
hc_ubuntu 14_djbh_l3MLPS 2.0 Level 3: Ubuntu 14 compliance baseline check
hc_ubuntu_djbh_l3MLPS 2.0 Level 3: Ubuntu 16/18/20 compliance baseline check
hc_was_djbhMLPS 2.0 Level 3: WebSphere Application Server compliance baseline check
hc_weblogic_djbhMLPS 2.0 Level 3: WebLogic compliance baseline check
hc_win 2008_djbh_l3MLPS 2.0 Level 3: Windows 2008 R2 compliance baseline check
hc_win 2012_djbh_l3MLPS 2.0 Level 3: Windows 2012 R2 compliance baseline check
hc_win 2016_djbh_l3MLPS 2.0 Level 3: Windows 2016/2019 compliance baseline check
hc_aliyun_linux_djbh_l2MLPS 2.0 Level 2: Alibaba Cloud Linux/Aliyun Linux 2 compliance baseline check
hc_centos 6_djbh_l2MLPS 2.0 Level 2: CentOS Linux 6 compliance baseline check
hc_centos 7_djbh_l2MLPS 2.0 Level 2: CentOS Linux 7 compliance baseline check
hc_debian_djbh_l2MLPS 2.0 Level 2: Debian Linux 8 compliance baseline check
hc_redhat 7_djbh_l2MLPS 2.0 Level 2: Red Hat Linux 7 compliance baseline check
hc_ubuntu_djbh_l2MLPS 2.0 Level 2: Ubuntu 16/18 compliance baseline check
hc_win 2008_djbh_l2MLPS 2.0 Level 2: Windows 2008 R2 compliance baseline check
hc_win 2012_djbh_l2MLPS 2.0 Level 2: Windows 2012 R2 compliance baseline check
hc_win 2016_djbh_l2MLPS 2.0 Level 2: Windows 2016/2019 compliance baseline check
hc_aliyun_linux_cisInternational security best practices: Alibaba Cloud Linux/Aliyun Linux 2 security baseline check
hc_centos 6_cis_rulesInternational security best practices: CentOS Linux 6 security baseline check
hc_centos 7_cis_rulesInternational security best practices: CentOS Linux 7 security baseline check
hc_centos 8_cis_rulesInternational security best practices: CentOS Linux 8 security baseline check
hc_debian 8_cis_rulesInternational security best practices: Debian Linux 8 security baseline check
hc_ubuntu 14_cis_rulesInternational security best practices: Ubuntu 14 security baseline check
hc_ubuntu 16_cis_rulesInternational security best practices: Ubuntu 16/18/20 security baseline check
hc_win 2008_cis_rulesInternational security best practices: Windows Server 2008 R2 security baseline check
hc_win 2012_cis_rulesInternational security best practices: Windows Server 2012 R2 security baseline check
hc_win 2016_cis_rulesInternational security best practices: Windows Server 2016/2019 security baseline check
hc_kylin_djbh_l3MLPS 2.0 Level 3: Kylin compliance baseline check
hc_uos_djbh_l3MLPS 2.0 Level 3: UOS compliance baseline check
hc_best_securityhc_aliyun_linuxAlibaba Cloud standard: Alibaba Cloud Linux/Aliyun Linux 2 security baseline check
hc_centos 6Alibaba Cloud standard: CentOS Linux 6 security baseline check
hc_centos 7Alibaba Cloud standard: CentOS Linux 7/8 security baseline check
hc_debianAlibaba Cloud standard: Debian Linux 8/9/10 security baseline check
hc_redhat 6Alibaba Cloud standard: Red Hat Linux 6 security baseline check
hc_redhat 7Alibaba Cloud standard: Red Hat Linux 7/8 security baseline check
hc_ubuntuAlibaba Cloud standard: Ubuntu security baseline check
hc_windows_2008Alibaba Cloud standard: Windows 2008 R2 security baseline check
hc_windows_2012Alibaba Cloud standard: Windows 2012 R2 security baseline check
hc_windows_2016Alibaba Cloud standard: Windows 2016/2019 security baseline check
hc_db_mssqlAlibaba Cloud standard: SQL Server security baseline check
hc_memcached_aliAlibaba Cloud standard: Memcached security baseline check
hc_mongodbAlibaba Cloud standard: MongoDB 3.x security baseline check
hc_mysql_aliAlibaba Cloud standard: MySQL security baseline check
hc_oracleAlibaba Cloud standard: Oracle 11g security baseline check
hc_pgsql_aliAlibaba Cloud standard: PostgreSQL security baseline check
hc_redis_aliAlibaba Cloud standard: Redis security baseline check
hc_apacheAlibaba Cloud standard: Apache security baseline check
hc_iis_8Alibaba Cloud standard: IIS 8 security baseline check
hc_nginx_linuxAlibaba Cloud standard: Nginx security baseline check
hc_suse 15Alibaba Cloud standard: SUSE Linux 15 security baseline check
tomcat 7Alibaba Cloud standard: Apache Tomcat security baseline check
weak_passwordhc_mongodb_pwdWeak password: MongoDB logon weak password detection (version 2.x)
hc_weakpwd_ftp_linuxWeak password: FTP logon weak password check
hc_weakpwd_linux_sysWeak password: Linux system logon weak password check
hc_weakpwd_mongodb 3Weak password: MongoDB logon weak password detection
hc_weakpwd_mssqlWeak password: SQL Server database logon weak password check
hc_weakpwd_mysql_linuxWeak password: MySQL database logon weak password check
hc_weakpwd_mysql_winWeak password: MySQL database logon weak password check (Windows)
hc_weakpwd_openldapWeak password: OpenLDAP logon weak password check
hc_weakpwd_oracleWeak password: Oracle logon weak password detection
hc_weakpwd_pgsqlWeak password: PostgreSQL database logon weak password check
hc_weakpwd_pptpWeak password: pptpd service logon weak password check
hc_weakpwd_redis_linuxWeak password: Redis database logon weak password check
hc_weakpwd_rsyncWeak password: rsync service logon weak password check
hc_weakpwd_svnWeak password: SVN service logon weak password check
hc_weakpwd_tomcat_linuxWeak password: Apache Tomcat console weak password check
hc_weakpwd_vncWeak password: VNC Server weak password check
hc_weakpwd_weblogicWeak password: WebLogic 12c logon weak password detection
hc_weakpwd_win_sysWeak password: Windows system logon weak password check