Skip to content

Microsoft Sentinel

Overview

  • Vendor: Microsoft
  • Supported environment: SaaS
  • Detection based on: Alerts
  • Supported application or feature:
    • Incidents

Microsoft Sentinel is a cloud-native security information and event management (SIEM) service that provides intelligent security analytics for your entire enterprise at cloud scale. Get immediate visibility into your cloud, on-premises, and hybrid environments. Detect and respond to threats with built-in machine learning and artificial intelligence.

Warning

Important note - This format is currently in beta. We highly value your feedback to improve its performance.

Specification

Prerequisites

  • Resource:

    • Azure cloud tenant
    • Microsoft Sentinel instance
  • Permissions:

    • Administrator permissions to the Azure instance

Transport Protocol/Method

  • HTTP/HTTPS for SaaS

Logs details

  • Supported functionalities: See section Overview
  • Supported type(s) of structure: JSON
  • Supported verbosity level: Alert

Step-by-Step Configuration Procedure

Create an api key

Create an Azure application

  1. On the Azure Portal, in the search bar, go to App registrations

App registrations button

  1. Click + New registration
  2. Type a name
  3. Select Accounts in this organizational directory only option as account type
  4. Click Register
  5. From the Overview page, copy Application (client) ID and Directory (tenant) ID

IDs

Create a client secret

  1. Go to Manage > Certificates & secrets

Certificats and secrets

  1. Click + New client secret

Client secret button

  1. Type a description and select the desirated expiration period

Client secret configuration

  1. Click Add
  2. Copy the Value of the client secret

Add role to the app

  1. In the search bar, go to Subscriptions
  2. Click on one of your subscriptions
  3. On the right panel, Click Access control (IAM)
  4. Click + Add > Add role assignement
  5. In the job function roles sub-tab, search for Microsoft Sentinel Contributor and select it
  6. Click Next
  7. Select User, group or service principal as access
  8. Click + Select members
  9. Type the name of the Azure application created previously, select it and click Select
  10. Click Review + assign
  11. In the Overview part, you can find the Subscription ID

Subscription ID

Note

  • You can find the workspacename on the Overview page under name when you create your Microsoft Sentinel instance.
  • The resourcegroup depends on the resource group in which you placed your instance. You can also find this on the Overview page under Resource Group. Microsoft Sentinel Overview page

Create the intake

Go to the intake page and create a new intake from the format Microsoft Sentinel.

Raw Events Samples

In this section, you will find examples of raw logs as generated natively by the source. These examples are provided to help integrators understand the data format before ingestion into Sekoia.io. It is crucial for setting up the correct parsing stages and ensuring that all relevant information is captured.

{
    "additional_properties": {},
    "id": "/subscriptions/f1fa95bf-0000-0000-0000-910a79dc1f7b/resourceGroups/test/providers/Microsoft.OperationalInsights/workspaces/Test/providers/Microsoft.SecurityInsights/Incidents/13000000-0000-0000-0000-9b8460000000",
    "name": "13000000-0000-0000-0000-9b8460000000",
    "type": "Microsoft.SecurityInsights/Incidents",
    "system_data": null,
    "etag": "2e002c01-0000-0d00-0000-67a000000000",
    "additional_data": {
        "additional_properties": {},
        "alerts_count": 0,
        "bookmarks_count": 0,
        "comments_count": 0,
        "alert_product_names": [],
        "tactics": []
    },
    "classification": "FalsePositive",
    "classification_comment": "Not a malicious activity",
    "classification_reason": "IncorrectAlertLogic",
    "created_time_utc": "2025-02-03T13:32:12.236416+00:00",
    "description": "connector test",
    "incident_url": "https://portal.azure.com/#asset/Microsoft_Azure_Security_Insights/Incident/subscriptions/f1fa95bf-0000-0000-0000-910a79dc1f7b/resourceGroups/test/providers/Microsoft.OperationalInsights/workspaces/Test/providers/Microsoft.SecurityInsights/Incidents/13000000-0000-0000-0000-9b8460000000",
    "incident_number": 11,
    "labels": [
        {
            "additional_properties": {},
            "label_name": "test",
            "label_type": "User"
        }
    ],
    "last_activity_time_utc": "2025-02-03T13:32:11.509000+00:00",
    "last_modified_time_utc": "2025-02-03T13:32:12.236416+00:00",
    "owner": {
        "additional_properties": {},
        "assigned_to": "joe doe",
        "email": "joe.doe@test.com",
        "user_principal_name": "joe.doe@test.com",
        "object_id": "40f54000-0000-0000-0000-4c990e00000000"
    },
    "related_analytic_rule_ids": [],
    "severity": "Medium",
    "status": "New",
    "title": "test 11"
}
{
    "additional_properties": {},
    "id": "/subscriptions/f1fa95bf-631e-48e9-bbc7-910a79dc1f7b/resourceGroups/test/providers/Microsoft.OperationalInsights/workspaces/Test/providers/Microsoft.SecurityInsights/Incidents/2f880001-0000-0000-0000-30000d1a3000",
    "name": "2f880001-0000-0000-0000-30000d1a3000",
    "type": "Microsoft.SecurityInsights/Incidents",
    "system_data": null,
    "etag": "2d001bf8-0000-0d00-0000-67a000000000",
    "additional_data": {
        "additional_properties": {},
        "alerts_count": 0,
        "bookmarks_count": 0,
        "comments_count": 0,
        "alert_product_names": [],
        "tactics": []
    },
    "classification": null,
    "classification_comment": null,
    "classification_reason": null,
    "created_time_utc": "2025-02-03T13:29:41.551768+00:00",
    "description": "connector test",
    "incident_url": "https://portal.azure.com/#asset/Microsoft_Azure_Security_Insights/Incident/subscriptions/f1fa95bf-631e-48e9-bbc7-910a79dc1f7b/resourceGroups/test/providers/Microsoft.OperationalInsights/workspaces/Test/providers/Microsoft.SecurityInsights/Incidents/2f884fd1-aa45-4d80-8118-30accd1a389b",
    "incident_number": 10,
    "labels": [
        {
            "additional_properties": {},
            "label_name": "test",
            "label_type": "User"
        }
    ],
    "last_activity_time_utc": "2025-02-03T13:29:40.831000+00:00",
    "last_modified_time_utc": "2025-02-03T13:29:41.551768+00:00",
    "owner": {
        "additional_properties": {},
        "assigned_to": "joe doe",
        "email": "joe.doe@test.com",
        "user_principal_name": "joe.doe@test.com",
        "object_id": "40f54fde-0000-0000-0000-4c990e00000000"
    },
    "related_analytic_rule_ids": [],
    "severity": "Medium",
    "status": "New",
    "title": "test 10"
}
{
    "additional_properties": {},
    "id": "/subscriptions/f1fa95bf-631e-48e9-bbc7-910a79dc1f7b/resourceGroups/test/providers/Microsoft.OperationalInsights/workspaces/Test/providers/Microsoft.SecurityInsights/Incidents/368693b4-8d49-4bd7-ac9c-a6f1f2232a9a",
    "name": "368693b4-8888-4444-cccc-aafff2232292",
    "type": "Microsoft.SecurityInsights/Incidents",
    "system_data": null,
    "etag": "\"5b022666-0000-0d00-0000-ccb5cccc0000\"",
    "additional_data": {
        "additional_properties": {},
        "alerts_count": 0,
        "bookmarks_count": 0,
        "comments_count": 0,
        "alert_product_names": [],
        "tactics": []
    },
    "classification": null,
    "classification_comment": null,
    "classification_reason": null,
    "created_time_utc": "2025-02-19T11:36:38.757960+00:00",
    "description": ":D",
    "incident_url": "https://portal.azure.com/#asset/Microsoft_Azure_Security_Insights/Incident/subscriptions/f1fa95bf-631e-48e9-bbc7-910a79dc1f7b/resourceGroups/test/providers/Microsoft.OperationalInsights/workspaces/Test/providers/Microsoft.SecurityInsights/Incidents/36666344-8888-bbbb-cccc-a111fff3339a",
    "incident_number": 14,
    "labels": [
        {
            "additional_properties": {},
            "label_name": "test_label",
            "label_type": "User"
        }
    ],
    "last_activity_time_utc": "2025-02-19T11:36:38.207000+00:00",
    "last_modified_time_utc": "2025-02-19T11:36:38.757960+00:00",
    "owner": {
        "additional_properties": {},
        "assigned_to": null,
        "email": null,
        "user_principal_name": null,
        "object_id": null
    },
    "related_analytic_rule_ids": [],
    "severity": "Low",
    "status": "Active",
    "title": "Test 22"
}
{
    "additional_properties": {},
    "id": "/subscriptions/f1fa95bf-631e-48e9-bbc7-910a79dc1f7b/resourceGroups/integration/providers/Microsoft.OperationalInsights/workspaces/Integration/providers/Microsoft.SecurityInsights/Incidents/368693b4-8d49-4bd7-ac9c-a6f1f2232a9a",
    "name": "368693b4-8d49-4bd7-ac9c-a6f1f2232a9a",
    "type": "Microsoft.SecurityInsights/Incidents",
    "system_data": null,
    "etag": "\"5b02465b-0000-0d00-0000-67b5c2460000\"",
    "additional_data": {
        "additional_properties": {},
        "alerts_count": 0,
        "bookmarks_count": 0,
        "comments_count": 0,
        "alert_product_names": [],
        "tactics": []
    },
    "classification": null,
    "classification_comment": null,
    "classification_reason": null,
    "created_time_utc": "2025-02-19T11:36:38.757960+00:00",
    "description": ":D",
    "incident_url": "https://portal.azure.com/#asset/Microsoft_Azure_Security_Insights/Incident/subscriptions/f1fa95bf-631e-48e9-bbc7-910a79dc1f7b/resourceGroups/integration/providers/Microsoft.OperationalInsights/workspaces/Integration/providers/Microsoft.SecurityInsights/Incidents/368693b4-8d49-4bd7-ac9c-a6f1f2232a9a",
    "incident_number": 14,
    "labels": [
        {
            "additional_properties": {},
            "label_name": "tagada",
            "label_type": "User"
        }
    ],
    "last_activity_time_utc": "2025-02-19T11:36:38.207000+00:00",
    "last_modified_time_utc": "2025-02-19T11:36:38.757960+00:00",
    "owner": {
        "additional_properties": {},
        "assigned_to": null,
        "email": null,
        "user_principal_name": null,
        "object_id": null
    },
    "related_analytic_rule_ids": [],
    "severity": "Low",
    "status": "Active",
    "title": "Test 22"
}

Detection section

The following section provides information for those who wish to learn more about the detection capabilities enabled by collecting this intake. It includes details about the built-in rule catalog, event categories, and ECS fields extracted from raw events. This is essential for users aiming to create custom detection rules, perform hunting activities, or pivot in the events page.

No related built-in rules was found. This message is automatically generated.

Event Categories

The following table lists the data source offered by this integration.

Data Source Description
Office 365 account logs Activity logs that provide data related to user accounts in Office 365.
Office 365 audit logs Logs that detail actions taken by users and admins within Office 365 applications.
Office 365 trace logs Logs that help in troubleshooting and monitoring the performance of Office 365 services.
Third-party application logs Logs from applications not developed by Microsoft that can report security-relevant events.
Windows event logs Logs generated by Windows systems that provide crucial information about system events, errors, and security.
Web application firewall logs Security logs related to the actions of a web application firewall protecting a web applications.

In details, the following table denotes the type of events produced by this integration.

Name Values
Kind alert
Category intrusion_detection
Type info

Transformed Events Samples after Ingestion

This section demonstrates how the raw logs will be transformed by our parsers. It shows the extracted fields that will be available for use in the built-in detection rules and hunting activities in the events page. Understanding these transformations is essential for analysts to create effective detection mechanisms with custom detection rules and to leverage the full potential of the collected data.

{
    "message": "{\"additional_properties\":{},\"id\":\"/subscriptions/f1fa95bf-0000-0000-0000-910a79dc1f7b/resourceGroups/test/providers/Microsoft.OperationalInsights/workspaces/Test/providers/Microsoft.SecurityInsights/Incidents/13000000-0000-0000-0000-9b8460000000\",\"name\":\"13000000-0000-0000-0000-9b8460000000\",\"type\":\"Microsoft.SecurityInsights/Incidents\",\"system_data\":null,\"etag\":\"2e002c01-0000-0d00-0000-67a000000000\",\"additional_data\":{\"additional_properties\":{},\"alerts_count\":0,\"bookmarks_count\":0,\"comments_count\":0,\"alert_product_names\":[],\"tactics\":[]},\"classification\":\"FalsePositive\",\"classification_comment\":\"Not a malicious activity\",\"classification_reason\":\"IncorrectAlertLogic\",\"created_time_utc\":\"2025-02-03T13:32:12.236416+00:00\",\"description\":\"connector test\",\"incident_url\":\"https://portal.azure.com/#asset/Microsoft_Azure_Security_Insights/Incident/subscriptions/f1fa95bf-0000-0000-0000-910a79dc1f7b/resourceGroups/test/providers/Microsoft.OperationalInsights/workspaces/Test/providers/Microsoft.SecurityInsights/Incidents/13000000-0000-0000-0000-9b8460000000\",\"incident_number\":11,\"labels\":[{\"additional_properties\":{},\"label_name\":\"test\",\"label_type\":\"User\"}],\"last_activity_time_utc\":\"2025-02-03T13:32:11.509000+00:00\",\"last_modified_time_utc\":\"2025-02-03T13:32:12.236416+00:00\",\"owner\":{\"additional_properties\":{},\"assigned_to\":\"joe doe\",\"email\":\"joe.doe@test.com\",\"user_principal_name\":\"joe.doe@test.com\",\"object_id\":\"40f54000-0000-0000-0000-4c990e00000000\"},\"related_analytic_rule_ids\":[],\"severity\":\"Medium\",\"status\":\"New\",\"title\":\"test 11\"}",
    "event": {
        "category": [
            "intrusion_detection"
        ],
        "end": "2025-02-03T13:32:12.236416Z",
        "kind": "alert",
        "reason": "connector test",
        "type": [
            "info"
        ],
        "url": "https://portal.azure.com/#asset/Microsoft_Azure_Security_Insights/Incident/subscriptions/f1fa95bf-0000-0000-0000-910a79dc1f7b/resourceGroups/test/providers/Microsoft.OperationalInsights/workspaces/Test/providers/Microsoft.SecurityInsights/Incidents/13000000-0000-0000-0000-9b8460000000"
    },
    "@timestamp": "2025-02-03T13:32:12.236416Z",
    "log": {
        "level": "Medium"
    },
    "microsoft": {
        "sentinel": {
            "classification": {
                "comment": "Not a malicious activity",
                "reason": "IncorrectAlertLogic",
                "type": "FalsePositive"
            },
            "incident": {
                "number": "11"
            },
            "status": "New",
            "title": "test 11"
        }
    },
    "observer": {
        "product": "Sentinel",
        "vendor": "Microsoft"
    },
    "user": {
        "email": "joe.doe@test.com"
    }
}
{
    "message": "{\"additional_properties\":{},\"id\":\"/subscriptions/f1fa95bf-631e-48e9-bbc7-910a79dc1f7b/resourceGroups/test/providers/Microsoft.OperationalInsights/workspaces/Test/providers/Microsoft.SecurityInsights/Incidents/2f880001-0000-0000-0000-30000d1a3000\",\"name\":\"2f880001-0000-0000-0000-30000d1a3000\",\"type\":\"Microsoft.SecurityInsights/Incidents\",\"system_data\":null,\"etag\":\"2d001bf8-0000-0d00-0000-67a000000000\",\"additional_data\":{\"additional_properties\":{},\"alerts_count\":0,\"bookmarks_count\":0,\"comments_count\":0,\"alert_product_names\":[],\"tactics\":[]},\"classification\":null,\"classification_comment\":null,\"classification_reason\":null,\"created_time_utc\":\"2025-02-03T13:29:41.551768+00:00\",\"description\":\"connector test\",\"incident_url\":\"https://portal.azure.com/#asset/Microsoft_Azure_Security_Insights/Incident/subscriptions/f1fa95bf-631e-48e9-bbc7-910a79dc1f7b/resourceGroups/test/providers/Microsoft.OperationalInsights/workspaces/Test/providers/Microsoft.SecurityInsights/Incidents/2f884fd1-aa45-4d80-8118-30accd1a389b\",\"incident_number\":10,\"labels\":[{\"additional_properties\":{},\"label_name\":\"test\",\"label_type\":\"User\"}],\"last_activity_time_utc\":\"2025-02-03T13:29:40.831000+00:00\",\"last_modified_time_utc\":\"2025-02-03T13:29:41.551768+00:00\",\"owner\":{\"additional_properties\":{},\"assigned_to\":\"joe doe\",\"email\":\"joe.doe@test.com\",\"user_principal_name\":\"joe.doe@test.com\",\"object_id\":\"40f54fde-0000-0000-0000-4c990e00000000\"},\"related_analytic_rule_ids\":[],\"severity\":\"Medium\",\"status\":\"New\",\"title\":\"test 10\"}",
    "event": {
        "category": [
            "intrusion_detection"
        ],
        "end": "2025-02-03T13:29:41.551768Z",
        "kind": "alert",
        "reason": "connector test",
        "type": [
            "info"
        ],
        "url": "https://portal.azure.com/#asset/Microsoft_Azure_Security_Insights/Incident/subscriptions/f1fa95bf-631e-48e9-bbc7-910a79dc1f7b/resourceGroups/test/providers/Microsoft.OperationalInsights/workspaces/Test/providers/Microsoft.SecurityInsights/Incidents/2f884fd1-aa45-4d80-8118-30accd1a389b"
    },
    "@timestamp": "2025-02-03T13:29:41.551768Z",
    "log": {
        "level": "Medium"
    },
    "microsoft": {
        "sentinel": {
            "incident": {
                "number": "10"
            },
            "status": "New",
            "title": "test 10"
        }
    },
    "observer": {
        "product": "Sentinel",
        "vendor": "Microsoft"
    },
    "user": {
        "email": "joe.doe@test.com"
    }
}
{
    "message": "{\"additional_properties\":{},\"id\":\"/subscriptions/f1fa95bf-631e-48e9-bbc7-910a79dc1f7b/resourceGroups/test/providers/Microsoft.OperationalInsights/workspaces/Test/providers/Microsoft.SecurityInsights/Incidents/368693b4-8d49-4bd7-ac9c-a6f1f2232a9a\",\"name\":\"368693b4-8888-4444-cccc-aafff2232292\",\"type\":\"Microsoft.SecurityInsights/Incidents\",\"system_data\":null,\"etag\":\"\\\"5b022666-0000-0d00-0000-ccb5cccc0000\\\"\",\"additional_data\":{\"additional_properties\":{},\"alerts_count\":0,\"bookmarks_count\":0,\"comments_count\":0,\"alert_product_names\":[],\"tactics\":[]},\"classification\":null,\"classification_comment\":null,\"classification_reason\":null,\"created_time_utc\":\"2025-02-19T11:36:38.757960+00:00\",\"description\":\":D\",\"incident_url\":\"https://portal.azure.com/#asset/Microsoft_Azure_Security_Insights/Incident/subscriptions/f1fa95bf-631e-48e9-bbc7-910a79dc1f7b/resourceGroups/test/providers/Microsoft.OperationalInsights/workspaces/Test/providers/Microsoft.SecurityInsights/Incidents/36666344-8888-bbbb-cccc-a111fff3339a\",\"incident_number\":14,\"labels\":[{\"additional_properties\":{},\"label_name\":\"test_label\",\"label_type\":\"User\"}],\"last_activity_time_utc\":\"2025-02-19T11:36:38.207000+00:00\",\"last_modified_time_utc\":\"2025-02-19T11:36:38.757960+00:00\",\"owner\":{\"additional_properties\":{},\"assigned_to\":null,\"email\":null,\"user_principal_name\":null,\"object_id\":null},\"related_analytic_rule_ids\":[],\"severity\":\"Low\",\"status\":\"Active\",\"title\":\"Test 22\"}",
    "event": {
        "category": [
            "intrusion_detection"
        ],
        "end": "2025-02-19T11:36:38.757960Z",
        "kind": "alert",
        "reason": ":D",
        "type": [
            "info"
        ],
        "url": "https://portal.azure.com/#asset/Microsoft_Azure_Security_Insights/Incident/subscriptions/f1fa95bf-631e-48e9-bbc7-910a79dc1f7b/resourceGroups/test/providers/Microsoft.OperationalInsights/workspaces/Test/providers/Microsoft.SecurityInsights/Incidents/36666344-8888-bbbb-cccc-a111fff3339a"
    },
    "@timestamp": "2025-02-19T11:36:38.757960Z",
    "log": {
        "level": "Low"
    },
    "microsoft": {
        "sentinel": {
            "incident": {
                "number": "14"
            },
            "status": "Active",
            "title": "Test 22"
        }
    },
    "observer": {
        "product": "Sentinel",
        "vendor": "Microsoft"
    }
}
{
    "message": "{\"additional_properties\":{},\"id\":\"/subscriptions/f1fa95bf-631e-48e9-bbc7-910a79dc1f7b/resourceGroups/integration/providers/Microsoft.OperationalInsights/workspaces/Integration/providers/Microsoft.SecurityInsights/Incidents/368693b4-8d49-4bd7-ac9c-a6f1f2232a9a\",\"name\":\"368693b4-8d49-4bd7-ac9c-a6f1f2232a9a\",\"type\":\"Microsoft.SecurityInsights/Incidents\",\"system_data\":null,\"etag\":\"\\\"5b02465b-0000-0d00-0000-67b5c2460000\\\"\",\"additional_data\":{\"additional_properties\":{},\"alerts_count\":0,\"bookmarks_count\":0,\"comments_count\":0,\"alert_product_names\":[],\"tactics\":[]},\"classification\":null,\"classification_comment\":null,\"classification_reason\":null,\"created_time_utc\":\"2025-02-19T11:36:38.757960+00:00\",\"description\":\":D\",\"incident_url\":\"https://portal.azure.com/#asset/Microsoft_Azure_Security_Insights/Incident/subscriptions/f1fa95bf-631e-48e9-bbc7-910a79dc1f7b/resourceGroups/integration/providers/Microsoft.OperationalInsights/workspaces/Integration/providers/Microsoft.SecurityInsights/Incidents/368693b4-8d49-4bd7-ac9c-a6f1f2232a9a\",\"incident_number\":14,\"labels\":[{\"additional_properties\":{},\"label_name\":\"tagada\",\"label_type\":\"User\"}],\"last_activity_time_utc\":\"2025-02-19T11:36:38.207000+00:00\",\"last_modified_time_utc\":\"2025-02-19T11:36:38.757960+00:00\",\"owner\":{\"additional_properties\":{},\"assigned_to\":null,\"email\":null,\"user_principal_name\":null,\"object_id\":null},\"related_analytic_rule_ids\":[],\"severity\":\"Low\",\"status\":\"Active\",\"title\":\"Test 22\"}",
    "event": {
        "category": [
            "intrusion_detection"
        ],
        "end": "2025-02-19T11:36:38.757960Z",
        "kind": "alert",
        "reason": ":D",
        "type": [
            "info"
        ],
        "url": "https://portal.azure.com/#asset/Microsoft_Azure_Security_Insights/Incident/subscriptions/f1fa95bf-631e-48e9-bbc7-910a79dc1f7b/resourceGroups/integration/providers/Microsoft.OperationalInsights/workspaces/Integration/providers/Microsoft.SecurityInsights/Incidents/368693b4-8d49-4bd7-ac9c-a6f1f2232a9a"
    },
    "@timestamp": "2025-02-19T11:36:38.757960Z",
    "log": {
        "level": "Low"
    },
    "microsoft": {
        "sentinel": {
            "incident": {
                "number": "14"
            },
            "status": "Active",
            "title": "Test 22"
        }
    },
    "observer": {
        "product": "Sentinel",
        "vendor": "Microsoft"
    }
}

Extracted Fields

The following table lists the fields that are extracted, normalized under the ECS format, analyzed and indexed by the parser. It should be noted that infered fields are not listed.

Name Type Description
@timestamp date Date/time when the event originated.
event.category keyword Event category. The second categorization field in the hierarchy.
event.end date event.end contains the date when the event ended or when the activity was last observed.
event.kind keyword The kind of the event. The highest categorization field in the hierarchy.
event.reason keyword Reason why this event happened, according to the source
event.type keyword Event type. The third categorization field in the hierarchy.
event.url keyword Event investigation URL
log.level keyword Log level of the log event.
microsoft.sentinel.classification.comment keyword Comment on the classification of the alert
microsoft.sentinel.classification.reason keyword Reason for the classification of the alert
microsoft.sentinel.classification.type keyword Type of the classification
microsoft.sentinel.incident.number keyword Incident number of the alert
microsoft.sentinel.status keyword Status of the alert
microsoft.sentinel.title keyword Title of the alert
observer.product keyword The product name of the observer.
observer.vendor keyword Vendor name of the observer.
user.email keyword User email address.

For more information on the Intake Format, please find the code of the Parser, Smart Descriptions, and Supported Events here.