Akamai Guardicore On-Premises
Overview
Akamai Guardicore delivers application-centric microsegmentation and breach detection to prevent lateral movement across on-premises and cloud environments. With process-level visibility, dynamic policy orchestration and automated workflows, it enforces Zero Trust controls at scale. Simplify network segmentation, accelerate threat response and maintain continuous compliance for critical assets.
- Vendor: Akamai
- Supported environment: On-Premises
- Version compatibility: V51 and above
- Detection based on: Alert, Telemetry
- Supported application or feature: see section below
Warning
Important note - This format is currently in beta. We highly value your feedback to improve its performance.
Akamai Guardicore event types supported
Here is a list of all the Akamai Guardicore event types supported by this integration:
- Incident
- Audit log
- Network log
Specification
Prerequisites
- Resource:
- Self-managed syslog forwarder
- Network:
- Outbound traffic allowed
- Permissions:
- Administrator or Root access to the Akamai Guardicore Console
- Root access to the Linux server with the syslog forwarder
Transport Protocol/Method
- Indirect Syslog
Logs details
- Supported functionalities: See section Overview
- Supported type(s) of structure: CEF
- Supported verbosity level: Informational
Note
Log levels are based on the taxonomy of RFC5424. Adapt according to the terminology used by the editor.
Configure
This setup guide will show you how to forward your Akamai Guardicore events to Sekoia.io.
Steps to follow
- Create an intake
- Set up the forwarding for Events
- Set up the forwarding for Network Logs
Instructions on Sekoia
Configure Your Intake
This section will guide you through creating the intake object in Sekoia, which provides a unique identifier called the "Intake key." The Intake key is essential for later configuration, as it references the Community, Entity, and Parser (Intake Format) used when receiving raw events on Sekoia.
- Go to the Sekoia Intake page.
- Click on the
+ New Intakebutton at the top right of the page. - Search for your Intake by the product name in the search bar.
- Give it a Name and associate it with an Entity (and a Community if using multi-tenant mode).
- Click on
Create.
Note
For more details on how to use the Intake page and to find the Intake key you just created, refer to this documentation.
Configure a forwarder
To forward events using syslog to Sekoia.io, you need to update the syslog header with the intake key you previously created. Here is an example of your message before the forwarder
<%pri%>1 %timestamp:::date-rfc3339% %hostname% %app-name% %procid% LOG RAW_MESSAGE
<%pri%>1 %timestamp:::date-rfc3339% %hostname% %app-name% %procid% LOG [SEKOIA@53288 intake_key=\"YOUR_INTAKE_KEY\"] RAW_MESSAGE
To achieve this you can:
- Use the Sekoia.io forwarder which is the official supported way to collect data using the syslog protocol in Sekoia.io. In charge of centralizing data coming from many equipments/sources and forwarding them to Sekoia.io with the apporpriated format, it is a prepackaged option. You only have to provide your intake key as parameter.
- Use your own Syslog service instance. Maybe you already have an intance of one of these components on your side and want to reuse it in order to centralize data before forwarding them to Sekoia.io. When using this mode, you have to configure and maintain your component in order to respect the expected Sekoia.io format.
Warning
Only the Sekoia.io forwarder is officially supported. Other options are documented for reference purposes but do not have official support.
Set up the forwarding for Events
- Log in to the Akamai Guardicore console
- In the left panel, go to
System>INTEGRATION>Data Exporters

- Click
+ Create Data Exporter

- Select
Events syslog Exporter - Type a name for the exporter configuration (e.g:
Sekoia.io Events exporter) -
In the
Connection optionssection:- Type the address of the syslog concentrator as
Syslog host - Type the port of the syslog concentrator as
Syslog port - Select the matching protocol for the syslog concentrator as
Syslog protocol - Disable
Verify host

- Type the address of the syslog concentrator as
-
In the
Exporting optionssection:- Enable
Export incidents - Disable
Export Agent Logs - Enable
Audit Logs

- Enable
-
In the
Message formatsection:- Select
CEFasMessage format - Select
ISO8601 (including milliseconds)asFormat log timestamp - Click
Test Connection - Click
Save

- Select
Set up the forwarding for Network logs
- Click
+ Create Data Exporter

- Select
Network Log syslog Exporter - Type a name for the exporter configuration (e.g:
Sekoia.io Network Log exporter) -
In the
Connection optionssection:- Type the address of the syslog concentrator as
Syslog host - Type the port of the syslog concentrator as
Syslog port - Select the matching protocol for the syslog concentrator as
Syslog protocol - Disable
Verify host

- Type the address of the syslog concentrator as
-
In the
Exporting optionssection:- Click
+ Add - Create
export verdictsfor:AllowedBlockedAlertedAllowed and Encrypted

- Click
-
In the
Message formatsection:- Select
CEFasMessage format - Select
ISO8601 (including milliseconds)asFormat log timestamp - Click
Test Connection - Click
Save

- Select
Raw Events Samples
In this section, you will find examples of raw logs as generated natively by the source. These examples are provided to help integrators understand the data format before ingestion into Sekoia.io. It is crucial for setting up the correct parsing stages and ensuring that all relevant information is captured.
CEF:0|Guardicore|Centra|52|Audit Record|Audit Record|INFO|request=/api/v3.0/integration act=Adding new Data Exporter Integration configuration suser=jdoe msg=Data Exporter Integration 'Myexporter' creation: host: 198.51.100.10, port: 6514, protocol: TCP, use TLS: False, export audit log: True src=192.0.2.1
0|Guardicore|Centra|52|Audit Record|Audit Record|INFO|request=/api/v3.0/authenticate act=User authentication suser=j.doe msg=User j.doe authenticated successfully src=192.0.2.1
CEF:0|Guardicore|Centra|52|Audit Record|Audit Record|INFO|request=/api/v3.0/integration act=Adding new Data Exporter Integration configuration suser=jdoe msg=Data Exporter Integration 'Myexporter' creation: host: 198.51.100.4, port: 6514, protocol: TCP, use TLS: False src=192.0.2.1
CEF:0|Guardicore|Centra|52|Audit Record|Audit Record|INFO|request=/api/v3.0/integration/00000000-0000-0000-0000-000000000000 act=Updating Data Exporter Integration configuration suser=jdoe msg=Data Exporter Integration 'Myexporter' modifications src=192.0.2.1
CEF:0|Guardicore|Centra|52|Audit Record|Audit Record|INFO|request=/api/v3.0/integration/test-connection act=Run Data Exporter Integration Test Connections suser=jdoe src=192.0.2.1
CEF:0|Guardicore|Centra|42|Audit Record|Audit Record|Unknown|request=/api/v3.0/integration act=Adding new Syslog integration configuration suser=jdoe msg=Syslog integration 'test2 - incidents' creation: host: lab.test.com, port: 514, protocol: UDP, use TLS: False, export audit log: False src=198.51.100.19
CEF:0|Guardicore|Centra|42|Audit Record|Audit Record|Unknown|request=/api/v3.0/visibility/label-groups act=Create label group suser=jdoe msg=Created label group Role: App (id: 00000000-0000-0000-0000-000000000000) src=198.51.100.189
0|Guardicore|Centra|52|Audit Record|Audit Record|INFO|request=/api/v3.0/integration/00000000-0000-0000-0000-000000000000 act=Updating Data Exporter Integration configuration suser=jdoe msg=Data Exporter Integration 'Myexporter' modifications src=192.0.2.1
0|Guardicore|Centra|52|Audit Record|Audit Record|INFO|request=/api/v3.0/logout act=Logout suser=jdoe msg=User jdoe logged out src=192.0.2.1
0|Guardicore|Centra|52|Audit Record|Audit Record|INFO|request=/api/v3.0/authenticate act=User authentication suser=j.doe msg=User j.doe tried to login but failed due to the following reason: password mismatch src=192.0.2.1
CEF:0|Guardicore|Centra|52|Test connection|Test connection|SeverityLogLevel.INFO|start=2026-04-07T09:14Z dvc=192.0.2.1 dvchost=N/A act=Run Data Exporter Integration Test Connections
CEF:0|Guardicore|Centra|52|Bad Reputation|A request was made to an IP address with a bad reputation|3|start=2026-04-07T06:39Z dvc=192.0.2.1 dvchost=N/A act=ALERTED_BY_MANAGEMENT cs1Label=IncidentUUID cs1=00000000-0000-0000-0000-000000000000 cs2Label=IncidentURI cs2=https://lab.example.com/overview/incidents/00000000-0000-0000-0000-000000000000 cs3Label=IncidentTags cs3=Known Phishing,Known Malware cs4Label=AssetId cs4=N/A cs5Label=AssetLabels cs5= cs6Label=RuleID cs6=No rule cs7Label=Direction cs7=Inbound
CEF:0|Guardicore|Centra|52|Bad Reputation|A request was made to an IP address with a bad reputation|3|start=2026-04-07T06:39Z dvc=N/A dvchost=test.example.com act=ALERTED_BY_MANAGEMENT cs1Label=IncidentUUID cs1=11111111-1111-1111-1111-111111111111 cs2Label=IncidentURI cs2=https://lab.example.com/overview/incidents/11111111-1111-1111-1111-111111111111 cs3Label=IncidentTags cs3=Known Phishing,Known Malware cs4Label=AssetId cs4=22222222-2222-2222-2222-222222222222 cs5Label=AssetLabels cs5=Terraform: True,os_name: Ubuntu 24.04.4 LTS,Worksite: Default,Role: BE,App: SWIFT,Environment: Production,os_type: Linux cs6Label=RuleID cs6=No rule cs7Label=Direction cs7=Inbound
CEF:0|Guardicore|Centra|52|Bad Reputation|A request was made to an IP address with a bad reputation|3|start=2026-04-07T08:19Z dvc=192.0.2.1 dvchost=N/A act=ALERTED_BY_MANAGEMENT cs1Label=IncidentUUID cs1=33333333-3333-3333-3333-333333333333 cs2Label=IncidentURI cs2=https://lab.example.com/overview/incidents/33333333-3333-3333-3333-333333333333 cs3Label=IncidentTags cs3=Known Phishing,Known Malware cs4Label=AssetId cs4=N/A cs5Label=AssetLabels cs5= cs6Label=RuleID cs6=44444444-4444-4444-4444-444444444444 cs7Label=Direction cs7=Outbound
0|Guardicore|Centra|52|Bad Reputation|A request was made to an IP address with a bad reputation|3|start=2026-04-07T06:39Z dvc=N/A dvchost=test.example.com act=ALERTED_BY_MANAGEMENT cs1Label=IncidentUUID cs1=11111111-1111-1111-1111-111111111111 cs2Label=IncidentURI cs2=https://lab.example.com/overview/incidents/11111111-1111-1111-1111-111111111111 cs3Label=IncidentTags cs3=Known Phishing,Known Malware cs4Label=AssetId cs4=22222222-2222-2222-2222-222222222222 cs5Label=AssetLabels cs5=Terraform: True,os_name: Ubuntu 24.04.4 LTS,Worksite: Default,Role: BE,App: SWIFT,Environment: Production,os_type: Linux cs6Label=RuleID cs6=No rule cs7Label=Direction cs7=Inbound
CEF:0|Guardicore|Centra|42|Network Log|Network Log|None|id=11111111 act=Allowed cnt=1 start=1656596452843 src=192.0.2.4 shost=localhost suser=LOCALHOST\JDOE dst=192.0.2.8 dpt=67 dhost=Unknown proto=UDP cs1Label=connection_type cs1=SUCCESSFUL cs3Label=source_process cs3=C:\Windows\System32\svchost.exe cs6Label=connection_verdict cs6=allowed cs7Label=policy_rule cs7=default
0|Guardicore|Centra|42|Network Log|Network Log|None|id=11111111 act=Allowed cnt=1 start=1656596452843 src=192.0.2.4 shost=localhost suser=LOCALHOST\JDOE dst=192.0.2.8 dpt=67 dhost=Unknown proto=UDP cs1Label=connection_type cs1=SUCCESSFUL cs3Label=source_process cs3=C:\Windows\System32\svchost.exe cs6Label=connection_verdict cs6=allowed cs7Label=policy_rule cs7=default
CEF:0|Guardicore|Centra|42|Network Log|Network Log|None|id=11111111 act=Blocked cnt=1 start=1656596452843 src=192.0.2.4 shost=lab.test.com suser=LOCALHOST\JDOE duser=LOCALHOST\JDOE dst=192.0.2.8 dpt=67 dhost=Unknown proto=UDP cs1Label=connection_type cs1=SUCCESSFUL cs3Label=destination_process_full_path cs3=C:\Windows\System32\svchost.exe cs6Label=connection_verdict cs6=blocked by source cs7Label=policy_ruleset cs7=test
Detection section
The following section provides information for those who wish to learn more about the detection capabilities enabled by collecting this intake. It includes details about the built-in rule catalog, event categories, and ECS fields extracted from raw events. This is essential for users aiming to create custom detection rules, perform hunting activities, or pivot in the events page.
Event Categories
The following table lists the data source offered by this integration.
| Data Source | Description |
|---|---|
Network device logs |
Akamai Guardicore logs network traffic |
Network protocol analysis |
Akamai Guardicore logs Network traffic |
Third-party application logs |
Akamai Guardicore logs audit activities and incidents |
In details, the following table denotes the type of events produced by this integration.
| Name | Values |
|---|---|
| Kind | alert |
| Category | authentication, configuration, network, threat |
| Type | access, allowed, change, creation, deletion, denied, end, info, start |
Transformed Events Samples after Ingestion
This section demonstrates how the raw logs will be transformed by our parsers. It shows the extracted fields that will be available for use in the built-in detection rules and hunting activities in the events page. Understanding these transformations is essential for analysts to create effective detection mechanisms with custom detection rules and to leverage the full potential of the collected data.
{
"message": "CEF:0|Guardicore|Centra|52|Audit Record|Audit Record|INFO|request=/api/v3.0/integration act=Adding new Data Exporter Integration configuration suser=jdoe msg=Data Exporter Integration 'Myexporter' creation: host: 198.51.100.10, port: 6514, protocol: TCP, use TLS: False, export audit log: True src=192.0.2.1",
"event": {
"action": "Adding new Data Exporter Integration configuration",
"category": [
"configuration"
],
"dataset": "audit",
"reason": "Data Exporter Integration 'Myexporter' creation: host: 198.51.100.10, port: 6514, protocol: TCP, use TLS: False, export audit log: True",
"type": [
"creation"
]
},
"akamai": {
"guardicore": {
"signature_id": "Audit Record"
}
},
"observer": {
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "52"
},
"related": {
"ip": [
"192.0.2.1"
],
"user": [
"jdoe"
]
},
"source": {
"address": "192.0.2.1",
"ip": "192.0.2.1"
},
"url": {
"path": "/api/v3.0/integration"
},
"user": {
"name": "jdoe"
}
}
{
"message": "0|Guardicore|Centra|52|Audit Record|Audit Record|INFO|request=/api/v3.0/authenticate act=User authentication suser=j.doe msg=User j.doe authenticated successfully src=192.0.2.1",
"event": {
"action": "User authentication",
"category": [
"authentication"
],
"dataset": "audit",
"outcome": "success",
"reason": "User j.doe authenticated successfully",
"type": [
"start"
]
},
"akamai": {
"guardicore": {
"signature_id": "Audit Record"
}
},
"observer": {
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "52"
},
"related": {
"ip": [
"192.0.2.1"
],
"user": [
"j.doe"
]
},
"source": {
"address": "192.0.2.1",
"ip": "192.0.2.1"
},
"url": {
"path": "/api/v3.0/authenticate"
},
"user": {
"name": "j.doe"
}
}
{
"message": "CEF:0|Guardicore|Centra|52|Audit Record|Audit Record|INFO|request=/api/v3.0/integration act=Adding new Data Exporter Integration configuration suser=jdoe msg=Data Exporter Integration 'Myexporter' creation: host: 198.51.100.4, port: 6514, protocol: TCP, use TLS: False src=192.0.2.1",
"event": {
"action": "Adding new Data Exporter Integration configuration",
"category": [
"configuration"
],
"dataset": "audit",
"reason": "Data Exporter Integration 'Myexporter' creation: host: 198.51.100.4, port: 6514, protocol: TCP, use TLS: False",
"type": [
"creation"
]
},
"akamai": {
"guardicore": {
"signature_id": "Audit Record"
}
},
"observer": {
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "52"
},
"related": {
"ip": [
"192.0.2.1"
],
"user": [
"jdoe"
]
},
"source": {
"address": "192.0.2.1",
"ip": "192.0.2.1"
},
"url": {
"path": "/api/v3.0/integration"
},
"user": {
"name": "jdoe"
}
}
{
"message": "CEF:0|Guardicore|Centra|52|Audit Record|Audit Record|INFO|request=/api/v3.0/integration/00000000-0000-0000-0000-000000000000 act=Updating Data Exporter Integration configuration suser=jdoe msg=Data Exporter Integration 'Myexporter' modifications src=192.0.2.1",
"event": {
"action": "Updating Data Exporter Integration configuration",
"category": [
"configuration"
],
"dataset": "audit",
"reason": "Data Exporter Integration 'Myexporter' modifications",
"type": [
"change"
]
},
"akamai": {
"guardicore": {
"signature_id": "Audit Record"
}
},
"observer": {
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "52"
},
"related": {
"ip": [
"192.0.2.1"
],
"user": [
"jdoe"
]
},
"source": {
"address": "192.0.2.1",
"ip": "192.0.2.1"
},
"url": {
"path": "/api/v3.0/integration/00000000-0000-0000-0000-000000000000"
},
"user": {
"name": "jdoe"
}
}
{
"message": "CEF:0|Guardicore|Centra|52|Audit Record|Audit Record|INFO|request=/api/v3.0/integration/test-connection act=Run Data Exporter Integration Test Connections suser=jdoe src=192.0.2.1",
"event": {
"action": "Run Data Exporter Integration Test Connections",
"category": [
"configuration"
],
"dataset": "audit",
"type": [
"info"
]
},
"akamai": {
"guardicore": {
"signature_id": "Audit Record"
}
},
"observer": {
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "52"
},
"related": {
"ip": [
"192.0.2.1"
],
"user": [
"jdoe"
]
},
"source": {
"address": "192.0.2.1",
"ip": "192.0.2.1"
},
"url": {
"path": "/api/v3.0/integration/test-connection"
},
"user": {
"name": "jdoe"
}
}
{
"message": "CEF:0|Guardicore|Centra|42|Audit Record|Audit Record|Unknown|request=/api/v3.0/integration act=Adding new Syslog integration configuration suser=jdoe msg=Syslog integration 'test2 - incidents' creation: host: lab.test.com, port: 514, protocol: UDP, use TLS: False, export audit log: False src=198.51.100.19",
"event": {
"action": "Adding new Syslog integration configuration",
"category": [
"configuration"
],
"dataset": "audit",
"reason": "Syslog integration 'test2 - incidents' creation: host: lab.test.com, port: 514, protocol: UDP, use TLS: False, export audit log: False",
"type": [
"creation"
]
},
"akamai": {
"guardicore": {
"signature_id": "Audit Record"
}
},
"observer": {
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "42"
},
"related": {
"ip": [
"198.51.100.19"
],
"user": [
"jdoe"
]
},
"source": {
"address": "198.51.100.19",
"ip": "198.51.100.19"
},
"url": {
"path": "/api/v3.0/integration"
},
"user": {
"name": "jdoe"
}
}
{
"message": "CEF:0|Guardicore|Centra|42|Audit Record|Audit Record|Unknown|request=/api/v3.0/visibility/label-groups act=Create label group suser=jdoe msg=Created label group Role: App (id: 00000000-0000-0000-0000-000000000000) src=198.51.100.189",
"event": {
"action": "Create label group",
"category": [
"configuration"
],
"dataset": "audit",
"reason": "Created label group Role: App (id: 00000000-0000-0000-0000-000000000000)",
"type": [
"creation"
]
},
"akamai": {
"guardicore": {
"signature_id": "Audit Record"
}
},
"observer": {
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "42"
},
"related": {
"ip": [
"198.51.100.189"
],
"user": [
"jdoe"
]
},
"source": {
"address": "198.51.100.189",
"ip": "198.51.100.189"
},
"url": {
"path": "/api/v3.0/visibility/label-groups"
},
"user": {
"name": "jdoe"
}
}
{
"message": "0|Guardicore|Centra|52|Audit Record|Audit Record|INFO|request=/api/v3.0/integration/00000000-0000-0000-0000-000000000000 act=Updating Data Exporter Integration configuration suser=jdoe msg=Data Exporter Integration 'Myexporter' modifications src=192.0.2.1",
"event": {
"action": "Updating Data Exporter Integration configuration",
"category": [
"configuration"
],
"dataset": "audit",
"reason": "Data Exporter Integration 'Myexporter' modifications",
"type": [
"change"
]
},
"akamai": {
"guardicore": {
"signature_id": "Audit Record"
}
},
"observer": {
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "52"
},
"related": {
"ip": [
"192.0.2.1"
],
"user": [
"jdoe"
]
},
"source": {
"address": "192.0.2.1",
"ip": "192.0.2.1"
},
"url": {
"path": "/api/v3.0/integration/00000000-0000-0000-0000-000000000000"
},
"user": {
"name": "jdoe"
}
}
{
"message": "0|Guardicore|Centra|52|Audit Record|Audit Record|INFO|request=/api/v3.0/logout act=Logout suser=jdoe msg=User jdoe logged out src=192.0.2.1",
"event": {
"action": "Logout",
"category": [
"authentication"
],
"dataset": "audit",
"outcome": "success",
"reason": "User jdoe logged out",
"type": [
"end"
]
},
"akamai": {
"guardicore": {
"signature_id": "Audit Record"
}
},
"observer": {
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "52"
},
"related": {
"ip": [
"192.0.2.1"
],
"user": [
"jdoe"
]
},
"source": {
"address": "192.0.2.1",
"ip": "192.0.2.1"
},
"url": {
"path": "/api/v3.0/logout"
},
"user": {
"name": "jdoe"
}
}
{
"message": "0|Guardicore|Centra|52|Audit Record|Audit Record|INFO|request=/api/v3.0/authenticate act=User authentication suser=j.doe msg=User j.doe tried to login but failed due to the following reason: password mismatch src=192.0.2.1",
"event": {
"action": "User authentication",
"category": [
"authentication"
],
"dataset": "audit",
"outcome": "failure",
"reason": "User j.doe tried to login but failed due to the following reason: password mismatch",
"type": [
"start"
]
},
"akamai": {
"guardicore": {
"signature_id": "Audit Record"
}
},
"observer": {
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "52"
},
"related": {
"ip": [
"192.0.2.1"
],
"user": [
"j.doe"
]
},
"source": {
"address": "192.0.2.1",
"ip": "192.0.2.1"
},
"url": {
"path": "/api/v3.0/authenticate"
},
"user": {
"name": "j.doe"
}
}
{
"message": "CEF:0|Guardicore|Centra|52|Test connection|Test connection|SeverityLogLevel.INFO|start=2026-04-07T09:14Z dvc=192.0.2.1 dvchost=N/A act=Run Data Exporter Integration Test Connections",
"event": {
"category": [
"network"
],
"dataset": "test",
"reason": "Run Data Exporter Integration Test Connections",
"type": [
"info"
]
},
"@timestamp": "2026-04-07T09:14:00Z",
"akamai": {
"guardicore": {
"signature_id": "Test connection"
}
},
"observer": {
"ip": [
"192.0.2.1"
],
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "52"
},
"related": {
"ip": [
"192.0.2.1"
]
}
}
{
"message": "CEF:0|Guardicore|Centra|52|Bad Reputation|A request was made to an IP address with a bad reputation|3|start=2026-04-07T06:39Z dvc=192.0.2.1 dvchost=N/A act=ALERTED_BY_MANAGEMENT cs1Label=IncidentUUID cs1=00000000-0000-0000-0000-000000000000 cs2Label=IncidentURI cs2=https://lab.example.com/overview/incidents/00000000-0000-0000-0000-000000000000 cs3Label=IncidentTags cs3=Known Phishing,Known Malware cs4Label=AssetId cs4=N/A cs5Label=AssetLabels cs5= cs6Label=RuleID cs6=No rule cs7Label=Direction cs7=Inbound",
"event": {
"action": "ALERTED_BY_MANAGEMENT",
"category": [
"threat"
],
"dataset": "incident",
"kind": "alert",
"reason": "A request was made to an IP address with a bad reputation",
"reference": "https://lab.example.com/overview/incidents/00000000-0000-0000-0000-000000000000",
"severity": 3,
"start": "2026-04-07T06:39:00Z",
"type": [
"info"
]
},
"@timestamp": "2026-04-07T06:39:00Z",
"akamai": {
"guardicore": {
"incident": {
"id": "00000000-0000-0000-0000-000000000000",
"severity": "low",
"tags": [
"Known Malware",
"Known Phishing"
]
},
"signature_id": "Bad Reputation"
}
},
"network": {
"direction": "inbound"
},
"observer": {
"ip": [
"192.0.2.1"
],
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "52"
},
"related": {
"ip": [
"192.0.2.1"
]
}
}
{
"message": "CEF:0|Guardicore|Centra|52|Bad Reputation|A request was made to an IP address with a bad reputation|3|start=2026-04-07T06:39Z dvc=N/A dvchost=test.example.com act=ALERTED_BY_MANAGEMENT cs1Label=IncidentUUID cs1=11111111-1111-1111-1111-111111111111 cs2Label=IncidentURI cs2=https://lab.example.com/overview/incidents/11111111-1111-1111-1111-111111111111 cs3Label=IncidentTags cs3=Known Phishing,Known Malware cs4Label=AssetId cs4=22222222-2222-2222-2222-222222222222 cs5Label=AssetLabels cs5=Terraform: True,os_name: Ubuntu 24.04.4 LTS,Worksite: Default,Role: BE,App: SWIFT,Environment: Production,os_type: Linux cs6Label=RuleID cs6=No rule cs7Label=Direction cs7=Inbound",
"event": {
"action": "ALERTED_BY_MANAGEMENT",
"category": [
"threat"
],
"dataset": "incident",
"kind": "alert",
"reason": "A request was made to an IP address with a bad reputation",
"reference": "https://lab.example.com/overview/incidents/11111111-1111-1111-1111-111111111111",
"severity": 3,
"start": "2026-04-07T06:39:00Z",
"type": [
"info"
]
},
"@timestamp": "2026-04-07T06:39:00Z",
"akamai": {
"guardicore": {
"incident": {
"affected_assets": [
"22222222-2222-2222-2222-222222222222"
],
"environment": "Production",
"id": "11111111-1111-1111-1111-111111111111",
"severity": "low",
"tags": [
"Known Malware",
"Known Phishing"
]
},
"signature_id": "Bad Reputation"
}
},
"host": {
"os": {
"full": "Ubuntu 24.04.4 LTS",
"type": "linux"
}
},
"network": {
"application": "SWIFT",
"direction": "inbound"
},
"observer": {
"hostname": "test.example.com",
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "52"
},
"related": {
"hosts": [
"test.example.com"
]
}
}
{
"message": "CEF:0|Guardicore|Centra|52|Bad Reputation|A request was made to an IP address with a bad reputation|3|start=2026-04-07T08:19Z dvc=192.0.2.1 dvchost=N/A act=ALERTED_BY_MANAGEMENT cs1Label=IncidentUUID cs1=33333333-3333-3333-3333-333333333333 cs2Label=IncidentURI cs2=https://lab.example.com/overview/incidents/33333333-3333-3333-3333-333333333333 cs3Label=IncidentTags cs3=Known Phishing,Known Malware cs4Label=AssetId cs4=N/A cs5Label=AssetLabels cs5= cs6Label=RuleID cs6=44444444-4444-4444-4444-444444444444 cs7Label=Direction cs7=Outbound",
"event": {
"action": "ALERTED_BY_MANAGEMENT",
"category": [
"threat"
],
"dataset": "incident",
"kind": "alert",
"reason": "A request was made to an IP address with a bad reputation",
"reference": "https://lab.example.com/overview/incidents/33333333-3333-3333-3333-333333333333",
"severity": 3,
"start": "2026-04-07T08:19:00Z",
"type": [
"info"
]
},
"@timestamp": "2026-04-07T08:19:00Z",
"akamai": {
"guardicore": {
"incident": {
"id": "33333333-3333-3333-3333-333333333333",
"severity": "low",
"tags": [
"Known Malware",
"Known Phishing"
]
},
"signature_id": "Bad Reputation"
}
},
"network": {
"direction": "outbound"
},
"observer": {
"ip": [
"192.0.2.1"
],
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "52"
},
"related": {
"ip": [
"192.0.2.1"
]
},
"rule": {
"id": "44444444-4444-4444-4444-444444444444"
}
}
{
"message": "0|Guardicore|Centra|52|Bad Reputation|A request was made to an IP address with a bad reputation|3|start=2026-04-07T06:39Z dvc=N/A dvchost=test.example.com act=ALERTED_BY_MANAGEMENT cs1Label=IncidentUUID cs1=11111111-1111-1111-1111-111111111111 cs2Label=IncidentURI cs2=https://lab.example.com/overview/incidents/11111111-1111-1111-1111-111111111111 cs3Label=IncidentTags cs3=Known Phishing,Known Malware cs4Label=AssetId cs4=22222222-2222-2222-2222-222222222222 cs5Label=AssetLabels cs5=Terraform: True,os_name: Ubuntu 24.04.4 LTS,Worksite: Default,Role: BE,App: SWIFT,Environment: Production,os_type: Linux cs6Label=RuleID cs6=No rule cs7Label=Direction cs7=Inbound",
"event": {
"action": "ALERTED_BY_MANAGEMENT",
"category": [
"threat"
],
"dataset": "incident",
"kind": "alert",
"reason": "A request was made to an IP address with a bad reputation",
"reference": "https://lab.example.com/overview/incidents/11111111-1111-1111-1111-111111111111",
"severity": 3,
"start": "2026-04-07T06:39:00Z",
"type": [
"info"
]
},
"@timestamp": "2026-04-07T06:39:00Z",
"akamai": {
"guardicore": {
"incident": {
"affected_assets": [
"22222222-2222-2222-2222-222222222222"
],
"environment": "Production",
"id": "11111111-1111-1111-1111-111111111111",
"severity": "low",
"tags": [
"Known Malware",
"Known Phishing"
]
},
"signature_id": "Bad Reputation"
}
},
"host": {
"os": {
"full": "Ubuntu 24.04.4 LTS",
"type": "linux"
}
},
"network": {
"application": "SWIFT",
"direction": "inbound"
},
"observer": {
"hostname": "test.example.com",
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "52"
},
"related": {
"hosts": [
"test.example.com"
]
}
}
{
"message": "CEF:0|Guardicore|Centra|42|Network Log|Network Log|None|id=11111111 act=Allowed cnt=1 start=1656596452843 src=192.0.2.4 shost=localhost suser=LOCALHOST\\JDOE dst=192.0.2.8 dpt=67 dhost=Unknown proto=UDP cs1Label=connection_type cs1=SUCCESSFUL cs3Label=source_process cs3=C:\\Windows\\System32\\svchost.exe cs6Label=connection_verdict cs6=allowed cs7Label=policy_rule cs7=default",
"event": {
"action": "allowed",
"category": [
"network"
],
"dataset": "network",
"outcome": "success",
"type": [
"allowed"
]
},
"@timestamp": "2022-06-30T13:40:52.843000Z",
"akamai": {
"guardicore": {
"network": {
"connection_verdict": "allowed",
"id": "11111111"
},
"signature_id": "Network Log"
}
},
"destination": {
"address": "192.0.2.8",
"ip": "192.0.2.8",
"port": 67
},
"network": {
"transport": "udp"
},
"observer": {
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "42"
},
"process": {
"executable": "C:\\Windows\\System32\\svchost.exe",
"name": "svchost.exe"
},
"related": {
"hosts": [
"localhost"
],
"ip": [
"192.0.2.4",
"192.0.2.8"
],
"user": [
"JDOE"
]
},
"rule": {
"id": "default"
},
"source": {
"address": "localhost",
"domain": "localhost",
"ip": "192.0.2.4"
},
"user": {
"domain": "LOCALHOST",
"name": "JDOE"
}
}
{
"message": "0|Guardicore|Centra|42|Network Log|Network Log|None|id=11111111 act=Allowed cnt=1 start=1656596452843 src=192.0.2.4 shost=localhost suser=LOCALHOST\\JDOE dst=192.0.2.8 dpt=67 dhost=Unknown proto=UDP cs1Label=connection_type cs1=SUCCESSFUL cs3Label=source_process cs3=C:\\Windows\\System32\\svchost.exe cs6Label=connection_verdict cs6=allowed cs7Label=policy_rule cs7=default",
"event": {
"action": "allowed",
"category": [
"network"
],
"dataset": "network",
"outcome": "success",
"type": [
"allowed"
]
},
"@timestamp": "2022-06-30T13:40:52.843000Z",
"akamai": {
"guardicore": {
"network": {
"connection_verdict": "allowed",
"id": "11111111"
},
"signature_id": "Network Log"
}
},
"destination": {
"address": "192.0.2.8",
"ip": "192.0.2.8",
"port": 67
},
"network": {
"transport": "udp"
},
"observer": {
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "42"
},
"process": {
"executable": "C:\\Windows\\System32\\svchost.exe",
"name": "svchost.exe"
},
"related": {
"hosts": [
"localhost"
],
"ip": [
"192.0.2.4",
"192.0.2.8"
],
"user": [
"JDOE"
]
},
"rule": {
"id": "default"
},
"source": {
"address": "localhost",
"domain": "localhost",
"ip": "192.0.2.4"
},
"user": {
"domain": "LOCALHOST",
"name": "JDOE"
}
}
{
"message": "CEF:0|Guardicore|Centra|42|Network Log|Network Log|None|id=11111111 act=Blocked cnt=1 start=1656596452843 src=192.0.2.4 shost=lab.test.com suser=LOCALHOST\\JDOE duser=LOCALHOST\\JDOE dst=192.0.2.8 dpt=67 dhost=Unknown proto=UDP cs1Label=connection_type cs1=SUCCESSFUL cs3Label=destination_process_full_path cs3=C:\\Windows\\System32\\svchost.exe cs6Label=connection_verdict cs6=blocked by source cs7Label=policy_ruleset cs7=test",
"event": {
"action": "blocked",
"category": [
"network"
],
"dataset": "network",
"outcome": "failure",
"type": [
"denied"
]
},
"@timestamp": "2022-06-30T13:40:52.843000Z",
"akamai": {
"guardicore": {
"network": {
"connection_verdict": "blocked by source",
"destination": {
"process": {
"name": "svchost.exe",
"path": "C:\\Windows\\System32\\svchost.exe"
}
},
"id": "11111111"
},
"signature_id": "Network Log"
}
},
"destination": {
"address": "192.0.2.8",
"ip": "192.0.2.8",
"port": 67,
"user": {
"domain": "LOCALHOST",
"name": "JDOE"
}
},
"network": {
"transport": "udp"
},
"observer": {
"product": "Guardicore",
"type": "ids",
"vendor": "Akamai",
"version": "42"
},
"related": {
"hosts": [
"lab.test.com"
],
"ip": [
"192.0.2.4",
"192.0.2.8"
],
"user": [
"JDOE"
]
},
"rule": {
"ruleset": "test"
},
"source": {
"address": "lab.test.com",
"domain": "lab.test.com",
"ip": "192.0.2.4",
"registered_domain": "test.com",
"subdomain": "lab",
"top_level_domain": "com"
},
"user": {
"domain": "LOCALHOST",
"name": "JDOE"
}
}
Extracted Fields
The following table lists the fields that are extracted, normalized under the ECS format, analyzed and indexed by the parser. It should be noted that infered fields are not listed.
| Name | Type | Description |
|---|---|---|
@timestamp |
date |
Date/time when the event originated. |
akamai.guardicore.incident.affected_assets |
array |
List of asset IDs affected by the security incident, as reported by akamai.guardicore. |
akamai.guardicore.incident.environment |
keyword |
Environment label associated with the source asset involved in the incident (e.g., Development, Production, Staging). |
akamai.guardicore.incident.id |
keyword |
Unique identifier of the security incident reported by akamai.guardicore. |
akamai.guardicore.incident.tags |
array |
Tags associated to the security incident. |
akamai.guardicore.network.connection_verdict |
keyword |
Final verdict of the network connection as determined by akamai.guardicore policy enforcement (e.g., blocked_by_destination, allowed_by_policy). |
akamai.guardicore.network.destination.process.name |
keyword |
Name of the process running on the destination asset that received the network connection. |
akamai.guardicore.network.destination.process.path |
keyword |
Full file system path of the process running on the destination asset that received the network connection. |
akamai.guardicore.network.id |
keyword |
Unique identifier of the network connection event reported by akamai.guardicore. |
akamai.guardicore.network.incidents |
array |
Identifiers of security incidents related to this network connection event, as reported by akamai.guardicore. |
akamai.guardicore.signature_id |
keyword |
The signature ID of the event |
destination.domain |
keyword |
The domain name of the destination. |
destination.ip |
ip |
IP address of the destination. |
destination.port |
long |
Port of the destination. |
destination.user.domain |
keyword |
Name of the directory the user is a member of. |
destination.user.name |
keyword |
Short name or login of the user. |
event.action |
keyword |
The action captured by the event. |
event.category |
keyword |
Event category. The second categorization field in the hierarchy. |
event.dataset |
keyword |
Name of the dataset. |
event.end |
date |
event.end contains the date when the event ended or when the activity was last observed. |
event.kind |
keyword |
The kind of the event. The highest categorization field in the hierarchy. |
event.outcome |
keyword |
The outcome of the event. The lowest level categorization field in the hierarchy. |
event.reason |
keyword |
Reason why this event happened, according to the source |
event.reference |
keyword |
Event reference URL |
event.severity |
long |
Numeric severity of the event. |
event.start |
date |
event.start contains the date when the event started or when the activity was first observed. |
event.type |
keyword |
Event type. The third categorization field in the hierarchy. |
host.os.full |
keyword |
Operating system name, including the version or code name. |
host.os.type |
keyword |
Which commercial OS family (one of: linux, macos, unix or windows). |
network.application |
keyword |
Application level protocol name. |
network.direction |
keyword |
Direction of the network traffic. |
network.transport |
keyword |
Protocol Name corresponding to the field iana_number. |
observer.hostname |
keyword |
Hostname of the observer. |
observer.ip |
ip |
IP addresses of the observer. |
observer.product |
keyword |
The product name of the observer. |
observer.type |
keyword |
The type of the observer the data is coming from. |
observer.vendor |
keyword |
Vendor name of the observer. |
observer.version |
keyword |
Observer version. |
process.executable |
keyword |
Absolute path to the process executable. |
process.name |
keyword |
Process name. |
rule.id |
keyword |
Rule ID |
rule.ruleset |
keyword |
Rule ruleset |
source.domain |
keyword |
The domain name of the source. |
source.ip |
ip |
IP address of the source. |
source.port |
long |
Port of the source. |
url.path |
wildcard |
Path of the request, such as "/search". |
user.domain |
keyword |
Name of the directory the user is a member of. |
user.name |
keyword |
Short name or login of the user. |
For more information on the Intake Format, please find the code of the Parser, Smart Descriptions, and Supported Events here.
Troubleshooting
No event is received
In the Akamai Guardicore console, for each data exporter for Sekoia.io, check, in the Message format section:
ISO8601 (including milliseconds)is selected asFormat log timestamp