Firewall Rule
firewall_rule
The Firewall Rule object represents a specific rule within a firewall policy or event. It contains information about a rule's configuration, properties, and associated actions that define how network traffic is handled by the firewall.
Attributes
Caption | Name | Type | Description |
---|---|---|---|
Category | category |
String | The rule category. |
Condition | condition |
String | The rule trigger condition for the rule. For example: SQL_INJECTION. |
Description | desc |
String | The description of the rule that generated the event. |
Duration Milliseconds | duration |
Long | The rule response time duration, usually used for challenge completion time. |
Match Details | match_details |
String[] | The data in a request that rule matched. For example: '["10","and","1"]'. |
Match Location | match_location |
String | The location of the matched data in the source which resulted in the triggered firewall rule. For example: HEADER. |
Name | name |
String | The name of the rule that generated the event. |
Rate Limit | rate_limit |
Integer | The rate limit for a rate-based rule. |
Raw Data | raw_data |
JSON |
Group:context The event data as received from the event source. |
Record ID | record_id |
String |
Group:primary Unique identifier for the object |
Sensitivity | sensitivity |
String | The sensitivity of the firewall rule in the matched event. For example: HIGH. |
Type | type |
String | The rule type. |
Unique ID | uid |
String | The unique identifier of the rule that generated the event. |
Unmapped | unmapped |
Unmapped[] | Data from the source that was not mapped into the schema. |
Version | version |
String |
The rule version. For example: 1.1 .
|
Relationships
Inbound Relationships
These objects and events reference Firewall Rule in their attributes:
- Kernel Object Query
- Web Resource Access Activity
- Email URL Activity
- Discovery
- Web Resources Activity
- Network Connection Query
- Kernel Activity
- Memory Activity
- Script Activity
- Authentication
- Group Management
- Software Inventory Info
- Unmanned Systems
- NTP Activity
- Job Query
- Registry Key Activity
- Authorize Session
- Detection Finding
- User Session Query
- Module Query
- Scheduled Job Activity
- Device Inventory Info
- Process Remediation Activity
- Remediation Activity
- Network Remediation Activity
- User Access Management
- API Activity
- DHCP Activity
- Device Config State Change
- Drone Flights Activity
- Admin Group Query
- Security Finding
- Prefetch Query
- Email File Activity
- Networks Query
- Network Activity
- Network File Activity
- File System Activity
- Event Log Activity
- Compliance Finding
- File Query
- User Inventory Info
- File Remediation Activity
- Application Activity
- HTTP Activity
- Module Activity
- Application Lifecycle
- Datastore Activity
- FTP Activity
- Base Event
- Vulnerability Finding
- Cloud Resources Inventory Info
- Registry Value Query
- Tunnel Activity
- Network
- Windows Resource Activity
- Peripheral Device Query
- Airborne Broadcast Activity
- Process Activity
- Device Config State
- Kernel Extension Activity
- User Query
- System Activity
- Email Activity
- Operating System Patch State
- RDP Activity
- Application Error
- Startup Item Query
- Registry Key Query
- Service Query
- Entity Management
- DNS Activity
- Registry Value Activity
- Process Query
- Data Security Finding
- File Hosting Activity
- Folder Query
- SMB Activity
- Finding
- Incident Finding
- Windows Service Activity
- Scan Activity
- SSH Activity
- Account Change
- Identity & Access Management
- Discovery Result
- OSINT Inventory Info
Outbound Relationships
Firewall Rule references the following objects and events in its attributes:
This page describes ocsf-1.4.0
Updated 8 days ago