Logsources
For each Sigma rule to be effective at detection, it is important to identify what type of logs your SIEM is required to search over. This is important not only for efficiency of detections, but also for ensuring detection is happening against the correct set of fields and values applied.
Each logsource definition within a Sigma rule is made up of three separate fields. These fields, when used in combination, define a given logsource.
categoryproductservice
Each Sigma logsource is then usually (depending on your SIEM) prepended to the start of a detection query, in order for that query to target only those specific set of logs relevant to that detection. See this example below:
Logsource Basics
Before Sigma queries can be used effectively within an organization's SIEM or Alerting tooling, it's important to identify whether the detection can search over the appropriate types of logs that the Sigma detection requires.
Because each logsource will look fairly similar – especially in Sigma rules targeting Microsoft Windows™ domain – it's important to know when Sigma rules will match again a logsource, as any mismatches in logsource can render the detection ineffective.
Sigma Specification for Logsources
The Sigma Specification repository outlines a standard set of logsources, that is supported across the community in the Sigma rule collection.
Logsource Types
The category value is used to select all log files written by a certain group of products, like firewalls or web server logs.
The product value is used to select all log outputs of a certain product. For example, all Windows Eventlog types including "Security", "System", "Application" and the new log types like "AppLocker" and "Windows Defender".
Use the service value to select only a subset of a product's logs, like the "sshd" on Linux or the "Security" Eventlog on Windows systems.
Definition Field
You may also see a definition field within logsource description. This can also provide more information about how to onboard the log data source correctly, and doesn't get included when completing logsource matching.
tags:
- attack.privilege_escalation
- attack.t1548
logsource:
product: windows
category: ps_script
definition: Script Block Logging must be enabled
detection:
selection:
ScriptBlockText|contains: 'Invoke-Nightmare'Available Logsources
Standard Logsources
Below is a list of standard Sigma logsources. These are the logsources used within the sigma/rules repository.
AWS - Cloudtrail awscloudtrail
logsource:
product: aws
service: cloudtrailAntivirus antivirus
logsource:
category: antivirusApache apache
logsource:
service: apacheAzure - Activity Logs activityactivitylogsazurelogs
logsource:
product: azure
service: activitylogsAzure - Auditlogs auditlogsazure
logsource:
product: azure
service: auditlogsAzure - Azure Activity activityazureazureactivity
logsource:
product: azure
service: azureactivityAzure - Signinlogs azuresigninlogs
logsource:
product: azure
service: signinlogsCisco - Aaa - Accounting aaaaccountingcisco
logsource:
category: accounting
product: cisco
service: aaaDNS dns
logsource:
category: dnsDjango - Application applicationdjango
logsource:
category: application
product: djangoFirewall firewall
logsource:
category: firewallGoogle Cloud Platform - Google Cloud Platform.Audit cloudgcpgcp.auditgoogleplatformplatform.audit
logsource:
product: gcp
service: gcp.auditGoogle Workspace - Google Workspace.Admin googlegoogle_workspacegoogle_workspace.adminworkspaceworkspace.admin
logsource:
product: google_workspace
service: google_workspace.adminLinux linux
logsource:
product: linuxLinux - Auditd auditdlinux
logsource:
product: linux
service: auditdLinux - Auth authlinux
logsource:
product: linux
service: authLinux - Clamav clamavlinux
logsource:
product: linux
service: clamavLinux - Cron cronlinux
logsource:
product: linux
service: cronLinux - File Event eventfilefile_eventlinux
logsource:
product: linux
category: file_eventLinux - Guacamole guacamolelinux
logsource:
product: linux
service: guacamoleLinux - Modsecurity linuxmodsecurity
logsource:
product: linux
service: modsecurityLinux - Network Connection connectionlinuxnetworknetwork_connection
logsource:
category: network_connection
product: linuxLinux - Process Creation creationlinuxprocessprocess_creation
logsource:
category: process_creation
product: linuxLinux - Sshd linuxsshd
logsource:
product: linux
service: sshdLinux - Sudo linuxsudo
logsource:
product: linux
service: sudoLinux - Syslog linuxsyslog
logsource:
product: linux
service: syslogLinux - Vsftpd linuxvsftpd
logsource:
product: linux
service: vsftpdMicrosoft 365 - Exchange 365exchangem365microsoft
logsource:
product: m365
service: exchangeMicrosoft 365 - Threat Detection 365detectionm365microsoftthreatthreat_detection
logsource:
product: m365
service: threat_detectionMicrosoft 365 - Threat Management 365m365managementmicrosoftthreatthreat_management
logsource:
product: m365
service: threat_managementMicrosoft 365 Portal - Auditlogs 365auditlogsmicrosoftmicrosoft365portalportal
logsource:
product: microsoft365portal
service: auditlogsNetflow netflow
logsource:
service: netflowOkta - Okta okta
logsource:
product: okta
service: oktaOneLogin - OneLogin.Events oneloginonelogin.events
logsource:
product: onelogin
service: onelogin.eventsProxy proxy
logsource:
category: proxyPython - Application applicationpython
logsource:
category: application
product: pythonQualys qualys
logsource:
product: qualysRpc Firewall - Application applicationfirewallrpcrpc_firewall
logsource:
category: application
product: rpc_firewallRuby On Rails - Application applicationonrailsrubyruby_on_rails
logsource:
category: application
product: ruby_on_railsSQL - Application applicationsql
logsource:
category: application
product: sqlSpring - Application applicationspring
logsource:
category: application
product: springWebserver webserver
logsource:
category: webserverWindows windows
logsource:
product: windowsWindows - Application applicationwindows
logsource:
product: windows
service: applicationWindows - Applocker applockerwindows
logsource:
product: windows
service: applockerWindows - Bits Client bitsbits-clientclientwindows
logsource:
product: windows
service: bits-clientWindows - Codeintegrity Operational codeintegritycodeintegrity-operationaloperationalwindows
logsource:
product: windows
service: codeintegrity-operationalWindows - Create Remote Thread createcreate_remote_threadremotethreadwindows
logsource:
category: create_remote_thread
product: windowsWindows - Create Stream Hash createcreate_stream_hashhashstreamwindows
logsource:
category: create_stream_hash
product: windowsWindows - DNS Query dnsdns_queryquerywindows
logsource:
category: dns_query
product: windowsWindows - DNS Server dnsdns-serverserverwindows
logsource:
product: windows
service: dns-serverWindows - Diagnosis Scripted diagnosisdiagnosis-scriptedscriptedwindows
logsource:
product: windows
service: diagnosis-scriptedWindows - Driver Framework driverdriver-frameworkframeworkwindows
logsource:
product: windows
service: driver-frameworkWindows - Driver Load driverdriver_loadloadwindows
logsource:
category: driver_load
product: windowsWindows - File Access accessfilefile_accesswindows
logsource:
category: file_access
product: windowsWindows - File Block blockfilefile_blockwindows
logsource:
category: file_block
product: windowsWindows - File Change changefilefile_changewindows
logsource:
category: file_change
product: windowsWindows - File Delete deletefilefile_deletewindows
logsource:
category: file_delete
product: windowsWindows - File Event eventfilefile_eventwindows
logsource:
category: file_event
product: windowsWindows - File Rename filefile_renamerenamewindows
logsource:
category: file_rename
product: windowsWindows - Firewall As asfirewallfirewall-aswindows
logsource:
product: windows
service: firewall-asWindows - Image Load imageimage_loadloadwindows
logsource:
category: image_load
product: windowsWindows - Ldap Debug debugldapldap_debugwindows
logsource:
product: windows
service: ldap_debugWindows - Microsoft Servicebus Client clientmicrosoftmicrosoft-servicebus-clientservicebuswindows
logsource:
product: windows
service: microsoft-servicebus-clientWindows - Msexchange Management managementmsexchangemsexchange-managementwindows
logsource:
product: windows
service: msexchange-managementWindows - Network Connection connectionnetworknetwork_connectionwindows
logsource:
category: network_connection
product: windowsWindows - Ntlm ntlmwindows
logsource:
product: windows
service: ntlmWindows - OpenSSH opensshwindows
logsource:
product: windows
service: opensshWindows - Pipe Created createdpipepipe_createdwindows
logsource:
category: pipe_created
product: windowsWindows - Powershell powershellwindows
logsource:
product: windows
service: powershellWindows - Powershell Classic classicpowershellpowershell-classicwindows
logsource:
product: windows
service: powershell-classicWindows - Powershell Classic Provider Start classicpowershellproviderps_classic_provider_startstartwindows
logsource:
category: ps_classic_provider_start
product: windowsWindows - Powershell Classic Start classicpowershellps_classic_startstartwindows
logsource:
category: ps_classic_start
product: windowsWindows - Powershell Module modulepowershellps_modulewindows
logsource:
category: ps_module
product: windowsWindows - Powershell Script powershellps_scriptscriptwindows
logsource:
category: ps_script
product: windowsWindows - Printservice Admin adminprintserviceprintservice-adminwindows
logsource:
product: windows
service: printservice-adminWindows - Printservice Operational operationalprintserviceprintservice-operationalwindows
logsource:
product: windows
service: printservice-operationalWindows - Process Access accessprocessprocess_accesswindows
logsource:
category: process_access
product: windowsWindows - Process Creation creationprocessprocess_creationwindows
logsource:
category: process_creation
product: windowsWindows - Process Tampering processprocess_tamperingtamperingwindows
logsource:
category: process_tampering
product: windowsWindows - Raw Access Thread accessrawraw_access_threadthreadwindows
logsource:
category: raw_access_thread
product: windowsWindows - Registry Add addregistryregistry_addwindows
logsource:
category: registry_add
product: windowsWindows - Registry Delete deleteregistryregistry_deletewindows
logsource:
category: registry_delete
product: windowsWindows - Registry Event eventregistryregistry_eventwindows
logsource:
category: registry_event
product: windowsWindows - Registry Set registryregistry_setsetwindows
logsource:
category: registry_set
product: windowsWindows - Security securitywindows
logsource:
product: windows
service: securityWindows - Security securitywindows
logsource:
category: security
product: windowsWindows - Security Mitigations mitigationssecuritysecurity-mitigationswindows
logsource:
product: windows
service: security-mitigationsWindows - Shell Core coreshellshell-corewindows
logsource:
product: windows
service: shell-coreWindows - Smbclient Security securitysmbclientsmbclient-securitywindows
logsource:
product: windows
service: smbclient-securityWindows - Sysmon sysmonwindows
logsource:
product: windows
service: sysmonWindows - Sysmon Error errorsysmonsysmon_errorwindows
logsource:
category: sysmon_error
product: windowsWindows - Sysmon Status statussysmonsysmon_statuswindows
logsource:
category: sysmon_status
product: windowsWindows - System systemwindows
logsource:
product: windows
service: systemWindows - System systemwindows
logsource:
category: system
product: windowsWindows - Taskscheduler taskschedulerwindows
logsource:
product: windows
service: taskschedulerWindows - Terminalservices Localsessionmanager localsessionmanagerterminalservicesterminalservices-localsessionmanagerwindows
logsource:
product: windows
service: terminalservices-localsessionmanagerWindows - WMI windowswmi
logsource:
product: windows
service: wmiWindows - WMI Event eventwindowswmiwmi_event
logsource:
category: wmi_event
product: windowsWindows - Webserver webserverwindows
logsource:
category: webserver
product: windowsWindows - Windefend windefendwindows
logsource:
product: windows
service: windefendZeek - DNS dnszeek
logsource:
product: zeek
service: dnsZeek - Dce Rpc dcedce_rpcrpczeek
logsource:
product: zeek
service: dce_rpcZeek - Http httpzeek
logsource:
product: zeek
service: httpZeek - Kerberos kerberoszeek
logsource:
product: zeek
service: kerberosZeek - RDP rdpzeek
logsource:
product: zeek
service: rdpZeek - Smb Files filessmbsmb_fileszeek
logsource:
product: zeek
service: smb_filesZeek - X509 x509zeek
logsource:
product: zeek
service: x509macOS - File Event eventfilefile_eventmacos
logsource:
category: file_event
product: macosmacOS - Process Creation creationmacosprocessprocess_creation
logsource:
category: process_creation
product: macosCustom Logsources
Sigma does not restrict what a Sigma logsource can be defined as, meaning you can use Sigma for just about any kind of logsource within your SIEM.
With the use of Pipelines, you can specify granular field-mapping, and logsource-mapping to ensure that your Sigma rules are correct right after the conversion process.
You can also see a basic example of logsource and field-mapping within the Getting Started page.