Azure-Sentinel/Sample Data/CEF/illusive.csv

310 KiB

1TenantIdSourceSystemTimeGeneratedReceiptTimeDeviceVendorDeviceProductDeviceEventClassIDLogSeverityOriginalLogSeverityDeviceActionSimplifiedDeviceActionComputerCommunicationDirectionDeviceFacilityDestinationPortDestinationIPDeviceAddressDeviceNameMessageProtocolSourcePortSourceIPRemoteIPRemotePortMaliciousIPThreatSeverityIndicatorThreatTypeThreatDescriptionThreatConfidenceReportReferenceLinkMaliciousIPLongitudeMaliciousIPLatitudeMaliciousIPCountryDeviceVersionActivityApplicationProtocolEventCountDestinationDnsDomainDestinationServiceNameDestinationTranslatedAddressDestinationTranslatedPortDeviceDnsDomainDeviceExternalIDDeviceInboundInterfaceDeviceNtDomainDeviceOutboundInterfaceDevicePayloadIdProcessNameDeviceTranslatedAddressDestinationHostNameDestinationMACAddressDestinationNTDomainDestinationProcessIdDestinationUserPrivilegesDestinationProcessNameDeviceTimeZoneDestinationUserIDDestinationUserNameDeviceMacAddressProcessIDExternalIDFileCreateTimeFileHashFileIDFileModificationTimeFilePathFilePermissionFileTypeFileNameFileSizeReceivedBytesOldFileCreateTimeOldFileHashOldFileIDOldFileModificationTimeOldFileNameOldFilePathOldFilePermissionOldFileSizeOldFileTypeSentBytesRequestURLRequestClientApplicationRequestContextRequestCookiesRequestMethodSourceHostNameSourceMACAddressSourceNTDomainSourceDnsDomainSourceServiceNameSourceTranslatedAddressSourceTranslatedPortSourceProcessIdSourceUserPrivilegesSourceProcessNameSourceUserIDSourceUserNameEventTypeDeviceCustomIPv6Address1DeviceCustomIPv6Address1LabelDeviceCustomIPv6Address2DeviceCustomIPv6Address2LabelDeviceCustomIPv6Address3DeviceCustomIPv6Address3LabelDeviceCustomIPv6Address4DeviceCustomIPv6Address4LabelDeviceCustomFloatingPoint1DeviceCustomFloatingPoint1LabelDeviceCustomFloatingPoint2DeviceCustomFloatingPoint2LabelDeviceCustomFloatingPoint3DeviceCustomFloatingPoint3LabelDeviceCustomFloatingPoint4DeviceCustomFloatingPoint4LabelDeviceCustomNumber1DeviceCustomNumber1LabelDeviceCustomNumber2DeviceCustomNumber2LabelDeviceCustomNumber3DeviceCustomNumber3LabelDeviceCustomString1DeviceCustomString1LabelDeviceCustomString2DeviceCustomString2LabelDeviceCustomString3DeviceCustomString3LabelDeviceCustomString4DeviceCustomString4LabelDeviceCustomString5DeviceCustomString5LabelDeviceCustomString6DeviceCustomString6LabelDeviceCustomDate1DeviceCustomDate1LabelDeviceCustomDate2DeviceCustomDate2LabelFlexDate1FlexDate1LabelFlexNumber1FlexNumber1LabelFlexNumber2FlexNumber2LabelFlexString1FlexString1LabelFlexString2FlexString2LabelAdditionalExtensionsStartTimeEndTimeType_ResourceId
216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:00:23.827Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.12} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:00:23.863Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.29} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:00:58.12Z1.58971E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:00:58.12Z1.58971E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:01:04.867Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.12} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:01:04.903Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com logged in {User role \= ROLE_ADMIN Source address \= 192.168.77.1} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:02:04.907Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com logged in {User role \= ROLE_ADMIN Source address \= 192.168.77.1} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:02:52.217Z1.58971E+12illusiveillusiveillusive:login10null192.168.77.78Event type\=Audit Failure User Domain\=PREEDATTESTENV Event ID\=4771 Raw data\={"4771":{"eventId":4771,"recordNumber":2138141,"strings":["Admin2","S-1-5-21-2619870177-3502509152-1737558779-1117","krbtgt/PREEDATTESTENV","0x40810010","0x18","2","::ffff:10.1.2.13","49460","","",""],"timeGenerated":1589710055000,"timeWritten":1589710055000,"source":"win-euuezzttfsw.preedattestenv.com","eventType":"FAILURE"}} null10.1.2.13nullnullnull3.1.127.1613Login eventnullWINDOWSnullwin-euuezzttfsw.preedattestenv.comnullAdmin2null56nullnullnullnullendpoint3-pc.preedattestenv.comnullnullnullnullnullnullnull4771Windows Event Id26Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/26Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alerts;outcome=Audit FailurenullnullCommonSecurityLog
1016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:03:04.977Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.12} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
1116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:03:05.027Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.13} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
1216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:03:05.077Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.29} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
1316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:03:31.547Zillusiveillusiveillusive:login10nullhasForensics\=true nullnullnullnull3.1.127.1613Login eventnullnullnullnull57nullnullnullnullnullnullnullnullnullnullnullnull26Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/26Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
1416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:03:40.657Z1.58971E+12illusiveillusiveillusive:login10null192.168.77.78Event type\=Audit Failure User Domain\=PREEDATTESTENV Event ID\=4768 Raw data\={"4768":{"eventId":4768,"recordNumber":2138142,"strings":["testit","PREEDATTESTENV","S-1-0-0","krbtgt/PREEDATTESTENV","S-1-0-0","0x40810010","0x6","0xffffffff","-","::ffff:10.1.2.13","49461","","",""],"timeGenerated":1589710060000,"timeWritten":1589710060000,"source":"win-euuezzttfsw.preedattestenv.com","eventType":"FAILURE"}} null10.1.2.13nullnullnull3.1.127.1613Login eventnullWINDOWSnullwin-euuezzttfsw.preedattestenv.comnulltestitnull57nullnullnullnullENDPOINT3-PC.PreedatTestEnv.comnullnullNo User is Logged-innullnullnullnullnull4768Windows Event Id26Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/26Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alerts;outcome=Audit FailurenullnullCommonSecurityLog
1516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:03:54.86Z1.58971E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78null10.1.2.29nullnullnull3.1.127.1613Access eventnullSSHnullnullnull58nullnullnullnullnullnullnullnullnullnullnullnull27Incident Idnullhttps://MgmtServer2.PreedatTestEnv.com/#/incident/27Incident URLnullnullcat=illusive:alertsnullnullCommonSecurityLog
1616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:04:48.467Z1.58971E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78processes\=ftp.exe null10.1.2.12nullnullnull3.1.127.1613Access eventnullFTPnullnullnull59nullnullnullnullENDPOINT2-PC.PreedatTestEnv.comnullnullcmd.exe(2608),ftp.exeUser2nullnullnullnullnullnull28Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/28Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
1716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:04:57.657Zillusiveillusiveillusive:login10nullhasForensics\=true nullnullnullnull3.1.127.1613Login eventnullnullnullnull60nullnullnullnullnullnullnullnullnullnullnullnull28Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/28Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
1816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:05:06.78Z1.58971E+12illusiveillusiveillusive:login10null10.1.2.72192.168.77.78processes\=ftp.exe Is Successful Login\=false null10.1.2.12nullnullnull3.1.127.1613Login eventnullFTPnullnullgjkljsdkljdsglnull60nullnullnullnullENDPOINT2-PC.PreedatTestEnv.comnullnullcmd.exe(2608),ftp.exeUser2nullnullnullnullnullnull28Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/28Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
1916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:05:15.857Zillusiveillusiveillusive:access10nullhasForensics\=true nullnullnullnull3.1.127.1613Access eventnullnullnullnull59nullnullnullnullnullnullnullnullnullnullnullnull28Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/28Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
2016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:05:22.94Z1.58971E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78processes\=ftp.exe null10.1.2.12nullnullnull3.1.127.1613Access eventnullFTPnullnullnull62nullnullnullnullENDPOINT2-PC.PreedatTestEnv.comnullnullcmd.exe(2608),ftp.exeUser2nullnullnullnullnullnull30Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/30Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
2116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:06:14.377Zillusiveillusiveillusive:access10nullhasForensics\=true nullnullnullnull3.1.127.1613Access eventnullnullnullnull62nullnullnullnullnullnullnullnullnullnullnullnull30Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/30Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
2216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:06:22.33Zillusiveillusiveillusive:login10nullhasForensics\=true nullnullnullnull3.1.127.1613Login eventnullnullnullnull63nullnullnullnullnullnullnullnullnullnullnullnull31Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/31Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
2316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:07:23.563Z1.58971E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78null10.1.2.28nullnullnull3.1.127.1613Access eventnullSSHnullnullnull67nullnullnullnullnullnullnullnullnullnullnullnull32Incident Idnullhttps://MgmtServer2.PreedatTestEnv.com/#/incident/32Incident URLnullnullcat=illusive:alertsnullnullCommonSecurityLog
2416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:07:32.753Z1.58971E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78Share Folder Name\=c$ Operation Result\=$Recycle.Bin\\\nbootmgr\nBOOTNXT\nDocuments and Settings\\\npagefile.sys\nPerfLogs\\\nProgram Files\\\nProgram Files (x86)\\\nProgramData\\\nRecovery\\\nswapfile.sys\nSystem Volume Information\\\nUsers\\\nWindows\\ Share Access Attempt User\=User2 Operation\=Search Operation Data\=\\* null10.1.2.12nullnullnull3.1.127.1613Access eventnullSHAREnullnullnull66nullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnull30Incident Idnullc$Share Folder NameSearchOperation\\*Operation DataMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/30Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
2516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:07:41.813Zillusiveillusiveillusive:login10nullhasForensics\=true nullnullnullnull3.1.127.1613Login eventnullnullnullnull64nullnullnullnullnullnullnullnullnullnullnullnull30Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/30Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
2616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:07:50.94Z1.58971E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78Share Folder Name\=c$ Operation Result\=$Recycle.Bin\\\nbootmgr\nBOOTNXT\nDocuments and Settings\\\npagefile.sys\nPerfLogs\\\nProgram Files\\\nProgram Files (x86)\\\nProgramData\\\nRecovery\\\nswapfile.sys\nSystem Volume Information\\\nUsers\\\nWindows\\ Share Access Attempt User\=User2 Operation\=Search Operation Data\=\\* null10.1.2.12nullnullnull3.1.127.1613Access eventnullSHAREnullnullnull65nullnullnullnullENDPOINT2-PC.PreedatTestEnv.comnullnullN/A,N/AUser2nullnullnullnullnullnull30Incident Idnullc$Share Folder NameSearchOperation\\*Operation DataMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/30Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
2716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:08:00.097Zillusiveillusiveillusive:access10nullhasForensics\=true nullnullnullnull3.1.127.1613Access eventnullnullnullnull65nullnullnullnullnullnullnullnullnullnullnullnull30Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/30Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
2816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:08:07.72Z1.58971E+12illusiveillusiveillusive:login10null10.1.2.72192.168.77.78processes\=ftp.exe Is Successful Login\=false null10.1.2.12nullnullnull3.1.127.1613Login eventnullFTPnullnullgdlkgds lnull64nullnullnullnullENDPOINT2-PC.PreedatTestEnv.comnullnullcmd.exe(2608),ftp.exeUser2nullnullnullnullnullnull30Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/30Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
2916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:09:07.833Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.28} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
3016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:09:07.86Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.12} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
3116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:09:07.89Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.13} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
3216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:15:58.297Z1.58971E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
3316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:15:58.31Z1.58971E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
3416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:21:16.173Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com logged out {User role \= ROLE_ADMIN Source address \= 192.168.77.1} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
3516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:21:21.193Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com logged out {User role \= ROLE_ADMIN Source address \= 192.168.77.1} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
3616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:21:21.197Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com logged out {User role \= ROLE_ADMIN Source address \= 192.168.77.1} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
3716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:21:21.197Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com logged out {User role \= ROLE_ADMIN Source address \= 192.168.77.1} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
3816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:30:58.457Z1.58971E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
3916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-12T21:30:58.47Z1.58971E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
4016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T20:22:22Z1.58949E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
4116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T20:37:22.107Z1.58949E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
4216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T20:52:22.19Z1.58949E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
4316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T21:00:27.213Zillusiveillusiveillusive:access10nullhasForensics\=true nullnullnullnull3.1.127.1613Access eventnullnullnullnull32nullnullnullnullnullnullnullnullnullnullnullnull13Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/13Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
4416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T21:00:36.337Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78Share Folder Name\=c$ Operation Result\=$Recycle.Bin\\\nbootmgr\nBOOTNXT\nDocuments and Settings\\\npagefile.sys\nPerfLogs\\\nProgram Files\\\nProgram Files (x86)\\\nProgramData\\\nRecovery\\\nswapfile.sys\nSystem Volume Information\\\nUsers\\\nWindows\\ Share Access Attempt User\=User2 Operation\=Search Operation Data\=\\* null10.1.2.12nullnullnull3.1.127.1613Access eventnullSHAREnullnullnull33nullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnull13Incident Idnullc$Share Folder NameSearchOperation\\*Operation DataMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/13Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
4516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T21:07:26.87Z1.58949E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
4616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T21:10:08.943Z1.5897E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
4716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T21:10:08.967Z1.5897E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
4816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T21:16:36.717Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com logged out {User role \= ROLE_ADMIN Source address \= 192.168.77.1} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
4916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T21:16:36.767Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com logged out {User role \= ROLE_ADMIN Source address \= 192.168.77.1} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
5016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T21:22:26.95Z1.58949E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
5116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T21:25:09.19Z1.5897E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
5216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T21:25:14.217Z1.5897E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
5316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T21:37:27.047Z1.58949E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
5416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T21:40:09.52Z1.5897E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
5516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T21:40:14.55Z1.5897E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
5616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T21:52:27.137Z1.58949E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
5716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T21:55:09.837Z1.58971E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
5816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T21:55:14.863Z1.58971E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
5916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T22:07:27.217Z1.58949E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
6016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T22:10:10.303Z1.58971E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
6116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T22:10:15.337Z1.58971E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
6216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T22:22:27.317Z1.58949E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
6316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T22:25:10.647Z1.58971E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
6416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T22:25:15.673Z1.58971E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
6516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T22:37:27.407Z1.5895E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
6616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T22:40:10.817Z1.58971E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
6716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T22:40:15.837Z1.58971E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
6816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T22:52:27.51Z1.5895E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
6916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T23:07:27.613Z1.5895E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
7016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T23:22:27.703Z1.5895E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
7116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T23:37:27.797Z1.5895E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
7216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-14T23:52:27.907Z1.5895E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
7316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T00:07:28Z1.5895E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
7416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T00:22:28.09Z1.5895E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
7516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T00:37:28.183Z1.5895E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
7616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T00:52:28.28Z1.5895E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
7716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T01:07:28.357Z1.5895E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
7816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T01:22:28.437Z1.58951E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
7916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T01:37:28.53Z1.58951E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
8016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T01:52:28.607Z1.58951E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
8116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T02:07:28.687Z1.58951E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
8216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T02:22:28.747Z1.58951E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
8316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T02:37:28.833Z1.58951E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
8416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T02:52:28.917Z1.58951E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
8516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T03:07:29.017Z1.58951E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
8616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T03:22:29.107Z1.58951E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
8716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T03:37:37.227Z1.58951E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
8816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T03:52:37.307Z1.58951E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
8916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T04:07:37.407Z1.58952E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
9016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T04:22:37.503Z1.58952E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
9116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T04:37:37.597Z1.58952E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
9216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T04:52:37.683Z1.58952E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
9316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T05:07:37.763Z1.58952E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
9416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T05:22:37.847Z1.58952E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
9516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T05:37:45.167Z1.58952E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
9616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T05:52:45.247Z1.58952E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
9716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T06:07:45.297Z1.58952E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
9816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T06:22:45.387Z1.58952E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
9916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T06:37:45.467Z1.58952E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
10016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T06:52:45.56Z1.58953E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
10116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T07:07:45.68Z1.58953E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
10216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T07:22:45.777Z1.58953E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
10316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T07:37:45.857Z1.58953E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
10416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T07:52:45.95Z1.58953E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
10516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T08:07:46.03Z1.58953E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
10616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T08:22:46.13Z1.58953E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
10716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T08:37:46.233Z1.58953E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
10816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T08:52:50.86Z1.58953E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
10916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T09:07:50.977Z1.58953E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
11016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T09:22:52.71Z1.58953E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
11116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T09:37:52.8Z1.58954E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
11216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T09:52:52.89Z1.58954E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
11316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T10:07:52.99Z1.58954E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
11416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T10:22:53.027Z1.58954E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
11516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T10:37:53.123Z1.58954E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
11616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T10:52:53.207Z1.58954E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
11716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T11:07:53.3Z1.58954E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
11816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T11:22:53.41Z1.58954E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
11916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T11:37:57.553Z1.58954E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
12016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T11:52:57.64Z1.58954E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
12116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T12:07:57.74Z1.58954E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
12216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T12:22:57.847Z1.58955E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
12316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T12:37:57.937Z1.58955E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
12416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T12:52:58.02Z1.58955E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
12516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T13:07:58.11Z1.58955E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
12616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T13:22:58.207Z1.58955E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
12716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T13:37:58.307Z1.58955E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
12816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T13:52:58.393Z1.58955E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
12916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T14:07:58.507Z1.58955E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
13016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T14:22:58.557Z1.58955E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
13116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T14:37:58.67Z1.58955E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
13216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T14:52:58.773Z1.58955E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
13316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T15:07:58.867Z1.58956E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
13416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T15:23:02.037Z1.58956E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
13516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T15:38:02.123Z1.58956E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
13616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T15:53:02.203Z1.58956E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
13716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T16:08:02.297Z1.58956E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
13816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T16:23:02.387Z1.58956E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
13916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T16:38:02.483Z1.58956E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
14016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T16:53:02.6Z1.58956E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
14116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T17:08:02.687Z1.58956E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
14216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T17:23:02.773Z1.58956E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
14316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T17:38:02.867Z1.58956E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
14416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T17:53:02.96Z1.58957E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
14516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T18:08:08.683Z1.58957E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
14616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T18:23:08.77Z1.58957E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
14716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T18:38:08.863Z1.58957E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
14816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T18:53:08.97Z1.58957E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
14916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T19:08:09.063Z1.58957E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
15016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T19:23:09.137Z1.58957E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
15116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T19:38:09.167Z1.58957E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
15216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T19:53:09.267Z1.58957E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
15316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T20:08:18.037Z1.58957E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
15416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T20:23:18.127Z1.58957E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
15516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T20:38:18.223Z1.58958E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
15616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T20:53:18.33Z1.58958E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
15716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:00:30.41Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.29} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
15816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:00:30.453Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.28} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
15916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:00:30.503Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.12} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
16016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:00:30.547Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.16} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
16116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:00:30.593Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.13} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
16216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:03:54.78Z1.5897E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
16316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:03:59.807Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78processes\=ftp.exe null10.1.2.12nullnullnull3.1.127.1613Access eventnullFTPnullnullnull28nullnullnullnullENDPOINT2-PC.PreedatTestEnv.comnullnullcmd.exe(2608),ftp.exeUser2nullnullnullnullnullnull10Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/10Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
16416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:03:59.807Z1.5897E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
16516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:04:39.87Z1.5897E+12illusiveillusiveillusive:login10null192.168.77.78Event type\=Audit Failure User Domain\=PREEDATTESTENV Event ID\=4768 Raw data\={"4768":{"eventId":4768,"recordNumber":2136221,"strings":["testit","PREEDATTESTENV","S-1-0-0","krbtgt/PREEDATTESTENV","S-1-0-0","0x40810010","0x6","0xffffffff","-","::ffff:10.1.2.13","49317","","",""],"timeGenerated":1589700910000,"timeWritten":1589700910000,"source":"win-euuezzttfsw.preedattestenv.com","eventType":"FAILURE"}} null10.1.2.13nullnullnull3.1.127.1613Login eventnullWINDOWSnullwin-euuezzttfsw.preedattestenv.comnulltestitnull29nullnullnullnullENDPOINT3-PC.PreedatTestEnv.comnullnullNo User is Logged-innullnullnullnullnull4768Windows Event Id11Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/11Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alerts;outcome=Audit FailurenullnullCommonSecurityLog
16616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:04:48.917Zillusiveillusiveillusive:login10nullhasForensics\=true nullnullnullnull3.1.127.1613Login eventnullnullnullnull29nullnullnullnullnullnullnullnullnullnullnullnull11Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/11Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
16716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:04:58.073Zillusiveillusiveillusive:access10nullhasForensics\=true nullnullnullnull3.1.127.1613Access eventnullnullnullnull28nullnullnullnullnullnullnullnullnullnullnullnull10Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/10Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
16816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:07:03.79Z1.5897E+12illusiveillusiveillusive:login10null10.1.2.72192.168.77.78processes\=ftp.exe Is Successful Login\=false null10.1.2.12nullnullnull3.1.127.1613Login eventnullFTPnullnullsafkalfnull31nullnullnullnullENDPOINT2-PC.PreedatTestEnv.comnullnullcmd.exe(2608),ftp.exeUser2nullnullnullnullnullnull10Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/10Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
16916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:08:05.853Zillusiveillusiveillusive:login10nullhasForensics\=true nullnullnullnull3.1.127.1613Login eventnullnullnullnull31nullnullnullnullnullnullnullnullnullnullnullnull10Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/10Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
17016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:08:18.423Z1.58958E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
17116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:23:18.517Z1.58958E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
17216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:38:18.623Z1.58958E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
17316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T21:53:21.197Z1.58958E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
17416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T22:08:21.28Z1.58958E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
17516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T22:23:21.363Z1.58958E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
17616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T22:38:21.46Z1.58958E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
17716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T22:53:21.553Z1.58958E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
17816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T23:08:21.647Z1.58958E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
17916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T23:23:21.737Z1.58959E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
18016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T23:38:21.823Z1.58959E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
18116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-15T23:53:21.907Z1.58959E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
18216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T00:08:22.003Z1.58959E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
18316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T00:23:22.1Z1.58959E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
18416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T00:38:22.21Z1.58959E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
18516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T00:53:22.313Z1.58959E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
18616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T01:08:22.407Z1.58959E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
18716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T01:23:22.5Z1.58959E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
18816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T01:38:23.863Z1.58959E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
18916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T01:53:23.963Z1.58959E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
19016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T02:08:24.057Z1.58959E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
19116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T02:23:24.147Z1.5896E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
19216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T02:38:24.233Z1.5896E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
19316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T02:53:24.313Z1.5896E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
19416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T03:08:24.357Z1.5896E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
19516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T03:23:24.437Z1.5896E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
19616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T03:38:24.52Z1.5896E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
19716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T03:53:24.617Z1.5896E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
19816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T04:08:24.71Z1.5896E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
19916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T04:23:26.997Z1.5896E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
20016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T04:38:27.087Z1.5896E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
20116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T04:53:27.18Z1.5896E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
20216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T05:08:27.277Z1.58961E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
20316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T05:23:27.363Z1.58961E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
20416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T05:38:27.467Z1.58961E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
20516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T05:53:27.513Z1.58961E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
20616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T06:08:27.6Z1.58961E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
20716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T06:23:27.713Z1.58961E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
20816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T06:38:27.817Z1.58961E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
20916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T06:53:27.907Z1.58961E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
21016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T07:08:28.007Z1.58961E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
21116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T07:23:28.12Z1.58961E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
21216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T07:38:28.207Z1.58961E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
21316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T07:53:28.32Z1.58962E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
21416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T08:08:30.81Z1.58962E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
21516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T08:23:30.897Z1.58962E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
21616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T08:38:30.997Z1.58962E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
21716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T08:53:31.093Z1.58962E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
21816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T09:08:31.17Z1.58962E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
21916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T09:23:31.26Z1.58962E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
22016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T09:38:31.347Z1.58962E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
22116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T09:53:31.437Z1.58962E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
22216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T10:08:36.223Z1.58962E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
22316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T10:23:36.31Z1.58962E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
22416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T10:38:36.403Z1.58963E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
22516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T10:53:36.437Z1.58963E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
22616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T11:08:36.543Z1.58963E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
22716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T11:23:36.64Z1.58963E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
22816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T11:38:36.737Z1.58963E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
22916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T11:53:36.83Z1.58963E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
23016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T12:08:36.857Z1.58963E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
23116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T12:23:36.963Z1.58963E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
23216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T12:38:37.067Z1.58963E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
23316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T12:53:37.177Z1.58963E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
23416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T13:08:37.277Z1.58963E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
23516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T13:23:37.367Z1.58964E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
23616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T13:38:38.313Z1.58964E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
23716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T13:53:38.407Z1.58964E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
23816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T14:08:38.51Z1.58964E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
23916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T14:23:38.613Z1.58964E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
24016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T14:38:48.72Z1.58964E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
24116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T14:53:48.82Z1.58964E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
24216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T15:08:48.92Z1.58964E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
24316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T15:23:49.017Z1.58964E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
24416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T15:38:49.11Z1.58964E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
24516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T15:53:49.207Z1.58964E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
24616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T16:08:49.247Z1.58965E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
24716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T16:23:49.33Z1.58965E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
24816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T16:38:49.407Z1.58965E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
24916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T16:53:49.5Z1.58965E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
25016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T17:08:52.093Z1.58965E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
25116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T17:23:52.18Z1.58965E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
25216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T17:38:52.28Z1.58965E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
25316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T17:53:52.38Z1.58965E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
25416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T18:08:52.47Z1.58965E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
25516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T18:23:52.56Z1.58965E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
25616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T18:38:52.65Z1.58965E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
25716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T18:53:52.753Z1.58966E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
25816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T19:08:52.847Z1.58966E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
25916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T19:23:52.937Z1.58966E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
26016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T19:38:53.027Z1.58966E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
26116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T19:53:53.117Z1.58966E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
26216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T20:08:53.157Z1.58966E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
26316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T20:23:53.263Z1.58966E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
26416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T20:38:53.367Z1.58966E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
26516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T20:53:53.453Z1.58966E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
26616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T21:09:00.97Z1.58966E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
26716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T21:24:01.07Z1.58966E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
26816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T21:39:01.157Z1.58967E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
26916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T21:54:01.24Z1.58967E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
27016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T22:09:01.33Z1.58967E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
27116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T22:24:01.44Z1.58967E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
27216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T22:39:01.533Z1.58967E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
27316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T22:54:01.64Z1.58967E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
27416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T23:09:01.727Z1.58967E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
27516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T23:24:01.837Z1.58967E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
27616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T23:39:01.94Z1.58967E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
27716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-16T23:54:04.107Z1.58967E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
27816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T00:09:04.187Z1.58967E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
27916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T00:24:04.277Z1.58967E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
28016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T00:39:04.37Z1.58968E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
28116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T00:54:14.413Z1.58968E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
28216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T01:09:14.507Z1.58968E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
28316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T01:24:14.617Z1.58968E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
28416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T01:39:14.703Z1.58968E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
28516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T01:54:14.79Z1.58968E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
28616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T02:09:14.827Z1.58968E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
28716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T02:24:14.907Z1.58968E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
28816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T02:39:14.987Z1.58968E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
28916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T02:54:15.067Z1.58968E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
29016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T03:09:15.16Z1.58968E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
29116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T03:24:15.257Z1.58969E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
29216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T03:39:15.36Z1.58969E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
29316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T03:54:15.437Z1.58969E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
29416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T04:09:15.54Z1.58969E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
29516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T04:24:15.657Z1.58969E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
29616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T04:39:15.753Z1.58969E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
29716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T04:54:15.827Z1.58969E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.125.0-SNAPSHOTHeartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
29816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:10:56.44Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com added report server {Host\=10.1.2.29 Server type\=SYSLOG} full details {Port\=514 Host\=10.1.2.29 SEND_AUDITS\=true Protocol\=TCP Server type\=SYSLOG}nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
29916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:10:56.557Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com completed configuration wizard step {step id\=a3de3b02-1405-11e9-ab14-d663bd873d93} full details {status changed from 'PENDING' to 'COMPLETED'}nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
30016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:10:56.68Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com completed configuration wizard step {step id\=fbfec47e-f17d-4074-9caf-7716ac000a20} full details {status changed from 'PENDING' to 'COMPLETED'}nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
30116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:11:56.843Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com assigned directory entity to attacker view {Entity type\=Computer Entity name\=ENDPOINT3-PC} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
30216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:11:56.883Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com assigned directory entity to attacker view {Entity type\=Computer Entity name\=ENDPOINT5-PC} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
30316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:11:56.92Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com started attacker view collection nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
30416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:11:56.963Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com assigned directory entity to attacker view {Entity type\=Computer Entity name\=ENDPOINT2-PC} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
30516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:13:57.173Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com added deception entity {username\=Admin2} full details {AD User\=true password\=927mObB domain_name\=PreedatTestEnv.com is_persist\=false username\=Admin2}nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
30616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:13:57.233Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com added deception entity {username\=user5} full details {AD User\=true password\=JoMAlY11 domain_name\=PreedatTestEnv.com is_persist\=false username\=user5}nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
30716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:13:57.297Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com added deception entity {username\=testit} full details {AD User\=false password\=fERRa32 domain_name\=PreedatTestEnv.com is_persist\=false username\=testit}nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
30816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:14:57.473Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com added deception entity {host\=winemacgw10.preedattestenv.com} full details {AD Host\=false host\=winemacgw10.preedattestenv.com service type\=WEB}nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
30916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:14:57.523Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com added deception entity {host\=sharepoint1.preedattestenv.com} full details {AD Host\=false host\=sharepoint1.preedattestenv.com service type\=WEB}nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
31016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:14:57.577Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com added deception entity {host\=sharepoint2.preedattestenv.com} full details {AD Host\=false host\=sharepoint2.preedattestenv.com service type\=WEB}nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
31116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:14:57.637Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com added deception entity {host\=winemacgw11.preedattestenv.com} full details {AD Host\=false host\=winemacgw11.preedattestenv.com service type\=WEB}nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
31216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:15:57.817Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com assigned entity to policy {Entity type\=Computer Entity name\=ENDPOINT5-PC Full Protection} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
31316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:15:57.863Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deployed all policies nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
31416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:15:57.907Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com assigned entity to policy {Entity type\=Computer Entity name\=ENDPOINT3-PC Full Protection} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
31516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:15:57.953Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com assigned entity to policy {Entity type\=Computer Entity name\=ENDPOINT2-PC Full Protection} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
31616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:17:54.543Zillusiveillusiveillusive:login10nullhasForensics\=true nullnullnullnull3.1.127.1613Login eventnullnullnullnull2nullnullnullnullnullnullnullnullnullnullnullnull2Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/2Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
31716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:18:07.25Z1.5897E+12illusiveillusiveillusive:login10null192.168.77.78Event type\=Audit Failure User Domain\=PREEDATTESTENV Event ID\=4768 Raw data\={"4768":{"eventId":4768,"recordNumber":2135807,"strings":["testit","PREEDATTESTENV","S-1-0-0","krbtgt/PREEDATTESTENV","S-1-0-0","0x40810010","0x6","0xffffffff","-","::ffff:10.1.2.12","49219","","",""],"timeGenerated":1589699707000,"timeWritten":1589699707000,"source":"win-euuezzttfsw.preedattestenv.com","eventType":"FAILURE"}} null10.1.2.12nullnullnull3.1.127.1613Login eventnullWINDOWSnullwin-euuezzttfsw.preedattestenv.comnulltestitnull2nullnullnullnullENDPOINT2-PC.PreedatTestEnv.comnullnullUser2nullnullnullnullnull4768Windows Event Id2Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/2Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alerts;outcome=Audit FailurenullnullCommonSecurityLog
31816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:18:57.523Z1.5897E+12illusiveillusiveillusive:login10null192.168.77.78Event type\=Audit Failure User Domain\=PREEDATTESTENV Event ID\=4771 Raw data\={"4771":{"eventId":4771,"recordNumber":2135871,"strings":["Admin2","S-1-5-21-2619870177-3502509152-1737558779-1117","krbtgt/PREEDATTESTENV","0x40810010","0x18","2","::ffff:10.1.2.12","49228","","",""],"timeGenerated":1589699752000,"timeWritten":1589699752000,"source":"win-euuezzttfsw.preedattestenv.com","eventType":"FAILURE"}} null10.1.2.12nullnullnull3.1.127.1613Login eventnullWINDOWSnullwin-euuezzttfsw.preedattestenv.comnullAdmin2null3nullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnull4771Windows Event Id2Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/2Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alerts;outcome=Audit FailurenullnullCommonSecurityLog
31916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:20:01.443Zillusiveillusiveillusive:access10nullhasForensics\=true nullnullnullnull3.1.127.1613Access eventnullnullnullnull4nullnullnullnullnullnullnullnullnullnullnullnull3Incident IdnullMay 17 2020 12:15:58 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/3Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
32016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:20:16.6Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78processes\=ftp.exe null10.1.2.16nullnullnull3.1.127.1613Access eventnullFTPnullnullnull4nullnullnullnullEndpoint5-PC.PreedatTestEnv.comnullnullcmd.exe(1648),ftp.exeuser5nullnullnullnullnullnull3Incident IdnullMay 17 2020 12:15:58 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/3Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
32116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:20:25.723Z1.5897E+12illusiveillusiveillusive:login10null10.1.2.72192.168.77.78Is Successful Login\=false null10.1.2.16nullnullnull3.1.127.1613Login eventnullFTPnullnullhdfjksfsnull5nullnullnullnullendpoint5-pc.preedattestenv.comnullnullnullnullnullnullnullnull3Incident IdnullMay 17 2020 12:15:58 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/3Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
32216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:21:05.77Zillusiveillusiveillusive:access10nullhasForensics\=true nullnullnullnull3.1.127.1613Access eventnullnullnullnull6nullnullnullnullnullnullnullnullnullnullnullnull4Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/4Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
32316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:21:34.973Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78accept-language\=en-US,en q\=0.9 Web Protocol\=HTTP accept\=text/html,application/xhtml+xml,application/xml q\=0.9,image/webp,image/apng,*/* q\=0.8,application/signed-exchange v\=b3 q\=0.9 Web Host\=10.1.2.72 Web Url\=/ authorization\=Digest username\="fdslkf d", realm\="Domain Name", nonce\="1589699919330:8b2ca8e89a3a6f07e4a23ed531511415", uri\="/", response\="3c07d81f9768008ed2cfc8f57ca305bd", opaque\="A5F6B6ED2AD91DFCC42EB94987D23D53", qop\=auth, nc\=00000002, cnonce\="bba347df912d5e91" Web Body\= Web Method\=GET upgrade-insecure-requests\=1 Web User Agent\=Mozilla/5.0 (Windows NT 6.1 WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36 connection\=keep-alive cache-control\=max-age\=0 accept-encoding\=gzip, deflate null10.1.2.13nullnullnull3.1.127.1613Access eventnullWEBnullnullnull9nullnullnullnullMozilla/5.0 (Windows NT 6.1 WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36endpoint3-pc.preedattestenv.comnullnullnullnullnullnullnullnull4Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/4Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
32416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:21:44.053Z1.5897E+12illusiveillusiveillusive:login10null10.1.2.72192.168.77.78Is Successful Login\=false accept-language\=en-US,en q\=0.9 Web Protocol\=HTTP accept\=text/html,application/xhtml+xml,application/xml q\=0.9,image/webp,image/apng,*/* q\=0.8,application/signed-exchange v\=b3 q\=0.9 Web Host\=10.1.2.72 Web Url\=/ authorization\=Digest username\="fdslkf d", realm\="Domain Name", nonce\="1589699919330:8b2ca8e89a3a6f07e4a23ed531511415", uri\="/", response\="3c07d81f9768008ed2cfc8f57ca305bd", opaque\="A5F6B6ED2AD91DFCC42EB94987D23D53", qop\=auth, nc\=00000002, cnonce\="bba347df912d5e91" Web Body\= Web Method\=GET upgrade-insecure-requests\=1 Web User Agent\=Mozilla/5.0 (Windows NT 6.1 WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36 connection\=keep-alive cache-control\=max-age\=0 accept-encoding\=gzip, deflate null10.1.2.13nullnullnull3.1.127.1613Login eventnullWEBnullnullfdslkf dnull10nullnullnullnullMozilla/5.0 (Windows NT 6.1 WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36endpoint3-pc.preedattestenv.comnullnullnullnullnullnullnullnull4Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/4Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
32516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:21:53.16Z1.5897E+12illusiveillusiveillusive:access10330610.1.2.72192.168.77.78Source Port\=49277 Database Type\=MySQL Trap port\=3306 4927710.1.2.13nullnullnull3.1.127.1613Access eventnullDBnullnullnull7nullnullnullnullendpoint3-pc.preedattestenv.comnullnullnullnullnullnullnullnull4Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/4Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
32616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:22:02.287Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78accept-language\=en-US,en q\=0.9 Web Body\= Web Method\=GET upgrade-insecure-requests\=1 Web User Agent\=Mozilla/5.0 (Windows NT 6.1 WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36 connection\=keep-alive Web Protocol\=HTTP accept-encoding\=gzip, deflate accept\=text/html,application/xhtml+xml,application/xml q\=0.9,image/webp,image/apng,*/* q\=0.8,application/signed-exchange v\=b3 q\=0.9 Web Host\=10.1.2.72 Web Url\=/ null10.1.2.13nullnullnull3.1.127.1613Access eventnullWEBnullnullnull8nullnullnullnullMozilla/5.0 (Windows NT 6.1 WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36endpoint3-pc.preedattestenv.comnullnullnullnullnullnullnullnull4Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/4Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
32716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:22:11.537Z1.5897E+12illusiveillusiveillusive:access10330610.1.2.72192.168.77.78Source Port\=49286 Database Type\=MySQL Trap port\=3306 4928610.1.2.13nullnullnull3.1.127.1613Access eventnullDBnullnullnull11nullnullnullnullendpoint3-pc.preedattestenv.comnullnullnullnullnullnullnullnull4Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/4Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
32816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:22:20.723Z1.5897E+12illusiveillusiveillusive:access10330610.1.2.72192.168.77.78Source Port\=49276 processes\=chrome.exe Database Type\=MySQL Trap port\=3306 4927610.1.2.13nullnullnull3.1.127.1613Access eventnullDBnullnullnull6nullnullnullnullENDPOINT3-PC.PreedatTestEnv.comnullnullchrome.exe(292),chrome.exeUser3nullnullnullnullnullnull4Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/4Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
32916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:22:55.3Z1.5897E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
33016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:22:55.3Z1.5897E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
33116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:23:28.473Zillusiveillusiveillusive:access10nullhasForensics\=true nullnullnullnull3.1.127.1613Access eventnullnullnullnull12nullnullnullnullnullnullnullnullnullnullnullnull2Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/2Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
33216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:23:34.567Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78Share Folder Name\=c$ Operation Result\=$Recycle.Bin\\\nbootmgr\nBOOTNXT\nDocuments and Settings\\\npagefile.sys\nPerfLogs\\\nProgram Files\\\nProgram Files (x86)\\\nProgramData\\\nRecovery\\\nswapfile.sys\nSystem Volume Information\\\nUsers\\\nWindows\\ Share Access Attempt User\=User2 Operation\=Search Operation Data\=\\* null10.1.2.12nullnullnull3.1.127.1613Access eventnullSHAREnullnullnull12nullnullnullnullENDPOINT2-PC.PreedatTestEnv.comnullnullN/A,N/AUser2nullnullnullnullnullnull2Incident Idnullc$Share Folder NameSearchOperation\\*Operation DataMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/2Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
33316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:23:43.677Zillusiveillusiveillusive:access10nullhasForensics\=true nullnullnullnull3.1.127.1613Access eventnullnullnullnull13nullnullnullnullnullnullnullnullnullnullnullnull2Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/2Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
33416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:23:52.88Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78Share Folder Name\=c$ Operation Result\=$Recycle.Bin\\\nbootmgr\nBOOTNXT\nDocuments and Settings\\\npagefile.sys\nPerfLogs\\\nProgram Files\\\nProgram Files (x86)\\\nProgramData\\\nRecovery\\\nswapfile.sys\nSystem Volume Information\\\nUsers\\\nWindows\\ Share Access Attempt User\=User2 Operation\=Search Operation Data\=\\* null10.1.2.12nullnullnull3.1.127.1613Access eventnullSHAREnullnullnull13nullnullnullnullENDPOINT2-PC.PreedatTestEnv.comnullnullN/A,N/AUser2nullnullnullnullnullnull2Incident Idnullc$Share Folder NameSearchOperation\\*Operation DataMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/2Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
33516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:24:53.01Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.13} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
33616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:24:53.043Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.16} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
33716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:24:53.08Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.12} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
33816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:25:19.847Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78processes\=ftp.exe null10.1.2.12nullnullnull3.1.127.1613Access eventnullFTPnullnullnull14nullnullnullnullENDPOINT2-PC.PreedatTestEnv.comnullnullcmd.exe(2608),ftp.exeUser2nullnullnullnullnullnull5Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/5Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
33916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:26:02.253Zillusiveillusiveillusive:login10nullhasForensics\=true nullnullnullnull3.1.127.1613Login eventnullnullnullnull15nullnullnullnullnullnullnullnullnullnullnullnull5Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/5Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
34016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:26:11.347Z1.5897E+12illusiveillusiveillusive:login10null10.1.2.72192.168.77.78processes\=ftp.exe Is Successful Login\=false null10.1.2.12nullnullnull3.1.127.1613Login eventnullFTPnullnulldfj lkdsnull15nullnullnullnullENDPOINT2-PC.PreedatTestEnv.comnullnullcmd.exe(2608),ftp.exeUser2nullnullnullnullnullnull5Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/5Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
34116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:26:20.44Zillusiveillusiveillusive:access10nullhasForensics\=true nullnullnullnull3.1.127.1613Access eventnullnullnullnull14nullnullnullnullnullnullnullnullnullnullnullnull5Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/5Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
34216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:27:27.097Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78Share Folder Name\=c$ Operation Result\=$Recycle.Bin\\\nbootmgr\nBOOTNXT\nDocuments and Settings\\\npagefile.sys\nPerfLogs\\\nProgram Files\\\nProgram Files (x86)\\\nProgramData\\\nRecovery\\\nswapfile.sys\nSystem Volume Information\\\nUsers\\\nWindows\\ Share Access Attempt User\=user5 Operation\=Search Operation Data\=\\* null10.1.2.16nullnullnull3.1.127.1613Access eventnullSHAREnullnullnull17nullnullnullnullendpoint5-pc.preedattestenv.comnullnullnullnullnullnullnullnull6Incident Idnullc$Share Folder NameSearchOperation\\*Operation DataMay 17 2020 12:15:58 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/6Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
34316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:27:34.647Zillusiveillusiveillusive:access10nullhasForensics\=true nullnullnullnull3.1.127.1613Access eventnullnullnullnull16nullnullnullnullnullnullnullnullnullnullnullnull6Incident IdnullMay 17 2020 12:15:58 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/6Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
34416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:27:43.787Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78Share Folder Name\=c$ Operation Result\=$Recycle.Bin\\\nbootmgr\nBOOTNXT\nDocuments and Settings\\\npagefile.sys\nPerfLogs\\\nProgram Files\\\nProgram Files (x86)\\\nProgramData\\\nRecovery\\\nswapfile.sys\nSystem Volume Information\\\nUsers\\\nWindows\\ Share Access Attempt User\=user5 Operation\=Search Operation Data\=\\* null10.1.2.16nullnullnull3.1.127.1613Access eventnullSHAREnullnullnull18nullnullnullnullendpoint5-pc.preedattestenv.comnullnullnullnullnullnullnullnull6Incident Idnullc$Share Folder NameSearchOperation\\*Operation DataMay 17 2020 12:15:58 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/6Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
34516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:27:52.91Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78null10.1.2.29nullnullnull3.1.127.1613Access eventnullSSHnullnullnull19nullnullnullnullnullnullnullnullnullnullnullnull7Incident Idnullhttps://MgmtServer2.PreedatTestEnv.com/#/incident/7Incident URLnullnullcat=illusive:alertsnullnullCommonSecurityLog
34616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:28:02.037Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78Share Folder Name\=c$ Operation Result\=$Recycle.Bin\\\nbootmgr\nBOOTNXT\nDocuments and Settings\\\npagefile.sys\nPerfLogs\\\nProgram Files\\\nProgram Files (x86)\\\nProgramData\\\nRecovery\\\nswapfile.sys\nSystem Volume Information\\\nUsers\\\nWindows\\ Share Access Attempt User\=user5 Operation\=Search Operation Data\=\\* null10.1.2.16nullnullnull3.1.127.1613Access eventnullSHAREnullnullnull16nullnullnullnullEndpoint5-PC.PreedatTestEnv.comnullnullN/A,N/Auser5nullnullnullnullnullnull6Incident Idnullc$Share Folder NameSearchOperation\\*Operation DataMay 17 2020 12:15:58 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/6Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
34716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:28:29.74Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78null10.1.2.29nullnullnull3.1.127.1613Access eventnullSSHnullnullnull20nullnullnullnullnullnullnullnullnullnullnullnull7Incident Idnullhttps://MgmtServer2.PreedatTestEnv.com/#/incident/7Incident URLnullnullcat=illusive:alertsnullnullCommonSecurityLog
34816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:29:37.457Z1.5897E+12illusiveillusiveillusive:login10null192.168.77.78Event type\=Audit Failure User Domain\=PREEDATTESTENV Event ID\=4768 Raw data\={"4768":{"eventId":4768,"recordNumber":2136134,"strings":["testit","PREEDATTESTENV","S-1-0-0","krbtgt/PREEDATTESTENV","S-1-0-0","0x40810010","0x6","0xffffffff","-","::ffff:10.1.2.13","49309","","",""],"timeGenerated":1589700381000,"timeWritten":1589700381000,"source":"win-euuezzttfsw.preedattestenv.com","eventType":"FAILURE"}} null10.1.2.13nullnullnull3.1.127.1613Login eventnullWINDOWSnullwin-euuezzttfsw.preedattestenv.comnulltestitnull22nullnullnullnullENDPOINT3-PC.PreedatTestEnv.comnullnullNo User is Logged-innullnullnullnullnull4768Windows Event Id8Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/8Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alerts;outcome=Audit FailurenullnullCommonSecurityLog
34916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:29:46.613Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78processes\=ftp.exe null10.1.2.16nullnullnull3.1.127.1613Access eventnullFTPnullnullnull21nullnullnullnullEndpoint5-PC.PreedatTestEnv.comnullnullcmd.exe(1648),ftp.exeuser5nullnullnullnullnullnull6Incident IdnullMay 17 2020 12:15:58 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/6Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
35016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:29:55.677Zillusiveillusiveillusive:access10nullhasForensics\=true nullnullnullnull3.1.127.1613Access eventnullnullnullnull21nullnullnullnullnullnullnullnullnullnullnullnull6Incident IdnullMay 17 2020 12:15:58 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/6Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
35116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:30:04.77Zillusiveillusiveillusive:login10nullhasForensics\=true nullnullnullnull3.1.127.1613Login eventnullnullnullnull22nullnullnullnullnullnullnullnullnullnullnullnull8Incident IdnullMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/8Incident URLFull ProtectionPolicy NamenullnullnullnullCommonSecurityLog
35216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:31:34.693Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78null10.1.2.28nullnullnull3.1.127.1613Access eventnullSSHnullnullnull23nullnullnullnullnullnullnullnullnullnullnullnull9Incident Idnullhttps://MgmtServer2.PreedatTestEnv.com/#/incident/9Incident URLnullnullcat=illusive:alertsnullnullCommonSecurityLog
35316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:32:14.02Z1.5897E+12illusiveillusiveillusive:login10null10.1.2.72192.168.77.78Is Successful Login\=false Using SSH Key\=false null10.1.2.28nullnullnull3.1.127.1613Login eventnullSSHnullnulluser1null24nullnullnullnullnullnullnullnullnullnullnullnull9Incident Idnullhttps://MgmtServer2.PreedatTestEnv.com/#/incident/9Incident URLnullnullcat=illusive:alertsnullnullCommonSecurityLog
35416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:32:40.02Z1.5897E+12illusiveillusiveillusive:login10null10.1.2.72192.168.77.78Is Successful Login\=false Using SSH Key\=false null10.1.2.28nullnullnull3.1.127.1613Login eventnullSSHnullnulluser1null25nullnullnullnullnullnullnullnullnullnullnullnull9Incident Idnullhttps://MgmtServer2.PreedatTestEnv.com/#/incident/9Incident URLnullnullcat=illusive:alertsnullnullCommonSecurityLog
35516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:33:21.723Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78x-illusive-remote-addr\=10.1.2.28 Web Protocol\=HTTPS Web Url\=/ Web Host\=10.1.2.72 accept\=*/* x-illusive-local-addr\=10.1.2.72 x-illusive-server-port\=443 x-forwarded-server\=fe80::51aa:a3dd:dfc8:2318 x-illusive-remote-host\=10.1.2.28 x-forwarded-host\=10.1.2.72 Web X-Forwarded-For\=10.1.2.28 Web Method\=GET Web Body\= Web User Agent\=Wget/1.14 (linux-gnu) connection\=Keep-Alive null10.1.2.28nullnullnull3.1.127.1613Access eventnullWEBnullnullnull27nullnullnullnullWget/1.14 (linux-gnu)nullnullnullnullnullnullnullnull9Incident Idnullhttps://MgmtServer2.PreedatTestEnv.com/#/incident/9Incident URLnullnullcat=illusive:alertsnullnullCommonSecurityLog
35616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:33:30.863Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78Web Method\=GET Web Body\= Web User Agent\=Wget/1.14 (linux-gnu) connection\=Keep-Alive Web Protocol\=HTTP Web Url\=/ Web Host\=10.1.2.72 accept\=*/* null10.1.2.28nullnullnull3.1.127.1613Access eventnullWEBnullnullnull26nullnullnullnullWget/1.14 (linux-gnu)nullnullnullnullnullnullnullnull9Incident Idnullhttps://MgmtServer2.PreedatTestEnv.com/#/incident/9Incident URLnullnullcat=illusive:alertsnullnullCommonSecurityLog
35716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:54:06.613Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.12} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
35816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:54:06.69Z1.5897E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deleted incident {Source ip\=10.1.2.13} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
35916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T07:57:21.997Z1.5897E+12illusiveillusiveillusive:access10null10.1.2.72192.168.77.78Share Folder Name\=c$ Operation Result\=$Recycle.Bin\\\nbootmgr\nBOOTNXT\nDocuments and Settings\\\npagefile.sys\nPerfLogs\\\nProgram Files\\\nProgram Files (x86)\\\nProgramData\\\nRecovery\\\nswapfile.sys\nSystem Volume Information\\\nUsers\\\nWindows\\ Share Access Attempt User\=User2 Operation\=Search Operation Data\=\\* null10.1.2.12nullnullnull3.1.127.1613Access eventnullSHAREnullnullnull32nullnullnullnullENDPOINT2-PC.PreedatTestEnv.comnullnullN/A,N/AUser2nullnullnullnullnullnull13Incident Idnullc$Share Folder NameSearchOperation\\*Operation DataMay 17 2020 12:15:40 AMLast deployment timehttps://MgmtServer2.PreedatTestEnv.com/#/incident/13Incident URLFull ProtectionPolicy Namenullnullcat=illusive:alertsnullnullCommonSecurityLog
36016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T10:53:01.877Z1.58971E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
36116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T10:53:01.89Z1.58971E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
36216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T11:08:02.137Z1.58971E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
36316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T11:08:02.153Z1.58971E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
36416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T11:08:23.087Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com logged out {User role \= ROLE_ADMIN Source address \= 192.168.77.1} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
36516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T11:08:23.127Z1.58971E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com logged out {User role \= ROLE_ADMIN Source address \= 192.168.77.1} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
36616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T11:23:02.313Z1.58971E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
36716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T11:23:02.33Z1.58971E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
36816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T11:38:02.487Z1.58972E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
36916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T11:38:02.507Z1.58972E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
37016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T11:53:02.723Z1.58972E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
37116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T11:53:02.743Z1.58972E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
37216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T12:08:02.993Z1.58972E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
37316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T12:08:03.02Z1.58972E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
37416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T12:23:03.157Z1.58972E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
37516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T12:23:03.17Z1.58972E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
37616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T12:38:03.31Z1.58972E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
37716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T12:38:03.323Z1.58972E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
37816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T12:53:03.403Z1.58972E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
37916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T12:53:03.417Z1.58972E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
38016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T13:08:03.677Z1.58972E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
38116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T13:08:03.7Z1.58972E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
38216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T13:23:03.867Z1.58972E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
38316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T13:23:03.88Z1.58972E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
38416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T13:38:04.033Z1.58972E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
38516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T13:38:04.047Z1.58972E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
38616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T13:53:04.177Z1.58972E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
38716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T13:53:04.19Z1.58972E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
38816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T14:08:04.323Z1.58972E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
38916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T14:08:04.337Z1.58972E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
39016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T14:23:04.497Z1.58973E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
39116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T14:23:04.51Z1.58973E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
39216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T14:38:04.673Z1.58973E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
39316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T14:38:04.687Z1.58973E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
39416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T14:53:04.827Z1.58973E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
39516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T14:53:04.837Z1.58973E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
39616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T15:08:05.017Z1.58973E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
39716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T15:08:05.03Z1.58973E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
39816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T15:23:05.2Z1.58973E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
39916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T15:23:05.213Z1.58973E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
40016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T15:38:05.39Z1.58973E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
40116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T15:38:05.407Z1.58973E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
40216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T15:53:05.563Z1.58973E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
40316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T15:53:10.587Z1.58973E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
40416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T16:08:05.77Z1.58973E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
40516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T16:08:05.787Z1.58973E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
40616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T16:23:09.053Z1.58973E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
40716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T16:23:09.067Z1.58973E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
40816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T16:38:09.207Z1.58973E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
40916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T16:38:09.22Z1.58973E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
41016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T16:53:09.377Z1.58973E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
41116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T16:53:09.39Z1.58973E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
41216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T17:08:09.55Z1.58974E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
41316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T17:08:09.567Z1.58974E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
41416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T17:23:09.717Z1.58974E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
41516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T17:23:09.733Z1.58974E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
41616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T17:38:09.897Z1.58974E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
41716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T17:38:09.907Z1.58974E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
41816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T17:53:09.987Z1.58974E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
41916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T17:53:10.003Z1.58974E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
42016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:08:10.147Z1.58974E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
42116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:08:10.16Z1.58974E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
42216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:23:10.303Z1.58974E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
42316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:23:10.317Z1.58974E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
42416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:38:10.453Z1.58974E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
42516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:38:10.47Z1.58974E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
42616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:50:29.147Z1.58974E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com logged in {User role \= ROLE_ADMIN Source address \= 192.168.77.1} nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
42716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:51:29.487Z1.58974E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com uploaded licensenullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
42816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:52:29.543Z1.58974E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com uploaded licensenullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
42916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:52:29.583Z1.58974E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com uploaded licensenullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
43016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:53:10.553Z1.58974E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
43116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:53:10.553Z1.58974E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
43216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:53:29.65Z1.58974E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com add attack surface rule{Rule Name\=Discover Domain User Credentials #1} full details {User Groups\=TargetEntities{directoryEntity\=DirectoryEntity{commonName\='Haim Cohen', distinguishedName\='CN\=Haim Cohen,CN\=Users,dc\=PreedatTestEnv,dc\=com', objectClass\=User, childrenEntities\=null, members\=null, logonUser\='null', logonUserPreWindows2003\='User1', objectSid\='null'} BaseEntity{dateCreated\=Sun May 17 11:53:26 PDT 2020, lastUpdated\=Sun May 17 11:53:26 PDT 2020}, operationType\=INCLUDE},TargetEntities{directoryEntity\=DirectoryEntity{commonName\='Eran Zehavi', distinguishedName\='CN\=Eran Zehavi,CN\=Users,dc\=PreedatTestEnv,dc\=com', objectClass\=User, childrenEntities\=null, members\=null, logonUser\='null', logonUserPreWindows2003\='user5', objectSid\='null'} BaseEntity{dateCreated\=Sun May 17 11:53:26 PDT 2020, lastUpdated\=Sun May 17 11:53:26 PDT 2020}, operationType\=INCLUDE},TargetEntities{directoryEntity\=DirectoryEntity{commonName\='Tal Ben Haim', distinguishedName\='CN\=Tal Ben Haim,CN\=Users,dc\=PreedatTestEnv,dc\=com', objectClass\=User, childrenEntities\=null, members\=null, logonUser\='null', logonUserPreWindows2003\='user4', objectSid\='null'} BaseEntity{dateCreated\=Sun May 17 11:53:26 PDT 2020, lastUpdated\=Sun May 17 11:53:26 PDT 2020}, operationType\=INCLUDE},TargetEntities{directoryEntity\=DirectoryEntity{commonName\='Moshe Levi.', distinguishedName\='CN\=Moshe Levi.,CN\=Users,dc\=PreedatTestEnv,dc\=com', objectClass\=User, childrenEntities\=null, members\=null, logonUser\='null', logonUserPreWindows2003\='User2', objectSid\='null'} BaseEntity{dateCreated\=Sun May 17 11:53:26 PDT 2020, lastUpdated\=Sun May 17 11:53:26 PDT 2020}, operationType\=INCLUDE},TargetEntities{directoryEntity\=DirectoryEntity{commonName\='Avi Nimni', distinguishedName\='CN\=Avi Nimni,CN\=Users,dc\=PreedatTestEnv,dc\=com', objectClass\=User, childrenEntities\=null, members\=null, logonUser\='null', logonUserPreWindows2003\='User3', objectSid\='null'} BaseEntity{dateCreated\=Sun May 17 11:53:26 PDT 2020, lastUpdated\=Sun May 17 11:53:26 PDT 2020}, operationType\=INCLUDE} Should Notify Siem\=true Rule Name\=Discover Domain User Credentials #1 Should Run on all Network\=true Should Send Mail Notification\=false}nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
43316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:54:29.79Z1.58974E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com deployed machine nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
43416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:55:24.827Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullpreedattestenv.com\\user3nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user3' has session in state 'Disconnected'. Session id: '1', Logon ids: '1084102,1084046', Logon type: 'Interactive', first logon time: 'May 17 2020 12:17:39 AM', last logon time: 'May 17 2020 12:17:39 AM', last active time: 'May 17 2020 12:26:14 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
43516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:55:24.827Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\user4nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'LegacyGeneric:target\=PREEDATTESTENV\\user4' with username: 'PREEDATTESTENV\\user4' and last modification time: 'Nov 13 2019 7:44:17 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
43616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:55:24.827Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\user2nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1125' has connection to: 'LegacyGeneric:target\=PREEDATTESTENV\\User2' with username: 'PREEDATTESTENV\\User2' and last modification time: 'Sep 15 2019 11:30:30 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
43716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:55:24.827Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\user5nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user5' has session in state 'Active'. Session id: '1', Logon ids: '517304', Logon type: 'Interactive', first logon time: 'May 17 2020 12:16:55 AM', last logon time: 'May 17 2020 12:16:55 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
43816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:55:24.827Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\user2nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user2' has session in state 'Active'. Session id: '1', Logon ids: '486262,486308', Logon type: 'Interactive', first logon time: 'May 17 2020 12:16:03 AM', last logon time: 'May 17 2020 12:16:03 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
43916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:55:29.957Z1.58974E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com started attacker view collection nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
44016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:55:30.003Z1.58974E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com update attack surface rule{Rule Name\=Discover Domain User Credentials #1} full details {User Groups changed from 'TargetEntities{directoryEntity\=DirectoryEntity{commonName\='Haim Cohen', distinguishedName\='CN\=Haim Cohen,CN\=Users,dc\=PreedatTestEnv,dc\=com', objectClass\=User, childrenEntities\=null, members\=null, logonUser\='null', logonUserPreWindows2003\='null', objectSid\='null'} BaseEntity{dateCreated\=2020-05-17 11:53:26.894, lastUpdated\=2020-05-17 11:53:26.894}, operationType\=INCLUDE},TargetEntities{directoryEntity\=DirectoryEntity{commonName\='Tal Ben Haim', distinguishedName\='CN\=Tal Ben Haim,CN\=Users,dc\=PreedatTestEnv,dc\=com', objectClass\=User, childrenEntities\=null, members\=null, logonUser\='null', logonUserPreWindows2003\='null', objectSid\='null'} BaseEntity{dateCreated\=2020-05-17 11:53:26.894, lastUpdated\=2020-05-17 11:53:26.894}, operationType\=INCLUDE},TargetEntities{directoryEntity\=DirectoryEntity{commonName\='Moshe Levi.', distinguishedName\='CN\=Moshe Levi.,CN\=Users,dc\=PreedatTestEnv,dc\=com', objectClass\=User, childrenEntities\=null, members\=null, logonUser\='null', logonUserPreWindows2003\='null', objectSid\='null'} BaseEntity{dateCreated\=2020-05-17 11:53:26.894, lastUpdated\=2020-05-17 11:53:26.894}, operationType\=INCLUDE},TargetEntities{directoryEntity\=DirectoryEntity{commonName\='Avi Nimni', distinguishedName\='CN\=Avi Nimni,CN\=Users,dc\=PreedatTestEnv,dc\=com', objectClass\=User, childrenEntities\=null, members\=null, logonUser\='null', logonUserPreWindows2003\='null', objectSid\='null'} BaseEntity{dateCreated\=2020-05-17 11:53:26.894, lastUpdated\=2020-05-17 11:53:26.894}, operationType\=INCLUDE},TargetEntities{directoryEntity\=DirectoryEntity{commonName\='Eran Zehavi', distinguishedName\='CN\=Eran Zehavi,CN\=Users,dc\=PreedatTestEnv,dc\=com', objectClass\=User, childrenEntities\=null, members\=null, logonUser\='null', logonUserPreWindows2003\='null', objectSid\='null'} BaseEntity{dateCreated\=2020-05-17 11:53:26.894, lastUpdated\=2020-05-17 11:53:26.894}, operationType\=INCLUDE}' to 'TargetEntities{directoryEntity\=DirectoryEntity{commonName\='Users', distinguishedName\='CN\=Users,CN\=Builtin,dc\=PreedatTestEnv,dc\=com', objectClass\=Group, childrenEntities\=null, members\=null, logonUser\='null', logonUserPreWindows2003\='Users', objectSid\='null'} BaseEntity{dateCreated\=Sun May 17 11:54:30 PDT 2020, lastUpdated\=Sun May 17 11:54:30 PDT 2020}, operationType\=INCLUDE},TargetEntities{directoryEntity\=DirectoryEntity{commonName\='Haim Cohen', distinguishedName\='CN\=Haim Cohen,CN\=Users,dc\=PreedatTestEnv,dc\=com', objectClass\=User, childrenEntities\=null, members\=null, logonUser\='null', logonUserPreWindows2003\='null', objectSid\='null'} BaseEntity{dateCreated\=2020-05-17 11:53:26.894, lastUpdated\=2020-05-17 11:53:26.894}, operationType\=INCLUDE},TargetEntities{directoryEntity\=DirectoryEntity{commonName\='Tal Ben Haim', distinguishedName\='CN\=Tal Ben Haim,CN\=Users,dc\=PreedatTestEnv,dc\=com', objectClass\=User, childrenEntities\=null, members\=null, logonUser\='null', logonUserPreWindows2003\='null', objectSid\='null'} BaseEntity{dateCreated\=2020-05-17 11:53:26.894, lastUpdated\=2020-05-17 11:53:26.894}, operationType\=INCLUDE},TargetEntities{directoryEntity\=DirectoryEntity{commonName\='Moshe Levi.', distinguishedName\='CN\=Moshe Levi.,CN\=Users,dc\=PreedatTestEnv,dc\=com', objectClass\=User, childrenEntities\=null, members\=null, logonUser\='null', logonUserPreWindows2003\='null', objectSid\='null'} BaseEntity{dateCreated\=2020-05-17 11:53:26.894, lastUpdated\=2020-05-17 11:53:26.894}, operationType\=INCLUDE},TargetEntities{directoryEntity\=DirectoryEntity{commonName\='Avi Nimni', distinguishedName\='CN\=Avi Nimni,CN\=Users,dc\=PreedatTestEnv,dc\=com', objectClass\=User, childrenEntities\=null, members\=null, logonUser\='null', logonUserPreWindows2003\='null', objectSid\='null'} BaseEntity{dateCreated\=2020-05-17 11:53:26.894, lastUpdated\=2020-05-17 11:53:26.894}, operationType\=INCLUDE},TargetEntities{directoryEntity\=DirectoryEntity{commonName\='Eran Zehavi', distinguishedName\='CN\=Eran Zehavi,CN\=Users,dc\=PreedatTestEnv,dc\=com', objectClass\=User, childrenEntities\=null, members\=null, logonUser\='null', logonUserPreWindows2003\='null', objectSid\='null'} BaseEntity{dateCreated\=2020-05-17 11:53:26.894, lastUpdated\=2020-05-17 11:53:26.894}, operationType\=INCLUDE}'}nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
44116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:56:24.85Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullpreedattestenv.com\\user3nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user3' has session in state 'Disconnected'. Session id: '1', Logon ids: '1084102,1084046', Logon type: 'Interactive', first logon time: 'May 17 2020 12:17:39 AM', last logon time: 'May 17 2020 12:17:39 AM', last active time: 'May 17 2020 12:26:14 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
44216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:56:24.867Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: Group:Enterprise Admins and Group:Domain Admins and Group:Schema Admins and Group:DnsAdminsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\administratornullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1125' has connection to: 'Domain:interactive\=PreedatTestEnv.com\\Administrator' with username: 'PreedatTestEnv.com\\Administrator' and last modification time: 'Jun 12 2017 7:59:33 PM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
44316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:56:24.87Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\user5nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user5' has session in state 'Active'. Session id: '1', Logon ids: '517304', Logon type: 'Interactive', first logon time: 'May 17 2020 12:16:55 AM', last logon time: 'May 17 2020 12:16:55 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
44416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:56:24.87Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\user2nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user2' has session in state 'Active'. Session id: '1', Logon ids: '486262,486308', Logon type: 'Interactive', first logon time: 'May 17 2020 12:16:03 AM', last logon time: 'May 17 2020 12:16:03 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
44516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:56:24.87Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\user4nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'LegacyGeneric:target\=PREEDATTESTENV\\user4' with username: 'PREEDATTESTENV\\user4' and last modification time: 'Nov 13 2019 7:44:17 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
44616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:56:24.87Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: Group:Enterprise Admins and Group:Domain Admins and Group:Schema Admins and Group:DnsAdminsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\administratornullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'Domain:interactive\=PreedatTestEnv.com\\Administrator' with username: 'PreedatTestEnv.com\\Administrator' and last modification time: 'Nov 13 2019 7:44:17 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
44716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:56:24.87Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\user2nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1125' has connection to: 'LegacyGeneric:target\=PREEDATTESTENV\\User2' with username: 'PREEDATTESTENV\\User2' and last modification time: 'Sep 15 2019 11:30:30 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
44816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T18:56:30.127Z1.58974E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com update attack surface rule{Rule Name\=Discover instances of standard privileged groups credentials on all deployed machines #1} full details {Should Notify Siem changed from 'false' to 'true'}nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
44916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:01:25.037Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: Group:Enterprise Admins and Group:Domain Admins and Group:Schema Admins and Group:DnsAdminsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\administratornullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1125' has connection to: 'Domain:interactive\=PreedatTestEnv.com\\Administrator' with username: 'PreedatTestEnv.com\\Administrator' and last modification time: 'Jun 12 2017 7:59:33 PM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
45016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:01:25.05Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\user5nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user5' has session in state 'Active'. Session id: '1', Logon ids: '517304', Logon type: 'Interactive', first logon time: 'May 17 2020 12:16:55 AM', last logon time: 'May 17 2020 12:16:55 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
45116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:01:25.05Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: Group:Enterprise Admins and Group:Domain Admins and Group:Schema Admins and Group:DnsAdminsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\administratornullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'Domain:interactive\=PreedatTestEnv.com\\Administrator' with username: 'PreedatTestEnv.com\\Administrator' and last modification time: 'Nov 13 2019 7:44:17 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
45216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:01:25.05Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\user4nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'LegacyGeneric:target\=PREEDATTESTENV\\user4' with username: 'PREEDATTESTENV\\user4' and last modification time: 'Nov 13 2019 7:44:17 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
45316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:01:25.05Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullpreedattestenv.com\\user3nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user3' has session in state 'Disconnected'. Session id: '1', Logon ids: '1084102,1084046', Logon type: 'Interactive', first logon time: 'May 17 2020 12:17:39 AM', last logon time: 'May 17 2020 12:17:39 AM', last active time: 'May 17 2020 12:26:14 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
45416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:01:25.05Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\user2nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user2' has session in state 'Active'. Session id: '1', Logon ids: '486262,486308', Logon type: 'Interactive', first logon time: 'May 17 2020 12:16:03 AM', last logon time: 'May 17 2020 12:16:03 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
45516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:01:25.05Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\user2nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1125' has connection to: 'LegacyGeneric:target\=PREEDATTESTENV\\User2' with username: 'PREEDATTESTENV\\User2' and last modification time: 'Sep 15 2019 11:30:30 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
45616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:07:25.287Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\user2nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1125' has connection to: 'LegacyGeneric:target\=PREEDATTESTENV\\User2' with username: 'PREEDATTESTENV\\User2' and last modification time: 'Sep 15 2019 11:30:30 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
45716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:07:25.307Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\user2nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user2' has session in state 'Active'. Session id: '1', Logon ids: '486262,486308', Logon type: 'Interactive', first logon time: 'May 17 2020 12:16:03 AM', last logon time: 'May 17 2020 12:16:03 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
45816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:07:25.307Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: Group:Enterprise Admins and Group:Domain Admins and Group:Schema Admins and Group:DnsAdminsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\administratornullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'Domain:interactive\=PreedatTestEnv.com\\Administrator' with username: 'PreedatTestEnv.com\\Administrator' and last modification time: 'Nov 13 2019 7:44:17 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
45916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:07:25.307Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\user5nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user5' has session in state 'Active'. Session id: '1', Logon ids: '517304', Logon type: 'Interactive', first logon time: 'May 17 2020 12:16:55 AM', last logon time: 'May 17 2020 12:16:55 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
46016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:07:25.307Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: Group:Enterprise Admins and Group:Domain Admins and Group:Schema Admins and Group:DnsAdminsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\administratornullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1125' has connection to: 'Domain:interactive\=PreedatTestEnv.com\\Administrator' with username: 'PreedatTestEnv.com\\Administrator' and last modification time: 'Jun 12 2017 7:59:33 PM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
46116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:07:25.307Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\user4nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'LegacyGeneric:target\=PREEDATTESTENV\\user4' with username: 'PREEDATTESTENV\\user4' and last modification time: 'Nov 13 2019 7:44:17 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
46216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:07:25.307Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullpreedattestenv.com\\user3nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user3' has session in state 'Disconnected'. Session id: '1', Logon ids: '1084102,1084046', Logon type: 'Interactive', first logon time: 'May 17 2020 12:17:39 AM', last logon time: 'May 17 2020 12:17:39 AM', last active time: 'May 17 2020 12:26:14 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
46316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:08:10.687Z1.58974E+12illusiveillusiveillusive:heartbeat0null10.1.2.72nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
46416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:08:10.687Z1.58974E+12illusiveillusiveillusive:heartbeat0null192.168.77.78nullnullnullnull3.1.127.1613Heartbeatnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:SYSnullnullCommonSecurityLog
46516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.427Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type DevOps (AD) in application of the following services SSHnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'User3' has connection to: 'win-euuezzttfsw.preedattestenv.com' with username: 'test'Collection detailswin-euuezzttfsw.preedattestenv.comCrown Jewel HostSSHService TypeMRemoteNGCollection sourceDevOps (AD)Crown Jewel TypenullnullnullnullCommonSecurityLog
46616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.427Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: Group:Enterprise Admins and Group:Domain Admins and Group:Schema Admins and Group:DnsAdminsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\administratornullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'Domain:interactive\=PreedatTestEnv.com\\Administrator' with username: 'PreedatTestEnv.com\\Administrator' and last modification time: 'Nov 13 2019 7:44:17 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
46716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.427Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type Management (Management PC) in application of the following services RDPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'EndPoint3-PC' with username: 'PREEDATTESTENV\\User3' and last modification time: 'Mar 1 2020 12:45:04 PM'Collection detailsendpoint3-pc.preedattestenv.comCrown Jewel HostRDPService TypeRdpRegistryCollection sourceManagement (Management PC)Crown Jewel TypenullnullnullnullCommonSecurityLog
46816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.43Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type Management (Management PC) in application of the following services RDPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'User2' has connection to: 'EndPoint3-PC' and last modification time: 'Mar 1 2020 12:45:10 PM' and path: 'C:\\Users\\User2\\Documents\\Default.rdp'Collection detailsendpoint3-pc.preedattestenv.comCrown Jewel HostRDPService TypeRdpFileCollection sourceManagement (Management PC)Crown Jewel TypenullnullnullnullCommonSecurityLog
46916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.43Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\user2nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user2' has session in state 'Active'. Session id: '1', Logon ids: '486262,486308', Logon type: 'Interactive', first logon time: 'May 17 2020 12:16:03 AM', last logon time: 'May 17 2020 12:16:03 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
47016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.43Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\user2nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1125' has connection to: 'LegacyGeneric:target\=PREEDATTESTENV\\User2' with username: 'PREEDATTESTENV\\User2' and last modification time: 'Sep 15 2019 11:30:30 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
47116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.43Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: Group:Enterprise Admins and Group:Domain Admins and Group:Schema Admins and Group:DnsAdminsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\administratornullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1125' has connection to: 'Domain:interactive\=PreedatTestEnv.com\\Administrator' with username: 'PreedatTestEnv.com\\Administrator' and last modification time: 'Jun 12 2017 7:59:33 PM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
47216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.43Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type Management (Management PC) in application of the following services Sharenullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: '\\\\endpoint5-pc.preedattestenv.com\\c$' with username: 'preedattestenv\\user5'Collection detailsendpoint5-pc.preedattestenv.comCrown Jewel HostShareService TypeActiveShareCollection sourceManagement (Management PC)Crown Jewel TypenullnullnullnullCommonSecurityLog
47316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.43Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type DevOps (AD) in application of the following services FTPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1110' has connection to: 'win-euuezzttfsw.preedattestenv.com' with username: 'test' and last modification time: 'May 17 2020 12:05:15 PM'Collection detailswin-euuezzttfsw.preedattestenv.comCrown Jewel HostFTPService TypeWinSCPCollection sourceDevOps (AD)Crown Jewel TypenullnullnullnullCommonSecurityLog
47416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.43Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\user5nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user5' has session in state 'Active'. Session id: '1', Logon ids: '517304', Logon type: 'Interactive', first logon time: 'May 17 2020 12:16:55 AM', last logon time: 'May 17 2020 12:16:55 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
47516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.43Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type DevOps (AD) in application of the following services FTPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'win-euuezzttfsw.preedattestenv.com' with username: 'bla' and last modification time: 'Mar 9 2020 12:41:18 PM'Collection detailswin-euuezzttfsw.preedattestenv.comCrown Jewel HostFTPService TypeWinSCPCollection sourceDevOps (AD)Crown Jewel TypenullnullnullnullCommonSecurityLog
47616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.43Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullpreedattestenv.com\\user3nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user3' has session in state 'Active'. Session id: '1', Logon ids: '1084102,1084046', Logon type: 'Interactive', first logon time: 'May 17 2020 12:17:39 AM', last logon time: 'May 17 2020 12:17:39 AM', last active time: 'May 17 2020 11:55:24 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
47716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.43Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\user4nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'LegacyGeneric:target\=PREEDATTESTENV\\user4' with username: 'PREEDATTESTENV\\user4' and last modification time: 'Nov 13 2019 7:44:17 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
47816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.43Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type DevOps (AD) in application of the following services RDPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'LegacyGeneric:target\=TERMSRV/win-euuezzttfsw.preedattestenv.com' with username: 'mgmt' and last modification time: 'Mar 9 2020 12:36:39 PM'Collection detailswin-euuezzttfsw.preedattestenv.comCrown Jewel HostRDPService TypeVaultCollection sourceDevOps (AD)Crown Jewel TypenullnullnullnullCommonSecurityLog
47916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.43Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type DevOps (AD) in application of the following services RDPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'win-euuezzttfsw.preedattestenv.com' with username: 'mgmt' and last modification time: 'Mar 9 2020 12:36:40 PM'Collection detailswin-euuezzttfsw.preedattestenv.comCrown Jewel HostRDPService TypeRdpRegistryCollection sourceDevOps (AD)Crown Jewel TypenullnullnullnullCommonSecurityLog
48016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.43Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type HR (HR Servers) in application of the following services SSHnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'User3' has connection to: 'hrserver.preedattestenv.com' with username: 'test'Collection detailshrserver.preedattestenv.comCrown Jewel HostSSHService TypeMRemoteNGCollection sourceHR (HR Servers)Crown Jewel TypenullnullnullnullCommonSecurityLog
48116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:25.43Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type Management (Management PC) in application of the following services Sharenullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: '\\\\endpoint3-pc.preedattestenv.com\\c$' with username: 'preedattestenv\\user3'Collection detailsendpoint3-pc.preedattestenv.comCrown Jewel HostShareService TypeActiveShareCollection sourceManagement (Management PC)Crown Jewel TypenullnullnullnullCommonSecurityLog
48216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:30.317Z1.58974E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com started attacker view collection nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:info;outcome=SUCCESSnullnullCommonSecurityLog
48316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:10:30.357Z1.58974E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com add attack surface rule{Rule Name\=Discover saved connections to Crown Jewels #1} full details {Sub Types\=MachineSubTag{id\=a4d462dd-81ff-455f-bb2d-abcd879477de, machineTag\=MachineTag{id\=ef69a94a-1052-4103-9ed9-72ae789c3e56, name\='Manual'}, name\='MACHINE', defaultCriticalityLevel\=HIGH},MachineSubTag{id\=6b1e1d85-9c12-47d3-ac96-a225f54d22c6, machineTag\=MachineTag{id\=2ab7d944-809c-47f7-a058-30545e61860c, name\='HR'}, name\='HR Servers', defaultCriticalityLevel\=HIGH},MachineSubTag{id\=c33af919-9e47-4897-b4aa-3a184a29420a, machineTag\=MachineTag{id\=1d3a3fad-8c0a-4d38-b572-289b48a66e14, name\='Management'}, name\='Management PC', defaultCriticalityLevel\=HIGH},MachineSubTag{id\=65f11027-886c-4119-b732-f1a450aec323, machineTag\=MachineTag{id\=cdba6545-558b-41b7-8b18-8ce2b1689c1b, name\='DevOps'}, name\='Management Servers', defaultCriticalityLevel\=HIGH},MachineSubTag{id\=806923ae-14d4-444b-9aec-b1bf2e2290bd, machineTag\=MachineTag{id\=cdba6545-558b-41b7-8b18-8ce2b1689c1b, name\='DevOps'}, name\='AD', defaultCriticalityLevel\=HIGH} Should Notify Siem\=true Rule Name\=Discover saved connections to Crown Jewels #1 Should Run on all Network\=true Service Types\=WEB,SAAS,SSH,DB,SHARE,RDP,FTP Should Send Mail Notification\=false}nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
48416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:11:25.367Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\user2nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1125' has connection to: 'LegacyGeneric:target\=PREEDATTESTENV\\User2' with username: 'PREEDATTESTENV\\User2' and last modification time: 'Sep 15 2019 11:30:30 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
48516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:11:25.387Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\user5nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user5' has session in state 'Active'. Session id: '1', Logon ids: '517304', Logon type: 'Interactive', first logon time: 'May 17 2020 12:16:55 AM', last logon time: 'May 17 2020 12:16:55 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
48616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:11:25.387Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: Group:Enterprise Admins and Group:Domain Admins and Group:Schema Admins and Group:DnsAdminsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\administratornullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1125' has connection to: 'Domain:interactive\=PreedatTestEnv.com\\Administrator' with username: 'PreedatTestEnv.com\\Administrator' and last modification time: 'Jun 12 2017 7:59:33 PM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
48716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.527Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type DevOps (AD) in application of the following services SSHnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'User3' has connection to: 'win-euuezzttfsw.preedattestenv.com' with username: 'test'Collection detailswin-euuezzttfsw.preedattestenv.comCrown Jewel HostSSHService TypeMRemoteNGCollection sourceDevOps (AD)Crown Jewel TypenullnullnullnullCommonSecurityLog
48816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.527Zillusiveillusiveillusive:violation10nullNo Local User administrators should have stored credentials to the following target: except OrganizationalUnit:Groupsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnulltestnullnullnullnullnullnullnullnullLOCAL_USER_ADMINISTRATORSRule TypenullnullnullnullCommonSecurityLog
48916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.527Zillusiveillusiveillusive:violation10nullNo Local User administrators should have stored credentials to the following target: except OrganizationalUnit:Groupsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullendpoint1nullnullnullnullnullnullnullnullLOCAL_USER_ADMINISTRATORSRule TypenullnullnullnullCommonSecurityLog
49016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.527Zillusiveillusiveillusive:violation10nullNo Local User administrators should have stored credentials to the following target: except OrganizationalUnit:Groupsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullendpoint1nullnullnullnullnullnullnullnullLOCAL_USER_ADMINISTRATORSRule TypenullnullnullnullCommonSecurityLog
49116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.527Zillusiveillusiveillusive:violation10nullNo Local User administrators should have stored credentials to the following target: except OrganizationalUnit:Groupsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnulladminnullnullnullnullnullnullnullnullLOCAL_USER_ADMINISTRATORSRule TypenullnullnullnullCommonSecurityLog
49216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.527Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: Group:Enterprise Admins and Group:Domain Admins and Group:Schema Admins and Group:DnsAdminsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\administratornullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'Domain:interactive\=PreedatTestEnv.com\\Administrator' with username: 'PreedatTestEnv.com\\Administrator' and last modification time: 'Nov 13 2019 7:44:17 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
49316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.527Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullpreedattestenv.com\\user3nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user3' has session in state 'Active'. Session id: '1', Logon ids: '1084102,1084046', Logon type: 'Interactive', first logon time: 'May 17 2020 12:17:39 AM', last logon time: 'May 17 2020 12:17:39 AM', last active time: 'May 17 2020 11:55:24 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
49416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.527Zillusiveillusiveillusive:violation10nullNo Local User administrators should have stored credentials to the following target: except OrganizationalUnit:Groupsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnulluser1nullnullnullnullnullnullnullnullLOCAL_USER_ADMINISTRATORSRule TypenullnullnullnullCommonSecurityLog
49516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.53Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\user2nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1125' has connection to: 'LegacyGeneric:target\=PREEDATTESTENV\\User2' with username: 'PREEDATTESTENV\\User2' and last modification time: 'Sep 15 2019 11:30:30 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
49616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.53Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type DevOps (AD) in application of the following services RDPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'LegacyGeneric:target\=TERMSRV/win-euuezzttfsw.preedattestenv.com' with username: 'mgmt' and last modification time: 'Mar 9 2020 12:36:39 PM'Collection detailswin-euuezzttfsw.preedattestenv.comCrown Jewel HostRDPService TypeVaultCollection sourceDevOps (AD)Crown Jewel TypenullnullnullnullCommonSecurityLog
49716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.53Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type DevOps (AD) in application of the following services FTPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1110' has connection to: 'win-euuezzttfsw.preedattestenv.com' with username: 'test' and last modification time: 'May 17 2020 12:05:15 PM'Collection detailswin-euuezzttfsw.preedattestenv.comCrown Jewel HostFTPService TypeWinSCPCollection sourceDevOps (AD)Crown Jewel TypenullnullnullnullCommonSecurityLog
49816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.53Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\user2nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user2' has session in state 'Active'. Session id: '1', Logon ids: '486262,486308', Logon type: 'Interactive', first logon time: 'May 17 2020 12:16:03 AM', last logon time: 'May 17 2020 12:16:03 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
49916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.53Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: Group:Enterprise Admins and Group:Domain Admins and Group:Schema Admins and Group:DnsAdminsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\administratornullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1125' has connection to: 'Domain:interactive\=PreedatTestEnv.com\\Administrator' with username: 'PreedatTestEnv.com\\Administrator' and last modification time: 'Jun 12 2017 7:59:33 PM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
50016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.53Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type DevOps (AD) in application of the following services FTPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'win-euuezzttfsw.preedattestenv.com' with username: 'bla' and last modification time: 'Mar 9 2020 12:41:18 PM'Collection detailswin-euuezzttfsw.preedattestenv.comCrown Jewel HostFTPService TypeWinSCPCollection sourceDevOps (AD)Crown Jewel TypenullnullnullnullCommonSecurityLog
50116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.53Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type DevOps (AD) in application of the following services RDPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'win-euuezzttfsw.preedattestenv.com' with username: 'mgmt' and last modification time: 'Mar 9 2020 12:36:40 PM'Collection detailswin-euuezzttfsw.preedattestenv.comCrown Jewel HostRDPService TypeRdpRegistryCollection sourceDevOps (AD)Crown Jewel TypenullnullnullnullCommonSecurityLog
50216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.53Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type HR (HR Servers) in application of the following services SSHnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'User3' has connection to: 'hrserver.preedattestenv.com' with username: 'test'Collection detailshrserver.preedattestenv.comCrown Jewel HostSSHService TypeMRemoteNGCollection sourceHR (HR Servers)Crown Jewel TypenullnullnullnullCommonSecurityLog
50316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.53Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type Management (Management PC) in application of the following services Sharenullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: '\\\\endpoint3-pc.preedattestenv.com\\c$' with username: 'preedattestenv\\user3'Collection detailsendpoint3-pc.preedattestenv.comCrown Jewel HostShareService TypeActiveShareCollection sourceManagement (Management PC)Crown Jewel TypenullnullnullnullCommonSecurityLog
50416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.53Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\user4nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'LegacyGeneric:target\=PREEDATTESTENV\\user4' with username: 'PREEDATTESTENV\\user4' and last modification time: 'Nov 13 2019 7:44:17 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
50516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.53Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type Management (Management PC) in application of the following services RDPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'User2' has connection to: 'EndPoint3-PC' and last modification time: 'Mar 1 2020 12:45:10 PM' and path: 'C:\\Users\\User2\\Documents\\Default.rdp'Collection detailsendpoint3-pc.preedattestenv.comCrown Jewel HostRDPService TypeRdpFileCollection sourceManagement (Management PC)Crown Jewel TypenullnullnullnullCommonSecurityLog
50616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.53Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\user5nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user5' has session in state 'Active'. Session id: '1', Logon ids: '517304', Logon type: 'Interactive', first logon time: 'May 17 2020 12:16:55 AM', last logon time: 'May 17 2020 12:16:55 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
50716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.53Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type Management (Management PC) in application of the following services Sharenullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: '\\\\endpoint5-pc.preedattestenv.com\\c$' with username: 'preedattestenv\\user5'Collection detailsendpoint5-pc.preedattestenv.comCrown Jewel HostShareService TypeActiveShareCollection sourceManagement (Management PC)Crown Jewel TypenullnullnullnullCommonSecurityLog
50816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:25.53Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type Management (Management PC) in application of the following services RDPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'EndPoint3-PC' with username: 'PREEDATTESTENV\\User3' and last modification time: 'Mar 1 2020 12:45:04 PM'Collection detailsendpoint3-pc.preedattestenv.comCrown Jewel HostRDPService TypeRdpRegistryCollection sourceManagement (Management PC)Crown Jewel TypenullnullnullnullCommonSecurityLog
50916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:30.427Z1.58974E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com update attack surface rule{Rule Name\=Discover all instances of local admins #1} full details {Should Notify Siem changed from 'false' to 'true'}nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
51016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:12:30.46Z1.58974E+12illusiveillusiveillusive:audit5null192.168.77.78mgmt@PreedatTestEnv.com update attack surface rule{Rule Name\=Discover all instances of local admins #1} full details { EXCLUDE: Entity type\=OrganizationalUnit Entity name\=Groups}nullnullnullnull3.1.127.1613Auditnullnullnullmgmt@PreedatTestEnv.comnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullcat=illusive:change;outcome=SUCCESSnullnullCommonSecurityLog
51116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.557Zillusiveillusiveillusive:violation10nullNo Local User administrators should have stored credentials to the following target: except OrganizationalUnit:Groupsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnulluser1nullnullnullnullnullnullnullnullLOCAL_USER_ADMINISTRATORSRule TypenullnullnullnullCommonSecurityLog
51216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.557Zillusiveillusiveillusive:violation10nullNo Local User administrators should have stored credentials to the following target: except OrganizationalUnit:Groupsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullendpoint1nullnullnullnullnullnullnullnullLOCAL_USER_ADMINISTRATORSRule TypenullnullnullnullCommonSecurityLog
51316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: Group:Enterprise Admins and Group:Domain Admins and Group:Schema Admins and Group:DnsAdminsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\administratornullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'Domain:interactive\=PreedatTestEnv.com\\Administrator' with username: 'PreedatTestEnv.com\\Administrator' and last modification time: 'Nov 13 2019 7:44:17 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
51416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type Management (Management PC) in application of the following services Sharenullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: '\\\\endpoint5-pc.preedattestenv.com\\c$' with username: 'preedattestenv\\user5'Collection detailsendpoint5-pc.preedattestenv.comCrown Jewel HostShareService TypeActiveShareCollection sourceManagement (Management PC)Crown Jewel TypenullnullnullnullCommonSecurityLog
51516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type DevOps (AD) in application of the following services SSHnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'User3' has connection to: 'win-euuezzttfsw.preedattestenv.com' with username: 'test'Collection detailswin-euuezzttfsw.preedattestenv.comCrown Jewel HostSSHService TypeMRemoteNGCollection sourceDevOps (AD)Crown Jewel TypenullnullnullnullCommonSecurityLog
51616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: Group:Enterprise Admins and Group:Domain Admins and Group:Schema Admins and Group:DnsAdminsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\administratornullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1125' has connection to: 'Domain:interactive\=PreedatTestEnv.com\\Administrator' with username: 'PreedatTestEnv.com\\Administrator' and last modification time: 'Jun 12 2017 7:59:33 PM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
51716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\user2nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user2' has session in state 'Active'. Session id: '1', Logon ids: '486262,486308', Logon type: 'Interactive', first logon time: 'May 17 2020 12:16:03 AM', last logon time: 'May 17 2020 12:16:03 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
51816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type Management (Management PC) in application of the following services Sharenullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: '\\\\endpoint3-pc.preedattestenv.com\\c$' with username: 'preedattestenv\\user3'Collection detailsendpoint3-pc.preedattestenv.comCrown Jewel HostShareService TypeActiveShareCollection sourceManagement (Management PC)Crown Jewel TypenullnullnullnullCommonSecurityLog
51916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullpreedattestenv.com\\user3nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user3' has session in state 'Active'. Session id: '1', Logon ids: '1084102,1084046', Logon type: 'Interactive', first logon time: 'May 17 2020 12:17:39 AM', last logon time: 'May 17 2020 12:17:39 AM', last active time: 'May 17 2020 11:55:24 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
52016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\user5nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeUser name: 'preedattestenv\\user5' has session in state 'Active'. Session id: '1', Logon ids: '517304', Logon type: 'Interactive', first logon time: 'May 17 2020 12:16:55 AM', last logon time: 'May 17 2020 12:16:55 AM'Collection detailsUserSessionCollection sourcenullnullnullnullCommonSecurityLog
52116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type DevOps (AD) in application of the following services RDPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'win-euuezzttfsw.preedattestenv.com' with username: 'mgmt' and last modification time: 'Mar 9 2020 12:36:40 PM'Collection detailswin-euuezzttfsw.preedattestenv.comCrown Jewel HostRDPService TypeRdpRegistryCollection sourceDevOps (AD)Crown Jewel TypenullnullnullnullCommonSecurityLog
52216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type DevOps (AD) in application of the following services FTPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'win-euuezzttfsw.preedattestenv.com' with username: 'bla' and last modification time: 'Mar 9 2020 12:41:18 PM'Collection detailswin-euuezzttfsw.preedattestenv.comCrown Jewel HostFTPService TypeWinSCPCollection sourceDevOps (AD)Crown Jewel TypenullnullnullnullCommonSecurityLog
52316af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type HR (HR Servers) in application of the following services SSHnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'User3' has connection to: 'hrserver.preedattestenv.com' with username: 'test'Collection detailshrserver.preedattestenv.comCrown Jewel HostSSHService TypeMRemoteNGCollection sourceHR (HR Servers)Crown Jewel TypenullnullnullnullCommonSecurityLog
52416af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Local User administrators should have stored credentials to the following target: except OrganizationalUnit:Groupsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnulltestnullnullnullnullnullnullnullnullLOCAL_USER_ADMINISTRATORSRule TypenullnullnullnullCommonSecurityLog
52516af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type Management (Management PC) in application of the following services RDPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'User2' has connection to: 'EndPoint3-PC' and last modification time: 'Mar 1 2020 12:45:10 PM' and path: 'C:\\Users\\User2\\Documents\\Default.rdp'Collection detailsendpoint3-pc.preedattestenv.comCrown Jewel HostRDPService TypeRdpFileCollection sourceManagement (Management PC)Crown Jewel TypenullnullnullnullCommonSecurityLog
52616af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Local User administrators should have stored credentials to the following target: except OrganizationalUnit:Groupsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnulladminnullnullnullnullnullnullnullnullLOCAL_USER_ADMINISTRATORSRule TypenullnullnullnullCommonSecurityLog
52716af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Local User administrators should have stored credentials to the following target: except OrganizationalUnit:Groupsnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullendpoint1nullnullnullnullnullnullnullnullLOCAL_USER_ADMINISTRATORSRule TypenullnullnullnullCommonSecurityLog
52816af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint5-pc.preedattestenv.comnullnullpreedattestenv.com\\user2nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1125' has connection to: 'LegacyGeneric:target\=PREEDATTESTENV\\User2' with username: 'PREEDATTESTENV\\User2' and last modification time: 'Sep 15 2019 11:30:30 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
52916af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored credentials from the following groups: User:Avi Nimni and User:Moshe Levi. and Group:Users and User:Eran Zehavi and User:Haim Cohen and User:Tal Ben Haimnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullpreedattestenv.com\\user4nullnullnullnullnullnullnullnullUSER_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'LegacyGeneric:target\=PREEDATTESTENV\\user4' with username: 'PREEDATTESTENV\\user4' and last modification time: 'Nov 13 2019 7:44:17 AM'Collection detailsVaultCollection sourcenullnullnullnullCommonSecurityLog
53016af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type DevOps (AD) in application of the following services RDPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'LegacyGeneric:target\=TERMSRV/win-euuezzttfsw.preedattestenv.com' with username: 'mgmt' and last modification time: 'Mar 9 2020 12:36:39 PM'Collection detailswin-euuezzttfsw.preedattestenv.comCrown Jewel HostRDPService TypeVaultCollection sourceDevOps (AD)Crown Jewel TypenullnullnullnullCommonSecurityLog
53116af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type Management (Management PC) in application of the following services RDPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint2-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1109' has connection to: 'EndPoint3-PC' with username: 'PREEDATTESTENV\\User3' and last modification time: 'Mar 1 2020 12:45:04 PM'Collection detailsendpoint3-pc.preedattestenv.comCrown Jewel HostRDPService TypeRdpRegistryCollection sourceManagement (Management PC)Crown Jewel TypenullnullnullnullCommonSecurityLog
53216af70b6-66b1-48c8-a563-caa8245b97d3OpsManager2020-05-17T19:13:25.56Zillusiveillusiveillusive:violation10nullNo Hosts from should have stored Crown Jewel credentials of type DevOps (AD) in application of the following services FTPnullnullnullnull3.1.127.1613Violationnullnullnullnullnullnullnullnullnullendpoint3-pc.preedattestenv.comnullnullnullnullnullnullnullnullnullnullCROWN_JEWEL_CREDENTIALSRule TypeProfile name: 'S-1-5-21-2619870177-3502509152-1737558779-1110' has connection to: 'win-euuezzttfsw.preedattestenv.com' with username: 'test' and last modification time: 'May 17 2020 12:05:15 PM'Collection detailswin-euuezzttfsw.preedattestenv.comCrown Jewel HostFTPService TypeWinSCPCollection sourceDevOps (AD)Crown Jewel TypenullnullnullnullCommonSecurityLog