| NtpActivity |
The Network Time Protocol (NTP) Activity events report instances of remote |
yes |
| Feature |
The Feature object provides information about the software product feature th... |
yes |
| Databucket |
The databucket object is a basic container that holds data, typically organiz... |
yes |
| Service |
The Service object describes characteristics of a service, e |
yes |
| Agent |
An Agent (also known as a Sensor) is typically installed on an Operating Syst... |
yes |
| RpcInterface |
The RPC Interface represents the remote procedure call interface used in the |
yes |
| ManagedEntity |
The Managed Entity object describes the type and version of an entity, such a... |
yes |
| Product |
The Product object describes characteristics of a software product |
yes |
| Logger |
The Logger object represents the device and product where events are stored |
yes |
| Attack |
The MITRE ATT&CK® & ATLAS™ object describes the tactic, technique, |
yes |
| File |
The File object represents the metadata associated with a file stored in a |
yes |
| Scim |
The System for Cross-domain Identity Management (SCIM) Configuration object |
yes |
| Api |
The API, or Application Programming Interface, object represents information |
yes |
| Check |
The check object defines a specific, testable compliance verification point |
yes |
| Tls |
The Transport Layer Security (TLS) object describes the negotiated TLS protoc... |
yes |
| ResourceDetails |
The Resource Details object describes details about resources that were |
yes |
| Analytic |
The Analytic object contains details about the analytic technique used to |
yes |
| Sbom |
The Software Bill of Materials object describes characteristics of a generate... |
yes |
| Os |
The Operating System (OS) object describes characteristics of an OS, such as |
yes |
| Certificate |
The Digital Certificate, also known as a Public Key Certificate, object |
yes |
| Metadata |
The Metadata object describes the metadata associated with the event |
yes |
| ApplicationObject |
An Application describes the details for an inventoried application as report... |
yes |
| Policy |
The Policy object describes the policies that are applicable |
yes |
| WinService |
The Windows Service object describes a Windows service |
no |
| Extension |
The OCSF Schema Extension object provides detailed information about the sche... |
yes |
| SoftwareComponent |
The Software Component object describes characteristics of a software compone... |
yes |
| Package |
The Software Package object describes details about a software package |
yes |
| CisCsc |
The CIS Critical Security Control (CSC) contains information as defined by th... |
yes |
| Rule |
The Rule object describes characteristics of a rule associated with a policy ... |
yes |
| HttpRequest |
The HTTP Request object represents the attributes of a request made to a web |
yes |
| AffectedPackage |
The Affected Package object describes details about a software package |
no |
| FirewallRule |
The Firewall Rule object represents a specific rule within a firewall policy ... |
no |
| CisControl |
The CIS Control (aka Critical Security Control) object describes a prioritize... |
yes |
| Cvss |
The Common Vulnerability Scoring System (<a target='_blank' |
yes |
| Epss |
The Exploit Prediction Scoring System (EPSS) object describes the estimated |
yes |
| AiModel |
The AI Model object describes the characteristics of an AI/ML model |
yes |
| D3fend |
The MITRE D3FEND™ object describes the tactic & technique associated with a |
yes |