ESET PROTECT
ESET PROTECT is ESET's central management console for its endpoint-security suite, covering malware defence, firewall and device control.
EnginsightGlobal Fields (4)
| Field | Type | 
|---|---|
ngs.id Unique identifier for the log entry.  | string  | 
ngs.createdAt Timestamp when the event was created locally.  | pdate  | 
ngs.indexedAt Timestamp when the log was indexed into the SIEM.  | pdate  | 
ngs.source Origin or source system of the log.  | string  | 
Reference-Specific Fields (68)
| Field | Type | 
|---|---|
esetProtect.command_line The full command-line string used by the process when the detection occurred.  | string  | 
esetProtect.detection_uuid Unique UUID of this detection record, used to retrieve its full details via GET /v1/detections/{detectionUuid}.  | string  | 
esetProtect.domain Active Directory domain name of the endpoint where the event was logged.  | string  | 
esetProtect.eialarmid Internal alarm ID assigned by the ESET Inspect engine for correlating related alerts.  | string  | 
esetProtect.engine_version Version number of the ESET detection engine that produced this event.  | string  | 
esetProtect.event Plain-text description of the event type (e.g. detection, remediation, policy update).  | text_general  | 
esetProtect.group_description Textual description of the group or container (e.g. machine group) involved in the event.  | text_general  | 
esetProtect.group_name Name of the device group or organizational unit as defined in ESET Protect.  | string  | 
esetProtect.handled String flag indicating whether the event has been marked handled (e.g. "true"/"false").  | string  | 
esetProtect.os_name Operating system name of the endpoint (e.g. Windows 10, macOS).  | string  | 
esetProtect.result Outcome of the ESET action (e.g. detected, cleaned, blocked).  | text_general  | 
esetProtect.rule_id Identifier of the detection rule or signature that triggered this event.  | string  | 
esetProtect.scan_id UUID of the scan session in which this detection occurred (for on-demand or scheduled scans).  | string  | 
esetProtect.scanner_id Identifier of the scanning engine instance (e.g. module name or internal GUID).  | string  | 
esetProtect.source_uuid UUID of the source device or agent that reported the event.  | string  | 
esetProtect.trigger_event Name of the trigger that caused the detection (e.g. file open, scheduled scan).  | text_general  | 
esetProtect.computer_name Hostname of the computer where the detection or event was logged.  | text_general  | 
esetProtect.first_seen_time UTC timestamp when the threat was first detected by ESET Protect.  | pdate  | 
esetProtect.firewall_event Code or name of the firewall action (e.g. "ALLOW", "BLOCK") logged by the endpoint firewall.  | string  | 
esetProtect.process_name Executable name of the process involved in the event.  | text_general  | 
esetProtect.tgt_address IP address or hostname of the target resource involved (if network-related).  | text_general  | 
esetProtect.target Logical name of the target object (file path, registry key, URL, etc.).  | text_general  | 
esetProtect.notification_name Friendly name of the notification issued (e.g. "Malware Found").  | text_general  | 
esetProtect.notification_type Category of notification (e.g. alert, info, warning).  | text_general  | 
esetProtect.msp_customer_name Name of the MSP customer if managed via ESET MSP console.  | text_general  | 
esetProtect.computer_sg_parent Name of the parent security group or organizational hierarchy above the device.  | text_general  | 
esetProtect.src_port Source port number for network-related events.  | pint  | 
esetProtect.completion UTC timestamp when the remediation or scan action completed.  | pdate  | 
esetProtect.cleaned Number of items successfully cleaned or remediated in this event.  | plong  | 
esetProtect.detection_type High-level type of detection (e.g. malware, PUP, suspicious).  | string  | 
esetProtect.object_type Type of object involved (file, process, registry, network).  | string  | 
esetProtect.user Logged-on user account name when the event was generated.  | text_general  | 
esetProtect.computer_sg_hierarchy Full hierarchical path of security groups this computer belongs to.  | text_general  | 
esetProtect.ip_address IP address involved in the event (e.g. remote host, download URL).  | text_general  | 
esetProtect.tgt_port Destination port number for network-related detections or blocks.  | pint  | 
esetProtect.msp_company_name Name of the managed service provider company, if applicable.  | text_general  | 
esetProtect.hash Hash value (MD5, SHA-1, etc.) of the file or object detected.  | string  | 
esetProtect.action_error Detailed error message if a remediation or scan action failed.  | text_general  | 
esetProtect.detection_handled Boolean flag indicating if the detection has been programmatically handled.  | boolean  | 
esetProtect.inbound_comm True if the event involved inbound network communication.  | boolean  | 
esetProtect.operation Name of the operation performed (e.g. scan, quarantine, block).  | text_general  | 
esetProtect.infected Number of files or objects flagged as infected in this event.  | plong  | 
esetProtect.scanner Name of the scanning module or engine component used.  | text_general  | 
esetProtect.virus_db Version of the virus signature database in use.  | string  | 
esetProtect.object_uri URI identifying the object in ESET Protect (e.g. /machines/{id}/files/{path}).  | text_general  | 
esetProtect.tgt_address_type Type of target address (IPv4, IPv6, hostname).  | string  | 
esetProtect.application Name of the application context in which the event occurred.  | text_general  | 
esetProtect.scanned_targets List of target paths scanned during this event (files, folders).  | text_general []  | 
esetProtect.timestamp UTC timestamp when this log entry was generated.  | pdate  | 
esetProtect.action High-level action taken by ESET (e.g. "quarantine", "ignore").  | string  | 
esetProtect.target_computer_name Hostname of the target machine for remote-initiated actions.  | text_general  | 
esetProtect.is_hardware_detection_enabled True if hardware-based detection (e.g. UEFI) was enabled on the endpoint.  | boolean  | 
esetProtect.scanned Number of objects scanned in this scan job or real-time check.  | plong  | 
esetProtect.circumstances Contextual details about why this event was generated (e.g. scheduled vs. real-time).  | text_general  | 
esetProtect.cause Underlying cause or detection method (heuristics, signatures, behavior).  | text_general  | 
esetProtect.rule_name Human-readable name of the detection rule or signature.  | text_general  | 
esetProtect.computer_severity_score Numeric severity score assigned to the machine by ESET policy.  | plong  | 
esetProtect.status Current status of the detection (e.g. "new", "resolved").  | string  | 
esetProtect.severity String severity level of this event (e.g. "low", "medium", "high").  | string  | 
esetProtect.detection_name Display name of the detected threat or event category.  | text_general  | 
esetProtect.description Detailed description or remediation recommendation provided with the event.  | text_general  | 
esetProtect.src_address_type Type of source address (IPv4, IPv6, hostname) for network events.  | string  | 
esetProtect.restart_required True if a system restart is required after this action.  | boolean  | 
esetProtect.source_computer_name Hostname of the source machine initiating the event (for remote scans).  | text_general  | 
esetProtect.severity_score Numeric score representing severity on a standardized scale (0-100).  | plong  | 
esetProtect.occurrences Count of how many times this same event has recurred on the endpoint.  | plong  | 
esetProtect.ei_console_link Deep link URL to view this detection or event in the ESET Protect web console.  | text_general  | 
esetProtect.protocol Network protocol involved (e.g. TCP, UDP, ICMP) if applicable.  | string  | 
Sample Log Event
Below is a representative JSON log entry showing key fields as they're emitted by the system. Depending on the context of the event, some fields may be omitted if they're not applicable.