Enginsight Shield (IPS)
Enginsight Shield is an inline intrusion-prevention system that blocks exploits and anomalies in real time.
EnginsightGlobal Fields (4)
| Field | Type | 
|---|---|
ngs.id Unique identifier for the log entry.  | string  | 
ngs.createdAt Timestamp when the event was created locally.  | pdate  | 
ngs.indexedAt Timestamp when the log was indexed into the SIEM.  | pdate  | 
ngs.source Origin or source system of the log.  | string  | 
Reference-Specific Fields (21)
| Field | Type | 
|---|---|
ngs.shield.ruleName Descriptive name of the IPS/IDS rule that matched (e.g., "SQL Injection Attempt").  | text_general  | 
ngs.shield.ruleId Internal or Snort/Suricata signature ID of the matched rule.  | string  | 
ngs.shield.autopilotName Human-readable name of the Enginsight Autopilot that detected or blocked the traffic.  | text_general  | 
ngs.shield.autopilotId Unique identifier of the Autopilot instance reporting the event.  | string  | 
ngs.shield.segmentName Label of the network segment or zone in which the traffic was observed.  | text_general  | 
ngs.shield.segmentId Identifier of the segment object in the Enginsight inventory.  | string  | 
ngs.shield.cause Short textual cause or keyword explaining why the traffic was blocked or flagged.  | string  | 
ngs.shield.segment CIDR notation of the segment's IP range (e.g., "192.168.0.0/24").  | string  | 
ngs.shield.ports Array of TCP/UDP port numbers involved in the connection.  | pint []  | 
ngs.shield.occurrences Number of times the identical event was seen and aggregated during the reporting interval.  | pint  | 
ngs.shield.direction Traffic direction relative to the protected host (inbound or outbound).  | string  | 
ngs.shield.hash Hash value (SHA-256) uniquely identifying the packet payload for deduplication.  | string  | 
ngs.shield.rule Full text of the detection rule or signature that triggered the alert.  | string  | 
ngs.shield.policy Name of the Shield policy bundle in which the rule is defined.  | string  | 
ngs.shield.action Enforcement action carried out by Shield (alert, drop, reject, pass).  | string  | 
ngs.shield.protocol Layer-4 protocol of the packet flow (TCP, UDP, ICMP, etc.).  | string  | 
ngs.shield.source Source IP address (and optional port) of the packet that matched the rule.  | text_general []  | 
ngs.shield.destination Destination IP address (and optional port) targeted by the packet.  | text_general []  | 
ngs.shield.reason Detailed reason phrase returned by the engine (e.g., "pattern matched: ET EXPLOIT Shellcode").  | text_general []  | 
ngs.shield.payload Excerpt of the packet payload or HTTP request that triggered the rule (may be truncated).  | text_general []  | 
ngs.shield.type High-level detection class, e.g., signature, anomaly, policy or reputation.  | text_general []  | 
Sample Log Event
Below is a representative JSON log entry showing key fields as they're emitted by the system. Depending on the context of the event, some fields may be omitted if they're not applicable.