Common Event Format (CEF) NameJSON NameDescriptionField TypeExample Value
TimestamptimestampTimestamp of the threat eventString (ISO 8601)2019-11-01T02:04:56.084Z
AlertIDalertIdThe threat event IDStringa111111a-11a1-4f80-9905-24f90bfe26bf
DeviceIDdevice.externalIdDevice Identifier as obtained from a connected UEM. Usually the device's UDID.String59fa173f6c7ca6e7516fa27632f0fa14aaaaaaaa
GUIDdevice.deviceIdJamf unique identifier for the device.Stringa111111a-11a1-4266-9609-fbee82a8a4f9
DeviceNamedevice.deviceNamePlatform and version of the deviceStringApple iPhone 6s (12.2)
EventeventType.descriptionThe threat event that was detectedStringMalware
AppNameapp.nameName of the application identified for this threat eventStringMyFreeCalculator
AppIDapp.idpackageName (Android) or bundleId (iOS and iPadOS) of the application identified for this threat event (if applicable)Stringru.freeapps.calc
SeverityseveritySeverity level of the threat event

String with possible values: 2, 4, 6, 8, 10

6
Destinationdestination.nameDestination URL of malicious network activity (if applicable)Stringhttp://badsite.com/exa_mple1
ACTactionThe policy action taken

String with possible values: Resolved, Blocked, Detected

Detected
OSdevice.osOS and version of the deviceStringiOS / iPadOS 12.2
LocationlocationLocation of the device when the threat event was detected in 2-letter ISO country codeStringgb
AccessPointaccessPointThe access point that a network threat was detected onStringStarbucks_FREE_WIFI
EventURLeventUrlURL link to the Jamf Security Cloud Event Detail reportString
AccountNameaccount.nameCustomer account nameStringMegacorp GB
UserEmailuser.emailDevice user email addressStringjohn.smith@megacorp.com
SourceIPsource.ipIP address of the device where potential malicious network activity originatedString123.45.6.789
CustomerIdaccount.customerIdCustomer account IDString4444defa-1042-4a85-9fff-763ae00c8354
AppVersionapp.versionVersion of the application identified for this threat eventString10.4
AppSha256app.sha256SHA-256 hash of the application identified for this threat eventString50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c
AppSha1app.sha1SHA-1 hash of the applicationStringc3499c2729730a7f807efb8676a92dcb6f8a3f8f
DestinationIPdestination.ipIP address of the destination serverString123.45.6.789
ParentIdaccount.parentIdCustomer global account IDString5555defa-1042-4a85-9fff-763ae00c8354
AccessPointBSSIDaccessPointBssidThe BSSID of an access point that a network threat was detected onString23:8f:cf:0:9d:23
EventTypeeventType.nameThe granular threat event that was detectedStringPOTENTIALLY_UNWANTED_APP_IN_INVENTORY
sptsource.portPort where the request originatedString1234
dptdestination.portPort of the destination server where the request is goingString80
UserDeviceName device.userDeviceNameThe name of the device set by the end user or adminStringLesley's iPhone or artificial guide depending on UEM presence
susersourceUserNameIdentifies the source user by nameStringJoanne Smith