Sophos

Sophos offers a range of cybersecurity solutions, including endpoint protection, firewalls, and cloud security. Sophos logs provide detailed information on security events such as malware detections, firewall activity, web filtering, intrusion attempts, and endpoint health. These logs are used to monitor network and device security, investigate threats, and ensure compliance with security policies across an organization’s IT infrastructure.

Ingest Method

This source is a polling source and will download new event/alert logs from the Sophos API approximately every 60 seconds.

Setup

To connect your source, generate an API Token from your Sophos Central account and add it to new RunReveal source in the sources dashboard.

Enter the API Access URL that Sophos provides, and copy the generated Headers into the Headers field.

Schema

The following columns are exposed for this source. RunReveal applies schema normalization across all sources, ensuring uniform field names and data types for cross-source queries and reusable detection logic.

Table: sophos_alert_logs (48 columns)

ColumnType
workspaceIDString
sourceIDString
sourceTypeLowCardinality(String)
sourceTTLUInt32
receivedAtDateTime
idString
eventTimeDateTime
eventNameString
eventIDString
srcIPString
srcASCountryCodeString
srcASNumberUInt32
srcASOrganizationString
srcCityString
srcConnectionTypeString
srcISPString
srcLatitudeFloat64
srcLongitudeFloat64
srcUserTypeString
dstIPString
dstASCountryCodeString
dstASNumberUInt32
dstASOrganizationString
dstCityString
ColumnType
dstConnectionTypeString
dstISPString
dstLatitudeFloat64
dstLongitudeFloat64
dstUserTypeString
actorMap(String, String)
tagsMap(String, String)
resourcesArray(String)
serviceNameString
readOnlyBool
rawLogString
typeString
whenDateTime
created_atDateTime
customer_idString
dataMap(String, String)
descriptionString
event_service_event_idString
infoMap(String, String)
locationString
severityString
sourceString
threatString
threat_cleanableUInt8

Table: sophos_event_logs (70 columns)

ColumnType
workspaceIDString
sourceIDString
sourceTypeLowCardinality(String)
sourceTTLUInt32
receivedAtDateTime
idString
eventTimeDateTime
eventNameString
eventIDString
srcIPString
srcASCountryCodeString
srcASNumberUInt32
srcASOrganizationString
srcCityString
srcConnectionTypeString
srcISPString
srcLatitudeFloat64
srcLongitudeFloat64
srcUserTypeString
dstIPString
dstASCountryCodeString
dstASNumberUInt32
dstASOrganizationString
dstCityString
dstConnectionTypeString
dstISPString
dstLatitudeFloat64
dstLongitudeFloat64
dstUserTypeString
actorMap(String, String)
tagsMap(String, String)
resourcesArray(String)
serviceNameString
readOnlyBool
rawLogString
ColumnType
typeString
whenDateTime
created_atDateTime
customer_idString
endpoint_idString
endpoint_typeString
groupString
locationString
nameString
originString
severityString
sourceString
source_infoMap(String, String)
threatString
user_idString
appCertsArray(String)
appSha256String
core_remedy_itemsString
ips_threat_data.detectionTypeInt64
ips_threat_data.executableNameString
ips_threat_data.executablePathString
ips_threat_data.executablePidString
ips_threat_data.executableVersionString
ips_threat_data.localPortString
ips_threat_data.rawDataString
ips_threat_data.remoteIpString
ips_threat_data.remotePortString
ips_threat_data.techSupportIdString
detailsMap(String, String)
whitelist_propertiesMap(String, String)
amsi_threat_data.parentProcessIdString
amsi_threat_data.parentProcessPathString
amsi_threat_data.processIdString
amsi_threat_data.processNameString
amsi_threat_data.processPathString