Understanding How Cloud Events are Mapped in Data Security Workbench
This topic describes some of the differences in terminology between the CASB application and Proofpoint Data Security & Posture dedicated Data Security Workbench app.
Since Proofpoint Data Security & Posture hosts not only cloud activity, but also, ITM, endpoint DLP, and email DLP, with more Data Security & Posture channels to come, it requires a terminology that applies equally to all these channels
CASB Alert Tagging in Data Security Workbench
When viewing CASB alerts in Data Security Workbench, you will see each comes with predefined tags.
The mapping between the CASB rule types and Analytics predefined tags is as follows:
-
Access Rule -> Suspicious Login tag
-
Data Rule -> Data Leakage tag
-
App Governance -> Suspicious Activity tag
-
Configuration & Security Posture Rule -> Suspicious Activity tag
Common/Frequently Used Cloud Event Attribute Names in Data Security Workbench
This table lists key cloud event and alert attributes in the Data Security and Posture platform for CASB and ATO Protection customers.
Some of the attributes in the below table are not available for all cloud activities.
Section Name |
Attribute Name |
Example Values |
Description |
---|---|---|---|
Activity |
Primary Category |
Successful Login, File Modify, File Upload, File Share. |
Defines the specific type of user activity such as login, file upload, or sharing. |
Activity |
Action Family |
Change, View, Directory |
Groups similar types of actions, such as changes, views, or deletions. |
Activity |
Action Object Type |
Storage File/folder, Directory Login, Third-Party-Application, Mail mailbox |
Specifies the type of object impacted by the activity (e.g., file, login, 3rd-party app). |
Activity |
Action Status |
success, failure |
Represents whether the action completed successfully or failed, as reported by the cloud provider. |
Activity |
Action Status Message |
Error validating credentials due to invalid username or password |
Detailed message from the cloud provider explaining the reason for action failure or providing additional information about the action. |
Activity |
Target Application/ Resource Name |
{{3rd Party App Name}} |
Name of the third-party application targeted by the action. |
Activity |
Target Application/ Resource Severity |
Low |
Risk level or severity of the third-party application involved. |
Activity |
Resource Insights Key |
share with |
Additional types of insights representing the activity provided by Proofpoint |
Activity |
Resource Insights |
All-Domain-Share, Internal Share, Public Share |
Activity insights value (Share level, 3rd party app name, etc.) |
Activity |
Resource Type |
Direct Access Sharing Link |
Additional information about the type of object that has been created/modified. |
Activity |
Resource Attributes |
permission:reader Scope Category |
Additional attributes about the resource created/modified. For file share activities it is used to describe the type of sharing permission created/modified. |
Activity |
Resource Attributes |
Resource Attributes Transition |
User friendly view of changed attribute values |
Activity |
Resource Relation Labels |
acme.com |
The domain of collaborators involved in file sharing activities. |
Activity |
Resource Relation Object Alias |
jdoe@acme.com |
The email addresses of collaborators in file sharing activities |
Activity |
Session id |
1.92847E+12 |
Unique session identifier for tracing login or access events. |
Client / 3PA |
Client / 3PA Alias |
51c4d537-d0d8-4523-bd82-54f70c75d3b0 |
Identifier of the client application that performed the action |
Client / 3PA |
Client / 3PA Name |
lucidchart |
Name of the client application that performed the action |
Client / 3PA |
Risk Level |
Low |
Risk level of the client application that performed the action |
Client / 3PA |
ID |
third_party_app_b2c097db5acb54d706ae7ac562c1bbd6 |
Proofpoint app identifier of the client application that performed the action |
Client / 3PA |
Client / 3PA Type |
mobile |
Type of interface used to access the app (e.g., mobile, script). |
User |
User properties |
Internal, External Resolved, Unresolved |
Specifies whether the user is internal or external.Unresolved: user does not match a known domain user External: guest or external user. |
User |
Directory Department Name |
Finance |
User's department, as defined in the organization’s directory (EntraID) |
User |
Directory Title |
Sales Person |
User’s title as defined in EntraID |
User |
Directory City Title |
San Fransicso |
User’s city as defined in EntraID |
User |
Directory Country Code |
OM |
User’s country code as defined in EntraID |
User |
Overall Risk Level |
Low |
Overall risk score calculated for the user by Proofpoint Human Risk Explorer based on behavioral and contextual analysis |
User |
Threat / Awareness / Data Risk Level |
Low |
Risk score under a specific risk dimension (e.g., data, threat., awareness) as defined in Human Risk Explorer |
User |
Directory Manager Catalog ID |
e6eae7e3-2a1d-4dc4-8a48-238eb25623da |
Unique identifier of the user's manager as defined in EntraID |
Entity/Application |
Suite |
Salesforce, Office 365, Google Workspace |
Cloud provider name |
Entity/Application |
Name |
OneDrive (Office 365), Microsoft Teams (Office 365) |
Specific cloud application name (for some cloud apps its similar to the suite field (cloud provider name) |
Access Source |
Client IP |
106.201.198.123 |
IP address of the actor/user from which the user activity originated |
Access Source |
User Agent |
Microsoft SkyDriveSync 25.110.0608.0001 ship; Windows NT 10.0 (22631) |
User agent reported by the actor |
Access Source |
Client Device |
Desktop, Mobile |
Device type the actor based on its user agent |
Access Source |
Client OS |
Windows Mac |
OS of the actor’s device based on its User Agent |
Access Source |
Host IP domain |
Aitrel.in |
Domain of the ISP based on the actor’s IP address |
Access Source |
Host IP ISP Name |
Bharthi Airtel ltd. |
Name of the ISP based on the actor’s IP address |
Access Source |
Country/City/State |
India, Mumbai |
Country/city/state of the actor user based on its IP address |
Access Source |
Location Info |
India, Maharashtra, Mumbai |
Aggregated location field (country, region, city) based on actor’s IP address |
Session |
ID |
08108dc9-eaa9-07de-b416-82b54ce2fc7a |
Session identifier (if exists). Several events can be performed as part of the single session |
Resource |
Name |
testfile.docx |
File name |
Resource |
Resource URL |
https://acme-my.sharepoint.com/personal/sitename/Documents/user/file.docx |
File’s full URL |
Resource |
Resource URL domain |
https://acme-my.sharepoint.com |
Domain part of the file based on its URL |
Resource |
Path |
Documents/username/folder/file.docx |
File path |
Resource |
Container/Site |
acme-my.shrepoint.com/ |
Name of file container such as sharepoint site Onedrive or Shared drive |
Resource |
Parent Folder |
folder/file.docx |
File’s folder name |
Resource |
Classification Labels Name |
Credit Card number, Classified, |
Name of matching Detectors, Data Class and Classifiers, MIP labels or Google badged labels |
Resource |
Classification Labels Type |
AI Classifier, Detector, MIP |
Type of data classifier matching the file’s content |
Resource |
Classification Labels confidence score |
77 |
AI classifier score |
Resource |
Share Level |
Internal, Exernal |
Calculated share level of file or content |
Resource |
Owner Name |
jdoe@acme.com |
File owner email address |
|
|
|
|
Resource |
Content Type |
image/jpeg, application/pdf |
MIME type of file |
Resource |
Extension |
jpg |
File extention |
Resource |
Hash Values |
|
File’s Hash value (SHA256 or quickXor) |
Resource |
ID |
2363cbcde7648ad96478f3f43d385427 |
Proofpoint file identifier |
Resource |
System Origin Identifier |
6aaddb60-3163-4c58-93dc-21266be0587b |
Cloud Provider file identifier |
Feed |
Region |
US1 |
Data center region in which the data is persisted in |
Feed |
Tenant Alias |
Acme |
Data Security Platform tenant name |
Feed |
Tenant ID |
203208323 |
Data Security Platform tenant identifier |
Organization |
Instance Name |
ACME corp. |
CASB tenant name |
Organization |
Instance ID |
casb:tenant:tenant_ca1812b7c73ae4c48bd8d9fe0cc12b188 |
CASB tenant identifier |
Event |
Occurred Time |
Sun, Jul 6, 2025 10:55:45 AM UTC |
Time of actual activity (as captured by the cloud provider). |
Event |
Observed Time |
Sun, Jul 6, 2025 10:55:45 AM UTC |
Time of actual activity (as captured by the cloud provider). Same as Occurred Time |
Event |
Ingested Time |
Sun, Jul 6, 2025 10:55:45 AM UTC |
Time Proofpoint algorithms identified the activity as a threat during automatic threat detection. In the case of a file related event, this represents the time in which file threat/content scanning was completed and the event became available in Data Security Workbench application |
Event |
Inspected Time |
Sun, Jul 6, 2025 10:55:45 AM UTC |
Time the event became available to Proofpoint by the cloud provider via API |
Event |
Updated Time |
Sun, Jul 6, 2025 10:55:45 AM UTC |
Reflects the last detection time, in the event of a threat information update |
Event |
ID |
flevent_fba5dfb24f99d124e5d0232a2ae9bd36 |
Proofpoint internal event identifier |
Alert |
Severity |
Low |
Alert’s severity |
Alert |
Rule Name |
RuleName |
Name of the matching rule triggering the alert |
Alert |
ID |
alert_d87fcdcae91449dc530241cb31bf4232 |
Alert identifier |
Alert |
Description |
|
Triggered rule description |
Alert |
Remediation Type |
File:apply Google Labels |
Name of remediation action that was executed |
Alert |
Remediation Status |
Success, Failed |
Status of remediation action that was executed |
Alert |
Remediation Executed Time |
Tue, Jun 3, 2025 7:05:10 PM GMT+3 |
Time in which the remediation action was triggered |
Alert |
Remediation Updated Time |
Tue, Jun 3, 2025 7:05:10 PM GMT+3 |
Time in which the remediation action status was updated |
Alert |
Remediations - Message |
{{message}} |
Remediation status message |
Alert |
Remediation Origin Type |
remediation:automated, remediation:manual |
Indicates if the remediation action was triggered manually or by a rule (automatic) |
Indicator |
Type |
CASB rule, Detector, Dictionary, SmartID |
Vector representing all match critertias that were matched by the rule |
Indicator |
Indicator/Detector Name |
{{RuleName}}, {{MIPLabelName}}, {{Detector Name}}, |
For alerts: alert name For MIP labels: Label name |
Indicator |
Matches Object Type |
event:match, File:content |
vector representing the type of each match criteria |
Indicator |
Matches Object Name |
Activity Type, Exclude Networks, Result |
vector representing the names of the rule’s match criteria |
Indicator |
Matches Params Value |
Add Mailbox Delegation, Dictionary_CreditCard,SmartID_CreditCardNumber |
vector representing the values of matched attributes |
Indicator |
Matches Results |
Add Mailbox Delegation |
|
Indicator |
Matches Results Stats Count |
N/A, 9, 8, 15 |
Vector representing the number of matches per Indicator |
Additional Information |
Threat Score |
50 |
Proofpoint threat detection risk score |
Additional Information |
Login Status |
Faliure |
Login activity status |
Additional Information |
Risk Level |
Low |
Proofpoint threat detection risk level |
Additional Information |
Owner |
jdoe@acme.com |
File owner email address |
Correlations |
Object ID |
flevent_a46d61adf490f3cc0e509125b917ca9b |
Correlated event identifier |
Processing |
Processing Action / Response |
Make File Private |
Indicates the result of a remediation action |
Processing |
Action Executied Time |
Tue, Jun 3, 2025 6:51:56 PM GMT+3 |
Time in which the response action was initiated |
Processing |
Action ID |
remediationaction_2652cf83b8423efa61bd0cf4b423b922 |
remediaiton action identifier |
Key Examples
Cloud Service -> Entity/Application Name
The legacy CASB Activities, Alerts, and Files pages use the term 'Cloud Service' to designate cloud application monitoring by CASB-sanctioned applications.
In the Data Security Workbench Explorations page, this is now called the Entity/Application Name, and is found in the Activity Summary column and the Summary panel, as shown below.
Event Types -> Primary Category and Action Families
The legacy CASB Activity page featured both a column and filter called 'Event Types'(1) that showed groups or families of events. This example illustrates the Change (2) event type. It displays different types of changes, such as (3) File/Folder Rename, File Modify, or User Update. These specific types of changes all come under the general 'Change' family.
In the Data Security Workbench Exploration page, these specific types are translated into primary categories, which are grouped into families. There are several levels of families, as you will see in the query example below.
The first column in the grid displays the category information.
Refer to the example below. The bolded text is the primary category. That is the specific type of event that took place ('File/Folder Add'(1)). Below the primary category, is the lowest level family ('File/Folder Create (2)) and the type of object (Storage 'File/Folder (3)) or resource, as they were called in CASB.
The primary categories are similar to the specific events that appeared in the event type column in the legacy CASB activities: file rename, file update, etc.
Resource Types -> Objects
The legacy CASB used the term 'resource type' to designate the object on which an event took place, such as a file, a third-party application, or a user. In the Data Security Workbench Explorations page, these are called 'object types' (3).