Web Log Formats

The Cisco Secure Access Web logs show your organization's traffic through the Secure Access proxy. For information about the size of a log file, see Estimate the Size of a Log.

Table of Contents

Example

An example of a v10 Web log event.

timestamp,policy identity label,internal client ip,external client ip,destination ip,content type,action,url,referer,user agent,status code,request size,response size,response body size,sha—sha256,categories,av detections,puas,amp disposition,AMP malware name,amp score,policy identity type,blocked categories,identities,identity types,request method,dlp status,certificate errors,file name,ruleset id,rule ID,destination list ids,isolate action,file action,warn status,forwarding method,producer,msp organization id,geo location,blocked destination countries,application ids,hostname,data center,egress,server name,time based rule,security overridden,detected response file type,warn categories,organization id
"2024-09-11 11:48:11","TheComputerName","192.192.192.135","1.1.1.91", "3.4.5.6","","ALLOWED",""https://unitedstates.smartscreen.microsoft.com"","www.google.com","Mozilla/5.0> (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36","200","562","1489","","","Search Engines","","","","","","Roaming Computer","","TheComputerName, ADSite,Network","Roaming Computer, Site, Network","GET","","","the.js","","","","isolated","downloaded_original_file","warn-session","","SWA","","","","","swg-nginx-proxy-https-bd8cc1601841.signginx.atl1","ATL1","true","unitedstates.smartscreen.microsoft.com","false","false","","","2204063"

Order of Fields in the Web Log

Note: Not all fields listed are found in most or all requests. When a field does not have a value, Secure Access sets the field to the empty string ("") in the log.

V10 Log Format

The CSV fields in the header row of the Web log.

timestamp,policy identity label,internal client ip,external client ip,destination ip,content type,action,url,referer,user agent,status code,request size,response size,response body size,sha—sha256,categories,av detections,puas,amp disposition,AMP malware name,amp score,policy identity type,blocked categories,identities,identity types,request method,dlp status,certificate errors,file name,ruleset id,rule ID,destination list ids,isolate action,file action,warn status,forwarding method,producer,msp organization id,geo location,blocked destination countries,application ids,hostname,data center,egress,server name,time based rule,security overridden,detected response file type,warn categories,organization id

The description of each field and the log version in which each field was released, up to version 10. For more information about log versions, see Find Your Log Schema Version.

Field nameDescriptionRelease version
timestampThe date and time of the Web traffic event, expressed as a UTC-formatted string (e.g., 2024-01-16 17:48:41).

Note: Unlike the Secure Access dashboard and reports, Secure Access logs do not convert the timestamp to your local timezone.
v1
policy identity labelThe identity that made the request.v1
internal client ipThe internal IP address of the computer making the request.v1
external client ipThe egress IP address of the network where the request originated.v1
destination ipThe destination IP address of the request.v1
content typeThe type of web content, typically text/html.v1
actionWhether the request was allowed or blocked.v1
urlThe URL requested.v1
refererThe referring domain or URL.v1
user agentThe browser agent that made the request.v1
status codeThe HTTP status code; should always be 200 or 201.v1
request sizeRequest size in bytes.v1
response sizeResponse size in bytes.v1
response body sizeResponse body size in bytes.v1
sha—sha256The hex digest of the response content.v1
categoriesThe security categories for this request, such as Malware.v1
av detectionsThe detection name according to the antivirus engine used in file inspection.v1
puasA list of all potentially unwanted application (PUA) results for the proxied file as returned by the antivirus scanner.v1
amp dispositionThe status of the files proxied and scanned by Cisco Advanced Malware Protection (AMP) as part of the File Inspection feature; can be Clean, Malicious or Unknown.v1
amp malware nameIf Malicious, the name of the malware according to AMP.v1
amp scoreThe score of the malware from AMP. This field returns blank ("") unless the verdict is Unknown, in which the value will be 0.v1
policy identity typeThe first identity type that made the request. Examples: Roaming Computer, Network.v1
blocked categoriesThe category that resulted in the destination being blocked.v4
identitiesAll identities associated with this request.v5
identity typesThe type of identities that were associated with the request. Examples: Roaming Computer, Network.v5
request methodThe HTTP request method. Examples: GET, POST, HEAD, PUT, DELETE.v5
dlp statusIf the request was Blocked for DLP.v6
certificate errorsAny certificate or protocol errors in the request.v6
file nameThe name of the file.v6
ruleset idThe ID number assigned to the ruleset.v6
rule idThe ID number assigned to the rule.v6
destination list idsThe ID number assigned to a destination list.v6
isolate actionThe remote browser isolation state associated with the request.v8
file actionThe action taken on a file in a remote browser isolation session. Valid values are: UNKNOWN, DETECT, BLOCK, MALWARE_CLOUD_LOOKUP, MALWARE_WHITELIST, CLOUD_LOOKUP_TIMEOUT, CUSTOM_DETECTION, CUSTOM_DETECTION_BLOCK, ARCHIVE_BLOCK_DEPTH_EXCEEDED, ARCHIVE_BLOCK_ENCRYPTED, ARCHIVE_BLOCK_FAILED_TO_INSPECT, TID_BLOCKv8
warn statusThe Warn page's state associated with the request.v8
forwarding methodThe method used to forward the proxy events. Example: Secure Web Appliance.v9
producerThe producer of the proxy events.v9
msp organization idThe Secure Access parent organization ID.v10
geo locationThe regional location of the user device.v10
blocked destination countriesThe country of the blocked destination.v10
application idsThe ID of the destination application.v10
hostnameThe hostname of the user device.v10
data centerThe name of the data center that processed the user-generated traffic.v10
egressv10
server namev10
time based rulev10
security overriddenv10
detected response file typev10
warn categoriesThe ID of one or more content categories in lists matched for a Warn action by the rule.v10
organization idThe Secure Access organization ID. For more information, see Find Your Organization ID .v10


Remote Access VPN Log Formats < Web Log Formats > Zero Trust Network Access Log Formats