Zero Trust Access Log Formats

The Cisco Secure Access Zero Trust Access logs show your organization's traffic through the Secure Access Zero Trust Access services. ZTA logs include security events for both client-based and client-less Zero Trust Access sessions. For information about the size of a log file, see Estimate the Size of a Log.

Table of Contents

Example

An example of a v10 Zero Trust Access log event.

timestamp,identity email,identity labels,identity type labels,hostname,verdict,client os,client browser,client geo location,client ip,ruleset id,rule id,private app group id,private app id,private resource id,private resource group id,step up auth type,step up auth result,step up auth token life,posture id,requested id fqdn,resolved ip,app connector group id,headend type,duo device id,duo device id string,system password,client firewall,disk encryption,anti malware agents,transaction id,block reason,application port,application protocol,tunnel type,secure client version,possible match ruleset id,possible match rule id,possible match posture,source process id,source process name,source process hash,source process user name,organization id,ad joined id
"2017-10-02 23:52:53","[email protected]","Network. AD Computer","Networks","ts-auto.com","ALLOW","Mac OS 10.9.5","Chrome 9.9","Canada","10.10.10.10","56","12","25","129","200","756","SAML_SSO","SUCCESS","6000","256","prod.example.com","1.1.1.1","45","CLAP",,"921c9ab4123456789aa5d6e814b90","enabled[1000]","SYS","THIRDPARTY","[cisco-amp 1.20.0.877, windows-defender 1.20.0.877]","ne2OJA4jNFM2J2LSVKJXvNguHW2bFqUd","","80","TCP","HTTP2","","[]","[]","[]","[]","[]","[]","[]","8151514",""

Order of Fields in Zero Trust Access Logs

Note: Not all fields listed are found in most or all requests. When a field does not have a value, Secure Access sets the field to the empty string ("") in the log.

V10 Log Format

The CSV fields in the header row of the Zero Trust Access log.

timestamp,identity email,identity labels,identity type labels,hostname,verdict,client os,client browser,client geo location,client ip,ruleset id,rule id,private app group id,private app id,private resource id,private resource group id,step up auth type,step up auth result,step up auth token life,posture id,requested id fqdn,resolved ip,app connector group id,headend type,duo device id,duo device id string,system password,client firewall,disk encryption,anti malware agents,transaction id,block reason,application port,application protocol,tunnel type,secure client version,possible match ruleset id,possible match rule id,possible match posture,source process id,source process name,source process hash,source process user name,organization id,ad joined id

The description of each field and the log version in which each field was released, up to version 10. For more information about log versions, see Find Your Log Schema Version.

Field nameDescriptionRelease version
timestampThe date and time of the ZTA event, expressed as a UTC-formatted string (e.g., 2024-01-16 17:48:41).

Note: Unlike the Secure Access dashboard and reports, Secure Access logs do not convert the timestamp to your local timezone.
v9
identity emailThe email address of the Active Directory user.v9
identity labelsThe list of labels for the identity.v9
identity type labelsThe label of the identity type.v9
hostnameThe hostname of the user device.v9
verdictWhether the user has access to a resource.v9
client osThe operating system of the user device.v9
client browserThe name of the browser on the user device.v9
client geo locationThe regional location of the user device.v9
client ipThe IP address of the user device.v9
ruleset idThe ID of the ruleset.v9
rule idThe ID of the access rule.v9
private app group idThe ID of the private application group.v9
private app idThe ID of the private application.v9
private resource idThe ID that Secure Access assigns to the customer-defined private application.v9
private resource group idThe ID if the rule matched is based on the private application group.v9
step up auth typeThe type of authentication. Valid values are: SAML_SSO, MFA, or NONE.v9
step up auth resultThe result of the authentication. Valid values are: SUCCESS or FAILURE.v9
step up auth token lifeThe time in seconds between when you generated the token and used the token.v9
posture idID of the matching posture profile.v9
requested id fqdnThe IP or FQDN of the requested application.v9
resolved ipThe IP of the application returned by the proxy.v9
app connector group idThe group ID of the App Connector.v9
headend typeThe type of the headend. Valid values are: CLAP or BAP.v9
duo device idThe ID of the Duo App on the device.v9
duo device id stringThe ID label of the Duo App on the device.v9
system passwordWhether the system password is enabled with its timeout in seconds.v9
client firewallThe client system firewall. Valid values are SYS or NONE.v9
disk encryptionThe client Disk Encryption Type. Valid values are: SYS, NONE or THIRD PARTY.v9
anti malware agentsThe clients' anti malware agents.v9
transaction idUnique transaction ID generated by the Secure Client.v10
block reasonThe reason for the transaction being blocked. (e.g., Android OS not allowed)v10
application portThe port of the destination application.v10
application protocolThe type of protocol used for transactions. (e.g., TCP)v10
tunnel typeThe type of tunnel used to connect to the ZTA proxy. Valid values are: HTTP2, HTTP3v10
secure client versionThe version of the Cisco Secure Client on the endpoint device accessing a private resource.v10
possible match ruleset idFor a block event, the ID of the ruleset that could have allowed the transaction if not for the block reason.v10
possible match rule idFor a block event, the ID of the rule within the ruleset that could have allowed the transaction if not for the block reason.v10
possible match postureFor a block event, the posture that could have allowed the transaction if not for the block reason.v10
source process idThe ID of the source process that initiated the transaction from the client side.v10
source process nameThe name of the source process that initiated the transaction from the client side (e.g., chrome.exe).v10
source process hashThe hash of the source process that initiated the transaction from the client side.v10
source process user nameThe user name associated with the source process that initiated the transaction from the client side.v10
organization idThe Secure Access organization ID. For more information, see Find Your Organization ID .v10
ad joined idID of the device if it is joined to an Active Directory domain.v10


Web Log Formats < Zero Trust Access Log Formats > Manage API Keys