Key UDM fields for parsers

Supported in:
Google secops SIEM

Some Google Security Operations features depend on data populated incertain UDM fields. If this data is missing or incorrect, the feature may notfunction as intended.

When creating a parser, make sure the data mapping instructions populate as manyimportant Unified Data Model(UDM) fields as possible.Parser data mapping instructions control how original raw log data is mapped tofields in the UDM data structure. For a list of all UDM fields, see theUnifiedData Model field list.

Feature areas

Key UDM fields fall into the following feature areas (and use cases). TheFeature area or use cases column in theKey UDM field list includes the following feature areas:

  • Curated detections: Prebuilt rule sets, managed byGoogle SecOps, that analyze your data to detect potential threats.
  • Indexing: Lets security analysts search forinformation about resources, such as assets, domains, IP addresses, users, andfiles. It also enriches UDM records with details about prevalence,first time seen, last time seen, and more.
  • Artifact aliasing: Enriches UDM records with additional data,such as geolocation data using an external IP address.
  • Asset aliasing: Identifies relationships across individualUDM records related to the same physical asset, such as a server, laptop, ormobile device.
  • Process aliasing: Identifies relationships across individualUDM records that describe one or more related processes, files, and users whoexecuted the process.
  • User aliasing: Identifies relationships across individual UDMrecords related to the same user.
  • Entity graph: Identifies relationships between entities andresources in your environment.
  • IoC: Matches your data against data ingested from IoC feeds.
  • Threat hunting: This is a use case, not a feature. Fields with thisvalue are recommended to facilitate Threat hunting activities.

Key UDM fields

Use this keyword lookup to find important UDM fields.

Fully qualified field nameFeature area or use case
<event>.security_result.threat_id_namespaceIndexing
<event>.security_result.threat_idIndexing
<event>.security_result.categoryIndexing
<event>.security_result.summaryIndexing
<event>.security_result.descriptionIndexing
<event>.security_result.actionCurated detections
<event>.security_result.detection_fields.keyCurated detections
<event>.security_result.detection_fields.valueCurated detections
<event>.security_result.threat_nameThreat hunting
<event>.metadata.event_timestampIndexing
<event>.metadata.event_typeCurated detections, Indexing
<event>.metadata.product_nameCurated detections, Indexing
<event>.metadata.vendor_nameCurated detections, Indexing
<event>.metadata.descriptionCurated detections
<event>.metadata.ingestion_labels.keyCurated detections
<event>.metadata.ingestion_labels.valueCurated detections
<event>.metadata.product_event_typeCurated detections
<event>.metadata.product_deployment_idThreat hunting
<event>.metadata.product_log_idThreat hunting
<event>.principal.ipCurated detections, Indexing, Artifact aliasing, Asset aliasing
<event>.principal.macIndexing, Asset aliasing
<event>.principal.hostnameCurated detections, Indexing, Asset aliasing
<event>.principal.asset_idIndexing, Asset aliasing
<event>.principal.asset.ipIndexing
<event>.principal.asset.macIndexing
<event>.principal.asset.hostnameIndexing
<event>.principal.asset.asset_idIndexing
<event>.principal.user.email_addressCurated detections, Indexing, User aliasing
<event>.principal.user.useridIndexing, User aliasing
<event>.principal.user.windows_sidIndexing, User aliasing
<event>.principal.user.product_object_idIndexing, User aliasing
<event>.principal.user.attribute.permissions.nameCurated detections
<event>.principal.user.attribute.permissions.typeCurated detections
<event>.principal.user.attribute.roles.nameCurated detections
<event>.principal.user.attribute.roles.descriptionCurated detections
<event>.principal.file.sha1Artifact aliasing
<event>.principal.file.md5Artifact aliasing
<event>.principal.file.sha256Artifact aliasing
<event>.principal.file.full_pathCurated detections
<event>.principal.process.parent_processProcess aliasing
<event>.principal.process.product_specific_process_idProcess aliasing
<event>.principal.process.pidCurated detections
<event>.principal.process.command_lineCurated detections
<event>.principal.process.file.full_pathCurated detections
<event>.principal.process.parent_process.command_lineCurated detections
<event>.principal.process.parent_process.file.full_pathCurated detections
<event>.principal.cloud.environmentCurated detections
<event>.principal.resource.nameCurated detections
<event>.principal.resource.attribute.cloud.project.nameCurated detections
<event>.principal.resource.attribute.cloud.project.resource_subtypeCurated detections
<event>.principal.registry.registry_keyCurated detections
<event>.principal.registry.registry_value_nameCurated detections
<event>.principal.urlCurated detections
<event>.source.ipIndexing, Artifact aliasing, Asset aliasing
<event>.source.macIndexing, Asset aliasing
<event>.source.hostnameIndexing, Asset aliasing
<event>.source.asset_idIndexing, Asset aliasing
<event>.source.asset.ipIndexing
<event>.source.asset.macIndexing
<event>.source.asset.hostnameIndexing
<event>.source.asset.asset_idIndexing
<event>.source.user.email_addressIndexing, User aliasing
<event>.source.user.useridIndexing, User aliasing
<event>.source.user.windows_sidIndexing, User aliasing
<event>.source.user.product_object_idIndexing, User aliasing
<event>.source.file.sha1Artifact aliasing
<event>.source.file.md5Artifact aliasing
<event>.source.file.sha256Artifact aliasing
<event>.source.process.parent_processProcess aliasing
<event>.source.process.product_specific_process_idProcess aliasing
<event>.target.ipCurated detections, Indexing, Artifact aliasing, Asset aliasing
<event>.target.portCurated detections
<event>.target.macIndexing, Asset aliasing
<event>.target.hostnameCurated detections, Indexing, Asset aliasing
<event>.target.asset_idIndexing, Asset aliasing
<event>.target.asset.ipIndexing
<event>.target.asset.macIndexing
<event>.target.asset.hostnameIndexing
<event>.target.asset.asset_idIndexing
<event>.target.user.email_addressCurated detections, Indexing, User aliasing
<event>.target.user.useridIndexing, User aliasing
<event>.target.user.windows_sidIndexing, User aliasing
<event>.target.user.product_object_idIndexing, User aliasing
<event>.target.file.sha1Artifact aliasing
<event>.target.file.md5Artifact aliasing
<event>.target.file.sha256Artifact aliasing
<event>.target.file.full_pathCurated detections
<event>.target.process.parent_processProcess aliasing
<event>.target.process.product_specific_process_idProcess aliasing
<event>.target.process.pidCurated detections
<event>.target.process.command_lineCurated detections
<event>.target.process.file.full_pathCurated detections
<event>.target.process.parent_process.command_lineCurated detections
<event>.target.process.parent_process.file.full_pathCurated detections
<event>.target.applicationCurated detections
<event>.target.cloud.environmentCurated detections
<event>.target.cloud.project.nameCurated detections
<event>.target.resource.nameCurated detections
<event>.target.resource.resource_typeCurated detections
<event>.target.registry.registry_keyCurated detections
<event>.target.registry.registry_value_nameCurated detections
<event>.network.application_protocolCurated detections
<event>.network.ip_protocolCurated detections
<event>.network.dns_domainThreat hunting
<event>.network.http.methodCurated detections
<event>.network.http.user_agentCurated detections
<event>.network.http.referral_urlThreat hunting
<event>.network.http.response_codeThreat hunting
<event>.network.dns.questions.nameCurated detections
<event>.network.dns.questions.typeCurated detections
<event>.network.dns.answers.nameCurated detections
<event>.network.dns.answers.dataThreat hunting
<event>.network.dns.answers.typeCurated detections
<event>.network.email.bccThreat hunting
<event>.network.email.email.ccThreat hunting
<event>.network.email.fromThreat hunting
<event>.network.email.reply_toThreat hunting
<event>.network.email.subjectThreat hunting
<event>.network.email.toThreat hunting
<event>.network.ftp.commandThreat hunting
<entity>.entity.user.email_addressEntity graph, IoC
<entity>.entity.user.useridEntity graph
<entity>.entity.user.windows_sidEntity graph
<entity>.entity.user.product_object_idEntity graph, IoC
<entity>.entity.user.employee_idEntity graph
<entity>.entity.group.email_addressEntity graph
<entity>.entity.group.windows_sidEntity graph
<entity>.entity.group.product_object_idEntity graph, IoC
<entity>.entity.asset.ipEntity graph
<entity>.entity.asset.macEntity graph
<entity>.entity.asset.hostnameEntity graph
<entity>.entity.asset.asset_idEntity graph
<entity>.entity.asset.product_object_idEntity graph, IoC
<entity>.entity.resource.product_object_idEntity graph, IoC
<entity>.entity.resource.nameIoC
<entity>.entity.fileEntity graph
<entity>.entity.hostnameIoC
<entity>.entity.urlThreat hunting
<entity>.metadata.threatIoC
<entity>.metadata.collected_timestampEntity graph, IoC

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2026-02-19 UTC.