Events API for Cyber Resilience

About Cyber Resilience Events API

Using the Events API, you can export events from Cyber Resilience (Accelerated Ransomware Recovery and Security Posture and Observability). This API capability helps organizations to:

  • Get all the Ransomware and Security Posture events in a single API call
  • Monitor the reported failures and take corrective actions
  • Integrate the exported events with the third-party SIEM tool

Workflow to export Cyber Resilience events

  1. Generate a token to access Event API. For more information, see Use EVENTAPI to export events from Cyber Resilience.
  2. Access Event API through any REST Client to receive a response in JSON format.

Access Events API

Make API requests. For more information, see the Events API reference

About Events API Response

  • Each Ransomware Recovery Events API response contains a maximum of 100 Cyber Resilience events
  • If there are more than 100 events in the Cyber Resilience database while returning an Events API response, the response contains the nextPageToken attribute. Use the token provided within the nextPageToken attribute as a query parameter for the Token field to get an additional set of Cyber Resilience events.
  • Events API response is in the UTC timezone.

Supported Cyber Resilience events

The following table lists the Cyber Resilience events that you can export by using the Events API:

Malicious File Scan (RWC) and Curated Snapshot (CS) events

Event CategoryEvent TypesEvent StateDescriptionEvent Details
Admin eventAddition of SHA
File Hash
Success
Failed
Event related to addition of SHA hash(s).{"Added": 1, "Total": 1, "Invalid": 0, "Skipped": 0, "Duplicate": 0, "Successful": true}
Admin eventDeletion of SHA
File Hash
Success
Failed
Event related to addition of SHA hash(s).{"Note": "Deletion note", "SHADetails": "{User Name} deleted the file hash with SHA value {hashvalue} Delete Reason: {Reason} Status: Successful", "Successful": true}
Admin eventModification of Scan Settings

Scan Settings Updated
Success
Failed
Event for modification of scan settings. Updated settings are present in the response.{"Successful": true, "AVScanEnabled": false, "FileHashScanEnabled": true, "SkipScanForDeviceReplace": true, "AllowAdminToSkipScanServers": true, "AllowUserToSkipScanEndpoints": true, "AllowAdminToSkipScanEndpoints": true}
Admin eventRWC Job Creation
Malicious File Scan
Success
Failed
Event for creation of RWC job.{"JobType": "Malicious File Scan", "Activity": "Job Created", "ScanJobID": , "StartTime": "", "JobCreatedBy": "InternalAdmin", "ProductJobID": , "ResourceName": "", "ResourceType": "", "ResourceParent": ""}
Admin eventRWC Job Cancellation
Malicious File Scan
Success
Failed
Event for cancellation of RWC job.{"EndTime": "", "JobType": "Malicious File Scan", "Activity": "Job Cancelled", "ScanJobID": ,"StartTime": "", "FilesBlocked": 0, "FilesScanned": 0, "JobCreatedBy": "InternalAdmin", "ProductJobID": , "ResourceName": "", "ResourceType": "VMware", "JobCancelledBy": "", "ResourceParent": "", "FilesScanSkipped": 0, "FilesSelectedForRestore": 0}
Admin eventRWC Job Finished
Malicious File Scan
SuccessEvent for completion of RWC job.{"EndTime": "", "JobType": "Malicious File Scan", "Activity": "Job Completed", "ScanJobID": , "StartTime": "", "FilesBlocked": 8, "FilesScanned": 110791, "JobCreatedBy": "InternalAdmin", "ProductJobID": , "ResourceName": "", "ResourceType": "","ResourceParent": "", "FilesScanSkipped": , "FilesSelectedForRestore": }
Admin eventRWC Malicious Files Found
Malicious File Scan
SuccessEvent for when affected files count is > 0 for RWC job.{"EndTime": "", "JobType": "Malicious File Scan", "Activity": "Job Completed", "ScanJobID": , "StartTime": "", "FilesBlocked": 8, "FilesScanned": 110791, "JobCreatedBy": "InternalAdmin", "ProductJobID": , "ResourceName": "", "ResourceType": "", "ResourceParent": "", "FilesScanSkipped": , "FilesSelectedForRestore":
Admin eventCS Job CreationSuccessEvent for creation of Curated Snapshot (CS) job.{"JobType": "Curated Snapshot", "Activity": "Curated snapshot creation started", "ScanJobID": , "StartTime": "","JobCreatedBy": "", "ResourceName": "", "ResourceType": "Endpoint", "ResourceParent": ""}
Admin eventCS CreatedSuccessEvent for successful completion of creation of Curated Snapshot (CS).{'area': 'Security', 'category': 'Admin Event', 'type': 'Curated Snapshot', 'syslogSeverity': , 'syslogFacility': , 'SSJobID': , 'Activity': 'Curated snapshot created', 'FilesBlocked': 0, 'ResourceName': "", 'ResourceType': '', 'FilesExcluded': 0, 'FilesIncluded': 0, 'ResourceParent': '', 'FilesScanSkipped': 0}
Admin eventCS DeletedSuccess
Failed
Event for deletion of created Curated Snapshot (CS).{"Activity": "Curated snapshot Deleted", "StartTime": "", "SnapshotID": "", "DeleteReason": "", "ResourceName": "", "ResourceType": "File Server", "ResourceParent": "", "SnapshotDeletedBy": ""}
Admin eventCS Job CancelledSuccessEvent for cancellation of Curated Snapshot (CS) creation job.{"JobType": "Curated Snapshot", "Activity": "Curated snapshot creation cancelled", "ScanJobID": , "StartTime": "", "JobCreatedBy": "", "ResourceName": "", "ResourceType": "File Server", "JobCancelledBy": "", "ResourceParent": ""}

Quarantine Snapshots events

Event CategoryEvent TypesEvent StateDescriptionEvent Details
Ransomware RecoveryQuarantine Event - CreateSuccess
Failed
Event for creation of Quarantine Range.{"mode": "Admin Portal", "note": "", "orgID": , "state": "Success", "action": "Create Range", "ipAddress": "", "resourceID": , "initiatorID": "", "rangeEndTime": "", "resourceName": "", "resourceType": "VMware", "rangeStartTime": "", "resourceParent": "", "resourcePlatform": "NA"}
Ransomware RecoveryQuarantine Event - UpdateSuccess
Failed
Event for updating the Quarantine Range.{"mode": "Admin Portal", "note": "", "orgID": , "state": "Success", "action": "Update Range", "ipAddress": "", "resourceID": , "initiatorID": "", "rangeEndTime": "", "resourceName": "", "resourceType": "VMware", "rangeStartTime": "", "resourceParent": "", "resourcePlatform": ""}
Ransomware RecoveryQuarantine Event - DeleteSuccess
Failed
Event for deleting a Quarantine Range{"mode": "Admin Portal", "note": "", "orgID": , "state": "Success", "action": "Delete Range", "ipAddress": "", "resourceID": , "initiatorID": "", "rangeEndTime": "", "resourceName": "", "resourceType": "VMware", "rangeStartTime": "", "resourceParent": "", "resourcePlatform": "NA"}
Ransomware RecoveryAdmin Audit Trail -
Delete Snapshot
Snapshot deletedEvent for deletion snapshot from Quarantine Bay{"mode": "Admin Portal", "note": "", "orgID": 0, "state": "Success", "action": "", "ipAddress": "", "resourceID": 0, "initiatorID": "", "rangeEndTime": "", "resourceName": "", "resourceType": "", "rangeStartTime": "", "resourceParent": "", "resourcePlatform": ""}

Security Dashboard events

Event CategoryEvent TypesEvent StateDescriptionEvent Details
Admin eventAdmin LoginSuccess
Failed
Event related to Admin Login attempt.{"location": "", "adminName": "", "adminEmail": "", "loginResult": "Success", "adminActivity": "Admin Login Event", "adminIPAddress": "", "adminLoginTime": ""}
Data AccessData AccessSuccess
Failed
Event for Data Access.{"size": 0, "files": 0, "status": "Successful", "endTime": "", "targetIP": "", "startTime": "", "resourceID": , "resourceName": "", "initiatorName": "", "targetLocation": ""}
Admin EventAdmin Login (New location and a different IP address. Alert is generated)Success
Failed
Event for Admin Login (Only when admin has not logged in from the IP in the last 30 days).{"location": "", "adminName": "", "adminEmail": "", "loginResult": "Success", "adminActivity": "Admin Login Event", "adminIPAddress": "", "adminLoginTime": ""}
Data AccessData Access (New location and a different IP address. Alert is generated)Success
Failed
Event for Data Access (Only when data is not accessed from the IP in the last 30 days).{"size": 0, "files": 0, "status": "Successful", "endTime": "", "targetIP": "", "startTime": "", "resourceID": , "resourceName": "", "initiatorName": "", "targetLocation": ""}

Unusual Data Activity events

Event CategoryEvent TypesEvent StateDescriptionEvent Details
Unusual Data ActivityAdmin Audit TrailSuccessEvent related to UDA logs downloaded by the admin.{"udaType": ["Modification"], "fileInfo": {"newFiles": 0, "deletedFiles": 0, "updatedFiles": 220, "encryptedFiles": 0}, "adminName": "", "alertTime": "", "resourceID": , "resourceName": "", "resourceType": "File Server", "adminActivity": "Unusual Data Activity - Download logs", "affectedSnapshot": "", "resourceParentID": , "resourceParentName": ""}
Unusual Data ActivityAlertCreation
Deletion
Modification
Encryption
Event related to UDA alert generated because of an anomaly detected in either Creation, Deletion, Modification, or Encryption activity.{"udaType": ["Modification"], "fileInfo": {"newFiles": 0, "deletedFiles": 0, "updatedFiles": 220, "encryptedFiles": 0}, "alertName": "Unusual Data Activity", "alertTime": "", "resourceID": , "resourceName": "", "resourceType": "File Server", "affectedSnapshot": "", "resourceParentID": , "resourceParentName": ""}
Unusual Data ActivityAdmin Audit TrailSuccessEvent for when an alert is marked as ignored.{"udaType": ["Modification"], "fileInfo": {"newFiles": 0, "deletedFiles": 0, "updatedFiles": 220, "encryptedFiles": 0}, "adminName": "", "alertTime": "", "resourceID": , "resourceName": "", "resourceType": "File Server", "adminActivity": "Unusual Data Activity - Ignore Alert", "affectedSnapshot": "", "resourceParentID": , "resourceParentName": ""}
Unusual Data ActivitySystem EventWarning EventWarning event when UDA scan fails for VMware resources.{ "id": 185966,
"globalCustomerId": "925ace73-6a00-4626-a13c-180890a72fc0",
"occurenceTime": 1702406872,
"area": "Security",
"category": "Unusual Data Activity",
"type": "System Event",
"syslogSeverity": 4,
"syslogFacility": 23,
"details": "{"alertTime": "2023-12-12T18:47:52Z", "resourceID": 95, "error_reason": "VMware Tools is not installed", "resourceName": "swapnil-FS-centos-7.1", "resourceType": "VMware", "affectedSnapshot": "Tue Dec 12 18:47:52 2023", "resourceParentID": 15, "resourceParentName": "realizevc.druva.org"}"
},
Unusual Data ActivitySystem EventInformation EventProvides information about UDA scan events for VMware resources. { "id": 186711,
"globalCustomerId": "925ace73-6a00-4626-a13c-180890a72fc0",
"occurenceTime": 1702542593,
"area": "Security",
"category": "Unusual Data Activity",
"type": "System Event",
"syslogSeverity": 6,
"syslogFacility": 23,
"details": "{"alertTime": "2023-12-14T08:29:53Z", "resourceID": 122, "error_reason": "Snapshot not scanned for Unusual Data Activity as learning is in progress.", "resourceName": "DND_swapnil-FS-ubuntu", "resourceType": "VMware", "affectedSnapshot": "Thu Dec 14 08:29:53 2023", "resourceParentID": 15, "resourceParentName": "realizevc.druva.org"}"
}