<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Why do the same Windows Server data collected using XDRC and WEC agents show different statuses in the following fields? in Cortex XSIAM Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/why-do-the-same-windows-server-data-collected-using-xdrc-and-wec/m-p/1245850#M302</link>
    <description>&lt;P&gt;Why do the same Windows Server 2022 std (Traditional Chinese) data collected using XDRC and WEC agents show different statuses in the following fields?&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;_Collector_type = &lt;STRONG&gt;`WEC`&lt;/STRONG&gt; ，&lt;FONT color="#FF0000"&gt;&lt;U&gt;Event Log display is 【&lt;STRONG&gt;`English`&lt;/STRONG&gt;】&lt;/U&gt;&lt;/FONT&gt;，Fields have 【Message】、【 _RAW_LOG】。&lt;/LI&gt;
&lt;LI&gt;_Collector_type = &lt;STRONG&gt;`XDR Collector`&lt;/STRONG&gt; ，Event Log display is&lt;FONT color="#FF0000"&gt; &lt;U&gt;【&lt;STRONG&gt;`Traditional Chinese`&lt;/STRONG&gt;】&lt;/U&gt;&lt;/FONT&gt;，Fields &lt;FONT color="#FF0000"&gt;&lt;U&gt;&lt;STRONG&gt;Only&lt;/STRONG&gt; have 【Message】&lt;/U&gt;&lt;/FONT&gt;。&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jchen644219_0-1768787166072.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70392i8827F76AED9B6870/image-size/medium?v=v2&amp;amp;px=400" role="button" title="jchen644219_0-1768787166072.png" alt="jchen644219_0-1768787166072.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Question 1 :&amp;nbsp;Are the logs from &lt;FONT color="#3366FF"&gt;XDRC and WEC displayed correctly&lt;/FONT&gt;? There is currently no documentation specifying this.&lt;BR /&gt;Question 2 : I've read the Paloalto tutorials, which all focus on log filtering and parsing using the `_raw_log` field.&lt;BR /&gt;I'd like to ask how to perform log normalization in XDRC, which doesn't have a `_RAW_LOG` field?&lt;/P&gt;
&lt;P&gt;YT :&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=q9ShTvDzY78&amp;amp;list=PLD6FJ8WNiIqXct0oWOxUfr0gDGOQLECGS&amp;amp;index=4" target="_self"&gt;Cortex XDR How-To Video: Custom Parsing Rules&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Question 3 :&amp;nbsp;Because the log content formats collected by "&lt;STRONG&gt;_raw_log"&lt;/STRONG&gt; and "&lt;STRONG&gt;message"&lt;/STRONG&gt; are different, it is common to encounter situations where fields are created but the correct values ​​cannot be parsed correctly.&lt;BR /&gt;Therefore, I would like to confirm what method is used to parse the logs within the specified format.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jchen644219_3-1768788509185.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70395i962EC74BBD6C078F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="jchen644219_3-1768788509185.png" alt="jchen644219_3-1768788509185.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="50%"&gt;Message&lt;/TD&gt;
&lt;TD width="50%"&gt;_RAW_LOG&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%"&gt;
&lt;DIV&gt;An account was successfully logged on.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Subject:&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Security ID: S-1-5-18&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Account Name: XSIAM-WEC01$&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Account Domain: WORKGROUP&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Logon ID: 0x3E7&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Logon Information:&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Logon Type: 5&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Restricted Admin Mode: -&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Virtual Account: No&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Elevated Token: Yes&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Impersonation Level: Impersonation&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;New Logon:&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Security ID: S-1-5-18&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Account Name: SYSTEM&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Account Domain: NT AUTHORITY&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Logon ID: 0x3E7&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Linked Logon ID: 0x0&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Network Account Name: -&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Network Account Domain: -&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Logon GUID: {00000000-0000-0000-0000-000000000000}&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Process Information:&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Process ID: 0x2a0&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Process Name: C:\Windows\System32\services.exe&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Network Information:&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Workstation Name: -&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Source Network Address: -&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Source Port: -&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Detailed Authentication Information:&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Logon Process: Advapi&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Authentication Package: Negotiate&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Transited Services: -&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Package Name (NTLM only): -&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Key Length: 0&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;This event is generated when a logon session is created. It is generated on the computer that was accessed.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The impersonation level field indicates the extent to which a process in the logon session can impersonate.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The authentication information fields provide detailed information about this specific logon request.&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; - Transited services indicate which intermediate services have participated in this logon request.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; - Package name indicates which sub-protocol was used among the NTLM protocols.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="50%"&gt;&amp;lt;Event xmlns='&lt;A href="http://schemas.microsoft.com/win/2004/08/events/event" target="_blank"&gt;http://schemas.microsoft.com/win/2004/08/events/event&lt;/A&gt;'&amp;gt;&amp;lt;System&amp;gt;&amp;lt;Provider Name='Microsoft-Windows-Security-Auditing' Guid='{54849625-5478-4994-a5ba-3e3b0328c30d}'/&amp;gt;&amp;lt;EventID&amp;gt;4624&amp;lt;/EventID&amp;gt;&amp;lt;Version&amp;gt;2&amp;lt;/Version&amp;gt;&amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&amp;lt;Task&amp;gt;12544&amp;lt;/Task&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;TimeCreated SystemTime='2026-01-18T22:57:56.2825739Z'/&amp;gt;&amp;lt;EventRecordID&amp;gt;16486&amp;lt;/EventRecordID&amp;gt;&amp;lt;Correlation ActivityID='{cb9aec07-7b8a-0001-a3ec-9acb8a7bdc01}'/&amp;gt;&amp;lt;Execution ProcessID='692' ThreadID='5844'/&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt;XSIAM-WEC01&amp;lt;/Computer&amp;gt;&amp;lt;Security/&amp;gt;&amp;lt;/System&amp;gt;&amp;lt;EventData&amp;gt;&amp;lt;Data Name='SubjectUserSid'&amp;gt;S-1-5-18&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectUserName'&amp;gt;XSIAM-WEC01$&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectDomainName'&amp;gt;WORKGROUP&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectLogonId'&amp;gt;0x3e7&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserSid'&amp;gt;S-1-5-18&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserName'&amp;gt;SYSTEM&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetDomainName'&amp;gt;NT AUTHORITY&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetLogonId'&amp;gt;0x3e7&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LogonType'&amp;gt;5&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LogonProcessName'&amp;gt;Advapi &amp;lt;/Data&amp;gt;&amp;lt;Data Name='AuthenticationPackageName'&amp;gt;Negotiate&amp;lt;/Data&amp;gt;&amp;lt;Data Name='WorkstationName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LogonGuid'&amp;gt;{00000000-0000-0000-0000-000000000000}&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TransmittedServices'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LmPackageName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='KeyLength'&amp;gt;0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessId'&amp;gt;0x2a0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessName'&amp;gt;C:\Windows\System32\services.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name='IpAddress'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='IpPort'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ImpersonationLevel'&amp;gt;%%1833&amp;lt;/Data&amp;gt;&amp;lt;Data Name='RestrictedAdminMode'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetOutboundUserName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetOutboundDomainName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='VirtualAccount'&amp;gt;%%1843&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetLinkedLogonId'&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ElevatedToken'&amp;gt;%%1842&amp;lt;/Data&amp;gt;&amp;lt;/EventData&amp;gt;&amp;lt;RenderingInfo Culture='en-US'&amp;gt;&amp;lt;Message&amp;gt;An account was successfully logged on.&amp;amp;#x0A;&amp;amp;#x0A;Subject:&amp;amp;#x0A; Security ID: S-1-5-18&amp;amp;#x0A; Account Name: XSIAM-WEC01$&amp;amp;#x0A; Account Domain: WORKGROUP&amp;amp;#x0A; Logon ID: 0x3E7&amp;amp;#x0A;&amp;amp;#x0A;Logon Information:&amp;amp;#x0A; Logon Type: 5&amp;amp;#x0A; Restricted Admin Mode: -&amp;amp;#x0A; Virtual Account: No&amp;amp;#x0A; Elevated Token: Yes&amp;amp;#x0A;&amp;amp;#x0A;Impersonation Level: Impersonation&amp;amp;#x0A;&amp;amp;#x0A;New Logon:&amp;amp;#x0A; Security ID: S-1-5-18&amp;amp;#x0A; Account Name: SYSTEM&amp;amp;#x0A; Account Domain: NT AUTHORITY&amp;amp;#x0A; Logon ID: 0x3E7&amp;amp;#x0A; Linked Logon ID: 0x0&amp;amp;#x0A; Network Account Name: -&amp;amp;#x0A; Network Account Domain: -&amp;amp;#x0A; Logon GUID: {00000000-0000-0000-0000-000000000000}&amp;amp;#x0A;&amp;amp;#x0A;Process Information:&amp;amp;#x0A; Process ID: 0x2a0&amp;amp;#x0A; Process Name: C:\Windows\System32\services.exe&amp;amp;#x0A;&amp;amp;#x0A;Network Information:&amp;amp;#x0A; Workstation Name: -&amp;amp;#x0A; Source Network Address: -&amp;amp;#x0A; Source Port: -&amp;amp;#x0A;&amp;amp;#x0A;Detailed Authentication Information:&amp;amp;#x0A; Logon Process: Advapi &amp;amp;#x0A; Authentication Package: Negotiate&amp;amp;#x0A; Transited Services: -&amp;amp;#x0A; Package Name (NTLM only): -&amp;amp;#x0A; Key Length: 0&amp;amp;#x0A;&amp;amp;#x0A;This event is generated when a logon session is created. It is generated on the computer that was accessed.&amp;amp;#x0A;&amp;amp;#x0A;The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.&amp;amp;#x0A;&amp;amp;#x0A;The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).&amp;amp;#x0A;&amp;amp;#x0A;The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.&amp;amp;#x0A;&amp;amp;#x0A;The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.&amp;amp;#x0A;&amp;amp;#x0A;The impersonation level field indicates the extent to which a process in the logon session can impersonate.&amp;amp;#x0A;&amp;amp;#x0A;The authentication information fields provide detailed information about this specific logon request.&amp;amp;#x0A; - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.&amp;amp;#x0A; - Transited services indicate which intermediate services have participated in this logon request.&amp;amp;#x0A; - Package name indicates which sub-protocol was used among the NTLM protocols.&amp;amp;#x0A; - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.&amp;lt;/Message&amp;gt;&amp;lt;Level&amp;gt;&amp;lt;/Level&amp;gt;&amp;lt;Task&amp;gt;Logon&amp;lt;/Task&amp;gt;&amp;lt;Opcode&amp;gt;&amp;lt;/Opcode&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Provider&amp;gt;Microsoft Windows security auditing.&amp;lt;/Provider&amp;gt;&amp;lt;Keywords&amp;gt;&amp;lt;/Keywords&amp;gt;&amp;lt;/RenderingInfo&amp;gt;&amp;lt;/Event&amp;gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jchen644219_2-1768787586281.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70394i75ADDF127B7E32FE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="jchen644219_2-1768787586281.png" alt="jchen644219_2-1768787586281.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Question 4 :&lt;/P&gt;
&lt;P&gt;Regarding the above questions, for log normalization parsing... which field (message/_raw_log) should be used?&lt;/P&gt;
&lt;P&gt;If the "message" field is used, is it necessary to specify two parsing rules for the same event ID (4624)?&lt;/P&gt;</description>
    <pubDate>Fri, 20 Mar 2026 16:24:25 GMT</pubDate>
    <dc:creator>j.chen644219</dc:creator>
    <dc:date>2026-03-20T16:24:25Z</dc:date>
    <item>
      <title>Why do the same Windows Server data collected using XDRC and WEC agents show different statuses in the following fields?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/why-do-the-same-windows-server-data-collected-using-xdrc-and-wec/m-p/1245850#M302</link>
      <description>&lt;P&gt;Why do the same Windows Server 2022 std (Traditional Chinese) data collected using XDRC and WEC agents show different statuses in the following fields?&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;_Collector_type = &lt;STRONG&gt;`WEC`&lt;/STRONG&gt; ，&lt;FONT color="#FF0000"&gt;&lt;U&gt;Event Log display is 【&lt;STRONG&gt;`English`&lt;/STRONG&gt;】&lt;/U&gt;&lt;/FONT&gt;，Fields have 【Message】、【 _RAW_LOG】。&lt;/LI&gt;
&lt;LI&gt;_Collector_type = &lt;STRONG&gt;`XDR Collector`&lt;/STRONG&gt; ，Event Log display is&lt;FONT color="#FF0000"&gt; &lt;U&gt;【&lt;STRONG&gt;`Traditional Chinese`&lt;/STRONG&gt;】&lt;/U&gt;&lt;/FONT&gt;，Fields &lt;FONT color="#FF0000"&gt;&lt;U&gt;&lt;STRONG&gt;Only&lt;/STRONG&gt; have 【Message】&lt;/U&gt;&lt;/FONT&gt;。&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jchen644219_0-1768787166072.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70392i8827F76AED9B6870/image-size/medium?v=v2&amp;amp;px=400" role="button" title="jchen644219_0-1768787166072.png" alt="jchen644219_0-1768787166072.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Question 1 :&amp;nbsp;Are the logs from &lt;FONT color="#3366FF"&gt;XDRC and WEC displayed correctly&lt;/FONT&gt;? There is currently no documentation specifying this.&lt;BR /&gt;Question 2 : I've read the Paloalto tutorials, which all focus on log filtering and parsing using the `_raw_log` field.&lt;BR /&gt;I'd like to ask how to perform log normalization in XDRC, which doesn't have a `_RAW_LOG` field?&lt;/P&gt;
&lt;P&gt;YT :&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=q9ShTvDzY78&amp;amp;list=PLD6FJ8WNiIqXct0oWOxUfr0gDGOQLECGS&amp;amp;index=4" target="_self"&gt;Cortex XDR How-To Video: Custom Parsing Rules&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Question 3 :&amp;nbsp;Because the log content formats collected by "&lt;STRONG&gt;_raw_log"&lt;/STRONG&gt; and "&lt;STRONG&gt;message"&lt;/STRONG&gt; are different, it is common to encounter situations where fields are created but the correct values ​​cannot be parsed correctly.&lt;BR /&gt;Therefore, I would like to confirm what method is used to parse the logs within the specified format.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jchen644219_3-1768788509185.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70395i962EC74BBD6C078F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="jchen644219_3-1768788509185.png" alt="jchen644219_3-1768788509185.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="50%"&gt;Message&lt;/TD&gt;
&lt;TD width="50%"&gt;_RAW_LOG&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%"&gt;
&lt;DIV&gt;An account was successfully logged on.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Subject:&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Security ID: S-1-5-18&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Account Name: XSIAM-WEC01$&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Account Domain: WORKGROUP&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Logon ID: 0x3E7&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Logon Information:&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Logon Type: 5&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Restricted Admin Mode: -&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Virtual Account: No&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Elevated Token: Yes&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Impersonation Level: Impersonation&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;New Logon:&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Security ID: S-1-5-18&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Account Name: SYSTEM&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Account Domain: NT AUTHORITY&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Logon ID: 0x3E7&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Linked Logon ID: 0x0&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Network Account Name: -&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Network Account Domain: -&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Logon GUID: {00000000-0000-0000-0000-000000000000}&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Process Information:&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Process ID: 0x2a0&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Process Name: C:\Windows\System32\services.exe&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Network Information:&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Workstation Name: -&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Source Network Address: -&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Source Port: -&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Detailed Authentication Information:&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Logon Process: Advapi&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Authentication Package: Negotiate&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Transited Services: -&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Package Name (NTLM only): -&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Key Length: 0&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;This event is generated when a logon session is created. It is generated on the computer that was accessed.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The impersonation level field indicates the extent to which a process in the logon session can impersonate.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The authentication information fields provide detailed information about this specific logon request.&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; - Transited services indicate which intermediate services have participated in this logon request.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; - Package name indicates which sub-protocol was used among the NTLM protocols.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="50%"&gt;&amp;lt;Event xmlns='&lt;A href="http://schemas.microsoft.com/win/2004/08/events/event" target="_blank"&gt;http://schemas.microsoft.com/win/2004/08/events/event&lt;/A&gt;'&amp;gt;&amp;lt;System&amp;gt;&amp;lt;Provider Name='Microsoft-Windows-Security-Auditing' Guid='{54849625-5478-4994-a5ba-3e3b0328c30d}'/&amp;gt;&amp;lt;EventID&amp;gt;4624&amp;lt;/EventID&amp;gt;&amp;lt;Version&amp;gt;2&amp;lt;/Version&amp;gt;&amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&amp;lt;Task&amp;gt;12544&amp;lt;/Task&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;TimeCreated SystemTime='2026-01-18T22:57:56.2825739Z'/&amp;gt;&amp;lt;EventRecordID&amp;gt;16486&amp;lt;/EventRecordID&amp;gt;&amp;lt;Correlation ActivityID='{cb9aec07-7b8a-0001-a3ec-9acb8a7bdc01}'/&amp;gt;&amp;lt;Execution ProcessID='692' ThreadID='5844'/&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt;XSIAM-WEC01&amp;lt;/Computer&amp;gt;&amp;lt;Security/&amp;gt;&amp;lt;/System&amp;gt;&amp;lt;EventData&amp;gt;&amp;lt;Data Name='SubjectUserSid'&amp;gt;S-1-5-18&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectUserName'&amp;gt;XSIAM-WEC01$&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectDomainName'&amp;gt;WORKGROUP&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectLogonId'&amp;gt;0x3e7&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserSid'&amp;gt;S-1-5-18&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserName'&amp;gt;SYSTEM&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetDomainName'&amp;gt;NT AUTHORITY&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetLogonId'&amp;gt;0x3e7&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LogonType'&amp;gt;5&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LogonProcessName'&amp;gt;Advapi &amp;lt;/Data&amp;gt;&amp;lt;Data Name='AuthenticationPackageName'&amp;gt;Negotiate&amp;lt;/Data&amp;gt;&amp;lt;Data Name='WorkstationName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LogonGuid'&amp;gt;{00000000-0000-0000-0000-000000000000}&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TransmittedServices'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LmPackageName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='KeyLength'&amp;gt;0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessId'&amp;gt;0x2a0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessName'&amp;gt;C:\Windows\System32\services.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name='IpAddress'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='IpPort'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ImpersonationLevel'&amp;gt;%%1833&amp;lt;/Data&amp;gt;&amp;lt;Data Name='RestrictedAdminMode'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetOutboundUserName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetOutboundDomainName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='VirtualAccount'&amp;gt;%%1843&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetLinkedLogonId'&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ElevatedToken'&amp;gt;%%1842&amp;lt;/Data&amp;gt;&amp;lt;/EventData&amp;gt;&amp;lt;RenderingInfo Culture='en-US'&amp;gt;&amp;lt;Message&amp;gt;An account was successfully logged on.&amp;amp;#x0A;&amp;amp;#x0A;Subject:&amp;amp;#x0A; Security ID: S-1-5-18&amp;amp;#x0A; Account Name: XSIAM-WEC01$&amp;amp;#x0A; Account Domain: WORKGROUP&amp;amp;#x0A; Logon ID: 0x3E7&amp;amp;#x0A;&amp;amp;#x0A;Logon Information:&amp;amp;#x0A; Logon Type: 5&amp;amp;#x0A; Restricted Admin Mode: -&amp;amp;#x0A; Virtual Account: No&amp;amp;#x0A; Elevated Token: Yes&amp;amp;#x0A;&amp;amp;#x0A;Impersonation Level: Impersonation&amp;amp;#x0A;&amp;amp;#x0A;New Logon:&amp;amp;#x0A; Security ID: S-1-5-18&amp;amp;#x0A; Account Name: SYSTEM&amp;amp;#x0A; Account Domain: NT AUTHORITY&amp;amp;#x0A; Logon ID: 0x3E7&amp;amp;#x0A; Linked Logon ID: 0x0&amp;amp;#x0A; Network Account Name: -&amp;amp;#x0A; Network Account Domain: -&amp;amp;#x0A; Logon GUID: {00000000-0000-0000-0000-000000000000}&amp;amp;#x0A;&amp;amp;#x0A;Process Information:&amp;amp;#x0A; Process ID: 0x2a0&amp;amp;#x0A; Process Name: C:\Windows\System32\services.exe&amp;amp;#x0A;&amp;amp;#x0A;Network Information:&amp;amp;#x0A; Workstation Name: -&amp;amp;#x0A; Source Network Address: -&amp;amp;#x0A; Source Port: -&amp;amp;#x0A;&amp;amp;#x0A;Detailed Authentication Information:&amp;amp;#x0A; Logon Process: Advapi &amp;amp;#x0A; Authentication Package: Negotiate&amp;amp;#x0A; Transited Services: -&amp;amp;#x0A; Package Name (NTLM only): -&amp;amp;#x0A; Key Length: 0&amp;amp;#x0A;&amp;amp;#x0A;This event is generated when a logon session is created. It is generated on the computer that was accessed.&amp;amp;#x0A;&amp;amp;#x0A;The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.&amp;amp;#x0A;&amp;amp;#x0A;The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).&amp;amp;#x0A;&amp;amp;#x0A;The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.&amp;amp;#x0A;&amp;amp;#x0A;The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.&amp;amp;#x0A;&amp;amp;#x0A;The impersonation level field indicates the extent to which a process in the logon session can impersonate.&amp;amp;#x0A;&amp;amp;#x0A;The authentication information fields provide detailed information about this specific logon request.&amp;amp;#x0A; - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.&amp;amp;#x0A; - Transited services indicate which intermediate services have participated in this logon request.&amp;amp;#x0A; - Package name indicates which sub-protocol was used among the NTLM protocols.&amp;amp;#x0A; - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.&amp;lt;/Message&amp;gt;&amp;lt;Level&amp;gt;&amp;lt;/Level&amp;gt;&amp;lt;Task&amp;gt;Logon&amp;lt;/Task&amp;gt;&amp;lt;Opcode&amp;gt;&amp;lt;/Opcode&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Provider&amp;gt;Microsoft Windows security auditing.&amp;lt;/Provider&amp;gt;&amp;lt;Keywords&amp;gt;&amp;lt;/Keywords&amp;gt;&amp;lt;/RenderingInfo&amp;gt;&amp;lt;/Event&amp;gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jchen644219_2-1768787586281.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70394i75ADDF127B7E32FE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="jchen644219_2-1768787586281.png" alt="jchen644219_2-1768787586281.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Question 4 :&lt;/P&gt;
&lt;P&gt;Regarding the above questions, for log normalization parsing... which field (message/_raw_log) should be used?&lt;/P&gt;
&lt;P&gt;If the "message" field is used, is it necessary to specify two parsing rules for the same event ID (4624)?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2026 16:24:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/why-do-the-same-windows-server-data-collected-using-xdrc-and-wec/m-p/1245850#M302</guid>
      <dc:creator>j.chen644219</dc:creator>
      <dc:date>2026-03-20T16:24:25Z</dc:date>
    </item>
  </channel>
</rss>

