Please let me know if there is any additional info you may need. Thank you all very much for the help!
Eric
**Phase 1: Completed pre-decoding.
full event: 'Virus found,IP Address: xxx.xxx.xxx,Computer name: <endpoint hostname>,Source: Real Time Scan,Risk name: EICAR Test String,Occurrences: 1,<file path>\\eicar.com,'',Actual action: Cleaned by deletion,Requested action: Cleaned,Secondary action: Quarantined,Event time: 2016-04-01 19:12:56,Inserted: 2016-04-01 19:14:05,End: 2016-04-01 19:12:56,Last update time: 2016-04-01 19:14:05,Domain: <DOMAIN NAME>,Group:<AV Group>,Server: <Symantec server hostname>,User: <username>,Source computer: ,Source IP: ,Disposition: Reputation was not used in this detection.,Download site: ,Web domain: ,Downloaded by: ,Prevalence: Reputation was not used in this detection.,Confidence: Reputation was not used in this detection.,URL Tracking Status: Off,,First Seen: Reputation was not used in this detection.,Sensitivity: ,MDS,Application hash: 275A021BBFB6489E54D471899F7DB9D1663FC695EC2FE2A2C4538AABF651FD0F,Hash type: SHA2,Company name: ,Application name: eicar.com,Application version: ,Application type: 127,File size (bytes): 68,Category set: Malware,Category type: Virus'
hostname: 'ubuntu5'
program_name: '(null)'
log: 'Virus found,IP Address: xxx.xxx.xxx,Computer name: <endpoint hostname>,Source: Real Time Scan,Risk name: EICAR Test String,Occurrences: 1,<file path>\\eicar.com,'',Actual action: Cleaned by deletion,Requested action: Cleaned,Secondary action: Quarantined,Event time: 2016-04-01 19:12:56,Inserted: 2016-04-01 19:14:05,End: 2016-04-01 19:12:56,Last update time: 2016-04-01 19:14:05,Domain: <DOMAIN NAME>,Group:<AV Group>,Server: <Symantec server hostname>,User: <username>,Source computer: ,Source IP: ,Disposition: Reputation was not used in this detection.,Download site: ,Web domain: ,Downloaded by: ,Prevalence: Reputation was not used in this detection.,Confidence: Reputation was not used in this detection.,URL Tracking Status: Off,,First Seen: Reputation was not used in this detection.,Sensitivity: ,MDS,Application hash: 275A021BBFB6489E54D471899F7DB9D1663FC695EC2FE2A2C4538AABF651FD0F,Hash type: SHA2,Company name: ,Application name: eicar.com,Application version: ,Application type: 127,File size (bytes): 68,Category set: Malware,Category type: Virus'
**Phase 2: Completed decoding.
No decoder matched.
**Phase 3: Completed filtering (rules).
Rule id: '1003'
Level: '13'
Description: 'Non standard syslog message (size too large).
240801012128,5,1,720997,RBLWAP,SYSTEM,Trojan.Zlob,C:\WINDOWS\system32\ld100.tmp,5,4,4,256,570441764,"",0,,0,,0,4254,0,0,0,0,0,0,20060830.022,58100,2,4,0,acme-AVSRV,{579642AA-5A5E-46E1-8613-2289349D1F27},,(IP)-192.168.100.237,acmeav,acme,,8.1.825
**Phase 1: Completed pre-decoding.
full event: '240801012128,5,1,720997,RBLWAP,SYSTEM,Trojan.Zlob,C:\WINDOWS\system32\ld100.tmp,5,4,4,256,570441764,"",0,,0,,0,4254,0,0,0,0,0,0,20060830.022,58100,2,4,0,acme-AVSRV,{579642AA-5A5E-46E1-8613-2289349D1F27},,(IP)-192.168.100.237,acmeav,acme,,8.1.825'
hostname: 'ubuntu5'
program_name: '(null)'
log: '240801012128,5,1,720997,RBLWAP,SYSTEM,Trojan.Zlob,C:\WINDOWS\system32\ld100.tmp,5,4,4,256,570441764,"",0,,0,,0,4254,0,0,0,0,0,0,20060830.022,58100,2,4,0,acme-AVSRV,{579642AA-5A5E-46E1-8613-2289349D1F27},,(IP)-192.168.100.237,acmeav,acme,,8.1.825'
**Phase 2: Completed decoding.
decoder: 'symantec-av'
id: '5'
system_name: 'RBLWAP'
extra_data: 'SYSTEM'
**Phase 3: Completed filtering (rules).
Rule id: '7310'
Level: '9'
Description: 'Virus detected.'
<decoder name="test_symantec">
<prematch>^Virus found,IP Address: </prematch>
</decoder><group name="test,">
<rule id="100002" level="15">
<decoded_as>test_symantec</decoded_as>
<description>Symantec: Virus found</description>
</rule>
</group>**Phase 1: Completed pre-decoding.
full event: 'Virus found,IP Address: xxx.xxx.xxx,Computer name: <endpoint hostname>,Source: Real Time Scan,Risk name: EICAR Test String,Occurrences: 1,<file path>\\eicar.com,'',Actual action: Cleaned by deletion,Requested action: Cleaned,Secondary action: Quarantined,Event time: 2016-04-01 19:12:56,Inserted: 2016-04-01 19:14:05,End: 2016-04-01 19:12:56,Last update time: 2016-04-01 19:14:05,Domain: <DOMAIN NAME>,Group:<AV Group>,Server: <Symantec server hostname>,User: <username>,Source computer: ,Source IP: ,Disposition: Reputation was not used in this detection.,Download site: ,Web domain: ,Downloaded by: ,Prevalence: Reputation was not used in this detection.,Confidence: Reputation was not used in this detection.,URL Tracking Status: Off,,First Seen: Reputation was not used in this detection.,Sensitivity: ,MDS,Application hash: 275A021BBFB6489E54D471899F7DB9D1663FC695EC2FE2A2C4538AABF651FD0F,Hash type: SHA2,Company name: ,Application name: eicar.com,Application version: ,Application type: 127,File size (bytes): 68,Category set: Malware,Category type: Virus'
hostname: 'LinMV'
program_name: '(null)'
log: 'Virus found,IP Address: xxx.xxx.xxx,Computer name: <endpoint hostname>,Source: Real Time Scan,Risk name: EICAR Test String,Occurrences: 1,<file path>\\eicar.com,'',Actual action: Cleaned by deletion,Requested action: Cleaned,Secondary action: Quarantined,Event time: 2016-04-01 19:12:56,Inserted: 2016-04-01 19:14:05,End: 2016-04-01 19:12:56,Last update time: 2016-04-01 19:14:05,Domain: <DOMAIN NAME>,Group:<AV Group>,Server: <Symantec server hostname>,User: <username>,Source computer: ,Source IP: ,Disposition: Reputation was not used in this detection.,Download site: ,Web domain: ,Downloaded by: ,Prevalence: Reputation was not used in this detection.,Confidence: Reputation was not used in this detection.,URL Tracking Status: Off,,First Seen: Reputation was not used in this detection.,Sensitivity: ,MDS,Application hash: 275A021BBFB6489E54D471899F7DB9D1663FC695EC2FE2A2C4538AABF651FD0F,Hash type: SHA2,Company name: ,Application name: eicar.com,Application version: ,Application type: 127,File size (bytes): 68,Category set: Malware,Category type: Virus'
**Phase 2: Completed decoding.
decoder: 'test_symantec'
**Phase 3: Completed filtering (rules).
Rule id: '100002'
Level: '15'
Description: 'Symantec: Virus found'
**Alert to be generated.**Phase 1: Completed pre-decoding.
full event: 'Apr 19 09:44:23 SymantecServer <SEPHOSTNAME>: <HOSTNAME>,[SID: 22819] Web Attack: Suspicious...'
hostname: 'SymantecServer'
program_name: '(null)'
log: '<SEPHOSTNAME>: <HOSTNAME>,[SID: 22819] Web Attack: Suspicious...'**Phase 1: Completed pre-decoding.
full event: 'Apr 19 11:36:36 SymantecServer <SEPHOSTNAME>: Virus found,IP Address:...'
hostname: 'SymantecServer'
program_name: '(null)'
log: '<SEPHOSTNAME>: Virus found,IP Address:...'<decoder name="test_symantec">
<prematch>^\pSEPHOSTNAME\p</prematch>
</decoder><group name="test,">
<rule id="100002" level="3">
<decoded_as>test_symantec</decoded_as>
<description>Symantec messages</description>
</rule>
<rule id="100003" level="7">
<if_sid>100002</if_sid>
<match>Virus found</match>
<description>Symantec: virus found</description>
</rule>
</group>Apr 19 11:36:36 SymantecServer <SEPHOSTNAME>: Virus found,IP Address: ,Computer name: HOSTNAME,Source: Real Time Scan,Risk name: EICAR Test String,Occurrences: 1,C:\\Users\\<username>\\Downloads\\eicar.com.txt,'',Actual action: Cleaned by deletion,Requested action: Cleaned,Secondary action: Quarantined,Event time: 2016-04-19 15:36:10,Inserted: 2016-04-19 15:36:36,End: 2016-04-19 15:36:10,Last update time: 2016-04-19 15:36:36,Domain: <DOMAINNAME>,Group: Group,Server: <SEPSERVER>,User: user,Source computer: ,Source IP: ,Disposition: Reputation was not used in this detection.,Download site: ,Web domain: ,Downloaded by: ,Prevalence: Reputation was not used in this detection.,Confidence: Reputation was not used in this detection.,URL Tracking Status: Off,,First Seen: Reputation was not used in this detection.,Sensitivity: ,MDS,Application hash: 275A021BBFB6489E54D471899F7DB9D1663FC695EC2FE2A2C4538AABF651FD0F,Hash type: SHA2,Company name: ,Application name: eicar.com,
**Phase 1: Completed pre-decoding.
full event: 'Apr 19 11:36:36 SymantecServer <SEPHOSTNAME>: Virus found,IP Address: ,Computer name: HOSTNAME,Source: Real Time Scan,Risk name: EICAR Test String,Occurrences: 1,C:\\Users\\<username>\\Downloads\\eicar.com.txt,'',Actual action: Cleaned by deletion,Requested action: Cleaned,Secondary action: Quarantined,Event time: 2016-04-19 15:36:10,Inserted: 2016-04-19 15:36:36,End: 2016-04-19 15:36:10,Last update time: 2016-04-19 15:36:36,Domain: <DOMAINNAME>,Group: Group,Server: <SEPSERVER>,User: user,Source computer: ,Source IP: ,Disposition: Reputation was not used in this detection.,Download site: ,Web domain: ,Downloaded by: ,Prevalence: Reputation was not used in this detection.,Confidence: Reputation was not used in this detection.,URL Tracking Status: Off,,First Seen: Reputation was not used in this detection.,Sensitivity: ,MDS,Application hash: 275A021BBFB6489E54D471899F7DB9D1663FC695EC2FE2A2C4538AABF651FD0F,Hash type: SHA2,Company name: ,Application name: eicar.com,'
hostname: 'SymantecServer'
program_name: '(null)'
log: '<SEPHOSTNAME>: Virus found,IP Address: ,Computer name: HOSTNAME,Source: Real Time Scan,Risk name: EICAR Test String,Occurrences: 1,C:\\Users\\<username>\\Downloads\\eicar.com.txt,'',Actual action: Cleaned by deletion,Requested action: Cleaned,Secondary action: Quarantined,Event time: 2016-04-19 15:36:10,Inserted: 2016-04-19 15:36:36,End: 2016-04-19 15:36:10,Last update time: 2016-04-19 15:36:36,Domain: <DOMAINNAME>,Group: Group,Server: <SEPSERVER>,User: user,Source computer: ,Source IP: ,Disposition: Reputation was not used in this detection.,Download site: ,Web domain: ,Downloaded by: ,Prevalence: Reputation was not used in this detection.,Confidence: Reputation was not used in this detection.,URL Tracking Status: Off,,First Seen: Reputation was not used in this detection.,Sensitivity: ,MDS,Application hash: 275A021BBFB6489E54D471899F7DB9D1663FC695EC2FE2A2C4538AABF651FD0F,Hash type: SHA2,Company name: ,Application name: eicar.com,'
**Phase 2: Completed decoding.
decoder: 'test_symantec'
**Phase 3: Completed filtering (rules).
Rule id: '100003'
Level: '7'
Description: 'Symantec: virus found'
**Alert to be generated.