Workflows based on this trigger will search for new events every 5 minutes.
Sample Event
{ "last_persisted_time": 42, "username_count": 42, "description": "String", "rules": [ { "id": 42, "type": "String <one of: ADE_RULE, BUILDING_BLOCK_RULE, CRE_RULE>" } ], "event_count": 42, "flow_count": 42, "assigned_to": "String", "security_category_count": 42, "follow_up": true, "source_address_ids": [ 42 ], "source_count": 42, "inactive": true, "protected": true, "category_count": 42, "source_network": "String", "destination_networks": [ "String" ], "closing_user": "String", "close_time": 42, "remote_destination_count": 42, "start_time": 42, "last_updated_time": 42, "credibility": 42, "magnitude": 42, "id": 42, "categories": [ "String" ], "severity": 42, "log_sources": [ { "type_name": "String", "type_id": 42, "name": "String", "id": 42 } ], "policy_category_count": 42, "device_count": 42, "closing_reason_id": 42, "first_persisted_time": 42, "offense_type": 42, "relevance": 42, "domain_id": 42, "offense_source": "String", "local_destination_address_ids": [ 42 ], "local_destination_count": 42, "status": "String <one of: OPEN, HIDDEN, CLOSED>"}