<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Add-on for Symantec Endpoint Protection: Canned field extractions not working in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149522#M13375</link>
    <description>&lt;P&gt;Not quite sure how to mail them over - we have a support contract so if you can see me in the CRM you can pull out my email address I guess.&lt;/P&gt;</description>
    <pubDate>Fri, 31 Jul 2015 07:27:12 GMT</pubDate>
    <dc:creator>alexlomas</dc:creator>
    <dc:date>2015-07-31T07:27:12Z</dc:date>
    <item>
      <title>Splunk Add-on for Symantec Endpoint Protection: Canned field extractions not working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149515#M13368</link>
      <description>&lt;P&gt;I found that the canned extractions for [field_extraction_for_agt_risk] and [field_extraction_for_agt_behavior] were not working with Splunk 6.2.3 and SEP manager v 12.1.4104.4130.&lt;/P&gt;

&lt;P&gt;It looks like the last couple of fields for each were missing, in my case that's category_set, category_type, File_Size &amp;amp; Device_ID. I modified the regexes as below to make the last two fields optional. The pre-built dashboards now work correctly. I don't know if "something" is wrong in the versions, regexes, or logfiles themeselves, but if the developer sees this perhaps they can comment &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[field_extraction_for_agt_behavior]
REGEX = (\s*'[^']*'|\s*[^,]*)(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:(?:,(\s*'[^']*'|\s*[^,]*)){1}(?:,(\s*'[^']*'|\s*[^,]*)){1})?
FORMAT = Severity::$2 Host_Name::$3 Action::$4 Description::$5 API::$6 Begin_Time::$7 End_Time::$8 Rule_Name::$9 Caller_Process_ID::$10 Caller_Process_Name::$11 Return_Address::$12 Return_Module::$13 Parameter::$14 User_Name::$15 Domain_Name::$16 Action_Type::$17 File_Size::$18 Device_ID::$19

[field_extraction_for_agt_risk]
REGEX = (\s*'[^']*'|\s*"[^"]*"|\s*[^,]*)(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1},Application\sversion:\s(.*),Application\stype:([^,]*)(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1}(?:,(\s*[^,']*'[^']*'|\s*[^,"]*"[^"]*"|\s*[^,]*)){1})?
FORMAT = Risk_Action::$2 IP_Address::$3 Computer_Name::$4 Source::$5 Risk_Name::$6 Occurrences::$7 File_Path::$8 Description::$9 Actual_Action::$10 Requested_Action::$11 Secondary_Action::$12 Event_Time::$13 Event_Insert_Time::$14 End_Time::$15 Last_Update_Time::$16 Domain_Name::$17 Group_Name::$18 Server_Name::$19 User_Name::$20 Source_Computer_Name::$21 Source_Computer_IP::$22 Disposition::$23 Download_site::$24 Web_domain::$25 Downloaded_by::$26 Prevalence::$27 Confidence::$28 URL_Tracking_Status::$29 First_Seen::$31 Sensitivity::$32 Reason_for_white_listing::$33 Application_Hash::$34 Hash_Type::$35 Company_Name::$36 Application_Name::$37 Application_Version::$38 Application_Type::$39 File_Size::$40 Category_set::$41 Category_type::$42
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 29 Sep 2020 06:50:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149515#M13368</guid>
      <dc:creator>alexlomas</dc:creator>
      <dc:date>2020-09-29T06:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Symantec Endpoint Protection: Canned field extractions not working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149516#M13369</link>
      <description>&lt;P&gt;To confirm: the fields were not being extracted or missing in your logs?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 20:45:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149516#M13369</guid>
      <dc:creator>mreynov_splunk</dc:creator>
      <dc:date>2015-07-30T20:45:35Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Symantec Endpoint Protection: Canned field extractions not working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149517#M13370</link>
      <description>&lt;P&gt;A new reply to an answer on Splunk Add-on for Symantec Endpoint Protection: Canned field extractions not working was posted by alexlomas on Splunk Answers:&lt;/P&gt;

&lt;P&gt;Awesome - are any of the other field extractions affected?&lt;/P&gt;

&lt;P&gt;On a semi-related topic: how is the malware lookup supposed to work? Or rather, in which reports/panels is it used?&lt;/P&gt;

&lt;HR /&gt;

&lt;P&gt;I might have been too hasty, please respond to question below to clarify.&lt;/P&gt;

&lt;P&gt;re: malware lookup - it is used to map to CIM category field. TA is focused on getting data into Splunk and does not come with built in visual components. If you have ES, this data will show up in Malware related dashboards.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 20:53:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149517#M13370</guid>
      <dc:creator>mreynov_splunk</dc:creator>
      <dc:date>2015-07-30T20:53:44Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Symantec Endpoint Protection: Canned field extractions not working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149518#M13371</link>
      <description>&lt;P&gt;The fields are not in the logs - I modified the extractions to make the last two fields for both files optional with a (?: ... )?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 21:03:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149518#M13371</guid>
      <dc:creator>alexlomas</dc:creator>
      <dc:date>2015-07-30T21:03:03Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Symantec Endpoint Protection: Canned field extractions not working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149519#M13372</link>
      <description>&lt;P&gt;Alright, I guess it IS a bug and we will fix in the next release. The difference must stem from a difference in SEP configuration.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 21:06:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149519#M13372</guid>
      <dc:creator>mreynov_splunk</dc:creator>
      <dc:date>2015-07-30T21:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Symantec Endpoint Protection: Canned field extractions not working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149520#M13373</link>
      <description>&lt;P&gt;OK - let me know if you want file samples offline.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 21:08:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149520#M13373</guid>
      <dc:creator>alexlomas</dc:creator>
      <dc:date>2015-07-30T21:08:54Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Symantec Endpoint Protection: Canned field extractions not working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149521#M13374</link>
      <description>&lt;P&gt;woud love some samples. thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 21:14:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149521#M13374</guid>
      <dc:creator>mreynov_splunk</dc:creator>
      <dc:date>2015-07-30T21:14:17Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Symantec Endpoint Protection: Canned field extractions not working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149522#M13375</link>
      <description>&lt;P&gt;Not quite sure how to mail them over - we have a support contract so if you can see me in the CRM you can pull out my email address I guess.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jul 2015 07:27:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Symantec-Endpoint-Protection-Canned-field/m-p/149522#M13375</guid>
      <dc:creator>alexlomas</dc:creator>
      <dc:date>2015-07-31T07:27:12Z</dc:date>
    </item>
  </channel>
</rss>

