<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Infosec App - No data for Malware in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Infosec-App-No-data-for-Malware/m-p/402221#M49072</link>
    <description>&lt;P&gt;I am using the Infosec App but I am not getting any malware information.&lt;BR /&gt;
I am getting events from Sophos Central and these are searchable etc.&lt;/P&gt;

&lt;P&gt;I have set the cim_malware_indexes to search the sophos index, so it can search for them. &lt;/P&gt;

&lt;P&gt;But running the below search:  (edited to update to correct search)&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats prestats=true local=false summariesonly=true allow_old_summaries=true count from datamodel=Malware.Malware_Attacks where  Malware_Attacks.action=* by _time, Malware_Attacks.action span=10m 
| rename "Malware_Attacks.*" AS "*" 
| timechart minspan=10m useother=true count by action
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I am returned no results and in this time range there are malware events.&lt;/P&gt;

&lt;P&gt;Can anyone help me with this at all? Perhaps someone has used sophos central with the infosec app before.&lt;/P&gt;

&lt;P&gt;Cheers.&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 00:46:55 GMT</pubDate>
    <dc:creator>FraserC1</dc:creator>
    <dc:date>2020-09-30T00:46:55Z</dc:date>
    <item>
      <title>Infosec App - No data for Malware</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Infosec-App-No-data-for-Malware/m-p/402221#M49072</link>
      <description>&lt;P&gt;I am using the Infosec App but I am not getting any malware information.&lt;BR /&gt;
I am getting events from Sophos Central and these are searchable etc.&lt;/P&gt;

&lt;P&gt;I have set the cim_malware_indexes to search the sophos index, so it can search for them. &lt;/P&gt;

&lt;P&gt;But running the below search:  (edited to update to correct search)&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats prestats=true local=false summariesonly=true allow_old_summaries=true count from datamodel=Malware.Malware_Attacks where  Malware_Attacks.action=* by _time, Malware_Attacks.action span=10m 
| rename "Malware_Attacks.*" AS "*" 
| timechart minspan=10m useother=true count by action
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I am returned no results and in this time range there are malware events.&lt;/P&gt;

&lt;P&gt;Can anyone help me with this at all? Perhaps someone has used sophos central with the infosec app before.&lt;/P&gt;

&lt;P&gt;Cheers.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 00:46:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Infosec-App-No-data-for-Malware/m-p/402221#M49072</guid>
      <dc:creator>FraserC1</dc:creator>
      <dc:date>2020-09-30T00:46:55Z</dc:date>
    </item>
    <item>
      <title>Re: Infosec App - No data for Malware</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Infosec-App-No-data-for-Malware/m-p/402222#M49073</link>
      <description>&lt;P&gt;Hello there, is that a typo in Malware_Attacks.action field?&lt;BR /&gt;
Edit: value is missing.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2019 15:13:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Infosec-App-No-data-for-Malware/m-p/402222#M49073</guid>
      <dc:creator>alemarzu</dc:creator>
      <dc:date>2019-06-03T15:13:57Z</dc:date>
    </item>
    <item>
      <title>Re: Infosec App - No data for Malware</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Infosec-App-No-data-for-Malware/m-p/402223#M49074</link>
      <description>&lt;P&gt;Hi, thanks! Can you point out exactly where the typo is? I didn't write the search myself as I took it straight from the dashboard. &lt;/P&gt;

&lt;P&gt;I would be surprised if there is a typo, because all dashboards referencing malware do not work.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2019 15:26:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Infosec-App-No-data-for-Malware/m-p/402223#M49074</guid>
      <dc:creator>FraserC1</dc:creator>
      <dc:date>2019-06-03T15:26:53Z</dc:date>
    </item>
    <item>
      <title>Re: Infosec App - No data for Malware</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Infosec-App-No-data-for-Malware/m-p/402224#M49075</link>
      <description>&lt;P&gt;After the clause (where), the field Malware_Attacks.action lacks the value after the equal sign.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2019 15:50:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Infosec-App-No-data-for-Malware/m-p/402224#M49075</guid>
      <dc:creator>alemarzu</dc:creator>
      <dc:date>2019-06-03T15:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: Infosec App - No data for Malware</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Infosec-App-No-data-for-Malware/m-p/402225#M49076</link>
      <description>&lt;P&gt;Ah that's very odd.&lt;BR /&gt;
The search itself has a wildcard operator after the =.&lt;BR /&gt;
It must have been lost when I pasted it. The correct search is below and I will edit the original post.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats prestats=true local=false summariesonly=true allow_old_summaries=true count from datamodel=Malware.Malware_Attacks where  Malware_Attacks.action=* by _time, Malware_Attacks.action span=10m 
| rename "Malware_Attacks.*" AS "*" 
| timechart minspan=10m useother=true count by action
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 03 Jun 2019 16:27:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Infosec-App-No-data-for-Malware/m-p/402225#M49076</guid>
      <dc:creator>FraserC1</dc:creator>
      <dc:date>2019-06-03T16:27:41Z</dc:date>
    </item>
    <item>
      <title>Re: Infosec App - No data for Malware</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Infosec-App-No-data-for-Malware/m-p/402226#M49077</link>
      <description>&lt;P&gt;You may want to run this search to check whether you data maps to the Malware data model:&lt;/P&gt;

&lt;P&gt;index=* tag=malware tag=attack&lt;/P&gt;

&lt;P&gt;If you get results, add action=* to the search. &lt;/P&gt;

&lt;P&gt;If you get results, check whether your Malware data model is accelerated. &lt;/P&gt;

&lt;P&gt;You can also quickly check the health of your data sources going to Health and Stats menu and looking at the report in the lower left corner of the dashboard. &lt;/P&gt;

&lt;P&gt;The InfoSec app needs CIM compliant data. You’ll either need to use a CIM-compliant add on or make your data CIM compliant. &lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2019 19:31:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Infosec-App-No-data-for-Malware/m-p/402226#M49077</guid>
      <dc:creator>igifrin_splunk</dc:creator>
      <dc:date>2019-06-03T19:31:36Z</dc:date>
    </item>
    <item>
      <title>Re: Infosec App - No data for Malware</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Infosec-App-No-data-for-Malware/m-p/402227#M49078</link>
      <description>&lt;P&gt;Hey, thank you for your response. &lt;/P&gt;

&lt;P&gt;I am using the Sophos Add-On for Splunk. &lt;A href="https://splunkbase.splunk.com/app/4096/"&gt;https://splunkbase.splunk.com/app/4096/&lt;/A&gt;&lt;BR /&gt;
And it does seem to say it is CIM compliant according to the updates on v1.0.1.&lt;/P&gt;

&lt;P&gt;But I don't get any results when performing your searches so something is going wrong somewhere or it is not CIM compliant as it states. &lt;BR /&gt;
I suppose I will have to make the data CIM compliant as you suggested. If you have any ideas on how to do this that would be excellent, if not I will just look into it.&lt;/P&gt;

&lt;P&gt;Thanks again!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2019 09:43:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Infosec-App-No-data-for-Malware/m-p/402227#M49078</guid>
      <dc:creator>FraserC1</dc:creator>
      <dc:date>2019-06-04T09:43:07Z</dc:date>
    </item>
  </channel>
</rss>

