<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Integrate Trendmicro DDI with Splunk- Not parsing correctly? in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Integrate-Trendmicro-DDI-with-Splunk-Not-parsing-correctly/m-p/613681#M13956</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/242494"&gt;@Yadukrishnan&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You can add the below line into your Trendmmicro DDI logs sourcetype. I also added &lt;STRONG&gt;appGroup&lt;/STRONG&gt; and &lt;STRONG&gt;app&lt;/STRONG&gt; to regex which you may have problems with because of space.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;EXTRACT-values_with_spaces = appGroup=(?&amp;lt;appGroup&amp;gt;.+)\sapp=(?&amp;lt;app&amp;gt;.+)vLANId.*ruleName=(?&amp;lt;ruleName&amp;gt;.+)\sdeviceRiskConfidenceLevel&lt;/LI-CODE&gt;</description>
    <pubDate>Tue, 20 Sep 2022 04:07:55 GMT</pubDate>
    <dc:creator>scelikok</dc:creator>
    <dc:date>2022-09-20T04:07:55Z</dc:date>
    <item>
      <title>Integrate Trendmicro DDI with Splunk- Not parsing correctly?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Integrate-Trendmicro-DDI-with-Splunk-Not-parsing-correctly/m-p/613569#M13949</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I integrated Trendmicro DDI with Splunk using the app. But in DDI, there is a gap in the signature name. Therefore when Splunk is parsing the signature name, it is only showing the first word and not the rest.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example if the signature name is "possible scanning activity" , I could see only in Splunk that the signature nae is "Possible" . The remaining is not coming up. Can some one please help with this. This is something very urgent.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Sep 2022 15:42:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Integrate-Trendmicro-DDI-with-Splunk-Not-parsing-correctly/m-p/613569#M13949</guid>
      <dc:creator>Yadukrishnan</dc:creator>
      <dc:date>2022-09-19T15:42:36Z</dc:date>
    </item>
    <item>
      <title>Re: Integrate Trendmicro DDI with Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Integrate-Trendmicro-DDI-with-Splunk-Not-parsing-correctly/m-p/613573#M13950</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/242494"&gt;@Yadukrishnan&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Splunk automatic key value extraction stops ad spaces. That is why you may not see the full value in some fields. If you post a few sample events, I can suggest you an EXTRACT setting that you can add to your TrendmicroDDI sourcetype.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Sep 2022 09:57:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Integrate-Trendmicro-DDI-with-Splunk-Not-parsing-correctly/m-p/613573#M13950</guid>
      <dc:creator>scelikok</dc:creator>
      <dc:date>2022-09-19T09:57:31Z</dc:date>
    </item>
    <item>
      <title>Re: Integrate Trendmicro DDI with Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Integrate-Trendmicro-DDI-with-Splunk-Not-parsing-correctly/m-p/613588#M13951</link>
      <description>&lt;P&gt;Hi&amp;nbsp;@&lt;SPAN&gt;scelikok,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please see below the sample logs from DDI.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Sep 19 08:33:17 host-XX-XX-XX-XX-XX.open.local CEF: 0|Trend Micro|Deep Discovery Inspector|6.2.XXXX|100119|SECURITY_RISK_DETECTION|2|ptype=IDS dvc=XX.XX.XXX.XXX deviceMacAddress=XX:XX:XX:XX:XX:XX dvchost=XXXX deviceGUID=XXXX-XXXX-XXXX-XXXX-XXXX rt=Sep 19 2022 08:33:10 GMT+03:00 appGroup=DNS Response app=DNS Response vLANId=4095 deviceDirection=1 dhost=XX.XX.XX.XX dst=XX.XX.XX.XX dpt=51330 dmac=XX:XX:XX:XX:XX:XX shost=XX.xx.com src=XX.XX.XX.XX spt=53 smac=XX:XX:XX:XX: cs3Label=HostName_Ext cs3=XX.xx.com malType=MALWARE fileType=-65536 fsize=0 ruleId=101 ruleName=&lt;STRONG&gt;DNS response resolves to dead IP&lt;/STRONG&gt; &lt;STRONG&gt;address&lt;/STRONG&gt; deviceRiskConfidenceLevel=2 cs8Label=BOT_URL cs8=7%3F01 cn3Label=Deep Discovery_PotentialRisk cn3=1 cs4Label=Deep Discovery_SrcGroup cs4=Default cs5Label=Deep Discovery_SrcZone cs5=1 cs9Label=Deep Discovery_DstGroup cs9=Default cs10Label=Deep Discovery_DstZone cs10=1 cs6Label=Deep Discovery_DetectionType cs6=1 pComp=NCIE act=not blocked cn4Label=Deep Discovery_ThreatType cn4=2 peerIp=XX.XX.XX.XX.XX interestedIp=XX.XX.XX.XX cnt=3 cn5Label=AggregatedCount cn5=1 evtCat=Suspicious Traffic evtSubCat=DNS cn2Label=APT Related cn2=0 externalId=47206390 compressedFileType=-65536 compressedFileHash=0000000000000000000000000000000000000000 hostSeverity=1 reason=["Domain: XX.XX.com"] devicePayloadId=2:47206390:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;In the above logs, the one I have marked in Bold is the signature name. But in Splunk it is showing up as only &lt;STRONG&gt;DNS , &lt;/STRONG&gt;none of the other values are showing up. Can you please help to solve this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Sep 2022 11:30:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Integrate-Trendmicro-DDI-with-Splunk-Not-parsing-correctly/m-p/613588#M13951</guid>
      <dc:creator>Yadukrishnan</dc:creator>
      <dc:date>2022-09-19T11:30:05Z</dc:date>
    </item>
    <item>
      <title>Re: Integrate Trendmicro DDI with Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Integrate-Trendmicro-DDI-with-Splunk-Not-parsing-correctly/m-p/613589#M13952</link>
      <description>&lt;P&gt;Hi&amp;nbsp;@&lt;SPAN&gt;scelikok&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please see below the sample logs from DDI.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Sep 19 08:33:17 host-XX-XX-XX-XX-XX.open.local CEF: 0|Trend Micro|Deep Discovery Inspector|6.2.XXXX|100119|SECURITY_RISK_DETECTION|2|ptype=IDS dvc=XX.XX.XXX.XXX deviceMacAddress=XX:XX:XX:XX:XX:XX dvchost=XXXX deviceGUID=XXXX-XXXX-XXXX-XXXX-XXXX rt=Sep 19 2022 08:33:10 GMT+03:00 appGroup=DNS Response app=DNS Response vLANId=4095 deviceDirection=1 dhost=XX.XX.XX.XX dst=XX.XX.XX.XX dpt=51330 dmac=XX:XX:XX:XX:XX:XX shost=XX.xx.com src=XX.XX.XX.XX spt=53 smac=XX:XX:XX:XX: cs3Label=HostName_Ext cs3=XX.xx.com malType=MALWARE fileType=-65536 fsize=0 ruleId=101 ruleName=&lt;STRONG&gt;DNS response resolves to dead IP&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;address&lt;/STRONG&gt;&amp;nbsp;deviceRiskConfidenceLevel=2 cs8Label=BOT_URL cs8=7%3F01 cn3Label=Deep Discovery_PotentialRisk cn3=1 cs4Label=Deep Discovery_SrcGroup cs4=Default cs5Label=Deep Discovery_SrcZone cs5=1 cs9Label=Deep Discovery_DstGroup cs9=Default cs10Label=Deep Discovery_DstZone cs10=1 cs6Label=Deep Discovery_DetectionType cs6=1 pComp=NCIE act=not blocked cn4Label=Deep Discovery_ThreatType cn4=2 peerIp=XX.XX.XX.XX.XX interestedIp=XX.XX.XX.XX cnt=3 cn5Label=AggregatedCount cn5=1 evtCat=Suspicious Traffic evtSubCat=DNS cn2Label=APT Related cn2=0 externalId=47206390 compressedFileType=-65536 compressedFileHash=0000000000000000000000000000000000000000 hostSeverity=1 reason=["Domain: XX.XX.com"] devicePayloadId=2:47206390:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;In the above logs, the one I have marked in Bold is the signature name. But in Splunk it is showing up as only&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;DNS ,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;none of the other values are showing up. Can you please help to solve this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Sep 2022 11:30:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Integrate-Trendmicro-DDI-with-Splunk-Not-parsing-correctly/m-p/613589#M13952</guid>
      <dc:creator>Yadukrishnan</dc:creator>
      <dc:date>2022-09-19T11:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: Integrate Trendmicro DDI with Splunk- Not parsing correctly?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Integrate-Trendmicro-DDI-with-Splunk-Not-parsing-correctly/m-p/613681#M13956</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/242494"&gt;@Yadukrishnan&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You can add the below line into your Trendmmicro DDI logs sourcetype. I also added &lt;STRONG&gt;appGroup&lt;/STRONG&gt; and &lt;STRONG&gt;app&lt;/STRONG&gt; to regex which you may have problems with because of space.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;EXTRACT-values_with_spaces = appGroup=(?&amp;lt;appGroup&amp;gt;.+)\sapp=(?&amp;lt;app&amp;gt;.+)vLANId.*ruleName=(?&amp;lt;ruleName&amp;gt;.+)\sdeviceRiskConfidenceLevel&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 20 Sep 2022 04:07:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Integrate-Trendmicro-DDI-with-Splunk-Not-parsing-correctly/m-p/613681#M13956</guid>
      <dc:creator>scelikok</dc:creator>
      <dc:date>2022-09-20T04:07:55Z</dc:date>
    </item>
  </channel>
</rss>

