<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk App for Linux Auditd Log in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-App-for-Linux-Auditd-Log/m-p/679014#M18769</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/265226"&gt;@Symon&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To effectively monitor Linux Auditd events in Splunk, you can use the Splunk Add-on for Linux.&lt;/P&gt;&lt;P&gt;This add-on allows you to collect and analyze audit logs from your Linux devices. Here’s how you can set it up:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Configure AuditD to Send Data to the Splunk Add-on for Linux:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/AddOns/released/Linux/Configure4" target="_blank"&gt;https://docs.splunk.com/Documentation/AddOns/released/Linux/Configure4&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://splunkbase.splunk.com/app/833" target="_blank"&gt;https://splunkbase.splunk.com/app/833&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This Add On for linux Auditd allows Administrators to make their data OCSF Compliant and CIM compliant for related Linux Auditd Events&lt;/P&gt;&lt;P&gt;&lt;A href="https://preview.splunkbase.splunk.com/app/7045" target="_blank"&gt;https://preview.splunkbase.splunk.com/app/7045&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 28 Feb 2024 15:22:33 GMT</pubDate>
    <dc:creator>kiran_panchavat</dc:creator>
    <dc:date>2024-02-28T15:22:33Z</dc:date>
    <item>
      <title>Splunk App for Linux Auditd Log</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-App-for-Linux-Auditd-Log/m-p/678629#M18753</link>
      <description>&lt;P&gt;Hello Sirs,&lt;/P&gt;&lt;P&gt;I would like to know the most useful Splunk App that can be suitable for Linux Auditd events. I have Linux devices such as Mangement Servers, DNS, HTTP Servers, Firewall, etc. These logs carried by both Syslog Forwarder and Heavy forwarders.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Please suggest how to monitor the audit logs by which Splunk App?&lt;/P&gt;&lt;P&gt;Thanks a bunch.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 05:16:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-App-for-Linux-Auditd-Log/m-p/678629#M18753</guid>
      <dc:creator>Symon</dc:creator>
      <dc:date>2024-02-26T05:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App for Linux Auditd Log</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-App-for-Linux-Auditd-Log/m-p/679014#M18769</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/265226"&gt;@Symon&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To effectively monitor Linux Auditd events in Splunk, you can use the Splunk Add-on for Linux.&lt;/P&gt;&lt;P&gt;This add-on allows you to collect and analyze audit logs from your Linux devices. Here’s how you can set it up:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Configure AuditD to Send Data to the Splunk Add-on for Linux:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/AddOns/released/Linux/Configure4" target="_blank"&gt;https://docs.splunk.com/Documentation/AddOns/released/Linux/Configure4&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://splunkbase.splunk.com/app/833" target="_blank"&gt;https://splunkbase.splunk.com/app/833&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This Add On for linux Auditd allows Administrators to make their data OCSF Compliant and CIM compliant for related Linux Auditd Events&lt;/P&gt;&lt;P&gt;&lt;A href="https://preview.splunkbase.splunk.com/app/7045" target="_blank"&gt;https://preview.splunkbase.splunk.com/app/7045&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2024 15:22:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-App-for-Linux-Auditd-Log/m-p/679014#M18769</guid>
      <dc:creator>kiran_panchavat</dc:creator>
      <dc:date>2024-02-28T15:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App for Linux Auditd Log</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-App-for-Linux-Auditd-Log/m-p/679227#M18788</link>
      <description>&lt;P&gt;Thanks. Noted sir.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Mar 2024 05:00:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-App-for-Linux-Auditd-Log/m-p/679227#M18788</guid>
      <dc:creator>Symon</dc:creator>
      <dc:date>2024-03-01T05:00:48Z</dc:date>
    </item>
  </channel>
</rss>

