<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic McAfee TA 2.0 inputs issues in Knowledge Management</title>
    <link>https://community.splunk.com/t5/Knowledge-Management/McAfee-TA-2-0-inputs-issues/m-p/158204#M1535</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I use McAfee EPO 4.x and would like to import data into Splunk using Splunk McAfee TA 2.0&lt;/P&gt;

&lt;P&gt;however I am seeing errors like&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;2014-07-22 17:07:20.442 server01:ERROR:Scheduler - Error while reading stanza=[dbmon-tail://mcafee_epo_4_db/mcafee_epo_4_db_myinputl]: com.splunk.config.SplunkConfigurationException: Error validating dbmonTail for monitor=dbmon-tail://mcafee_epo_4_db/mcafee_epo_4_db_myinputl: The column "AutoID" is not present in the result set with query = SELECT CAST([EPOEvents].[ReceivedUTC] as varchar) as.......
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I've tried few variations without using 'AS' in 'SELECT' statement, however the timestamps are coming in wrong!&lt;/P&gt;

&lt;P&gt;how to fix this?&lt;/P&gt;</description>
    <pubDate>Fri, 25 Jul 2014 14:52:04 GMT</pubDate>
    <dc:creator>abonuccelli_spl</dc:creator>
    <dc:date>2014-07-25T14:52:04Z</dc:date>
    <item>
      <title>McAfee TA 2.0 inputs issues</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/McAfee-TA-2-0-inputs-issues/m-p/158204#M1535</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I use McAfee EPO 4.x and would like to import data into Splunk using Splunk McAfee TA 2.0&lt;/P&gt;

&lt;P&gt;however I am seeing errors like&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;2014-07-22 17:07:20.442 server01:ERROR:Scheduler - Error while reading stanza=[dbmon-tail://mcafee_epo_4_db/mcafee_epo_4_db_myinputl]: com.splunk.config.SplunkConfigurationException: Error validating dbmonTail for monitor=dbmon-tail://mcafee_epo_4_db/mcafee_epo_4_db_myinputl: The column "AutoID" is not present in the result set with query = SELECT CAST([EPOEvents].[ReceivedUTC] as varchar) as.......
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I've tried few variations without using 'AS' in 'SELECT' statement, however the timestamps are coming in wrong!&lt;/P&gt;

&lt;P&gt;how to fix this?&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2014 14:52:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/McAfee-TA-2-0-inputs-issues/m-p/158204#M1535</guid>
      <dc:creator>abonuccelli_spl</dc:creator>
      <dc:date>2014-07-25T14:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: McAfee TA 2.0 inputs issues</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/McAfee-TA-2-0-inputs-issues/m-p/158205#M1536</link>
      <description>&lt;P&gt;This will be addressed in next maintenance release,&lt;/P&gt;

&lt;P&gt;to fix this please replace the default&lt;/P&gt;

&lt;P&gt;'output.timestamp.parse.format' and 'query' params in $SPLUNK_HOME/etc/apps/Splunk_TA_mcafee/default/inputs.conf&lt;BR /&gt;
with&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;output.timestamp.parse.format = yyyy-MM-dd HH:mm:ss
query = SELECT CONVERT(VARCHAR(19), [EPOEvents].[ReceivedUTC], 120) as [timestamp], [EPOEvents].[AutoID], [EPOEvents].[ThreatName] as [signature], [EPOEvents].[ThreatType] as [threat_type], [EPOEvents].[ThreatEventID] as [signature_id], [EPOEvents].[ThreatCategory] as [category], [EPOEvents].[ThreatSeverity] as [severity_id], [EPOEventFilterDesc].[Name] as [event_description], [EPOEvents].[DetectedUTC] as [detected_timestamp], [EPOEvents].[TargetFileName] as [file_name], [EPOEvents].[AnalyzerDetectionMethod] as [detection_method], [EPOEvents].[ThreatActionTaken] as [action], [EPOEvents].[ThreatHandled] as [threat_handled], [EPOEvents].[TargetUserName] as [logon_user], [EPOComputerProperties].[UserName] as [user], [EPOComputerProperties].[DomainName] as [dest_nt_domain], [EPOEvents].[TargetHostName] as [dest_dns], [EPOEvents].[TargetHostName] as [dest_nt_host], [EPOComputerProperties].[IPHostName] as [fqdn], [dest_ip] = ( convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOComputerProperties].[IPV4x] + 2147483648))),1,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOComputerProperties].[IPV4x] + 2147483648))),2,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOComputerProperties].[IPV4x] + 2147483648))),3,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOComputerProperties].[IPV4x] + 2147483648))),4,1))) ), [EPOComputerProperties].[SubnetMask] as [dest_netmask], [EPOComputerProperties].[NetAddress] as [dest_mac], [EPOComputerProperties].[OSType] as [os], [EPOComputerProperties].[OSServicePackVer] as [sp], [EPOComputerProperties].[OSVersion] as [os_version], [EPOComputerProperties].[OSBuildNum] as [os_build], [EPOComputerProperties].[TimeZone] as [timezone], [EPOEvents].[SourceHostName] as [src_dns], [src_ip] = ( convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOEvents].[SourceIPV4] + 2147483648))),1,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOEvents].[SourceIPV4] + 2147483648))),2,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOEvents].[SourceIPV4] + 2147483648))),3,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOEvents].[SourceIPV4] + 2147483648))),4,1))) ), [EPOEvents].[SourceMAC] as [src_mac], [EPOEvents].[SourceProcessName] as [process], [EPOEvents].[SourceURL] as [url], [EPOEvents].[SourceUserName] as [logon_user], [EPOComputerProperties].[IsPortable] as [is_laptop], [EPOEvents].[AnalyzerName] as [product], [EPOEvents].[AnalyzerVersion] as [product_version], [EPOEvents].[AnalyzerEngineVersion] as [engine_version], [EPOEvents].[AnalyzerEngineVersion] as [dat_version], [EPOProdPropsView_VIRUSCAN].[datver] as [vse_dat_version], [EPOProdPropsView_VIRUSCAN].[enginever64] as [vse_engine64_version], [EPOProdPropsView_VIRUSCAN].[enginever] as [vse_engine_version], [EPOProdPropsView_VIRUSCAN].[hotfix] as [vse_hotfix], [EPOProdPropsView_VIRUSCAN].[productversion] as [vse_product_version], [EPOProdPropsView_VIRUSCAN].[servicepack] as [vse_sp], [EPOProdPropsView_ANTISPYWARE].[productversion] as [antispyware_version] FROM [EPOEvents] left join [EPOLeafNode] on [EPOEvents].[AgentGUID] = [EPOLeafNode].[AgentGUID] left join [EPOProdPropsView_ANTISPYWARE] on [EPOLeafNode].[AutoID] = [EPOProdPropsView_ANTISPYWARE].[LeafNodeID] left join [EPOProdPropsView_VIRUSCAN] on [EPOLeafNode].[AutoID] = [EPOProdPropsView_VIRUSCAN].[LeafNodeID] left join [EPOComputerProperties] on [EPOLeafNode].[AutoID] = [EPOComputerProperties].[ParentID] left join [EPOEventFilterDesc] on [EPOEvents].[ThreatEventID] = [EPOEventFilterDesc].[EventId] and (EPOEventFilterDesc.Language='0409') WHERE [EPOEvents].[AutoID] &amp;gt; 0 {{ AND [EPOEvents].$rising_column$ &amp;gt; ? }} ORDER BY [EPOEvents].[AutoID]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 28 Sep 2020 17:10:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/McAfee-TA-2-0-inputs-issues/m-p/158205#M1536</guid>
      <dc:creator>abonuccelli_spl</dc:creator>
      <dc:date>2020-09-28T17:10:52Z</dc:date>
    </item>
    <item>
      <title>Re: McAfee TA 2.0 inputs issues</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/McAfee-TA-2-0-inputs-issues/m-p/158206#M1537</link>
      <description>&lt;P&gt;Sorry to tell you, but it seems your answer doesn't work. The timestamp is still wrong (index time)...&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jul 2014 16:15:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/McAfee-TA-2-0-inputs-issues/m-p/158206#M1537</guid>
      <dc:creator>ysouchon</dc:creator>
      <dc:date>2014-07-28T16:15:05Z</dc:date>
    </item>
    <item>
      <title>Re: McAfee TA 2.0 inputs issues</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/McAfee-TA-2-0-inputs-issues/m-p/158207#M1538</link>
      <description>&lt;P&gt;try this instead for the timestamp problem &lt;BR /&gt;
&lt;A href="http://answers.splunk.com/answers/145674/timestamp-issue-with-splunk-add-on-for-mcafee"&gt;http://answers.splunk.com/answers/145674/timestamp-issue-with-splunk-add-on-for-mcafee&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2014 12:30:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/McAfee-TA-2-0-inputs-issues/m-p/158207#M1538</guid>
      <dc:creator>abonuccelli_spl</dc:creator>
      <dc:date>2014-07-29T12:30:18Z</dc:date>
    </item>
    <item>
      <title>Re: McAfee TA 2.0 inputs issues</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/McAfee-TA-2-0-inputs-issues/m-p/158208#M1539</link>
      <description>&lt;P&gt;This worked for me with this format of timestamp (Aug  3 2012  8:17AM)&lt;BR /&gt;
&lt;PRE&gt;&lt;BR /&gt;
[dbmon-tail://mcafee_epo/ta_mcafee_input]&lt;BR /&gt;
host = &lt;BR /&gt;
index = mcafee&lt;BR /&gt;
sourcetype = mcafee:epo&lt;BR /&gt;
interval = * * * * *&lt;BR /&gt;
output.format = kv&lt;BR /&gt;
output.timestamp = 1&lt;BR /&gt;
output.timestamp.column = timestamp&lt;BR /&gt;
output.timestamp.format = yyyy-MM-dd HH:mm:ss&lt;BR /&gt;
output.timestamp.parse.format = MMM dd yyyy HH:mmaa&lt;BR /&gt;
query= SELECT TOP 10000&lt;BR /&gt;
    [EPOEvents].[AutoID],&lt;BR /&gt;
    [EPOEvents].[ThreatName] as [signature],&lt;BR /&gt;
    [EPOEvents].[ThreatType] as [threat_type],&lt;BR /&gt;
    [EPOEvents].[ThreatEventID] as [signature_id],&lt;BR /&gt;
    [EPOEvents].[ThreatCategory] as [category],&lt;BR /&gt;
    [EPOEvents].[ThreatSeverity] as [severity_id],&lt;BR /&gt;
    [EPOEventFilterDesc].[Name] as [event_description],&lt;BR /&gt;
    [EPOEvents].[ReceivedUTC] as [received_timestamp],&lt;BR /&gt;
    [EPOEvents].[DetectedUTC] as [detected_timestamp],&lt;BR /&gt;
    [EPOEvents].[TargetFileName] as [file_name],&lt;BR /&gt;
    [EPOEvents].[AnalyzerDetectionMethod] as [detection_method],&lt;BR /&gt;
    [EPOEvents].[ThreatActionTaken] as [vendor_action],&lt;BR /&gt;
    [EPOEvents].[ThreatHandled] as [threat_handled],&lt;BR /&gt;
    [EPOEvents].[TargetUserName] as [logon_user],&lt;BR /&gt;
    [EPOComputerProperties].[UserName] as [user],&lt;BR /&gt;
    [EPOComputerProperties].[DomainName] as [dest_nt_domain],&lt;BR /&gt;
    [EPOEvents].[TargetHostName] as [dest_dns],&lt;BR /&gt;
    [EPOEvents].[TargetHostName] as [dest_nt_host],&lt;BR /&gt;
    [EPOComputerProperties].[IPHostName] as [fqdn],&lt;BR /&gt;
    [dest_ip] = ( convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOComputerProperties].[IPV4x] + 2147483648))),1,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOComputerProperties].[IPV4x] + 2147483648))),2,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOComputerProperties].[IPV4x] + 2147483648))),3,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOComputerProperties].[IPV4x] + 2147483648))),4,1))) ),&lt;BR /&gt;
    [EPOComputerProperties].[SubnetMask] as [dest_netmask],&lt;BR /&gt;
    [EPOComputerProperties].[NetAddress] as [dest_mac],&lt;BR /&gt;
    [EPOComputerProperties].[OSType] as [os],&lt;BR /&gt;
    [EPOComputerProperties].[OSServicePackVer] as [sp],&lt;BR /&gt;
    [EPOComputerProperties].[OSVersion] as [os_version],&lt;BR /&gt;
    [EPOComputerProperties].[OSBuildNum] as [os_build],&lt;BR /&gt;
    [EPOComputerProperties].[TimeZone] as [timezone],&lt;BR /&gt;
    [EPOEvents].[SourceHostName] as [src_dns],&lt;BR /&gt;
    [src_ip] = ( convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOEvents].[SourceIPV4] + 2147483648))),1,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOEvents].[SourceIPV4] + 2147483648))),2,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOEvents].[SourceIPV4] + 2147483648))),3,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOEvents].[SourceIPV4] + 2147483648))),4,1))) ),&lt;BR /&gt;
    [EPOEvents].[SourceMAC] as [src_mac],&lt;BR /&gt;
    [EPOEvents].[SourceProcessName] as [process],&lt;BR /&gt;
    [EPOEvents].[SourceURL] as [url],&lt;BR /&gt;
    [EPOEvents].[SourceUserName] as [logon_user],&lt;BR /&gt;
    [EPOComputerProperties].[IsPortable] as [is_laptop],&lt;BR /&gt;
    [EPOEvents].[AnalyzerName] as [product],&lt;BR /&gt;
    [EPOEvents].[AnalyzerVersion] as [product_version],&lt;BR /&gt;
    [EPOEvents].[AnalyzerEngineVersion] as [engine_version],&lt;BR /&gt;
    [EPOEvents].[AnalyzerEngineVersion] as [dat_version],&lt;BR /&gt;
    [EPOProdPropsView_VIRUSCAN].[datver] as [vse_dat_version],&lt;BR /&gt;
    [EPOProdPropsView_VIRUSCAN].[enginever64] as [vse_engine64_version],&lt;BR /&gt;
    [EPOProdPropsView_VIRUSCAN].[enginever] as [vse_engine_version],&lt;BR /&gt;
    [EPOProdPropsView_VIRUSCAN].[hotfix] as [vse_hotfix],&lt;BR /&gt;
    [EPOProdPropsView_VIRUSCAN].[productversion] as [vse_product_version],&lt;BR /&gt;
    [EPOProdPropsView_VIRUSCAN].[servicepack] as [vse_sp],&lt;BR /&gt;
    [EPOProdPropsView_ANTISPYWARE].[productversion] as [antispyware_version]&lt;BR /&gt;
FROM [EPOEvents]&lt;BR /&gt;
left join [EPOLeafNode] on [EPOEvents].[AgentGUID] = [EPOLeafNode].[AgentGUID]&lt;BR /&gt;
left join [EPOProdPropsView_ANTISPYWARE] on [EPOLeafNode].[AutoID] = [EPOProdPropsView_ANTISPYWARE].[LeafNodeID]&lt;BR /&gt;
left join [EPOProdPropsView_VIRUSCAN] on [EPOLeafNode].[AutoID] = [EPOProdPropsView_VIRUSCAN].[LeafNodeID]&lt;BR /&gt;
left join [EPOComputerProperties] on [EPOLeafNode].[AutoID] = [EPOComputerProperties].[ParentID]&lt;BR /&gt;
left join [EPOEventFilterDesc] on [EPOEvents].[ThreatEventID] = [EPOEventFilterDesc].[EventId]&lt;BR /&gt;
and (EPOEventFilterDesc.Language='0409')&lt;BR /&gt;
{{WHERE EPOEvents.$rising_column$ &amp;gt; ? }} ORDER BY [EPOEvents].[AutoID]&lt;BR /&gt;
table = ta_mcafee_input&lt;BR /&gt;
&lt;/PRE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 17:18:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/McAfee-TA-2-0-inputs-issues/m-p/158208#M1539</guid>
      <dc:creator>mcronkrite</dc:creator>
      <dc:date>2020-09-28T17:18:26Z</dc:date>
    </item>
  </channel>
</rss>

