<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I am setting up Authentication datamodel that have Default, insecure and Privileged Authentication in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/I-am-setting-up-Authentication-datamodel-that-have-Default/m-p/570498#M10351</link>
    <description>&lt;P&gt;How will I set up a data model that has Authentication and sub-sessions&amp;nbsp;Default, insecure and Privileged Authentication data model. It uses action of a sucess and failure.&amp;nbsp; I am using the following splunk query:&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;(`cim_Authentication_indexes`) tag=authentication NOT (action=success user=*$) NOT "pam_unix(sshd:auth): authentication failure;"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is there anything wrong with the above query or how can I make it to work?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Oct 2021 17:01:21 GMT</pubDate>
    <dc:creator>ngwodo</dc:creator>
    <dc:date>2021-10-11T17:01:21Z</dc:date>
    <item>
      <title>I am setting up Authentication datamodel that have Default, insecure and Privileged Authentication</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/I-am-setting-up-Authentication-datamodel-that-have-Default/m-p/570498#M10351</link>
      <description>&lt;P&gt;How will I set up a data model that has Authentication and sub-sessions&amp;nbsp;Default, insecure and Privileged Authentication data model. It uses action of a sucess and failure.&amp;nbsp; I am using the following splunk query:&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;(`cim_Authentication_indexes`) tag=authentication NOT (action=success user=*$) NOT "pam_unix(sshd:auth): authentication failure;"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is there anything wrong with the above query or how can I make it to work?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Oct 2021 17:01:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/I-am-setting-up-Authentication-datamodel-that-have-Default/m-p/570498#M10351</guid>
      <dc:creator>ngwodo</dc:creator>
      <dc:date>2021-10-11T17:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: I am setting up Authentication datamodel that have Default, insecure and Privileged Authentication</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/I-am-setting-up-Authentication-datamodel-that-have-Default/m-p/570499#M10352</link>
      <description>&lt;P&gt;The CIM app supplies the Authentication datamodel.&amp;nbsp; &amp;nbsp;Once you've installed the app, make sure your data uses the CIM fields. Add EVAL or FIELDALIAS props as necessary.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Oct 2021 17:06:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/I-am-setting-up-Authentication-datamodel-that-have-Default/m-p/570499#M10352</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-10-11T17:06:24Z</dc:date>
    </item>
    <item>
      <title>Re: I am setting up Authentication datamodel that have Default, insecure and Privileged Authentication</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/I-am-setting-up-Authentication-datamodel-that-have-Default/m-p/570502#M10353</link>
      <description>&lt;P&gt;Thanks for the above reply but what would be the eval expressions and field alias? Are mine going to have it for each of those authentication data model i.e. Default, Insecure and Privileged? Where will put the success and failure tags for the data model?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Oct 2021 17:57:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/I-am-setting-up-Authentication-datamodel-that-have-Default/m-p/570502#M10353</guid>
      <dc:creator>ngwodo</dc:creator>
      <dc:date>2021-10-11T17:57:51Z</dc:date>
    </item>
    <item>
      <title>Re: I am setting up Authentication datamodel that have Default, insecure and Privileged Authentication</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/I-am-setting-up-Authentication-datamodel-that-have-Default/m-p/570510#M10354</link>
      <description>&lt;P&gt;The EVAL and FIELDALIAS settings would like something like this.&amp;nbsp; Put them in the appropriate props.conf file.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[mysourcetype]
EVAL-vendor_product = "Microsoft Windows"
FIELDALIAS-src_ip = src_ip=src_ip_address&lt;/LI-CODE&gt;&lt;P&gt;Once a CIM field is defined it is available for use in all parts of a datamodel.&lt;/P&gt;&lt;P&gt;To tag the data, create an eventtype that extracts what the datamodel is looking for then add the appropriate tag to that eventtype.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Oct 2021 18:32:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/I-am-setting-up-Authentication-datamodel-that-have-Default/m-p/570510#M10354</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-10-11T18:32:54Z</dc:date>
    </item>
  </channel>
</rss>

