<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authentication CIM tags and mapping in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Authentication-CIM-tags-and-mapping/m-p/651830#M11637</link>
    <description>&lt;P&gt;Hi bro sorry for the late reply went to go make dinner for four years.&lt;BR /&gt;&lt;BR /&gt;If I understand your issue correctly, you are having issues finding your authentication CIM via data model search.&lt;BR /&gt;&lt;BR /&gt;In order to map your authentication logs to authentication CIM, you can add the following lines into your tags.conf file (located in TA):&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;[eventtype=[..]]&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;authentication = enabled&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;If you are unsure of your eventtype, you should also have eventtypes.conf where you can map the sourcetype to eventtype.&lt;BR /&gt;&lt;BR /&gt;Hope this clarifies your doubts, I will go eat my dinner now.&lt;/P&gt;</description>
    <pubDate>Tue, 25 Jul 2023 03:37:00 GMT</pubDate>
    <dc:creator>javierg</dc:creator>
    <dc:date>2023-07-25T03:37:00Z</dc:date>
    <item>
      <title>Authentication CIM tags and mapping</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Authentication-CIM-tags-and-mapping/m-p/500454#M8792</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;

&lt;P&gt;I need help manually mapping a log source that has no supported add on.  I entered in two event types with tags to ID which log is a failed login and which is a successful login.  They are listed below.  &lt;/P&gt;

&lt;P&gt;Search: index=index sourcetype=logsource LoginSuccessful=0      Tags: authentication, failure&lt;BR /&gt;
Search: index=index sourcetype=logsource LoginSuccessful=1      Tags: authentication, success&lt;/P&gt;

&lt;P&gt;But in the Auth DM fields, it is showing every event as Authentication.is_Failed_Authentication and every event as Authentication.is_Successful_Authentication.  Can someone send me the link to the right mapping doc in Splunk or describe what I am missing here.  Do I need to enter a field alias as well?&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:14:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Authentication-CIM-tags-and-mapping/m-p/500454#M8792</guid>
      <dc:creator>gwes77</dc:creator>
      <dc:date>2020-09-30T03:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication CIM tags and mapping</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Authentication-CIM-tags-and-mapping/m-p/651830#M11637</link>
      <description>&lt;P&gt;Hi bro sorry for the late reply went to go make dinner for four years.&lt;BR /&gt;&lt;BR /&gt;If I understand your issue correctly, you are having issues finding your authentication CIM via data model search.&lt;BR /&gt;&lt;BR /&gt;In order to map your authentication logs to authentication CIM, you can add the following lines into your tags.conf file (located in TA):&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;[eventtype=[..]]&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;authentication = enabled&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;If you are unsure of your eventtype, you should also have eventtypes.conf where you can map the sourcetype to eventtype.&lt;BR /&gt;&lt;BR /&gt;Hope this clarifies your doubts, I will go eat my dinner now.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2023 03:37:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Authentication-CIM-tags-and-mapping/m-p/651830#M11637</guid>
      <dc:creator>javierg</dc:creator>
      <dc:date>2023-07-25T03:37:00Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication CIM tags and mapping</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Authentication-CIM-tags-and-mapping/m-p/652590#M11645</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/30075"&gt;@gwes77&lt;/a&gt;, Can you please confirm what's the value of the action field? Because both, success and failed authentication does have "(`cim_Authentication_indexes`) tag=authentication NOT (action=success user=*$)" in common but not action. Below screenshots for your reference -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="meetmshah_0-1690834570644.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/26551i2037560F641DD6FC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="meetmshah_0-1690834570644.png" alt="meetmshah_0-1690834570644.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="meetmshah_1-1690834579469.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/26552i052E6203B143D9A5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="meetmshah_1-1690834579469.png" alt="meetmshah_1-1690834579469.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jul 2023 20:16:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Authentication-CIM-tags-and-mapping/m-p/652590#M11645</guid>
      <dc:creator>meetmshah</dc:creator>
      <dc:date>2023-07-31T20:16:28Z</dc:date>
    </item>
  </channel>
</rss>

