<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic MS SQL logs ingested via Windows security events , how to make it CIM compliant ? in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-logs-ingested-via-Windows-security-events-how-to-make-it/m-p/757443#M12812</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We have integrated MS SQL logs with Splunk. The current default add-on supports logs via DB Connect but we do not have database connectivity directly. Rather, all the logs are written in Security logs for Windows Event viewer with most of the details in the Message field.&lt;/P&gt;&lt;P&gt;Currently all the fields are not being parsed . How can we make it CIM compliant ?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Jan 2026 14:18:33 GMT</pubDate>
    <dc:creator>rahulhari88</dc:creator>
    <dc:date>2026-01-19T14:18:33Z</dc:date>
    <item>
      <title>MS SQL logs ingested via Windows security events , how to make it CIM compliant ?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-logs-ingested-via-Windows-security-events-how-to-make-it/m-p/757443#M12812</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We have integrated MS SQL logs with Splunk. The current default add-on supports logs via DB Connect but we do not have database connectivity directly. Rather, all the logs are written in Security logs for Windows Event viewer with most of the details in the Message field.&lt;/P&gt;&lt;P&gt;Currently all the fields are not being parsed . How can we make it CIM compliant ?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jan 2026 14:18:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-logs-ingested-via-Windows-security-events-how-to-make-it/m-p/757443#M12812</guid>
      <dc:creator>rahulhari88</dc:creator>
      <dc:date>2026-01-19T14:18:33Z</dc:date>
    </item>
    <item>
      <title>Re: MS SQL logs ingested via Windows security events , how to make it CIM compliant ?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-logs-ingested-via-Windows-security-events-how-to-make-it/m-p/757446#M12813</link>
      <description>&lt;P&gt;Since the data is not structured as expected by the "default add-on", you will have to craft your own add-on to parse the fields.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jan 2026 15:36:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-logs-ingested-via-Windows-security-events-how-to-make-it/m-p/757446#M12813</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2026-01-19T15:36:23Z</dc:date>
    </item>
  </channel>
</rss>

