<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Entreprise Seurity Not Generating Notables in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Entreprise-Seurity-Not-Generating-Notables/m-p/759108#M12854</link>
    <description>&lt;P&gt;OK. Of those three locations only the audit.log contains fairly standardized data.&lt;/P&gt;&lt;P&gt;But.&lt;/P&gt;&lt;P&gt;There are several different types of events there.&lt;/P&gt;&lt;P&gt;1. SELinux alerts&lt;/P&gt;&lt;P&gt;2. PAM events&lt;/P&gt;&lt;P&gt;3. auditd logs&lt;/P&gt;&lt;P&gt;Usefulness of SELinux alerts depends on your SELinux policy (and whether SELinux is enabled at all).&lt;/P&gt;&lt;P&gt;Auditd must be explicitly configured with audit rules to produce meaningful output.&lt;/P&gt;&lt;P&gt;So this single file can be tricky to configure.&lt;/P&gt;&lt;P&gt;And the two other files can contain plethora of various event formats from different daemons on your system depending on what you have installed and how your system is configured. I assume it's some debian-based distro because normal RH-based one doesn't even have /var/log/syslog.&lt;/P&gt;&lt;P&gt;So it's a bit more complicated than just installing "something" and having it work.&lt;/P&gt;&lt;P&gt;Sysmon is... well, that's a completely different story. I'd be very cautious about it since it's a very low-level external tool and requires a decent configuration to produce meaningful output but not overstress the system.&lt;/P&gt;</description>
    <pubDate>Sun, 08 Mar 2026 21:38:00 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2026-03-08T21:38:00Z</dc:date>
    <item>
      <title>Entreprise Seurity Not Generating Notables</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Entreprise-Seurity-Not-Generating-Notables/m-p/758823#M12850</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;I have integrated Linux Hosts with my Splunk. I installed the splunk add-on for Linux , and it gaves me 3 source types (linux_secure, linux_messages_syslog and linux_audit) .&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is my inputs.conf on Splunk Forwarder :&amp;nbsp;&lt;/P&gt;&lt;P&gt;[monitor:///var/log/auth.log]&lt;BR /&gt;disabled = false&lt;BR /&gt;sourcetype = linux_secure&lt;BR /&gt;index = linux_hosts&lt;/P&gt;&lt;P&gt;[monitor:///var/log/syslog]&lt;BR /&gt;disabled = false&lt;BR /&gt;sourcetype = linux_messages_syslog&lt;BR /&gt;index = linux_hosts&lt;/P&gt;&lt;P&gt;[monitor:///var/log/audit/audit.log]&lt;BR /&gt;disabled = false&lt;BR /&gt;sourcetype = auditd&lt;BR /&gt;index = linux_hosts&lt;/P&gt;&lt;P&gt;The First issue i have is that The Endpoint Data Model doesn't accept thoses source types except for linux_secure, so Correlation searches are not bringing any notables.&lt;/P&gt;&lt;P&gt;The second issue is regarding Notables , i changed the source type from linux_audit to auditd. And i took a correlation search as an axample , I run its SPL on search and it brings result , but On the Entreprise security no notable is generated.&lt;/P&gt;&lt;P&gt;Could you please help me fix This.&lt;/P&gt;&lt;P&gt;Thank you for your time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2026 11:00:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Entreprise-Seurity-Not-Generating-Notables/m-p/758823#M12850</guid>
      <dc:creator>fedayn05</dc:creator>
      <dc:date>2026-02-26T11:00:40Z</dc:date>
    </item>
    <item>
      <title>Re: Entreprise Seurity Not Generating Notables</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Entreprise-Seurity-Not-Generating-Notables/m-p/759096#M12852</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Thank you for sharing the details of your configuration. Based on your description, there are two separate issues related to &lt;STRONG&gt;data model compatibility&lt;/STRONG&gt; and &lt;STRONG&gt;notable event generation in Splunk Enterprise Security&lt;/STRONG&gt;.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Endpoint Data Model Not Recognizing Sourcetypes&lt;/STRONG&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;The &lt;STRONG&gt;Endpoint Data Model&lt;/STRONG&gt; in Splunk Enterprise Security expects specific sourcetypes defined in the &lt;STRONG&gt;CIM (Common Information Model)&lt;/STRONG&gt;. While the Splunk Add-on for Unix and Linux provides sourcetypes such as:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;linux_secure&lt;/LI&gt;&lt;LI&gt;linux_messages_syslog&lt;/LI&gt;&lt;LI&gt;linux_audit&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;only some of these are &lt;STRONG&gt;mapped to the Endpoint data model by default&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;In your configuration:&lt;/P&gt;&lt;P&gt;/var/log/auth.log -&amp;gt; linux_secure&lt;BR /&gt;/var/log/syslog -&amp;gt; linux_messages_syslog&lt;BR /&gt;/var/log/audit/audit.log -&amp;gt; auditd&lt;/P&gt;&lt;P&gt;The main issue is that &lt;STRONG&gt;linux_messages_syslog and auditd are not automatically mapped to the Endpoint data model&lt;/STRONG&gt; unless CIM field mappings and tags are properly applied.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Recommended actions:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Verify CIM compliance using the &lt;STRONG&gt;CIM Data Model Audit dashboard&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Check if the events contain the required CIM fields such as:&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;user&lt;/LI&gt;&lt;LI&gt;src&lt;/LI&gt;&lt;LI&gt;dest&lt;/LI&gt;&lt;LI&gt;process&lt;/LI&gt;&lt;LI&gt;action&lt;/LI&gt;&lt;/UL&gt;&lt;LI&gt;Ensure proper &lt;STRONG&gt;event tags&lt;/STRONG&gt; are applied (for example: authentication, process, change, etc.).&lt;/LI&gt;&lt;LI&gt;If necessary, create &lt;STRONG&gt;field aliases or eventtype mappings&lt;/STRONG&gt; to align the sourcetypes with the Endpoint data model.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;For example, verify whether your events appear in the data model:&lt;/P&gt;&lt;P&gt;| datamodel Endpoint Authentication search&lt;/P&gt;&lt;P&gt;If no results appear, the events are not mapped correctly to CIM.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Mar 2026 08:08:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Entreprise-Seurity-Not-Generating-Notables/m-p/759096#M12852</guid>
      <dc:creator>azadsarker</dc:creator>
      <dc:date>2026-03-08T08:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: Entreprise Seurity Not Generating Notables</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Entreprise-Seurity-Not-Generating-Notables/m-p/759102#M12853</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Thank you for your time and reply.&lt;/P&gt;&lt;P&gt;After further verification, it turns out that linux syslog logs don't generate deep logs about the filesystem and processes, so the logs will never trigger those correlation searches as the required data are not sent.&lt;/P&gt;&lt;P&gt;what i found on reddit is some people recommending the installation of Sysmon, as it monitors and logs the required data. i did install Sysmon and i installed Sysmon add-on for linux on Splunk and used the sysmon-linux sourcetype.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This really helped and now the correlation searches are being perfectly triggered.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Mar 2026 13:51:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Entreprise-Seurity-Not-Generating-Notables/m-p/759102#M12853</guid>
      <dc:creator>fedayn05</dc:creator>
      <dc:date>2026-03-08T13:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: Entreprise Seurity Not Generating Notables</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Entreprise-Seurity-Not-Generating-Notables/m-p/759108#M12854</link>
      <description>&lt;P&gt;OK. Of those three locations only the audit.log contains fairly standardized data.&lt;/P&gt;&lt;P&gt;But.&lt;/P&gt;&lt;P&gt;There are several different types of events there.&lt;/P&gt;&lt;P&gt;1. SELinux alerts&lt;/P&gt;&lt;P&gt;2. PAM events&lt;/P&gt;&lt;P&gt;3. auditd logs&lt;/P&gt;&lt;P&gt;Usefulness of SELinux alerts depends on your SELinux policy (and whether SELinux is enabled at all).&lt;/P&gt;&lt;P&gt;Auditd must be explicitly configured with audit rules to produce meaningful output.&lt;/P&gt;&lt;P&gt;So this single file can be tricky to configure.&lt;/P&gt;&lt;P&gt;And the two other files can contain plethora of various event formats from different daemons on your system depending on what you have installed and how your system is configured. I assume it's some debian-based distro because normal RH-based one doesn't even have /var/log/syslog.&lt;/P&gt;&lt;P&gt;So it's a bit more complicated than just installing "something" and having it work.&lt;/P&gt;&lt;P&gt;Sysmon is... well, that's a completely different story. I'd be very cautious about it since it's a very low-level external tool and requires a decent configuration to produce meaningful output but not overstress the system.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Mar 2026 21:38:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Entreprise-Seurity-Not-Generating-Notables/m-p/759108#M12854</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2026-03-08T21:38:00Z</dc:date>
    </item>
  </channel>
</rss>

