<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Enterprise Security: How to ingest firewall ,waf ,ssandbox ,email gateway, endpoints logs to datamodels in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495809#M8566</link>
    <description>&lt;P&gt;Thanks for the info but i tried malware dashbnoard with CIM malware index and tag =malware tag=attack....however it doesnot shows the malware detected by  trendmicro deep discovery analyzer.&lt;/P&gt;

&lt;P&gt;i have checked app as smtp , signature ,policy but no way i am tired of this datamodels even though mu dashboard like&lt;BR /&gt;
intrusin center &lt;BR /&gt;
malware&lt;BR /&gt;
network resolution DNS&lt;BR /&gt;
vulnearbilites &lt;BR /&gt;
risk&lt;BR /&gt;
threat &lt;BR /&gt;
endpoint &lt;BR /&gt;
DLP &lt;BR /&gt;
dashboards are showing some data but   i need to have real time datas from deep discovery analyszer , trendmicro apex central, firewalls , fortinet , trendmicro waf....&lt;/P&gt;

&lt;P&gt;not sure what to do ....also because of ES now my indexer has also started crashing...&lt;/P&gt;</description>
    <pubDate>Wed, 16 Oct 2019 19:10:46 GMT</pubDate>
    <dc:creator>RK_sp1unk</dc:creator>
    <dc:date>2019-10-16T19:10:46Z</dc:date>
    <item>
      <title>Splunk Enterprise Security: How to ingest firewall ,waf ,ssandbox ,email gateway, endpoints logs to datamodels</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495804#M8561</link>
      <description>&lt;P&gt;How can I ingest firewall ,waf ,ssandbox ,email gateway, endpoints logs to Splunk ES datamodels?&lt;/P&gt;

&lt;P&gt;I am trying to work on Splunk  ES dashboards with the below details:&lt;/P&gt;

&lt;P&gt;WAF Issues&lt;BR /&gt;
Firewall Issues&lt;BR /&gt;
Malware Reports&lt;BR /&gt;
DLP Activities&lt;BR /&gt;
DDAN&lt;/P&gt;

&lt;P&gt;These are the sources to look for:&lt;/P&gt;

&lt;P&gt;• network traffic : (firewall ip address) (proxy: ip address) (imsva (mail gatewa) ip address - shqimsva), ip address&lt;BR /&gt;
• malware: ip address (apex central - index is trendmicro) proxy and mail gateway , ip address&lt;BR /&gt;
• dlp: ip address  (apex central - index trendmicro), mail gateway [DLP_Credit Card info]  - &lt;BR /&gt;
• waf = ip address &lt;BR /&gt;
• web center (waf, iwsva proxy ip address)&lt;/P&gt;

&lt;P&gt;Dashboards are not loading details about the above logs.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2019 17:05:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495804#M8561</guid>
      <dc:creator>RK_sp1unk</dc:creator>
      <dc:date>2019-10-11T17:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to ingest firewall ,waf ,ssandbox ,email gateway, endpoints logs to datamodels</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495805#M8562</link>
      <description>&lt;P&gt;First you need to make sure your data is CIM (Common Information Model) compliant. This is to normalize the data so you are using the same field values for the datamodel. You will want to look at each data model for the Common names and then check your data that corresponds to that datamodel. &lt;A href="https://docs.splunk.com/Documentation/CIM/4.13.0/User/Overview"&gt;https://docs.splunk.com/Documentation/CIM/4.13.0/User/Overview&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Example for Network Datamodel: &lt;A href="https://docs.splunk.com/Documentation/CIM/4.13.0/User/NetworkTraffic"&gt;https://docs.splunk.com/Documentation/CIM/4.13.0/User/NetworkTraffic&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;The data also needs to be tagged properly. Network traffic has the tag of network and communication. This is typically done through the app but you will need to check this as well.&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/7770i945CB624D0FC572B/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;This is is where I would start and move through each datamodel and data source you are having issues with.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2019 17:28:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495805#M8562</guid>
      <dc:creator>jdhunter</dc:creator>
      <dc:date>2019-10-11T17:28:42Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to ingest firewall ,waf ,ssandbox ,email gateway, endpoints logs to datamodels</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495806#M8563</link>
      <description>&lt;P&gt;where can we get all the indexes details about all datamodels in CIM&lt;/P&gt;</description>
      <pubDate>Sat, 12 Oct 2019 08:42:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495806#M8563</guid>
      <dc:creator>RK_sp1unk</dc:creator>
      <dc:date>2019-10-12T08:42:45Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to ingest firewall ,waf ,ssandbox ,email gateway, endpoints logs to datamodels</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495807#M8564</link>
      <description>&lt;P&gt;how to make sureor check that  your data is CIM (Common Information Model) compliant&lt;/P&gt;</description>
      <pubDate>Sat, 12 Oct 2019 08:45:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495807#M8564</guid>
      <dc:creator>RK_sp1unk</dc:creator>
      <dc:date>2019-10-12T08:45:11Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to ingest firewall ,waf ,ssandbox ,email gateway, endpoints logs to datamodels</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495808#M8565</link>
      <description>&lt;P&gt;Search the data in question to make sure fields, for the datamodel they need to be a part, exist. Also check the for the field &lt;STRONG&gt;tag&lt;/STRONG&gt;. The data needs to be tagged appropriately for that data model as well (tag=network and communicate). So your firewall data should follow the Network traffic data model. If the firewall has an IPS/IDS and that data is sent to Splunk, it will need to follow the datamodel Intrusion Detection field names and tags=ids and attack.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Oct 2019 14:42:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495808#M8565</guid>
      <dc:creator>jdhunter</dc:creator>
      <dc:date>2019-10-14T14:42:00Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to ingest firewall ,waf ,ssandbox ,email gateway, endpoints logs to datamodels</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495809#M8566</link>
      <description>&lt;P&gt;Thanks for the info but i tried malware dashbnoard with CIM malware index and tag =malware tag=attack....however it doesnot shows the malware detected by  trendmicro deep discovery analyzer.&lt;/P&gt;

&lt;P&gt;i have checked app as smtp , signature ,policy but no way i am tired of this datamodels even though mu dashboard like&lt;BR /&gt;
intrusin center &lt;BR /&gt;
malware&lt;BR /&gt;
network resolution DNS&lt;BR /&gt;
vulnearbilites &lt;BR /&gt;
risk&lt;BR /&gt;
threat &lt;BR /&gt;
endpoint &lt;BR /&gt;
DLP &lt;BR /&gt;
dashboards are showing some data but   i need to have real time datas from deep discovery analyszer , trendmicro apex central, firewalls , fortinet , trendmicro waf....&lt;/P&gt;

&lt;P&gt;not sure what to do ....also because of ES now my indexer has also started crashing...&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2019 19:10:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495809#M8566</guid>
      <dc:creator>RK_sp1unk</dc:creator>
      <dc:date>2019-10-16T19:10:46Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to ingest firewall ,waf ,ssandbox ,email gateway, endpoints logs to datamodels</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495810#M8567</link>
      <description>&lt;P&gt;If you are having issues with the stability of your environment, I would open a Support case.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2019 19:25:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495810#M8567</guid>
      <dc:creator>jdhunter</dc:creator>
      <dc:date>2019-10-16T19:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to ingest firewall ,waf ,ssandbox ,email gateway, endpoints logs to datamodels</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495811#M8568</link>
      <description>&lt;P&gt;can you give an example showing how do you map data in datamodels using your network devices as source. &lt;/P&gt;

&lt;P&gt;for ex:source is trendmicro, data model is malware how can you configure the datamodel.&lt;/P&gt;</description>
      <pubDate>Sat, 19 Oct 2019 12:38:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495811#M8568</guid>
      <dc:creator>RK_sp1unk</dc:creator>
      <dc:date>2019-10-19T12:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to ingest firewall ,waf ,ssandbox ,email gateway, endpoints logs to datamodels</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495812#M8569</link>
      <description>&lt;P&gt;You need this app:&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/2968/"&gt;https://splunkbase.splunk.com/app/2968/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2019 08:32:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495812#M8569</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-10-22T08:32:35Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to ingest firewall ,waf ,ssandbox ,email gateway, endpoints logs to datamodels</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495813#M8570</link>
      <description>&lt;P&gt;When you search your trend micro data, does this data have a tag field? You will see this on the left hand side when searching your data as Selected fields or Interesting fields. If you are having issues with your Splunk server, I would recommend calling support and asking for assistance in making changes to your datamodels as this can impact the performance of your Splunk environment.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2019 15:02:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495813#M8570</guid>
      <dc:creator>jdhunter</dc:creator>
      <dc:date>2019-10-28T15:02:42Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to ingest firewall ,waf ,ssandbox ,email gateway, endpoints logs to datamodels</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495814#M8571</link>
      <description>&lt;P&gt;You are asking multiple questions at once that are very vague. It would be helpful to have a question with each specific source you are working with allowing those with experience in specific technologies to help you. For the portion of your sources that happen to be syslog based connections you may want to check out the new Splunk Connect for Syslog&lt;BR /&gt;
&lt;A href="https://splunk-connect-for-syslog.readthedocs.io/en/latest/sources/"&gt;https://splunk-connect-for-syslog.readthedocs.io/en/latest/sources/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2019 16:03:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495814#M8571</guid>
      <dc:creator>rfaircloth_splu</dc:creator>
      <dc:date>2019-10-28T16:03:46Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to ingest firewall ,waf ,ssandbox ,email gateway, endpoints logs to datamodels</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495815#M8572</link>
      <description>&lt;P&gt;thanks for the info but it seems &lt;/P&gt;

&lt;P&gt;• Asset and Identity has not been configured that results in showing unknown values in many dashboards&lt;BR /&gt;
• Data Mapping  and Normalization has not been done properly&lt;BR /&gt;
the above issues needs to be resolved first do you have any idea on this&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2019 19:54:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495815#M8572</guid>
      <dc:creator>RK_sp1unk</dc:creator>
      <dc:date>2019-10-29T19:54:51Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to ingest firewall ,waf ,ssandbox ,email gateway, endpoints logs to datamodels</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495816#M8573</link>
      <description>&lt;P&gt;Because this is a new install I would suggest connecting with your SE who may recommend services time to assist in initial deployment.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2019 20:43:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495816#M8573</guid>
      <dc:creator>rfaircloth_splu</dc:creator>
      <dc:date>2019-10-29T20:43:38Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to ingest firewall ,waf ,ssandbox ,email gateway, endpoints logs to datamodels</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495817#M8574</link>
      <description>&lt;P&gt;Dear Friend,&lt;/P&gt;

&lt;P&gt;Thanks for the info, this is not a new implementation, we had ES 4.7 installled and now it is upgraded to 5.2.2, exisitng splunk enterprise is 7.2.1&lt;/P&gt;

&lt;P&gt;We are having difficulties in data mapping and data normalisations.&lt;/P&gt;

&lt;P&gt;Regards,&lt;BR /&gt;
Rahul.K&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2019 05:44:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-ingest-firewall-waf-ssandbox/m-p/495817#M8574</guid>
      <dc:creator>RK_sp1unk</dc:creator>
      <dc:date>2019-10-30T05:44:03Z</dc:date>
    </item>
  </channel>
</rss>

