<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk TA for Symantec Brightmail in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477651#M140377</link>
    <description>&lt;P&gt;I haven't find any TA or Regex posted in community.&lt;/P&gt;</description>
    <pubDate>Sun, 23 Feb 2020 08:35:34 GMT</pubDate>
    <dc:creator>laklubinsplunk</dc:creator>
    <dc:date>2020-02-23T08:35:34Z</dc:date>
    <item>
      <title>Splunk TA for Symantec Brightmail</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477649#M140375</link>
      <description>&lt;P&gt;Anyone have TA for Symantec brightmail.&lt;/P&gt;</description>
      <pubDate>Sun, 07 Jun 2020 01:50:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477649#M140375</guid>
      <dc:creator>laklubinsplunk</dc:creator>
      <dc:date>2020-06-07T01:50:31Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk TA for Symantec Brightmail</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477650#M140376</link>
      <description>&lt;P&gt;&lt;A href="https://answers.splunk.com/answers/143900/symantec-brightmail-gateway-sbg-field-extraction.html" target="_blank"&gt;manual regex&lt;/A&gt;&lt;BR /&gt;
&lt;A href="https://support.symantec.com/us/en/article.tech232772.html" target="_blank"&gt;verdict message&lt;/A&gt;&lt;BR /&gt;
&lt;A href="https://www.symantec.com/connect/forums/untested-logs" target="_blank"&gt;UNTESTED&lt;/A&gt;&lt;BR /&gt;
&lt;A href="http://alec.dhuse.com/wp/2016/09/22/splunk-field-extractions-for-symantec-messaging-gateway-a-k-a-brightmail-syslogs/" target="_blank"&gt;splunk-field-extractions-for-symantec-messaging-gateway-a-k-a-brightmail-syslogs&lt;/A&gt;&lt;BR /&gt;
&lt;A href="https://support.symantec.com/us/en/article.howto15282.html" target="_blank"&gt;Log format of message audit logs for remote syslog&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;previous answers makes REGEX. &lt;BR /&gt;
I collect some relative links.&lt;BR /&gt;
I don't know TA. Please tell me if you find.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;|makeresults
| eval _raw="14:45 Symantec_Brightmail &amp;lt;142&amp;gt;Jul 3 14:51:36 mailrelay ecelerity: 1341316296|c0a88701-b7cedae000003dec-a7-4ff2dcc83a30|ACCEPT|192.168.115.130:51998
14:45 Symantec_Brightmail &amp;lt;142&amp;gt;Jul 3 14:51:14 mailrelay bmserver: 1341316274|c0a88701-b7cedae000003dec-91-4ff2dcb2aaaf|VERDICT|xxx123@gmail.com|senderauth_batv_sign|default|static bounce attack prevention sign
14:45 Symantec_Brightmail &amp;lt;142&amp;gt;Jul 3 14:51:10 mailrelay bmserver: 1341316270|c0a88701-b7cedae000003dec-8c-4ff2dcae65dc|VERDICT|mir@mac.com|senderauth_batv_sign|default|static bounce attack prevention sign
14:45 Symantec_Brightmail &amp;lt;142&amp;gt;Jul 3 14:51:15 mailrelay ecelerity: 1341316275|c0a88701-b7cedae000003dec-92-4ff2dcb3dfaa|ACCEPT|192.168.115.132:51723
14:45 Symantec_Brightmail &amp;lt;142&amp;gt;Jul 3 14:51:05 mailrelay ecelerity: 1341316265|c0a88701-b7cedae000003dec-86-4ff2dca8f358|DELIVER|212.199.239.178:25|edi@perry5y.co.il
14:44 Symantec_Brightmail &amp;lt;142&amp;gt;Jul 3 14:50:53 mailrelay ecelerity: 1341316221|c0a88701-b7cedae000003dec-52-4ff2dc7c9c9d|SENDER|shlomy1006+caf_=sshahar=xyx.il@gmail.com
14:44 Symantec_Brightmail &amp;lt;142&amp;gt;Jul 3 14:50:44 mailrelay bmserver: 1341316244|c0a88701-b7cedae000003dec-71-4ff2dc941242|VERDICT|m32@wanna.com|senderauth_batv_sign|default|static bounce attack prevention sign
14:45 Symantec_Brightmail &amp;lt;142&amp;gt;Jul 3 14:51:14 mailrelay bmserver: 1341316274|c0a88701-b7cedae000003dec-91-4ff2dcb2aaaf|VERDICT|rgakanov@gmail.com|senderauth_batv_sign|default|static bounce attack prevention sign"
| makemv delim="
" _raw
| stats count by _raw
| eval _raw=replace(_raw,".*&amp;gt;","")
| rename COMMENT as "this is sample, https://www.symantec.com/connect/forums/format-smg-log-output"
| rex "(?&amp;lt;timeStamp&amp;gt;^.+) mailrelay (?&amp;lt;mta&amp;gt;\S+): (?&amp;lt;sessionId&amp;gt;\d+)\|(?&amp;lt;auditId&amp;gt;.*?)\|(?&amp;lt;msg&amp;gt;.*)"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;this is sample, &lt;BR /&gt;
For &lt;EM&gt;bmserver&lt;/EM&gt; log, basically this format.&lt;BR /&gt;
so, extract &lt;CODE&gt;msg&lt;/CODE&gt; to as_you_like.&lt;BR /&gt;
Of course the connection log is separate, so it needs to extract the fields with it.&lt;/P&gt;

&lt;P&gt;Want to make a TA?&lt;BR /&gt;
I'll help you&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 04:16:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477650#M140376</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-09-30T04:16:27Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk TA for Symantec Brightmail</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477651#M140377</link>
      <description>&lt;P&gt;I haven't find any TA or Regex posted in community.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2020 08:35:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477651#M140377</guid>
      <dc:creator>laklubinsplunk</dc:creator>
      <dc:date>2020-02-23T08:35:34Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk TA for Symantec Brightmail</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477652#M140378</link>
      <description>&lt;P&gt;@to4kawa  do you the TA ?&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2020 08:44:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477652#M140378</guid>
      <dc:creator>laklubinsplunk</dc:creator>
      <dc:date>2020-03-30T08:44:46Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk TA for Symantec Brightmail</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477653#M140379</link>
      <description>&lt;P&gt;I don't have TA and logs.&lt;BR /&gt;
but If there is logs, we can extract fields.&lt;BR /&gt;
mail is  sensitive, these must sanitize.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2020 09:02:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477653#M140379</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-03-30T09:02:20Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk TA for Symantec Brightmail</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477654#M140380</link>
      <description>&lt;P&gt;Hi everybody!&lt;/P&gt;

&lt;P&gt;We are using the following field extraction, in compliance with &lt;A href="https://docs.splunk.com/Documentation/CIM/4.15.0/User/Email"&gt;CIM&lt;/A&gt;(1):&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;^\&amp;lt;\d+\&amp;gt;(?:.+\d+:\d+:\d+)\s+(?&amp;lt;dvc&amp;gt;\w+)\s+(?&amp;lt;process&amp;gt;[a-z]+)\[(?&amp;lt;process_number&amp;gt;\d+)\]:\s+(?&amp;lt;process_id&amp;gt;[^\|]+)\|(?&amp;lt;internal_message_id&amp;gt;[^\|]+)\|(?&amp;lt;message_info&amp;gt;\w+[^\|])?\|?(?&amp;lt;x1&amp;gt;[^\|]+)?\|?(?&amp;lt;x2&amp;gt;[^\|]+)?\|?(?&amp;lt;x3&amp;gt;[^\|]+)?\|?(?&amp;lt;xn&amp;gt;[^$|\s]+.*)?$
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;We define the fields like ´{field}=value´ and we always use subsearch to find something :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=smg IRCPTACTION

       [search sourcetype=smg *gmail.com | stats count by internal_message_id| table internal_message_id]

| eval {message_info}=x1, audit_id=internal_message_id
| transaction audit_id maxpause=15min
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;We tried another &lt;A href="http://alec.dhuse.com/wp/2016/09/"&gt;regex&lt;/A&gt;, but it doesn't have all fields like SPF, DKIM and DMARC.&lt;/P&gt;

&lt;P&gt;1 &lt;A href="https://docs.splunk.com/Documentation/CIM/4.15.0/User/Email"&gt;https://docs.splunk.com/Documentation/CIM/4.15.0/User/Email&lt;/A&gt;&lt;BR /&gt;
2 &lt;A href="http://alec.dhuse.com/wp/2016/09/"&gt;http://alec.dhuse.com/wp/2016/09/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2020 19:55:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477654#M140380</guid>
      <dc:creator>sandroherman</dc:creator>
      <dc:date>2020-04-20T19:55:40Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk TA for Symantec Brightmail</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477655#M140381</link>
      <description>&lt;P&gt;thanks &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/58688"&gt;@sandroherman&lt;/a&gt; &lt;BR /&gt;
I haven't know the audit_id of SMG is the internal_message_id.&lt;/P&gt;

&lt;P&gt;but there is many &lt;CODE&gt;xn&lt;/CODE&gt;, &lt;EM&gt;transformes.conf&lt;/EM&gt; field extraction is better, I guess.&lt;/P&gt;

&lt;P&gt;Making summary index by report, this is best practice.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 05:06:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477655#M140381</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-09-30T05:06:38Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk TA for Symantec Brightmail</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477656#M140382</link>
      <description>&lt;P&gt;Hi. Did you create the summary index? which query did you use&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2020 20:58:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477656#M140382</guid>
      <dc:creator>sandroherman</dc:creator>
      <dc:date>2020-04-27T20:58:39Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk TA for Symantec Brightmail</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477657#M140383</link>
      <description>&lt;P&gt;hi @sandroherman&lt;BR /&gt;
I haven't done it yet.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;....
| stats values(SENDER) as from values(RECIPIENT) as to values(SUBJECT) as subject values(FIRED) as fired by audit_id
| eval to=mvjoin(to,";"), fired=mvjoin(split(fired,"|"),"; ")
| collect smg_index
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;There are more fields, this is for example.&lt;/P&gt;

&lt;P&gt;Do you have sample logs?&lt;BR /&gt;
I'll extract fields and make the query.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2020 21:57:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477657#M140383</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-04-27T21:57:44Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk TA for Symantec Brightmail</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477658#M140384</link>
      <description>&lt;P&gt;Look this link:&lt;BR /&gt;
&lt;A href="https://regex101.com/r/kR0iS8/1"&gt;https://regex101.com/r/kR0iS8/1&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Do you prefer stats against transaction? And about events out of window time?&lt;/P&gt;

&lt;P&gt;are you aware of this information?&lt;BR /&gt;
"All events in a summary index have stash as their default source type. If you use a command like collect to change their source type to anything other than stash, you will incur license usage charges for those events".&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 13:20:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477658#M140384</guid>
      <dc:creator>sandroherman</dc:creator>
      <dc:date>2020-04-28T13:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk TA for Symantec Brightmail</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477659#M140385</link>
      <description>&lt;P&gt;thanks &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/58688"&gt;@sandroherman&lt;/a&gt;&lt;/P&gt;

&lt;P&gt;I see license issue.&lt;/P&gt;

&lt;P&gt;for example:&lt;BR /&gt;
1. create summary index&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;....
| stats min(_time) as _time value(*) as * by message_id
| eval summary_name="SMG_index"
| collect
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;OL&gt;
&lt;LI&gt;&lt;P&gt;search summary_index&lt;/P&gt;

&lt;P&gt;index=stash summary_name=SMG_index "you want"&lt;/P&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;How's this?&lt;/P&gt;

&lt;P&gt;and &lt;CODE&gt;transaction&lt;/CODE&gt; is too slow. SMG audit_id(message_id in your REGEX) is unique.&lt;BR /&gt;
&lt;CODE&gt;stats&lt;/CODE&gt; is better. &lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 05:14:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/477659#M140385</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-09-30T05:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk TA for Symantec Brightmail</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/539145#M152501</link>
      <description>&lt;P&gt;I am working on brand new Symantec Messaging Gateway (Brightmail) TA right now.&amp;nbsp; Once its done I will share it! This one si more comprehensive than the one currenlty available on Splunkbase.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2021 11:28:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-for-Symantec-Brightmail/m-p/539145#M152501</guid>
      <dc:creator>tomasmoser</dc:creator>
      <dc:date>2021-02-09T11:28:26Z</dc:date>
    </item>
  </channel>
</rss>

