All Apps and Add-ons

Network Traffic vs Endpoint.Ports

madsrc
New Member

Looking at the Network Traffic data model (https://docs.splunk.com/Documentation/CIM/4.13.0/User/NetworkTraffic), it only provides: "The fields and tags in the Network Traffic data model describe flows of data across network infrastructure components."

Looking at the Ports data set in the Endpoint data model (https://docs.splunk.com/Documentation/CIM/4.13.0/User/Endpoint), "The fields and tags in the Endpoint data model describe service or process inventory and state, such as Unix daemons, Windows services, running processes on any OS, or similar systems. "

Does that mean network connections from endpoints shouldn't be mapped to "Network Traffic"?

0 Karma

lkutch_splunk
Splunk Employee
Splunk Employee

Hi! I'm late to the party with this answer, but yes, you can use Endpoint for that. The Endpoint doc has been updated with further details... 

The Endpoint data model is for monitoring endpoint clients including, but not limited to, end-user machines, laptops, and bring your own devices (BYOD). If an event is about an endpoint process, service, file, port, and so on, then it relates to the Endpoint data model. For administrative and policy types of changes to infrastructure security devices, servers, and endpoint detection and response (EDR) systems, see Change.Endpoint in the Change data model.

https://docs.splunk.com/Documentation/CIM/4.18.0/User/Endpoint

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...