Getting Data In

CIM mapping CrowdStrike Falcon FileVantage (FIM) logs to a daamodel.

becksyboy
Contributor

Hi All,

Has anyone managed to map CrowdStrike Falcon FileVantage (FIM) logs to a Datamodel; if so could you share your field mappings? We were looking at he Change DM, would this be the best option? 

thanks

Labels (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @becksyboy ,

yes probably the Change DM is the best fit, but probably also the Authentication DM is useful, it depends on your Use Cases.

Ciao.

Giuseppe

View solution in original post

gcusello
SplunkTrust
SplunkTrust

hi @becksyboy ,

are you using the CrowdStrike Falcon FileVantage Technical Add-On ( https://splunkbase.splunk.com/app/7090 )?

if yes, this add-on should be already CIM compliant, but it isn.t true because in the add-on there isn't tags.conf and eventtypes.conf.

Anyway, I usually use to normalize data the SA-CIM_vladiator app ( https://splunkbase.splunk.com/app/2968 ) , that guides you in the normalization activity.

Ciao.

Giuseppe

0 Karma

becksyboy
Contributor

Hi @gcusello yep we noticed the TA did not do CIM mapping 😶

In terms of FIM monitoring would you say the Change DM is the best fit, seems like it to me.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @becksyboy ,

yes probably the Change DM is the best fit, but probably also the Authentication DM is useful, it depends on your Use Cases.

Ciao.

Giuseppe

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...