Hello,
I have onboarded activity logs from an azure subcription to splunk using Azure monitor addon for splunk, https://splunkbase.splunk.com/app/3534/#/details , and the logs are parsed into below sourcetypes,
amal:administrative
amal:serviceHealth
amal:resourceHealth
amal:security
amal:ascRecommendation
amal:ascAlert
Is there a CIM model for these sourcetypes? If not, how should CIM compliance be validated?
Take a look at these apps:
https://splunkbase.splunk.com/app/2968/
https://splunkbase.splunk.com/app/2962/
This APP is not CIM compliant. You need to ask the creator, or associate yourself with CIM.
Good luck!