Splunk Enterprise Security

Adapt the information in my logs to the CIM model so that the data models work

jo54
Explorer

For example, one field of the email data model is "recipient" and it comes from the tag=email.

However, my email information comes from the Microsoft O365 integration, where the recipient information is given in a field called "ExchangeDetails.Recipients{}".

As far as I have been able to understand, I have to modify the "email" tag, in "Event Types" to look in "index=o365 Workload=Exchange" for email related logs. And after that, I have to create an alias so that "ExchangeDetails.Recipients{}" is equivalent to "recipient" as indicated in the data model.

Is that correct?

Thank you for your assistance

0 Karma

venkatasri
SplunkTrust
SplunkTrust

Hi @jo54 

You are correct change the event_type with MS 365 email logs for tag=email and alias it to receipient should work fine.

0 Karma
Get Updates on the Splunk Community!

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...