Splunk Enterprise Security

Adapt the information in my logs to the CIM model so that the data models work

jo54
Explorer

For example, one field of the email data model is "recipient" and it comes from the tag=email.

However, my email information comes from the Microsoft O365 integration, where the recipient information is given in a field called "ExchangeDetails.Recipients{}".

As far as I have been able to understand, I have to modify the "email" tag, in "Event Types" to look in "index=o365 Workload=Exchange" for email related logs. And after that, I have to create an alias so that "ExchangeDetails.Recipients{}" is equivalent to "recipient" as indicated in the data model.

Is that correct?

Thank you for your assistance

0 Karma

venkatasri
SplunkTrust
SplunkTrust

Hi @jo54 

You are correct change the event_type with MS 365 email logs for tag=email and alias it to receipient should work fine.

0 Karma
Get Updates on the Splunk Community!

Take Your Breath Away with Splunk Risk-Based Alerting (RBA)

WATCH NOW!The Splunk Guide to Risk-Based Alerting is here to empower your SOC like never before. Join Haylee ...

SignalFlow: What? Why? How?

What is SignalFlow? Splunk Observability Cloud’s analytics engine, SignalFlow, opens up a world of in-depth ...

Federated Search for Amazon S3 | Key Use Cases to Streamline Compliance Workflows

Modern business operations are supported by data compliance. As regulations evolve, organizations must ...