I'm reviewing the logs to make sure the fields match the Splunk Enterprise Security CIM and datamodels.
The query shows me this percentage, understanding that they are the fields that are required versus the fields that it is finding, in this order of ideas, to adjust these fields I must create an alias or I must perform an "extract" either by regular expressions or tabs?
Per documentation, for example the action field in network traffic datamodel, prescribed values are allowed, blocked and teardown. But you have many values under action field. As suggested above, you can create a calculated field like
| eval action=case((action="xxx" OR action="yyy"),"allowed",1=1,"blocked")
Doing this on all recommended fields will increase you compliance %
Per documentation, for example the action field in network traffic datamodel, prescribed values are allowed, blocked and teardown. But you have many values under action field. As suggested above, you can create a calculated field like
| eval action=case((action="xxx" OR action="yyy"),"allowed",1=1,"blocked")
Doing this on all recommended fields will increase you compliance %
Yes, you need to extract fields or create aliases to increase your CIM compliance.