Hi All ,
I am trying to get DNS data into Splunk Enterprise Security 4.5
we already have Windows Server DNS logs in Splunk Enterprise, can we map the same data into Enterprise Security?
if yes, what is the procedure? is there any Add-on to configure it?
Looked into the Splunk Add-on for Bro IDS but it didn't meet my requirement!
I haven't used this but it does appear to have the CIM mappings you'll need:
I do not have an ES instance in front of me at the moment but DNS activity dashboard should be using specific sourcetype
searches to find the corresponding data.
i know the source type and index aswel which is related to DNS activity, my question is how to map them into Enterprise security ?
They should be mapped automatically because the built-in searches are looking for a specific set of sourcetypes.
1.Yes,i'm using windows TA
2.Via search
example: index =win_dns*
yes i can see the events when i do this search