Splunk Enterprise Security

Symantec endpoint protection - CIM compliance

astatrial
Contributor

Hello,
I am collecting SEP data from the next sources :

symantec:ep:behavior:file
symantec:ep:agent:file
symantec:ep:scan:file
symantec:ep:agt_system:file
symantec:ep:security:file
symantec:ep:risk:file
symantec:ep:scm_system:file
symantec:ep:proactive:file
symantec:ep:policy:file

In my dedicated index "Symantec" i can see events about symantec:ep:scan:file, which supposed to be normalized to "Malware" datamodel according to the docs docs.
I can also see the "malware" tag, as well as the "attack" tag.
For some reason, when i query the datamodel, i don't see any sign for symantec logs.
The Intrusion Detection datamodel for example, does has symantec logs .

Can anyone help me figuring this out ?

Thanks !!

lakshman239
Influencer

Is the issue resolved now? if so could you accept the solution, else provide further inputs so we can assit.

0 Karma

astatrial
Contributor

Hi,
I have some issues to implement your suggestion, but as soon as i will try it, i will update the question.

Thanks !

0 Karma

lakshman239
Influencer

You need to configure the index/sourcetypes to be used in the datamodel.

In the Enterprise Security App, navigate to Confgure->CIM Setup and select your Intrusion detection and add your index there. You need to do the same for other datamodels as well as per https://docs.splunk.com/Documentation/AddOns/released/SymantecEP/Sourcetypes

0 Karma
Get Updates on the Splunk Community!

.conf25 Registration is OPEN!

Ready. Set. Splunk! Your favorite Splunk user event is back and better than ever. Get ready for more technical ...

Detecting Cross-Channel Fraud with Splunk

This article is the final installment in our three-part series exploring fraud detection techniques using ...

Splunk at Cisco Live 2025: Learning, Innovation, and a Little Bit of Mr. Brightside

Pack your bags (and maybe your dancing shoes)—Cisco Live is heading to San Diego, June 8–12, 2025, and Splunk ...