Splunk Enterprise Security

Symantec endpoint protection - CIM compliance

Communicator

Hello,
I am collecting SEP data from the next sources :

symantec:ep:behavior:file
symantec:ep:agent:file
symantec:ep:scan:file
symantec:ep:agt_system:file
symantec:ep:security:file
symantec:ep:risk:file
symantec:ep:scm_system:file
symantec:ep:proactive:file
symantec:ep:policy:file

In my dedicated index "Symantec" i can see events about symantec:ep:scan:file, which supposed to be normalized to "Malware" datamodel according to the docs docs.
I can also see the "malware" tag, as well as the "attack" tag.
For some reason, when i query the datamodel, i don't see any sign for symantec logs.
The Intrusion Detection datamodel for example, does has symantec logs .

Can anyone help me figuring this out ?

Thanks !!

SplunkTrust
SplunkTrust

Is the issue resolved now? if so could you accept the solution, else provide further inputs so we can assit.

0 Karma

Communicator

Hi,
I have some issues to implement your suggestion, but as soon as i will try it, i will update the question.

Thanks !

0 Karma

SplunkTrust
SplunkTrust

You need to configure the index/sourcetypes to be used in the datamodel.

In the Enterprise Security App, navigate to Confgure->CIM Setup and select your Intrusion detection and add your index there. You need to do the same for other datamodels as well as per https://docs.splunk.com/Documentation/AddOns/released/SymantecEP/Sourcetypes

0 Karma