Splunk Search

vendor_action Field

splunkymcsnypr
Engager

Hi!
I'm trying to find more information about the vendor_action field, however I've not managed to do so with much success. If anyone has any insight in terms of cyber value and mapping to use cases that would be really helpful. Does there exist a taxonomy for this field?

Labels (3)
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @splunkymcsnypr,

Common Information Model has an action field that expects "allowed", "blocked" or "teardown" values. Device that sends these events with action field may have other convention like "accept", "deny", "close", etc. 

vendor_action field keeps original event action values that one may need to know original action value.

If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...