Are there best practices when mapping PaloAlto firewall logs toCIMdatamodels?
One think that I noticed is that Network_Traffic maps anything with tag="network" and tag="communicate". This m...
...ost folks likely don’t massage data prior to a forwarder picking up thedata. Perhaps then, thenormalization, if you will, occurs just prior to indexing? Or perhaps during query? Maybe it’s possible e...
...S_Email tag associated tothem . Now, A new source needs to be fed into thedataModel. The fields of the new source are cim compatible but are not fed into thedataModel. And I checked the...
Need help on enterprise security. Is there a way to create a standard TAXII Parser that can do correlation searches of logs coming from Maritime Transportation System ISAC & logs coming from S...
I had encoutered an interesting question from my client/security SME 1. Which one is better. To have Splunk Security Essentials or to retain Enterprise Security + Content updates? 2. Where are the...
...and correlation searches. I understand once we normalizethe incoming data according toCIM compatible. Splunk automatically links with the particular datamodel based on tags for example M...