Splunk Enterprise Security

Splunk Enterprise Security: How to pull DNS data into DNS activity dashboard?

splunkrajkrk
Explorer

Hi All ,

I am trying to get DNS data into Splunk Enterprise Security 4.5
we already have Windows Server DNS logs in Splunk Enterprise, can we map the same data into Enterprise Security?
if yes, what is the procedure? is there any Add-on to configure it?

Looked into the Splunk Add-on for Bro IDS but it didn't meet my requirement!

0 Karma

niemesrw
Path Finder

I haven't used this but it does appear to have the CIM mappings you'll need:

https://splunkbase.splunk.com/app/3208/

0 Karma

adamsaul
Communicator

I do not have an ES instance in front of me at the moment but DNS activity dashboard should be using specific sourcetype searches to find the corresponding data.

0 Karma

splunkrajkrk
Explorer

i know the source type and index aswel which is related to DNS activity, my question is how to map them into Enterprise security ?

0 Karma

adamsaul
Communicator

They should be mapped automatically because the built-in searches are looking for a specific set of sourcetypes.

  1. You are using the Windows TA to pull the DNS server logs into Splunk, correct?
  2. How do you view the current DNS logs, via search or the Windows Infrastructure App?
0 Karma

splunkrajkrk
Explorer

1.Yes,i'm using windows TA
2.Via search
example: index =win_dns*
yes i can see the events when i do this search

0 Karma
Get Updates on the Splunk Community!

Bridging the Gap: Splunk Helps Students Move from Classroom to Career

The Splunk Community is a powerful network of users, educators, and organizations working together to tackle ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Unleash Unified Security and Observability with Splunk Cloud Platform

     Now Available on Microsoft AzureThursday, March 27, 2025  |  11AM PST / 2PM EST | Register NowStep boldly ...