This app is archived. Learn more
The purpose of this add-on is to provide value to your Microsoft Cloud App Security syslog from Alerts and Activities. This is done by making the logs CIM compliant, adding tagging for Enterprise Security data models, and other knowledge objects to make searching and visualizing this data easy. This add-on assumes you are onboarding the data either using a syslog collector that outputs to a file or using the built-in Splunk TCP/UDP listener (I would highly recommend the former)--the knowledge objects will work for any ingestion method if you use the correct sourcetype. Regardless of ingestion method, you may need to adjust some of the props.conf settings for proper line breaking and timestamp parsing. * Built for Splunk Enterprise 6.x.x or higher * CIM Compliant (CIM 4.0.0 or higher) * Ready for Enterprise Security
(0)
Categories
Created By
Type
Downloads
Licensing
Splunk Answers
Resources