Splunk Enterprise Security

How to get IIS events into Enterprise Security App

asonenthal
New Member

Splunkers,

I am trying to get IIS log W3C log events into Enterprise Security App. I made the IIS events an eventtype with tag: web, and made the following field aliases:

c_ip as src
cs_Cookie as cookie
cs_Referer as http_referrer
cs_User_Agent as http_user_agent
cs_bytes as bytes_in
s_ip as dest
cs_method as http_method
cs_uri_stem as uri_path
s_sitename as site
sc_bytes as bytes_out
sc_status as status
cs_username as user

I made the permissions as wide as possible, but after a reboot ESA still does not see the data as for example the ESA HTTP User Agent Analysis remains blank. What am I doing wrong?

0 Karma

esix_splunk
Splunk Employee
Splunk Employee

As mentioned, you need to have these events tagged for web and proxy for ES. You should refer to the documentation for ES's dashboards for how your data should be tagged to appear in these correctly.

http://docs.splunk.com/Documentation/ES/3.2.1/User/MoreNetworkdashboards

http://docs.splunk.com/Documentation/CIM/4.1.0/User/Web

0 Karma

MinaMina
New Member

Hello,
I also need to get IIS logs into Splunk ES app, which add-on did you used ?
Thx,

0 Karma

LukeMurphey
Champion

The web data model was intended for use with proxy log and thus requires two tags: web and proxy.

Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...