All Apps and Add-ons

CylancePROTECT App for Splunk: Is there a way to create a search to filter out results by 1 field and create a table that shows only desired fields?

robpileum
Engager

New to splunk. I've setup CylancePROTECT App for Splunk. You may be familiar with this, but Cylance has “Zones” that it uses to group and classify devices for a client. So we have one portal setup where each client has their own "Zone". I am needing to specify a particular zone in a search string that will filter only devices within that zone and then create a table that lists only these Cylance Fields – Device Name, Created, Is Online, Offline Date, User

I have been messing around and have found that these search strings are close to providing all of the information I need, but I don’t know how to filter or list only the fields that I want. These commands have every field and also lists every time the device comes up in the logs. I just need 1 row per device.

eventtype=cylance_index sourcetype=device | stats list by "Zones" 
eventtype=cylance_index sourcetype=device | stats list by "Device Name"

I would also like to schedule a week/month report for every one of our zones so we’ll know the amount of devices, which are offline and for how long.

marycordova
SplunkTrust
SplunkTrust
  1. what is the actual field name of "Zones"?
  2. define that in your base search
  3. replace the correct field name and value for "Zones" in the searches below
  4. for more help post a sample of the raw data

eventtype=cylance_index sourcetype=device "Zones"=<zone you want> | stats values(*) as * by "Zones"
eventtype=cylance_index sourcetype=device "Zones"=<zone you want> | stats values(*) as * by "Device Name"

@marycordova
0 Karma

TonyLeeVT
Builder

If you want to get a bit more granular as to which fields are displayed, you can specify it in your search. For example:

eventtype=cylance_index sourcetype=device | stats list("Agent Version"), list("Device Name"), list("OS Version"), list("Policy"), list("Files Analyzed") by Zones

Then, if you want to specify the particular zone you want to look at... add it to the start of the search (ex: test zone):

eventtype=cylance_index sourcetype=device zone=test | stats list("Agent Version"), list("Device Name"), list("OS Version"), list("Policy"), list("Files Analyzed") by Zones

You can also end the strings with a "| rename" to pretty up the column headers if desired. I hope that helps.

pspc
Explorer

Hi,

Please refer to the README.md (which is part of the app which you downloaded). At the end of this file is a section about how to report issues or ask questions of support.

Thanks.

0 Karma

robpileum
Engager

Thanks for the advice. The app is configured and working properly. I would think my question would be more related to splunk search functions. I was hoping a splunk guru would be able to see this and assist. Is that not what this question/answer system is designed for?

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...