Splunk Enterprise Security

Issue with CIM Mapping for ES

mustafag
Path Finder

I am receiving the EMail logs from Proofpoint Email gateway via syslog. The single email communication include the multiple logs and we can use the one transaction id to create the full events which include the full email communication details.

As this meaningful event can be generated through correlation of transcation id, how can i map this event with CIM and add the necessary tag?

0 Karma

lakshman239
Influencer

Generally the TA should means to extract required eventtype (s) to map to Email data model. If it isn't and you are writting custom TA or updating existing TA, I would suggest not combine all events to get full email transaction, but have one or more events only for inbound email and one or more outbound. This way you can create eventtypes for inbound and outbound and then map them to Email datamodel.

0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...