To configure an Auth Events input for Splunk SIEM, perform the following procedure.
Auth Events requires Carbon Black Cloud Enterprise EDR, and it must be enabled for each policy. For more information, see Investigate - Auth Events.
Procedure
- In the Splunk SIEM console, in the Application Configuration menu, click the Auth Events Input tab.
- To create a new configuration, click the + in the top right corner of the page.
- Enter a name for the configuration.
- Select the API token that you configured in Set up Authentication and Authorization for Splunk SIEM.
Note: Make sure that the Splunk Access Level has the required permissions specified in
API Data Inputs for Auth Events API.
- Select the proxy that you configured in Step 4 of Configure Built-in Inputs for Splunk SIEM. If you are not using a proxy, select None.
- Set Lookback to
0
unless you need to retrieve data from previous days. The default value is 7
days.
- Set the Index to the Base Index name from Carbon Black Cloud Base Configuration; for example,
carbonblackcloud
.
Note: Do not include
index=
.
- Set the Interval to the desired poll cycle. The default value is
300 seconds
.