Source types for the Splunk Add-on for Box
The Splunk Add-on for Box provides the index-time and search-time knowledge for Box events, metadata, user and group information, collaboration data, and tasks in the following formats.
Source type | Description | CIM data models |
---|---|---|
box:events
|
Box enterprise audit events | Authentication Change Alerts DataAccess Malware |
box:file
|
Box file metadata | Inventory |
box:fileComment
|
Box file comments information | Inventory |
box:fileTask
|
Task information about box files | Inventory |
box:folder
|
Box file and folder metadata | Inventory |
box:folderCollaboration
|
Box collaboration information on folders | Inventory |
box:groups
|
Box group information | Inventory |
box:users
|
Box user information | Inventory |
box:addon:log
|
Splunk Add-on for Box internal log | none |
box:addon:setup:log
|
Splunk Add-on for Box internal installation log | none |
About the Splunk Add-on for Box | Release notes for the Splunk Add-on for Box |
This documentation applies to the following versions of Splunk® Supported Add-ons: released, released
Feedback submitted, thanks!