Splunk® Supported Add-ons

Splunk Add-on for Check Point OPSEC LEA

Acrobat logo Download manual as PDF


Acrobat logo Download topic as PDF

Lookups for the Splunk Add-on for Check Point OPSEC LEA

The Splunk Add-on for Check Point OPSEC LEA has 5 lookups. The lookup files map fields from OPSEC LEA systems to CIM-compliant values in the Splunk platform. The lookup files are located in: $SPLUNK_HOME/etc/apps/Splunk_TA_checkpoint-opseclea/lookups.

Filename Description
checkpoint_actions_te.csv Maps the te_action field value for the opsec:smartdefense, opsec:threat_emulation, opsec:anti_malware, and opsec:anti_virus source types to action field in CIM models.
checkpoint_audit_actions.csv Maps the vendor operation field for opsec:audit to action field in CIM models.
checkpoint_ids_severity.csv Maps vendor severity to severity field in CIM models for source type opsec:threat_emulation.
checkpoint_opsec_actions.csv Maps the vendor_action field for OPSEC to action field in CIM models for source types opsec and opsec:vpn.
checkpoint_vendor_info.csv Maps source type to add vendor product information.
Last modified on 28 February, 2020
PREVIOUS
Troubleshoot the Splunk Add-on for Check Point OPSEC LEA
 

This documentation applies to the following versions of Splunk® Supported Add-ons: released


Was this documentation topic helpful?

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters