This app is configured for an index with the name of "dlp" so you will need to create the appropriate stanza in your inputs.conf file to direct all the traffic to the below port into the correct index.
From the Symantec DLP system, you will need to setup and configure the "Log to a Syslog Server" response rule under Manage > Response Rules.
Host = IP address for the indexer
Port = Listening udp port on the indexer
Message = ID: $INCIDENT_ID$, Policy Violated: $POLICY$, Count: $MATCH_COUNT$, Protocol: $PROTOCOL$, Recipient: $RECIPIENTS$, Sender: $SENDER$, Severity: $SEVERITY$, Subject: $SUBJECT$, Target: $TARGET$, Filename: $FILE_NAME$, Blocked: $BLOCKED$, Endpoint: $ENDPOINT_MACHINE$
Level = 7 - Debugging
The above "Message" will allow this app to work right out of the box. You may add additional output from Symantec as desired. You will just have to add the additional Field Extractions in Splunk for your new queries to work.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.