<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Example of a batch file write to system32 use case? in Security</title>
    <link>https://community.splunk.com/t5/Security/Example-of-a-batch-file-write-to-system32-use-case/m-p/473150#M10948</link>
    <description>&lt;P&gt;Added related videos. &lt;/P&gt;</description>
    <pubDate>Fri, 25 Oct 2019 19:27:36 GMT</pubDate>
    <dc:creator>adukes_splunk</dc:creator>
    <dc:date>2019-10-25T19:27:36Z</dc:date>
    <item>
      <title>Example of a batch file write to system32 use case?</title>
      <link>https://community.splunk.com/t5/Security/Example-of-a-batch-file-write-to-system32-use-case/m-p/473148#M10946</link>
      <description>&lt;P&gt;Does anyone have examples of how to use Splunk to check for batch files written to the Windows system directory?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2019 19:58:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Example-of-a-batch-file-write-to-system32-use-case/m-p/473148#M10946</guid>
      <dc:creator>adukes_splunk</dc:creator>
      <dc:date>2019-09-05T19:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: Example of a batch file write to system32 use case?</title>
      <link>https://community.splunk.com/t5/Security/Example-of-a-batch-file-write-to-system32-use-case/m-p/473149#M10947</link>
      <description>&lt;P&gt;&lt;EM&gt;The Splunk Product Best Practices team helped produce this response. Read more about example use cases in the &lt;A href="https://docs.splunk.com/Documentation/UseCases"&gt;Splunk Platform Use Cases&lt;/A&gt; manual.&lt;/EM&gt;&lt;/P&gt;

&lt;H2&gt;&lt;EM&gt;For more information on this and other examples, download the free &lt;A href="https://splunkbase.splunk.com/app/3435"&gt;Splunk Security Essentials&lt;/A&gt; app on Splunkbase.&lt;/EM&gt;&lt;/H2&gt;

&lt;P&gt;In this use case, we'll explore how to use Splunk Enterprise Security to uncover batch files (.bat) written to the Windows system directory tree.&lt;/P&gt;

&lt;H1&gt;Load data&lt;/H1&gt;

&lt;P&gt;This use case depends on file system monitoring data in the &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Endpoint#Filesystem"&gt;Filesystem&lt;/A&gt; dataset of the &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Endpoint"&gt;endpoint data model&lt;/A&gt; as defined by the &lt;A href="https://docs.splunk.com/Documentation/CIM/4.13.0/User/Overview"&gt;Common Information Model (CIM)&lt;/A&gt;. For simplicity, this example only uses file system audit events from Windows Security data but any data properly normalized for the &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Endpoint#Filesystem"&gt;Filesystem&lt;/A&gt; dataset works well. It’s a best practice to &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/UsetheCIMtonormalizedataatsearchtime"&gt;use the CIM to normalize data at search time&lt;/A&gt;, but before you put in effort to create new knowledge objects, check &lt;A href="https://splunkbase.splunk.com/apps/#/page/1/search/CIM-compatible/order/relevance"&gt;Splunkbase&lt;/A&gt; to see if such a CIM-compatible app or add-on already exists.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: In searches, replace the asterisk in &lt;CODE&gt;index=&lt;EM&gt;&lt;/EM&gt;&lt;/CODE&gt;&lt;EM&gt; with the name of the &lt;A href="https://docs.splunk.com/Splexicon:Index"&gt;index&lt;/A&gt; that contains the data. By default, Splunk stores data in the &lt;CODE&gt;main&lt;/CODE&gt; index. Therefore, &lt;CODE&gt;index=&lt;/CODE&gt;&lt;/EM&gt;&lt;CODE&gt;&lt;/CODE&gt; becomes &lt;CODE&gt;index=main&lt;/CODE&gt;. Use the &lt;CODE&gt;OR&lt;/CODE&gt; operator to &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Search/Searchindexes#Specify_one_or_multiple_indexes_to_search"&gt;specify one or multiple indexes to search&lt;/A&gt;. For example, &lt;CODE&gt;index=main OR index=security&lt;/CODE&gt;. See &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Indexer/Aboutmanagingindexes"&gt;About managing indexes&lt;/A&gt; and &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Indexer/Howindexingworks"&gt;How indexing works&lt;/A&gt; in Splunk docs for details.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Use the &lt;A href="https://splunkbase.splunk.com/app/742/"&gt;Splunk Add-on for Microsoft Windows&lt;/A&gt; to accelerate time to value the necessary Windows filesystem data. For details, see &lt;A href="https://answers.splunk.com/answers/741802/is-it-a-best-practice-to-use-the-splunk-add-on-for.html"&gt;Is it a best practice to use the Splunk Add-on for Microsoft Windows?&lt;/A&gt; on Splunk Answers.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Enable the &lt;CODE&gt;[WinEventLog://Security]&lt;/CODE&gt; input in the add-on to collect Windows security data. For details, see our post &lt;A href="https://answers.splunk.com/answers/743944/how-do-i-collect-basic-windows-os-event-log-data-f.html"&gt;How do I collect basic Windows OS Event Log data from my Windows systems?&lt;/A&gt; on Splunk Answers.&lt;/LI&gt;
&lt;LI&gt;Deploy the add-on to the search heads to use the &lt;A href="https://docs.splunk.com/Splexicon:CommonInformationModel"&gt;Common Information Model&lt;/A&gt; to normalize the data at search time. See &lt;A href="https://docs.splunk.com/Documentation/WindowsAddOn/latest/User/Install#Distributed_deployments"&gt;Install the Splunk Add-on for Windows&lt;/A&gt; in Splunk documents for the procedure.&lt;/LI&gt;
&lt;LI&gt;Enable Windows to generate file system monitoring. For instructions, see &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Data/MonitorfilesystemchangesonWindows"&gt;Monitor file system changes&lt;/A&gt; within the Splunk Enterprise Getting Data In Manual.&lt;/LI&gt;
&lt;LI&gt;Run the following search to verify you are collecting Windows data: &lt;CODE&gt;earliest=-1day index=* source=win*security tag=endpoint tag=filesystem | head 10&lt;/CODE&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Since Splunk normalizes values from multiple source types regardless of source or format, it’s a best practice to make sure your data is &lt;A href="https://docs.splunk.com/Splexicon:CommonInformationModel"&gt;CIM&lt;/A&gt;-compliant. For more information about CIM and the &lt;A href="https://splunkbase.splunk.com/app/1621/"&gt;Splunk Common Information Model (CIM)&lt;/A&gt; add-on see the &lt;EM&gt;&lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Overview"&gt;Splunk Common Information Model Add-on Manual&lt;/A&gt;&lt;/EM&gt;. Run the following search to verify you are searching for normalized &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Endpoint#Filesystem"&gt;Filesystem&lt;/A&gt; data and ready for this use case: &lt;CODE&gt;earliest=-1day index=* tag=endpoint tag=filesystem | head 10&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;For more details about the Common Information Model, watch the following video.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=QTklD7OiN74" target="_blank"&gt;&lt;IMG alt="Demystifying the Splunk CIM" src="https://i.ytimg.com/vi/QTklD7OiN74/hqdefault.jpg" /&gt;&lt;/A&gt;&lt;/P&gt;

&lt;H1&gt;Get insights&lt;/H1&gt;

&lt;P&gt;This scenario uses the &lt;A href="https://docs.splunk.com/Documentation/ES/latest/User/IncidentReviewdashboard"&gt;Incident Review&lt;/A&gt; dashboard in Splunk Enterprise Security and underlying &lt;A href="https://docs.splunk.com/Splexicon:Correlationsearch"&gt;correlation searches&lt;/A&gt;. Use the following procedure to discover incidents:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Navigate to the Splunk Enterprise Security web user interface.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Incident Review&lt;/STRONG&gt; from the top navigation bar.&lt;/LI&gt;
&lt;LI&gt;Select the text box under &lt;STRONG&gt;Correlation Search&lt;/STRONG&gt;, begin typing &lt;STRONG&gt;Batch File Write to System32&lt;/STRONG&gt;, select the use case from the drop-down list that appears.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Submit&lt;/STRONG&gt; to display &lt;A href="https://docs.splunk.com/Splexicon:Notableevent"&gt;notable events&lt;/A&gt;.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Review the &lt;A href="https://docs.splunk.com/Documentation/ES/latest/User/IncidentReviewdashboard"&gt;Overview of Incident Review in Splunk Enterprise Security&lt;/A&gt; in Splunk docs for guidance on how to triage and act on resulting incidents. If no results appear, there may not be any notable notable events. However, you may need to &lt;A href="https://docs.splunk.com/Documentation/ES/latest/Admin/Configurecorrelationsearches#Enable_correlation_searches"&gt;enable correlation searches&lt;/A&gt;.&lt;/P&gt;

&lt;P&gt;If no results appear, you may need to deploy the add-ons to the search heads to use the knowledge objects necessary for simple searching.&lt;/P&gt;

&lt;P&gt;Watch the following video to see how the Use Case Library in Splunk Enterprise Security can strengthen your security posture and reduce risk with readily available, usable and relevant content.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=X8ITcKSPHc0" target="_blank"&gt;&lt;IMG alt="Splunk Enterprise Security: Use Case Library" src="https://i.ytimg.com/vi/X8ITcKSPHc0/hqdefault.jpg" /&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2019 20:06:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Example-of-a-batch-file-write-to-system32-use-case/m-p/473149#M10947</guid>
      <dc:creator>adukes_splunk</dc:creator>
      <dc:date>2019-09-05T20:06:44Z</dc:date>
    </item>
    <item>
      <title>Re: Example of a batch file write to system32 use case?</title>
      <link>https://community.splunk.com/t5/Security/Example-of-a-batch-file-write-to-system32-use-case/m-p/473150#M10948</link>
      <description>&lt;P&gt;Added related videos. &lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2019 19:27:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Example-of-a-batch-file-write-to-system32-use-case/m-p/473150#M10948</guid>
      <dc:creator>adukes_splunk</dc:creator>
      <dc:date>2019-10-25T19:27:36Z</dc:date>
    </item>
  </channel>
</rss>

