<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Example of new users taking privileged actions? in Security</title>
    <link>https://community.splunk.com/t5/Security/Example-of-new-users-taking-privileged-actions/m-p/473220#M10950</link>
    <description>&lt;P&gt;&lt;EM&gt;The Splunk Product Best Practices team helped produce this response. Read more about example use cases in the &lt;A href="https://docs.splunk.com/Documentation/UseCases"&gt;Splunk Platform Use Cases&lt;/A&gt; manual.&lt;/EM&gt;&lt;/P&gt;

&lt;H2&gt;&lt;EM&gt;For more information on this and other examples, download the free &lt;A href="https://splunkbase.splunk.com/app/3435"&gt;Splunk Security Essentials&lt;/A&gt; app on Splunkbase.&lt;/EM&gt;&lt;/H2&gt;

&lt;P&gt;Most large organizations have strict controls to find users enacting privileged actions. While most users who suddenly start taking privileged actions are legitimate, there can be a risk when a user suddenly exercises privileged rights they have had for a while or uses new rights. Combine these events with other risky behavior to identify users for the Insider or SOC team to analyze.&lt;/P&gt;

&lt;P&gt;This use case is from the &lt;A href="https://splunkbase.splunk.com/app/3435/"&gt;Splunk Security Essentials&lt;/A&gt; app. Check it out for more examples and demo data for this type of use case.&lt;/P&gt;

&lt;H1&gt;Load data&lt;/H1&gt;

&lt;P&gt;This use case depends on &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Authentication"&gt;authentication&lt;/A&gt; data from Windows, Unix and Linux, or any data properly &lt;A href="https://docs.splunk.com/Splexicon:Tag"&gt;tagged&lt;/A&gt; as &lt;CODE&gt;privileged&lt;/CODE&gt;. While only one data source is required to get insights, collecting multiple data sources provides a more comprehensive view of the environment's security.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Use the &lt;A href="https://splunkbase.splunk.com/app/742/"&gt;Splunk Add-on for Microsoft Windows&lt;/A&gt; to accelerate time to value the necessary Windows filesystem data. For details, see &lt;A href="https://answers.splunk.com/answers/741802/is-it-a-best-practice-to-use-the-splunk-add-on-for.html"&gt;Is it a best practice to use the Splunk Add-on for Microsoft Windows?&lt;/A&gt; on Splunk Answers.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Enable the &lt;CODE&gt;[WinEventLog://Security]&lt;/CODE&gt; input in the add-on to collect Windows security data. For details, see our post &lt;A href="https://answers.splunk.com/answers/743944/how-do-i-collect-basic-windows-os-event-log-data-f.html"&gt;How do I collect basic Windows OS Event Log data from my Windows systems?&lt;/A&gt; on Splunk Answers.&lt;/LI&gt;
&lt;LI&gt;Deploy the add-on to the search heads to use the &lt;A href="https://docs.splunk.com/Splexicon:CommonInformationModel"&gt;Common Information Model&lt;/A&gt; to normalize the data at search time. See &lt;A href="https://docs.splunk.com/Documentation/WindowsAddOn/latest/User/Install#Distributed_deployments"&gt;Install the Splunk Add-on for Windows&lt;/A&gt; in Splunk documents for the procedure.&lt;/LI&gt;
&lt;LI&gt;Enable Windows to generate file system monitoring. For instructions, see &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Data/MonitorfilesystemchangesonWindows"&gt;Monitor file system changes&lt;/A&gt; within the Splunk Enterprise Getting Data In Manual.&lt;/LI&gt;
&lt;LI&gt;Run the following search to verify you are collecting Windows data: &lt;CODE&gt;earliest=-1day index=* source=win*security tag=endpoint tag=privileged | head 10&lt;/CODE&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Use the &lt;A href="https://splunkbase.splunk.com/app/833/"&gt;Splunk Add-on for Unix and Linux&lt;/A&gt; to accelerate time to value with Unix and Linux data.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Enable the &lt;CODE&gt;[monitor:///var/log]&lt;/CODE&gt; input in the add-on to collect the Linux security data. See &lt;A href="https://docs.splunk.com/Documentation/UnixAddOn/latest/User/Enabledataandscriptedinputs"&gt;Enable data and scripted inputs for the Splunk Add-on for Unix and Linux&lt;/A&gt; in Splunk docs for the procedure.&lt;/LI&gt;
&lt;LI&gt;Give Splunk permission to read the /var/log/secure file to allow Splunk to monitor the Linux secure data. For details, see &lt;A href="https://answers.splunk.com/answers/710445/which-unix-permissions-are-best-for-monitoring-fil.html"&gt;Which UNIX permissions are best for monitoring files?&lt;/A&gt; on Splunk Answers.&lt;/LI&gt;
&lt;LI&gt;Deploy the add-on to the search heads to use the Common Information Model to normalize the data at search time. See Install the Splunk Add-on for Unix and Linux in Splunk docs for the procedure.&lt;/LI&gt;
&lt;LI&gt;Run the following search to verify you are collecting Unix and Linux data: &lt;CODE&gt;earliest=-1day index=* sourcetype=linux_secure tag=privileged | head 10&lt;/CODE&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Since Splunk normalizes values from multiple source types regardless of source or format, it’s a best practice to make sure your data is &lt;A href="https://docs.splunk.com/Splexicon:CommonInformationModel"&gt;CIM&lt;/A&gt;-compliant. For more information about CIM and the &lt;A href="https://splunkbase.splunk.com/app/1621/"&gt;Splunk Common Information Model (CIM)&lt;/A&gt; add-on see the &lt;EM&gt;&lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Overview"&gt;Splunk Common Information Model Add-on Manual&lt;/A&gt;&lt;/EM&gt;. Run the following search to verify you are searching for normalized &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Authentication#Tags_used_with_Authentication_event_datasets"&gt;privileged&lt;/A&gt; data and ready for this use case: &lt;CODE&gt;earliest=-1day index=* tag=endpoint tag=privilege | head 10&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;For more details about the Common Information Model, watch the following video.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=QTklD7OiN74" target="_blank"&gt;&lt;IMG alt="Demystifying the Splunk CIM" src="https://i.ytimg.com/vi/QTklD7OiN74/hqdefault.jpg" /&gt;&lt;/A&gt;&lt;/P&gt;

&lt;H1&gt;Get insights&lt;/H1&gt;

&lt;P&gt;This search records when a user who suddenly starts taking privileged actions.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: In the searches below, replace the asterisk in &lt;CODE&gt;index=&lt;EM&gt;&lt;/EM&gt;&lt;/CODE&gt;&lt;EM&gt; with the name of the &lt;A href="https://docs.splunk.com/Splexicon:Index"&gt;index&lt;/A&gt; that contains the data. By default, Splunk stores data in the main index. Therefore, &lt;CODE&gt;index=&lt;/CODE&gt;&lt;/EM&gt;&lt;CODE&gt;&lt;/CODE&gt; becomes &lt;CODE&gt;index=main&lt;/CODE&gt;. Use the &lt;CODE&gt;OR&lt;/CODE&gt; operator to &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Search/Searchindexes#Specify_one_or_multiple_indexes_to_search"&gt;specify one or multiple indexes to search&lt;/A&gt;. For example, &lt;CODE&gt;index=main OR index=security&lt;/CODE&gt;. See &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Indexer/Aboutmanagingindexes"&gt;About managing indexes&lt;/A&gt; and &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Indexer/Howindexingworks"&gt;How indexing works&lt;/A&gt; in Splunk docs for details.&lt;/P&gt;

&lt;H2&gt;Top Users Taking Privileged Actions&lt;/H2&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* tag=privileged
| stats count by user _time 
| stats sum(count) as count by user 
| sort - count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;H2&gt;Privileged Actions Over Time&lt;/H2&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* tag=privileged 
| bucket _time span=1d 
| stats count by user _time 
| timechart span=1d sum(count) as count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;Known false positives&lt;/STRONG&gt;: If an event is incorrectly marked with a &lt;CODE&gt;tag=privileged&lt;/CODE&gt;, this alert is false. This can be tuned through the &lt;A href="https://docs.splunk.com/Splexicon:Eventtype"&gt;eventtypes&lt;/A&gt; by adding search terms like &lt;CODE&gt;NOT EventCode=XXXX&lt;/CODE&gt; to block event IDs (XXXX) that you do not find valuable.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;How to respond&lt;/STRONG&gt;: Determine if the event is not expected from a user with their existing permissions. If that's the case, review the groups the user is a member of or see if a local account with the same username exists that may be the source of these rights. Evaluate whether the event is allowable or not.&lt;/P&gt;

&lt;P&gt;If no results appear, you may need to deploy the add-ons to the search heads to use the knowledge objects necessary for simple searching.&lt;/P&gt;</description>
    <pubDate>Thu, 05 Sep 2019 21:18:28 GMT</pubDate>
    <dc:creator>adukes_splunk</dc:creator>
    <dc:date>2019-09-05T21:18:28Z</dc:date>
    <item>
      <title>Example of new users taking privileged actions?</title>
      <link>https://community.splunk.com/t5/Security/Example-of-new-users-taking-privileged-actions/m-p/473219#M10949</link>
      <description>&lt;P&gt;Does anyone have examples of how to use Splunk to check for new users taking privileged actions?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2019 21:16:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Example-of-new-users-taking-privileged-actions/m-p/473219#M10949</guid>
      <dc:creator>adukes_splunk</dc:creator>
      <dc:date>2019-09-05T21:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: Example of new users taking privileged actions?</title>
      <link>https://community.splunk.com/t5/Security/Example-of-new-users-taking-privileged-actions/m-p/473220#M10950</link>
      <description>&lt;P&gt;&lt;EM&gt;The Splunk Product Best Practices team helped produce this response. Read more about example use cases in the &lt;A href="https://docs.splunk.com/Documentation/UseCases"&gt;Splunk Platform Use Cases&lt;/A&gt; manual.&lt;/EM&gt;&lt;/P&gt;

&lt;H2&gt;&lt;EM&gt;For more information on this and other examples, download the free &lt;A href="https://splunkbase.splunk.com/app/3435"&gt;Splunk Security Essentials&lt;/A&gt; app on Splunkbase.&lt;/EM&gt;&lt;/H2&gt;

&lt;P&gt;Most large organizations have strict controls to find users enacting privileged actions. While most users who suddenly start taking privileged actions are legitimate, there can be a risk when a user suddenly exercises privileged rights they have had for a while or uses new rights. Combine these events with other risky behavior to identify users for the Insider or SOC team to analyze.&lt;/P&gt;

&lt;P&gt;This use case is from the &lt;A href="https://splunkbase.splunk.com/app/3435/"&gt;Splunk Security Essentials&lt;/A&gt; app. Check it out for more examples and demo data for this type of use case.&lt;/P&gt;

&lt;H1&gt;Load data&lt;/H1&gt;

&lt;P&gt;This use case depends on &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Authentication"&gt;authentication&lt;/A&gt; data from Windows, Unix and Linux, or any data properly &lt;A href="https://docs.splunk.com/Splexicon:Tag"&gt;tagged&lt;/A&gt; as &lt;CODE&gt;privileged&lt;/CODE&gt;. While only one data source is required to get insights, collecting multiple data sources provides a more comprehensive view of the environment's security.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Use the &lt;A href="https://splunkbase.splunk.com/app/742/"&gt;Splunk Add-on for Microsoft Windows&lt;/A&gt; to accelerate time to value the necessary Windows filesystem data. For details, see &lt;A href="https://answers.splunk.com/answers/741802/is-it-a-best-practice-to-use-the-splunk-add-on-for.html"&gt;Is it a best practice to use the Splunk Add-on for Microsoft Windows?&lt;/A&gt; on Splunk Answers.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Enable the &lt;CODE&gt;[WinEventLog://Security]&lt;/CODE&gt; input in the add-on to collect Windows security data. For details, see our post &lt;A href="https://answers.splunk.com/answers/743944/how-do-i-collect-basic-windows-os-event-log-data-f.html"&gt;How do I collect basic Windows OS Event Log data from my Windows systems?&lt;/A&gt; on Splunk Answers.&lt;/LI&gt;
&lt;LI&gt;Deploy the add-on to the search heads to use the &lt;A href="https://docs.splunk.com/Splexicon:CommonInformationModel"&gt;Common Information Model&lt;/A&gt; to normalize the data at search time. See &lt;A href="https://docs.splunk.com/Documentation/WindowsAddOn/latest/User/Install#Distributed_deployments"&gt;Install the Splunk Add-on for Windows&lt;/A&gt; in Splunk documents for the procedure.&lt;/LI&gt;
&lt;LI&gt;Enable Windows to generate file system monitoring. For instructions, see &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Data/MonitorfilesystemchangesonWindows"&gt;Monitor file system changes&lt;/A&gt; within the Splunk Enterprise Getting Data In Manual.&lt;/LI&gt;
&lt;LI&gt;Run the following search to verify you are collecting Windows data: &lt;CODE&gt;earliest=-1day index=* source=win*security tag=endpoint tag=privileged | head 10&lt;/CODE&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Use the &lt;A href="https://splunkbase.splunk.com/app/833/"&gt;Splunk Add-on for Unix and Linux&lt;/A&gt; to accelerate time to value with Unix and Linux data.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Enable the &lt;CODE&gt;[monitor:///var/log]&lt;/CODE&gt; input in the add-on to collect the Linux security data. See &lt;A href="https://docs.splunk.com/Documentation/UnixAddOn/latest/User/Enabledataandscriptedinputs"&gt;Enable data and scripted inputs for the Splunk Add-on for Unix and Linux&lt;/A&gt; in Splunk docs for the procedure.&lt;/LI&gt;
&lt;LI&gt;Give Splunk permission to read the /var/log/secure file to allow Splunk to monitor the Linux secure data. For details, see &lt;A href="https://answers.splunk.com/answers/710445/which-unix-permissions-are-best-for-monitoring-fil.html"&gt;Which UNIX permissions are best for monitoring files?&lt;/A&gt; on Splunk Answers.&lt;/LI&gt;
&lt;LI&gt;Deploy the add-on to the search heads to use the Common Information Model to normalize the data at search time. See Install the Splunk Add-on for Unix and Linux in Splunk docs for the procedure.&lt;/LI&gt;
&lt;LI&gt;Run the following search to verify you are collecting Unix and Linux data: &lt;CODE&gt;earliest=-1day index=* sourcetype=linux_secure tag=privileged | head 10&lt;/CODE&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Since Splunk normalizes values from multiple source types regardless of source or format, it’s a best practice to make sure your data is &lt;A href="https://docs.splunk.com/Splexicon:CommonInformationModel"&gt;CIM&lt;/A&gt;-compliant. For more information about CIM and the &lt;A href="https://splunkbase.splunk.com/app/1621/"&gt;Splunk Common Information Model (CIM)&lt;/A&gt; add-on see the &lt;EM&gt;&lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Overview"&gt;Splunk Common Information Model Add-on Manual&lt;/A&gt;&lt;/EM&gt;. Run the following search to verify you are searching for normalized &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Authentication#Tags_used_with_Authentication_event_datasets"&gt;privileged&lt;/A&gt; data and ready for this use case: &lt;CODE&gt;earliest=-1day index=* tag=endpoint tag=privilege | head 10&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;For more details about the Common Information Model, watch the following video.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=QTklD7OiN74" target="_blank"&gt;&lt;IMG alt="Demystifying the Splunk CIM" src="https://i.ytimg.com/vi/QTklD7OiN74/hqdefault.jpg" /&gt;&lt;/A&gt;&lt;/P&gt;

&lt;H1&gt;Get insights&lt;/H1&gt;

&lt;P&gt;This search records when a user who suddenly starts taking privileged actions.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: In the searches below, replace the asterisk in &lt;CODE&gt;index=&lt;EM&gt;&lt;/EM&gt;&lt;/CODE&gt;&lt;EM&gt; with the name of the &lt;A href="https://docs.splunk.com/Splexicon:Index"&gt;index&lt;/A&gt; that contains the data. By default, Splunk stores data in the main index. Therefore, &lt;CODE&gt;index=&lt;/CODE&gt;&lt;/EM&gt;&lt;CODE&gt;&lt;/CODE&gt; becomes &lt;CODE&gt;index=main&lt;/CODE&gt;. Use the &lt;CODE&gt;OR&lt;/CODE&gt; operator to &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Search/Searchindexes#Specify_one_or_multiple_indexes_to_search"&gt;specify one or multiple indexes to search&lt;/A&gt;. For example, &lt;CODE&gt;index=main OR index=security&lt;/CODE&gt;. See &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Indexer/Aboutmanagingindexes"&gt;About managing indexes&lt;/A&gt; and &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Indexer/Howindexingworks"&gt;How indexing works&lt;/A&gt; in Splunk docs for details.&lt;/P&gt;

&lt;H2&gt;Top Users Taking Privileged Actions&lt;/H2&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* tag=privileged
| stats count by user _time 
| stats sum(count) as count by user 
| sort - count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;H2&gt;Privileged Actions Over Time&lt;/H2&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* tag=privileged 
| bucket _time span=1d 
| stats count by user _time 
| timechart span=1d sum(count) as count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;Known false positives&lt;/STRONG&gt;: If an event is incorrectly marked with a &lt;CODE&gt;tag=privileged&lt;/CODE&gt;, this alert is false. This can be tuned through the &lt;A href="https://docs.splunk.com/Splexicon:Eventtype"&gt;eventtypes&lt;/A&gt; by adding search terms like &lt;CODE&gt;NOT EventCode=XXXX&lt;/CODE&gt; to block event IDs (XXXX) that you do not find valuable.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;How to respond&lt;/STRONG&gt;: Determine if the event is not expected from a user with their existing permissions. If that's the case, review the groups the user is a member of or see if a local account with the same username exists that may be the source of these rights. Evaluate whether the event is allowable or not.&lt;/P&gt;

&lt;P&gt;If no results appear, you may need to deploy the add-ons to the search heads to use the knowledge objects necessary for simple searching.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2019 21:18:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Example-of-new-users-taking-privileged-actions/m-p/473220#M10950</guid>
      <dc:creator>adukes_splunk</dc:creator>
      <dc:date>2019-09-05T21:18:28Z</dc:date>
    </item>
    <item>
      <title>Re: Example of new users taking privileged actions?</title>
      <link>https://community.splunk.com/t5/Security/Example-of-new-users-taking-privileged-actions/m-p/473221#M10951</link>
      <description>&lt;P&gt;Added related video. &lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 21:12:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Example-of-new-users-taking-privileged-actions/m-p/473221#M10951</guid>
      <dc:creator>adukes_splunk</dc:creator>
      <dc:date>2019-10-24T21:12:50Z</dc:date>
    </item>
  </channel>
</rss>

