<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Example of inactive account activity detected use case? in Security</title>
    <link>https://community.splunk.com/t5/Security/Example-of-inactive-account-activity-detected-use-case/m-p/473705#M10969</link>
    <description>&lt;P&gt;&lt;EM&gt;The Splunk Product Best Practices team helped produce this response. Read more about example use cases in the &lt;A href="https://docs.splunk.com/Documentation/UseCases"&gt;Splunk Platform Use Cases&lt;/A&gt; manual.&lt;/EM&gt;&lt;/P&gt;

&lt;H2&gt;&lt;EM&gt;For more information on this and other examples, download the free &lt;A href="https://splunkbase.splunk.com/app/3435"&gt;Splunk Security Essentials&lt;/A&gt; app on Splunkbase.&lt;/EM&gt;&lt;/H2&gt;

&lt;P&gt;In this use case, we'll explore how to use Splunk Enterprise Security to discover when previously inactive accounts are being used. This may be due to an attacker that successfully gained access to an account that should no longer be used.&lt;/P&gt;

&lt;H1&gt;Load data&lt;/H1&gt;

&lt;P&gt;This use case depends on asset and identity data. Use the instructions to &lt;A href="https://docs.splunk.com/Documentation/ES/latest/Admin/Addassetandidentitydata"&gt;Add asset and identity data to Splunk Enterprise Security&lt;/A&gt; to allow Splunk Enterprise Security to correlate asset and identity information with events to enrich and provide context to your data. It’s a best practice to &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/UsetheCIMtonormalizedataatsearchtime"&gt;use the CIM to normalize data at search time&lt;/A&gt;, but before you put in effort to create new knowledge objects, check &lt;A href="https://splunkbase.splunk.com/apps/#/page/1/search/CIM-compatible/order/relevance"&gt;Splunkbase&lt;/A&gt; to see if such a CIM-compatible app or add-on already exists.&lt;/P&gt;

&lt;P&gt;For more details about the Common Information Model, watch the following video.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=QTklD7OiN74" target="_blank"&gt;&lt;IMG alt="Demystifying the Splunk CIM" src="https://i.ytimg.com/vi/QTklD7OiN74/hqdefault.jpg" /&gt;&lt;/A&gt;&lt;/P&gt;

&lt;H1&gt;Get insights&lt;/H1&gt;

&lt;P&gt;This scenario uses the &lt;A href="https://docs.splunk.com/Documentation/ES/latest/User/IncidentReviewdashboard"&gt;Incident Review&lt;/A&gt; dashboard in Splunk Enterprise Security and underlying &lt;A href="https://docs.splunk.com/Splexicon:Correlationsearch"&gt;correlation searches&lt;/A&gt;. Use the following procedure to discover incidents:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Navigate to the Splunk Enterprise Security web user interface.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Incident Review&lt;/STRONG&gt; from the top navigation bar.&lt;/LI&gt;
&lt;LI&gt;Select the text box under &lt;STRONG&gt;Correlation Search&lt;/STRONG&gt;, begin typing &lt;STRONG&gt;Inactive Account Activity Detected&lt;/STRONG&gt;, then select the appropriate result from the result set.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Submit&lt;/STRONG&gt; to display &lt;A href="https://docs.splunk.com/Splexicon:Notableevent"&gt;notable events&lt;/A&gt;.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Review the &lt;A href="https://docs.splunk.com/Documentation/ES/latest/User/IncidentReviewdashboard"&gt;Overview of Incident Review in Splunk Enterprise Security&lt;/A&gt; in Splunk docs for guidance on how to triage and act on resulting incidents. If there are not results, there may not be any notable notable events or you may need to &lt;A href="https://docs.splunk.com/Documentation/ES/latest/Admin/Configurecorrelationsearches#Enable_correlation_searches"&gt;enable correlation searches&lt;/A&gt;.&lt;/P&gt;

&lt;P&gt;Watch the following video to see how the Use Case Library in Splunk Enterprise Security can strengthen your security posture and reduce risk with readily available, usable, and relevant content.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=X8ITcKSPHc0" target="_blank"&gt;&lt;IMG alt="Splunk Enterprise Security: Use Case Library" src="https://i.ytimg.com/vi/X8ITcKSPHc0/hqdefault.jpg" /&gt;&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 06 Sep 2019 20:55:25 GMT</pubDate>
    <dc:creator>adukes_splunk</dc:creator>
    <dc:date>2019-09-06T20:55:25Z</dc:date>
    <item>
      <title>Example of inactive account activity detected use case?</title>
      <link>https://community.splunk.com/t5/Security/Example-of-inactive-account-activity-detected-use-case/m-p/473704#M10968</link>
      <description>&lt;P&gt;Does anyone have examples of how to use Splunk to check for inactive account activity?&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 20:52:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Example-of-inactive-account-activity-detected-use-case/m-p/473704#M10968</guid>
      <dc:creator>adukes_splunk</dc:creator>
      <dc:date>2019-09-06T20:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: Example of inactive account activity detected use case?</title>
      <link>https://community.splunk.com/t5/Security/Example-of-inactive-account-activity-detected-use-case/m-p/473705#M10969</link>
      <description>&lt;P&gt;&lt;EM&gt;The Splunk Product Best Practices team helped produce this response. Read more about example use cases in the &lt;A href="https://docs.splunk.com/Documentation/UseCases"&gt;Splunk Platform Use Cases&lt;/A&gt; manual.&lt;/EM&gt;&lt;/P&gt;

&lt;H2&gt;&lt;EM&gt;For more information on this and other examples, download the free &lt;A href="https://splunkbase.splunk.com/app/3435"&gt;Splunk Security Essentials&lt;/A&gt; app on Splunkbase.&lt;/EM&gt;&lt;/H2&gt;

&lt;P&gt;In this use case, we'll explore how to use Splunk Enterprise Security to discover when previously inactive accounts are being used. This may be due to an attacker that successfully gained access to an account that should no longer be used.&lt;/P&gt;

&lt;H1&gt;Load data&lt;/H1&gt;

&lt;P&gt;This use case depends on asset and identity data. Use the instructions to &lt;A href="https://docs.splunk.com/Documentation/ES/latest/Admin/Addassetandidentitydata"&gt;Add asset and identity data to Splunk Enterprise Security&lt;/A&gt; to allow Splunk Enterprise Security to correlate asset and identity information with events to enrich and provide context to your data. It’s a best practice to &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/UsetheCIMtonormalizedataatsearchtime"&gt;use the CIM to normalize data at search time&lt;/A&gt;, but before you put in effort to create new knowledge objects, check &lt;A href="https://splunkbase.splunk.com/apps/#/page/1/search/CIM-compatible/order/relevance"&gt;Splunkbase&lt;/A&gt; to see if such a CIM-compatible app or add-on already exists.&lt;/P&gt;

&lt;P&gt;For more details about the Common Information Model, watch the following video.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=QTklD7OiN74" target="_blank"&gt;&lt;IMG alt="Demystifying the Splunk CIM" src="https://i.ytimg.com/vi/QTklD7OiN74/hqdefault.jpg" /&gt;&lt;/A&gt;&lt;/P&gt;

&lt;H1&gt;Get insights&lt;/H1&gt;

&lt;P&gt;This scenario uses the &lt;A href="https://docs.splunk.com/Documentation/ES/latest/User/IncidentReviewdashboard"&gt;Incident Review&lt;/A&gt; dashboard in Splunk Enterprise Security and underlying &lt;A href="https://docs.splunk.com/Splexicon:Correlationsearch"&gt;correlation searches&lt;/A&gt;. Use the following procedure to discover incidents:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Navigate to the Splunk Enterprise Security web user interface.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Incident Review&lt;/STRONG&gt; from the top navigation bar.&lt;/LI&gt;
&lt;LI&gt;Select the text box under &lt;STRONG&gt;Correlation Search&lt;/STRONG&gt;, begin typing &lt;STRONG&gt;Inactive Account Activity Detected&lt;/STRONG&gt;, then select the appropriate result from the result set.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Submit&lt;/STRONG&gt; to display &lt;A href="https://docs.splunk.com/Splexicon:Notableevent"&gt;notable events&lt;/A&gt;.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Review the &lt;A href="https://docs.splunk.com/Documentation/ES/latest/User/IncidentReviewdashboard"&gt;Overview of Incident Review in Splunk Enterprise Security&lt;/A&gt; in Splunk docs for guidance on how to triage and act on resulting incidents. If there are not results, there may not be any notable notable events or you may need to &lt;A href="https://docs.splunk.com/Documentation/ES/latest/Admin/Configurecorrelationsearches#Enable_correlation_searches"&gt;enable correlation searches&lt;/A&gt;.&lt;/P&gt;

&lt;P&gt;Watch the following video to see how the Use Case Library in Splunk Enterprise Security can strengthen your security posture and reduce risk with readily available, usable, and relevant content.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=X8ITcKSPHc0" target="_blank"&gt;&lt;IMG alt="Splunk Enterprise Security: Use Case Library" src="https://i.ytimg.com/vi/X8ITcKSPHc0/hqdefault.jpg" /&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 20:55:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Example-of-inactive-account-activity-detected-use-case/m-p/473705#M10969</guid>
      <dc:creator>adukes_splunk</dc:creator>
      <dc:date>2019-09-06T20:55:25Z</dc:date>
    </item>
    <item>
      <title>Re: Example of inactive account activity detected use case?</title>
      <link>https://community.splunk.com/t5/Security/Example-of-inactive-account-activity-detected-use-case/m-p/473706#M10970</link>
      <description>&lt;P&gt;Added related video. &lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2019 19:39:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Example-of-inactive-account-activity-detected-use-case/m-p/473706#M10970</guid>
      <dc:creator>adukes_splunk</dc:creator>
      <dc:date>2019-10-25T19:39:17Z</dc:date>
    </item>
  </channel>
</rss>

