<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Example of a prohibited process detected use case? in Security</title>
    <link>https://community.splunk.com/t5/Security/Example-of-a-prohibited-process-detected-use-case/m-p/474395#M10990</link>
    <description>&lt;P&gt;Added related video. &lt;/P&gt;</description>
    <pubDate>Thu, 24 Oct 2019 19:45:09 GMT</pubDate>
    <dc:creator>adukes_splunk</dc:creator>
    <dc:date>2019-10-24T19:45:09Z</dc:date>
    <item>
      <title>Example of a prohibited process detected use case?</title>
      <link>https://community.splunk.com/t5/Security/Example-of-a-prohibited-process-detected-use-case/m-p/474393#M10988</link>
      <description>&lt;P&gt;Does anyone have examples of how to use Splunk to check for a prohibited process?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 19:07:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Example-of-a-prohibited-process-detected-use-case/m-p/474393#M10988</guid>
      <dc:creator>adukes_splunk</dc:creator>
      <dc:date>2019-09-09T19:07:55Z</dc:date>
    </item>
    <item>
      <title>Re: Example of a prohibited process detected use case?</title>
      <link>https://community.splunk.com/t5/Security/Example-of-a-prohibited-process-detected-use-case/m-p/474394#M10989</link>
      <description>&lt;P&gt;&lt;EM&gt;The Splunk Product Best Practices team helped produce this response. Read more about example use cases in the &lt;A href="https://docs.splunk.com/Documentation/UseCases"&gt;Splunk Platform Use Cases&lt;/A&gt; manual.&lt;/EM&gt;&lt;/P&gt;

&lt;H2&gt;&lt;EM&gt;For more information on this and other examples, download the free &lt;A href="https://splunkbase.splunk.com/app/3435"&gt;Splunk Security Essentials&lt;/A&gt; app on Splunkbase.&lt;/EM&gt;&lt;/H2&gt;

&lt;P&gt;In this use case, we'll explore how to use Splunk Enterprise Security to alert when a service in the prohibited process list is detected.&lt;/P&gt;

&lt;H1&gt;Load data&lt;/H1&gt;

&lt;P&gt;This use case depends on process monitoring data contained within the &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Endpoint#Processes"&gt;Processes&lt;/A&gt; dataset of the &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Endpoint"&gt;Endpoint&lt;/A&gt; datamodel as defined by the &lt;A href="https://docs.splunk.com/Splexicon:CommonInformationModel"&gt;Common Information Model&lt;/A&gt;. Although this use cases focuses on data from running processes of Windows and Unix or Linux, any data that is properly normalized for the &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Endpoint#Processes"&gt;Processes&lt;/A&gt; dataset works well. It’s a best practice to &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/UsetheCIMtonormalizedataatsearchtime"&gt;use the CIM to normalize data at search time&lt;/A&gt;, but before you put in effort to create new knowledge objects, check &lt;A href="https://splunkbase.splunk.com/apps/#/page/1/search/CIM-compatible/order/relevance"&gt;Splunkbase&lt;/A&gt; to see if such a CIM-compatible app or add-on already exists.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: In searches, replace the asterisk in &lt;CODE&gt;index=&lt;EM&gt;&lt;/EM&gt;&lt;/CODE&gt;&lt;EM&gt; with the name of the &lt;A href="https://docs.splunk.com/Splexicon:Index"&gt;index&lt;/A&gt; that contains the data. By default, Splunk stores data in the 'main' index. Therefore, &lt;CODE&gt;index=&lt;/CODE&gt;&lt;/EM&gt;&lt;CODE&gt;&lt;/CODE&gt; becomes &lt;CODE&gt;index=main&lt;/CODE&gt;. Use the &lt;CODE&gt;OR&lt;/CODE&gt; operator to &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Search/Searchindexes#Specify_one_or_multiple_indexes_to_search"&gt;specify one or multiple indexes to search&lt;/A&gt;. For example, &lt;CODE&gt;index=main OR index=security&lt;/CODE&gt;. See &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Indexer/Aboutmanagingindexes"&gt;About managing indexes&lt;/A&gt; and &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Indexer/Howindexingworks"&gt;How indexing works&lt;/A&gt; in Splunk docs for details.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Use the &lt;A href="https://splunkbase.splunk.com/app/742/"&gt;Splunk Add-on for Microsoft Windows&lt;/A&gt; to accelerate time to value &lt;BR /&gt;
time to value with Windows data. For details, see &lt;A href="https://answers.splunk.com/answers/741802/is-it-a-best-practice-to-use-the-splunk-add-on-for.html"&gt;Is it a best practice to use the Splunk Add-on for Microsoft Windows?&lt;/A&gt; on Splunk Answers.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Enable the &lt;CODE&gt;[WinHostMon://Process]&lt;/CODE&gt;, &lt;CODE&gt;[perfmon://Process]&lt;/CODE&gt;, and &lt;CODE&gt;[perfmon://ProcessorInformation]&lt;/CODE&gt; inputs in the add-on to collect Windows process and processor data. For details, see &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Data/MonitorWindowsperformance"&gt;Monitor Windows performance&lt;/A&gt; in the &lt;EM&gt;Splunk Getting Data In Manual&lt;/EM&gt;.&lt;/LI&gt;
&lt;LI&gt;Deploy the add-on to the search heads to use the &lt;A href="https://docs.splunk.com/Splexicon:CommonInformationModel"&gt;Common Information Model&lt;/A&gt; to normalize the data at search time. See &lt;A href="https://docs.splunk.com/Documentation/WindowsAddOn/latest/User/Install#Distributed_deployments"&gt;Install the Splunk Add-on for Windows&lt;/A&gt; in Splunk documents for the procedure.&lt;/LI&gt;
&lt;LI&gt;Run the following search to verify you are collecting Windows data: &lt;CODE&gt;earliest=-1day index=* sourcetype=*mon* tag=process tag=report | head 10&lt;/CODE&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Use the &lt;A href="https://splunkbase.splunk.com/app/833/"&gt;Splunk Add-on for Unix and Linux&lt;/A&gt; to accelerate time to value with Unix and Linux data.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Enable the &lt;CODE&gt;[script://./bin/top.sh]&lt;/CODE&gt; and &lt;CODE&gt;[script://./bin/ps.sh]&lt;/CODE&gt; input in the add-on to collect the Linux process data. See &lt;A href="https://docs.splunk.com/Documentation/UnixAddOn/latest/User/Enabledataandscriptedinputs"&gt;Enable data and scripted inputs for the Splunk Add-on for Unix and Linux&lt;/A&gt; in Splunk docs for the procedure.&lt;/LI&gt;
&lt;LI&gt;Deploy the add-on to the search heads to use the &lt;A href="https://docs.splunk.com/Splexicon:CommonInformationModel"&gt;Common Information Model&lt;/A&gt; to normalize the data at search time. See &lt;A href="https://docs.splunk.com/Documentation/UnixAddOn/latest/User/InstalltheSplunkAdd-onforUnixandLinux#Distributed_installation_of_this_add-on"&gt;Install the Splunk Add-on for Unix and Linux&lt;/A&gt; in Splunk docs for the procedure.&lt;/LI&gt;
&lt;LI&gt;Run the following search to verify you are collecting Unix and Linux data: &lt;CODE&gt;earliest=-1day index=* ( sourcetype=ps OR sourcetype=top ) tag=process tag=report | head 10&lt;/CODE&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Since Splunk normalizes values from multiple source types regardless of source or format, it’s a best practice to make sure your data is &lt;A href="https://docs.splunk.com/Splexicon:CommonInformationModel"&gt;CIM&lt;/A&gt;-compliant. For more information about CIM and the &lt;A href="https://splunkbase.splunk.com/app/1621/"&gt;Splunk Common Information Model (CIM)&lt;/A&gt; add-on see the &lt;EM&gt;&lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Overview"&gt;Splunk Common Information Model Add-on Manual&lt;/A&gt;&lt;/EM&gt;. Run the following search to verify you are searching for normalized &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Endpoint#Processes"&gt;Processes&lt;/A&gt; data and ready for this use case: &lt;CODE&gt;earliest=-1day index=* tag=process tag=report | head 10&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;For more details about the Common Information Model, watch the following video. &lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=QTklD7OiN74" target="_blank"&gt;&lt;IMG alt="Demystifying the Splunk CIM" src="https://i.ytimg.com/vi/QTklD7OiN74/hqdefault.jpg" /&gt;&lt;/A&gt;&lt;/P&gt;

&lt;H1&gt;Get insights&lt;/H1&gt;

&lt;P&gt;This scenario uses the &lt;A href="https://docs.splunk.com/Documentation/ES/latest/User/IncidentReviewdashboard"&gt;Incident Review&lt;/A&gt; dashboard in Splunk Enterprise Security and underlying &lt;A href="https://docs.splunk.com/Splexicon:Correlationsearch"&gt;correlation searches&lt;/A&gt;. Use the following procedure to discover incidents:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Navigate to the Splunk Enterprise Security web user interface.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Incident Review&lt;/STRONG&gt; from the top navigation bar.&lt;/LI&gt;
&lt;LI&gt;Select the text box under &lt;STRONG&gt;Correlation Search&lt;/STRONG&gt;, begin typing &lt;STRONG&gt;Prohibited Process Detected&lt;/STRONG&gt;, then select the appropriate result from the result set.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Submit&lt;/STRONG&gt; to display &lt;A href="https://docs.splunk.com/Splexicon:Notableevent"&gt;notable events&lt;/A&gt;.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Review the &lt;A href="https://docs.splunk.com/Documentation/ES/latest/User/IncidentReviewdashboard"&gt;Overview of Incident Review in Splunk Enterprise Security&lt;/A&gt; in Splunk docs for guidance on how to triage and act on resulting incidents. If no results appear, there may not be any notable notable events. However, you may need to &lt;A href="https://docs.splunk.com/Documentation/ES/latest/Admin/Configurecorrelationsearches#Enable_correlation_searches"&gt;enable correlation searches&lt;/A&gt;.&lt;/P&gt;

&lt;P&gt;If no results appear, you may need to deploy the add-ons to the search heads to use the knowledge objects necessary for simple searching. &lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 19:15:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Example-of-a-prohibited-process-detected-use-case/m-p/474394#M10989</guid>
      <dc:creator>adukes_splunk</dc:creator>
      <dc:date>2019-09-09T19:15:31Z</dc:date>
    </item>
    <item>
      <title>Re: Example of a prohibited process detected use case?</title>
      <link>https://community.splunk.com/t5/Security/Example-of-a-prohibited-process-detected-use-case/m-p/474395#M10990</link>
      <description>&lt;P&gt;Added related video. &lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 19:45:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Example-of-a-prohibited-process-detected-use-case/m-p/474395#M10990</guid>
      <dc:creator>adukes_splunk</dc:creator>
      <dc:date>2019-10-24T19:45:09Z</dc:date>
    </item>
  </channel>
</rss>

