<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Baseline and query for Anomalous Invalid Login Attempts in Security</title>
    <link>https://community.splunk.com/t5/Security/Baseline-and-query-for-Anomalous-Invalid-Login-Attempts/m-p/258319#M14931</link>
    <description>&lt;P&gt;Defining a baseline can be tricky as each system and environment is different. You might need to build a dashboard with multiple panels (queries) to give you a broad idea of average behavior over time. I see you're in a windows environment, I'll suggest taking a look at a few known working Windows queries here: &lt;A href="http://gosplunk.com/category/wineventlogsecurity/"&gt;http://gosplunk.com/category/wineventlogsecurity/&lt;/A&gt; You can probably find a few queries to throw together in a dashboard, as well as use and abuse the queries to come up with something that'll suit your needs.&lt;/P&gt;

&lt;P&gt;In addition, I'd use statistical functions such as average, median, standard deviation (etc, etc) over a proper period of time (week / month, weekend vs weekday) to properly determine behavior and baselines.&lt;/P&gt;

&lt;P&gt;My $.02 at least &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 02 Dec 2015 12:45:59 GMT</pubDate>
    <dc:creator>hagjos43</dc:creator>
    <dc:date>2015-12-02T12:45:59Z</dc:date>
    <item>
      <title>Baseline and query for Anomalous Invalid Login Attempts</title>
      <link>https://community.splunk.com/t5/Security/Baseline-and-query-for-Anomalous-Invalid-Login-Attempts/m-p/258317#M14929</link>
      <description>&lt;P&gt;I am working on Anomalous Invalid Login Attempts where I need to do multiple login from a same user from different sites in 30 mins time span, so the below query I implemented &lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;sourcetype=msad-successful-user-logons OR (EventCode=540 OR EventCode=4624) &lt;BR /&gt;
NOT (user=&lt;EM&gt;$ OR user="ANONYMOUS LOGON" OR user=SYSTEM OR user=services OR user=Unknown)&lt;BR /&gt;
| lookup ADSitesAndSubnets name as src_ip OUTPUT description as SiteName name as Subnet &lt;BR /&gt;
| search NOT (SiteName=KDC OR SiteName=NDC) )### both are same region so not require&lt;BR /&gt;
| lookup ComputerIPAddressTemporal ip AS src_ip OUTPUT computer AS ComputerName &lt;BR /&gt;
| stats first(_time) as LastEventTime last(_time) as FirstEventTime by user src_ip SiteName ComputerName &lt;BR /&gt;
| eval LogonData = ComputerName . "|" . SiteName . "|" . src_ip . "|" . strftime(FirstEventTime, "%H:%M:%S") . "|" . strftime(LastEventTime, "%H:%M:%S")&lt;BR /&gt;
| stats dc(SiteName) as Number_Sites values(LogonData) as LogonData by user | where Number_Sites &amp;gt;= 2&lt;BR /&gt;
| mvexpand LogonData&lt;BR /&gt;&lt;BR /&gt;
| rex field=LogonData "^(?&amp;lt;ComputerName&amp;gt;[^|]+)|(?&amp;lt;SiteName&amp;gt;[^|]+)|(?&amp;lt;src_ip&amp;gt;[^|]+)|(?&amp;lt;FirstEventTime&amp;gt;[^|]+)|(?&amp;lt;LastEventTime&amp;gt;[^|]+)$"&lt;BR /&gt;&lt;BR /&gt;
| ldapfilter domain=NEXEOSOLUTIONS search="(sAMAccountName=$user$)" attrs="distinguishedName"&lt;BR /&gt;&lt;BR /&gt;
| search distinguishedName="*OU=Nexeo Sync&lt;/EM&gt;"&lt;BR /&gt;&lt;BR /&gt;
| sort user SiteName ComputerName&lt;BR /&gt;
| table user SiteName ComputerName src_ip FirstEventTime LastEventTime&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Now my requirement is to define more baseline for “Anomalous Invalid Login Attempts”.&lt;BR /&gt;
My question is what could be the possible baselines in this scenario and what will be query for that.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 08:02:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Baseline-and-query-for-Anomalous-Invalid-Login-Attempts/m-p/258317#M14929</guid>
      <dc:creator>suvamondal</dc:creator>
      <dc:date>2020-09-29T08:02:59Z</dc:date>
    </item>
    <item>
      <title>Re: Baseline and query for Anomalous Invalid Login Attempts</title>
      <link>https://community.splunk.com/t5/Security/Baseline-and-query-for-Anomalous-Invalid-Login-Attempts/m-p/258318#M14930</link>
      <description>&lt;P&gt;Are you trying to get a report? Can you provide some sample data and the conditions that represent "Anomalous Invalid Login Attempts"?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2015 12:20:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Baseline-and-query-for-Anomalous-Invalid-Login-Attempts/m-p/258318#M14930</guid>
      <dc:creator>jsven7</dc:creator>
      <dc:date>2015-12-02T12:20:46Z</dc:date>
    </item>
    <item>
      <title>Re: Baseline and query for Anomalous Invalid Login Attempts</title>
      <link>https://community.splunk.com/t5/Security/Baseline-and-query-for-Anomalous-Invalid-Login-Attempts/m-p/258319#M14931</link>
      <description>&lt;P&gt;Defining a baseline can be tricky as each system and environment is different. You might need to build a dashboard with multiple panels (queries) to give you a broad idea of average behavior over time. I see you're in a windows environment, I'll suggest taking a look at a few known working Windows queries here: &lt;A href="http://gosplunk.com/category/wineventlogsecurity/"&gt;http://gosplunk.com/category/wineventlogsecurity/&lt;/A&gt; You can probably find a few queries to throw together in a dashboard, as well as use and abuse the queries to come up with something that'll suit your needs.&lt;/P&gt;

&lt;P&gt;In addition, I'd use statistical functions such as average, median, standard deviation (etc, etc) over a proper period of time (week / month, weekend vs weekday) to properly determine behavior and baselines.&lt;/P&gt;

&lt;P&gt;My $.02 at least &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2015 12:45:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Baseline-and-query-for-Anomalous-Invalid-Login-Attempts/m-p/258319#M14931</guid>
      <dc:creator>hagjos43</dc:creator>
      <dc:date>2015-12-02T12:45:59Z</dc:date>
    </item>
  </channel>
</rss>

