<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Potential Correlation Searches SPL in Security</title>
    <link>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/638433#M16894</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You're on different track my requirement is if single user triggers an alert say alert_name other than pdm in between 2 hours more than 3 times .&lt;/P&gt;&lt;P&gt;How could we achieve it using eval .&lt;/P&gt;&lt;P&gt;Thanks &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 03 Apr 2023 17:59:43 GMT</pubDate>
    <dc:creator>AL3Z</dc:creator>
    <dc:date>2023-04-03T17:59:43Z</dc:date>
    <item>
      <title>What are some potential correlation search SPL?</title>
      <link>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636160#M16662</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Looking for SPL like w&lt;SPAN&gt;ithin a brief span of time, say two hours, a user prompts alerts for both PDM and encrypted files.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 10:59:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636160#M16662</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-04-04T10:59:11Z</dc:date>
    </item>
    <item>
      <title>Re: Potential Correlation Searches SPL</title>
      <link>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636161#M16663</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;probably you should try to better describe your requirement!&lt;/P&gt;&lt;P&gt;whick data source are you speaking?&lt;/P&gt;&lt;P&gt;why do you speak of Correlation Search?&lt;/P&gt;&lt;P&gt;did you checked if in Splunk baseline there's some Use Case for your technology?&lt;/P&gt;&lt;P&gt;did you checked if in Splunk Security essentials App there's some Use Case for your technology?&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 14:55:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636161#M16663</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-03-27T14:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: Potential Correlation Searches SPL</title>
      <link>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636162#M16664</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Hi,&lt;/P&gt;&lt;P&gt;My requirement to find the&amp;nbsp;where a user triggers both PDM and Encrypted file alerts in a short period of time (like 2 hours)&lt;BR /&gt;Datasource is of DLP&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 15:00:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636162#M16664</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-03-27T15:00:11Z</dc:date>
    </item>
    <item>
      <title>Re: Potential Correlation Searches SPL</title>
      <link>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636163#M16665</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;could you share some sample of these two kind of alerts?&lt;/P&gt;&lt;P&gt;indicating the correlation key between them?&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 15:12:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636163#M16665</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-03-27T15:12:36Z</dc:date>
    </item>
    <item>
      <title>Re: Potential Correlation Searches SPL</title>
      <link>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636169#M16666</link>
      <description>&lt;P&gt;..&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 08:29:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636169#M16666</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-03-29T08:29:26Z</dc:date>
    </item>
    <item>
      <title>Re: Potential Correlation Searches SPL</title>
      <link>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636173#M16667</link>
      <description>&lt;P&gt;Pls use above sample event for this use case&lt;BR /&gt;when&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;User triggers diferent PDM alerts in a short period of time (EX Block on Gmail and block on external apps)...&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 18:08:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636173#M16667</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-03-27T18:08:25Z</dc:date>
    </item>
    <item>
      <title>Re: Potential Correlation Searches SPL</title>
      <link>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636177#M16668</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;this is one alert sample and the other?&lt;/P&gt;&lt;P&gt;could you highlight in bold the correlation key to use?&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 16:23:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636177#M16668</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-03-27T16:23:19Z</dc:date>
    </item>
    <item>
      <title>Re: Potential Correlation Searches SPL</title>
      <link>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636236#M16669</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find the sample event key points highlighted with red colour&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 00:35:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636236#M16669</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-03-28T00:35:30Z</dc:date>
    </item>
    <item>
      <title>Re: Potential Correlation Searches SPL</title>
      <link>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636249#M16670</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;this is one kind of alert (PDM I suppose), can you share a sample of the other kind of alert or does it have the same format and only different message?&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 06:17:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636249#M16670</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-03-28T06:17:13Z</dc:date>
    </item>
    <item>
      <title>Re: Potential Correlation Searches SPL</title>
      <link>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636399#M16674</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;could you brief about&amp;nbsp; PDM abbrevation and concept&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 20:45:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636399#M16674</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-03-28T20:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: Potential Correlation Searches SPL</title>
      <link>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636474#M16676</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;PDM is an acronym that I don't know and that you used.&lt;/P&gt;&lt;P&gt;In few words, you have to:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;identify the rules to filter only the events you need in both data sources (e.g. index and sourcetype), for this reason I asked two samples of data, one for each data source to correlate,&lt;/LI&gt;&lt;LI&gt;then identify a correlation key (e.g. user), a common field in both the data sources, if they have a different file name you have to rename one of them to have the same,&lt;/LI&gt;&lt;LI&gt;and then define the rules (e.g. user present in both the data sources) to apply a final filter,&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;in this way , you should have something like this, to find events where user is present in both data sources:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(index=index1 sourcetype=sourcetype1) OR (index=index2 sourcetype=sourcetype2)
| stats dc(index) AS index_count values(index) AS index BY user
| where index_count=2&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 06:52:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/636474#M16676</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-03-29T06:52:55Z</dc:date>
    </item>
    <item>
      <title>Re: Potential Correlation Searches SPL</title>
      <link>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/638433#M16894</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You're on different track my requirement is if single user triggers an alert say alert_name other than pdm in between 2 hours more than 3 times .&lt;/P&gt;&lt;P&gt;How could we achieve it using eval .&lt;/P&gt;&lt;P&gt;Thanks &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2023 17:59:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/638433#M16894</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-04-03T17:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: Potential Correlation Searches SPL</title>
      <link>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/638562#M16897</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;so the condition is triggering an alert, not that the alert must be in both the indexes,&lt;/P&gt;&lt;P&gt;in this case, please try the same with a different final condition:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(index=index1 sourcetype=sourcetype1) OR (index=index2 sourcetype=sourcetype2)
| stats dc(index) AS index_count values(index) AS index values(pdm) AS pdm BY user
| where index_count=1 AND index=index1 &lt;/LI-CODE&gt;&lt;P&gt;the thing that I don't understand is what's the condition for pdm.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 06:34:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-some-potential-correlation-search-SPL/m-p/638562#M16897</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-04-04T06:34:53Z</dc:date>
    </item>
  </channel>
</rss>

