<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to achieve brute force alerts? in Security</title>
    <link>https://community.splunk.com/t5/Security/How-to-achieve-brute-force-alerts/m-p/644162#M16979</link>
    <description>&lt;P&gt;The query uses a datamodel, which automatically inserts "unknown" in certain fields that have no value.&amp;nbsp; There's nothing you can do about that other than change the source to provide a proper value.&lt;/P&gt;&lt;P&gt;Consider using the datamodel's constraints to fetch the raw events used to detect brute force attacks.&amp;nbsp; Perhaps something there will provide a clue to the source.&lt;/P&gt;</description>
    <pubDate>Mon, 22 May 2023 17:44:43 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2023-05-22T17:44:43Z</dc:date>
    <item>
      <title>How to achieve brute force alerts?</title>
      <link>https://community.splunk.com/t5/Security/How-to-achieve-brute-force-alerts/m-p/644056#M16976</link>
      <description>&lt;P&gt;we had a vendor setup our Splunk instance and configure a "Brute Force Attack" alert with the following query.&lt;/P&gt;
&lt;P&gt;--- orginal brute force alert ----&lt;BR /&gt;| tstats summariesonly=t allow_old_summaries=t count from datamodel=Authentication by Authentication.action, Authentication.src&lt;BR /&gt;| rename Authentication.src as source, Authentication.action as action&lt;BR /&gt;| chart last(count) over source by action&lt;BR /&gt;| where success&amp;gt;0 and failure&amp;gt;20&lt;BR /&gt;| sort -failure&lt;BR /&gt;| rename failure as failures&lt;BR /&gt;| fields - success, unknown&lt;/P&gt;
&lt;P&gt;This seemed to be working OK, but lately we've been getting a lot of emails from it. Most I've fixed, it was a bad password in a automated job. But the last one left on my list, the source is listed as "unknown" and I cant seem to find any more information about it.&lt;/P&gt;
&lt;P&gt;I'm new to splunk so probably not looking in the correct place the correct way.&lt;BR /&gt;Has anyone got any suggestions on how to track down what it might be ?&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 13:11:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-achieve-brute-force-alerts/m-p/644056#M16976</guid>
      <dc:creator>MalcolmC</dc:creator>
      <dc:date>2023-05-22T13:11:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to achieve brute force alerts?</title>
      <link>https://community.splunk.com/t5/Security/How-to-achieve-brute-force-alerts/m-p/644162#M16979</link>
      <description>&lt;P&gt;The query uses a datamodel, which automatically inserts "unknown" in certain fields that have no value.&amp;nbsp; There's nothing you can do about that other than change the source to provide a proper value.&lt;/P&gt;&lt;P&gt;Consider using the datamodel's constraints to fetch the raw events used to detect brute force attacks.&amp;nbsp; Perhaps something there will provide a clue to the source.&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 17:44:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-achieve-brute-force-alerts/m-p/644162#M16979</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-05-22T17:44:43Z</dc:date>
    </item>
  </channel>
</rss>

