<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Example of a brute force access behavior detected use case? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Example-of-a-brute-force-access-behavior-detected-use-case/m-p/474503#M58303</link>
    <description>&lt;H2&gt;&lt;EM&gt;The Splunk Product Best Practices team provided this response. Read more about &lt;A href="https://www.splunk.com/blog/2019/02/25/how-crowdsourcing-is-shaping-the-future-of-splunk-best-practices.html"&gt;How Crowdsourcing is Shaping the Future of Splunk Best Practices&lt;/A&gt;.&lt;/EM&gt;&lt;/H2&gt;

&lt;P&gt;In this use case, we'll explore how to use Splunk Enterprise Security to detect excessive number of failed login attempts followed by a successful login which can indicate a successful brute force attack.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=x78lcsWPPW8" target="_blank"&gt;&lt;IMG alt="Use Case : Detecting Brute Force Attacks" src="https://i.ytimg.com/vi/x78lcsWPPW8/hqdefault.jpg" /&gt;&lt;/A&gt;&lt;/P&gt;

&lt;H1&gt;Load data&lt;/H1&gt;

&lt;P&gt;This use case depends on &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Authentication"&gt;authentication&lt;/A&gt; data as defined by the &lt;A href="https://docs.splunk.com/Documentation/CIM/4.13.0/User/Overview"&gt;Common Information Model (CIM)&lt;/A&gt;. For simplicity, this example uses  authentication data from from Windows and Unix or Linux, but any data properly normalized for the &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Authentication"&gt;authentication&lt;/A&gt; data model works well. It’s a best practice to &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/UsetheCIMtonormalizedataatsearchtime"&gt;use the CIM to normalize data at search time&lt;/A&gt;, but before you put in effort to create new knowledge objects, check Splunkbase to see if such a CIM-compatible app or add-on already exists.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: In searches, replace the asterisk in &lt;CODE&gt;index=&lt;EM&gt;&lt;/EM&gt;&lt;/CODE&gt;&lt;EM&gt; with the name of the &lt;A href="https://docs.splunk.com/Splexicon:Index"&gt;index&lt;/A&gt; that contains the data. By default, Splunk stores data in the 'main' index. Therefore, &lt;CODE&gt;index=&lt;/CODE&gt;&lt;/EM&gt;&lt;CODE&gt;&lt;/CODE&gt; becomes &lt;CODE&gt;index=main&lt;/CODE&gt;. Use the &lt;CODE&gt;OR&lt;/CODE&gt; operator to &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Search/Searchindexes#Specify_one_or_multiple_indexes_to_search"&gt;specify one or multiple indexes to search&lt;/A&gt;. &lt;BR /&gt;
For example, &lt;CODE&gt;index=main OR index=security&lt;/CODE&gt;. See &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Indexer/Aboutmanagingindexes"&gt;About managing indexes&lt;/A&gt; and &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Indexer/Howindexingworks"&gt;How indexing works&lt;/A&gt; in Splunk docs for details.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Use the &lt;A href="https://splunkbase.splunk.com/app/742/"&gt;Splunk Add-on for Microsoft Windows&lt;/A&gt; to accelerate time to value time to value with Windows data. For details, see &lt;A href="https://answers.splunk.com/answers/741802/is-it-a-best-practice-to-use-the-splunk-add-on-for.html"&gt;Is it a best practice to use the Splunk Add-on for Microsoft Windows?&lt;/A&gt; on Splunk Answers.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Enable the &lt;CODE&gt;[WinEventLog://Security]&lt;/CODE&gt; input in the add-on to collect Windows security data. For details, see our post &lt;A href="https://answers.splunk.com/answers/743944/how-do-i-collect-basic-windows-os-event-log-data-f.html"&gt;How do I collect basic Windows OS Event Log data from my Windows systems?&lt;/A&gt; on Splunk Answers.&lt;/LI&gt;
&lt;LI&gt;Deploy the add-on to the search heads to use the &lt;A href="https://docs.splunk.com/Splexicon:CommonInformationModel"&gt;Common Information Model&lt;/A&gt; to normalize the data at search time. See &lt;A href="https://docs.splunk.com/Documentation/WindowsAddOn/latest/User/Install#Distributed_deployments"&gt;Install the Splunk Add-on for Windows&lt;/A&gt; in Splunk documents for the procedure.&lt;/LI&gt;
&lt;LI&gt;Run the following search to verify you are collecting Windows data: &lt;CODE&gt;earliest=-1day index=* source=win*security tag=authentication user=* src=* | head 10&lt;/CODE&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Use the &lt;A href="https://splunkbase.splunk.com/app/833/"&gt;Splunk Add-on for Unix and Linux&lt;/A&gt; to accelerate time to value with Unix and Linux data.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Enable the &lt;CODE&gt;[monitor:///var/log]&lt;/CODE&gt; input in the add-on to collect the Linux security data. See &lt;A href="https://docs.splunk.com/Documentation/UnixAddOn/latest/User/Enabledataandscriptedinputs"&gt;Enable data and scripted inputs for the Splunk Add-on for Unix and Linux&lt;/A&gt; in Splunk docs for the procedure.&lt;/LI&gt;
&lt;LI&gt;Give Splunk permission to read the &lt;CODE&gt;/var/log/secure&lt;/CODE&gt; file to allow Splunk to monitor the Linux secure data. For details, see &lt;A href="https://answers.splunk.com/answers/710445/which-unix-permissions-are-best-for-monitoring-fil.html"&gt;Which UNIX permissions are best for monitoring files?&lt;/A&gt; on Splunk Answers.&lt;/LI&gt;
&lt;LI&gt;Deploy the add-on to the search heads to use the &lt;A href="https://docs.splunk.com/Splexicon:CommonInformationModel"&gt;Common Information Model&lt;/A&gt; to normalize the data at search time. See &lt;A href="https://docs.splunk.com/Documentation/UnixAddOn/latest/User/InstalltheSplunkAdd-onforUnixandLinux#Distributed_installation_of_this_add-on"&gt;Install the Splunk Add-on for Unix and Linux&lt;/A&gt; in Splunk docs for the procedure.&lt;/LI&gt;
&lt;LI&gt;Run the following search to verify you are collecting Unix and Linux data: &lt;CODE&gt;earliest=-1day index=* sourcetype=linux_secure tag=authentication user=* src=* | head 10&lt;/CODE&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Since Splunk normalizes values from multiple source types regardless of source or format, it’s a best practice to make sure your data is &lt;A href="https://docs.splunk.com/Splexicon:CommonInformationModel"&gt;CIM&lt;/A&gt;-compliant. For more information about CIM and the &lt;A href="https://splunkbase.splunk.com/app/1621/"&gt;Splunk Common Information Model (CIM)&lt;/A&gt; add-on see the &lt;EM&gt;&lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Overview"&gt;Splunk Common Information Model Add-on Manual&lt;/A&gt;&lt;/EM&gt;. Run the following search to verify you are searching for normalized &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Authentication"&gt;authentication&lt;/A&gt; data and ready for this use case: &lt;CODE&gt;earliest=-1day index=* tag=authentication user=* src=* | head 10&lt;/CODE&gt;&lt;/P&gt;

&lt;H1&gt;Get insights&lt;/H1&gt;

&lt;P&gt;This scenario uses the &lt;A href="https://docs.splunk.com/Documentation/ES/latest/User/IncidentReviewdashboard"&gt;Incident Review&lt;/A&gt; dashboard in Splunk Enterprise Security and underlying &lt;A href="https://docs.splunk.com/Splexicon:Correlationsearch"&gt;correlation searches&lt;/A&gt;. Use the following procedure to discover incidents:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Navigate to the Splunk Enterprise Security web user interface.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Incident Review&lt;/STRONG&gt; from the top navigation bar.&lt;/LI&gt;
&lt;LI&gt;Select the text box under &lt;STRONG&gt;Correlation Search&lt;/STRONG&gt;, begin typing  &lt;STRONG&gt;Brute Force Access Behavior Detected&lt;/STRONG&gt;, then select the appropriate result from the result set.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Submit&lt;/STRONG&gt; to display &lt;A href="https://docs.splunk.com/Splexicon:Notableevent"&gt;notable events&lt;/A&gt;.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Review the &lt;A href="https://docs.splunk.com/Documentation/ES/latest/User/IncidentReviewdashboard"&gt;Overview of Incident Review in Splunk Enterprise Security&lt;/A&gt; in Splunk docs for guidance on how to triage and act on resulting incidents. If no results appear, there may not be any notable notable events. However, you may need to &lt;A href="https://docs.splunk.com/Documentation/ES/latest/Admin/Configurecorrelationsearches#Enable_correlation_searches"&gt;enable correlation searches&lt;/A&gt;.&lt;/P&gt;

&lt;P&gt;If no results appear, you may need to deploy the add-ons to the search heads to use the knowledge objects necessary for simple searching.&lt;/P&gt;</description>
    <pubDate>Mon, 09 Sep 2019 21:34:39 GMT</pubDate>
    <dc:creator>adukes_splunk</dc:creator>
    <dc:date>2019-09-09T21:34:39Z</dc:date>
    <item>
      <title>Example of a brute force access behavior detected use case?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Example-of-a-brute-force-access-behavior-detected-use-case/m-p/474502#M58302</link>
      <description>&lt;P&gt;Does anyone have examples of how to use Splunk to check for brute force access behavior?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 21:33:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Example-of-a-brute-force-access-behavior-detected-use-case/m-p/474502#M58302</guid>
      <dc:creator>adukes_splunk</dc:creator>
      <dc:date>2019-09-09T21:33:20Z</dc:date>
    </item>
    <item>
      <title>Re: Example of a brute force access behavior detected use case?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Example-of-a-brute-force-access-behavior-detected-use-case/m-p/474503#M58303</link>
      <description>&lt;H2&gt;&lt;EM&gt;The Splunk Product Best Practices team provided this response. Read more about &lt;A href="https://www.splunk.com/blog/2019/02/25/how-crowdsourcing-is-shaping-the-future-of-splunk-best-practices.html"&gt;How Crowdsourcing is Shaping the Future of Splunk Best Practices&lt;/A&gt;.&lt;/EM&gt;&lt;/H2&gt;

&lt;P&gt;In this use case, we'll explore how to use Splunk Enterprise Security to detect excessive number of failed login attempts followed by a successful login which can indicate a successful brute force attack.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=x78lcsWPPW8" target="_blank"&gt;&lt;IMG alt="Use Case : Detecting Brute Force Attacks" src="https://i.ytimg.com/vi/x78lcsWPPW8/hqdefault.jpg" /&gt;&lt;/A&gt;&lt;/P&gt;

&lt;H1&gt;Load data&lt;/H1&gt;

&lt;P&gt;This use case depends on &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Authentication"&gt;authentication&lt;/A&gt; data as defined by the &lt;A href="https://docs.splunk.com/Documentation/CIM/4.13.0/User/Overview"&gt;Common Information Model (CIM)&lt;/A&gt;. For simplicity, this example uses  authentication data from from Windows and Unix or Linux, but any data properly normalized for the &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Authentication"&gt;authentication&lt;/A&gt; data model works well. It’s a best practice to &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/UsetheCIMtonormalizedataatsearchtime"&gt;use the CIM to normalize data at search time&lt;/A&gt;, but before you put in effort to create new knowledge objects, check Splunkbase to see if such a CIM-compatible app or add-on already exists.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: In searches, replace the asterisk in &lt;CODE&gt;index=&lt;EM&gt;&lt;/EM&gt;&lt;/CODE&gt;&lt;EM&gt; with the name of the &lt;A href="https://docs.splunk.com/Splexicon:Index"&gt;index&lt;/A&gt; that contains the data. By default, Splunk stores data in the 'main' index. Therefore, &lt;CODE&gt;index=&lt;/CODE&gt;&lt;/EM&gt;&lt;CODE&gt;&lt;/CODE&gt; becomes &lt;CODE&gt;index=main&lt;/CODE&gt;. Use the &lt;CODE&gt;OR&lt;/CODE&gt; operator to &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Search/Searchindexes#Specify_one_or_multiple_indexes_to_search"&gt;specify one or multiple indexes to search&lt;/A&gt;. &lt;BR /&gt;
For example, &lt;CODE&gt;index=main OR index=security&lt;/CODE&gt;. See &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Indexer/Aboutmanagingindexes"&gt;About managing indexes&lt;/A&gt; and &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Indexer/Howindexingworks"&gt;How indexing works&lt;/A&gt; in Splunk docs for details.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Use the &lt;A href="https://splunkbase.splunk.com/app/742/"&gt;Splunk Add-on for Microsoft Windows&lt;/A&gt; to accelerate time to value time to value with Windows data. For details, see &lt;A href="https://answers.splunk.com/answers/741802/is-it-a-best-practice-to-use-the-splunk-add-on-for.html"&gt;Is it a best practice to use the Splunk Add-on for Microsoft Windows?&lt;/A&gt; on Splunk Answers.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Enable the &lt;CODE&gt;[WinEventLog://Security]&lt;/CODE&gt; input in the add-on to collect Windows security data. For details, see our post &lt;A href="https://answers.splunk.com/answers/743944/how-do-i-collect-basic-windows-os-event-log-data-f.html"&gt;How do I collect basic Windows OS Event Log data from my Windows systems?&lt;/A&gt; on Splunk Answers.&lt;/LI&gt;
&lt;LI&gt;Deploy the add-on to the search heads to use the &lt;A href="https://docs.splunk.com/Splexicon:CommonInformationModel"&gt;Common Information Model&lt;/A&gt; to normalize the data at search time. See &lt;A href="https://docs.splunk.com/Documentation/WindowsAddOn/latest/User/Install#Distributed_deployments"&gt;Install the Splunk Add-on for Windows&lt;/A&gt; in Splunk documents for the procedure.&lt;/LI&gt;
&lt;LI&gt;Run the following search to verify you are collecting Windows data: &lt;CODE&gt;earliest=-1day index=* source=win*security tag=authentication user=* src=* | head 10&lt;/CODE&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Use the &lt;A href="https://splunkbase.splunk.com/app/833/"&gt;Splunk Add-on for Unix and Linux&lt;/A&gt; to accelerate time to value with Unix and Linux data.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Enable the &lt;CODE&gt;[monitor:///var/log]&lt;/CODE&gt; input in the add-on to collect the Linux security data. See &lt;A href="https://docs.splunk.com/Documentation/UnixAddOn/latest/User/Enabledataandscriptedinputs"&gt;Enable data and scripted inputs for the Splunk Add-on for Unix and Linux&lt;/A&gt; in Splunk docs for the procedure.&lt;/LI&gt;
&lt;LI&gt;Give Splunk permission to read the &lt;CODE&gt;/var/log/secure&lt;/CODE&gt; file to allow Splunk to monitor the Linux secure data. For details, see &lt;A href="https://answers.splunk.com/answers/710445/which-unix-permissions-are-best-for-monitoring-fil.html"&gt;Which UNIX permissions are best for monitoring files?&lt;/A&gt; on Splunk Answers.&lt;/LI&gt;
&lt;LI&gt;Deploy the add-on to the search heads to use the &lt;A href="https://docs.splunk.com/Splexicon:CommonInformationModel"&gt;Common Information Model&lt;/A&gt; to normalize the data at search time. See &lt;A href="https://docs.splunk.com/Documentation/UnixAddOn/latest/User/InstalltheSplunkAdd-onforUnixandLinux#Distributed_installation_of_this_add-on"&gt;Install the Splunk Add-on for Unix and Linux&lt;/A&gt; in Splunk docs for the procedure.&lt;/LI&gt;
&lt;LI&gt;Run the following search to verify you are collecting Unix and Linux data: &lt;CODE&gt;earliest=-1day index=* sourcetype=linux_secure tag=authentication user=* src=* | head 10&lt;/CODE&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;&lt;STRONG&gt;Best practice&lt;/STRONG&gt;: Since Splunk normalizes values from multiple source types regardless of source or format, it’s a best practice to make sure your data is &lt;A href="https://docs.splunk.com/Splexicon:CommonInformationModel"&gt;CIM&lt;/A&gt;-compliant. For more information about CIM and the &lt;A href="https://splunkbase.splunk.com/app/1621/"&gt;Splunk Common Information Model (CIM)&lt;/A&gt; add-on see the &lt;EM&gt;&lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Overview"&gt;Splunk Common Information Model Add-on Manual&lt;/A&gt;&lt;/EM&gt;. Run the following search to verify you are searching for normalized &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Authentication"&gt;authentication&lt;/A&gt; data and ready for this use case: &lt;CODE&gt;earliest=-1day index=* tag=authentication user=* src=* | head 10&lt;/CODE&gt;&lt;/P&gt;

&lt;H1&gt;Get insights&lt;/H1&gt;

&lt;P&gt;This scenario uses the &lt;A href="https://docs.splunk.com/Documentation/ES/latest/User/IncidentReviewdashboard"&gt;Incident Review&lt;/A&gt; dashboard in Splunk Enterprise Security and underlying &lt;A href="https://docs.splunk.com/Splexicon:Correlationsearch"&gt;correlation searches&lt;/A&gt;. Use the following procedure to discover incidents:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Navigate to the Splunk Enterprise Security web user interface.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Incident Review&lt;/STRONG&gt; from the top navigation bar.&lt;/LI&gt;
&lt;LI&gt;Select the text box under &lt;STRONG&gt;Correlation Search&lt;/STRONG&gt;, begin typing  &lt;STRONG&gt;Brute Force Access Behavior Detected&lt;/STRONG&gt;, then select the appropriate result from the result set.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Submit&lt;/STRONG&gt; to display &lt;A href="https://docs.splunk.com/Splexicon:Notableevent"&gt;notable events&lt;/A&gt;.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Review the &lt;A href="https://docs.splunk.com/Documentation/ES/latest/User/IncidentReviewdashboard"&gt;Overview of Incident Review in Splunk Enterprise Security&lt;/A&gt; in Splunk docs for guidance on how to triage and act on resulting incidents. If no results appear, there may not be any notable notable events. However, you may need to &lt;A href="https://docs.splunk.com/Documentation/ES/latest/Admin/Configurecorrelationsearches#Enable_correlation_searches"&gt;enable correlation searches&lt;/A&gt;.&lt;/P&gt;

&lt;P&gt;If no results appear, you may need to deploy the add-ons to the search heads to use the knowledge objects necessary for simple searching.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 21:34:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Example-of-a-brute-force-access-behavior-detected-use-case/m-p/474503#M58303</guid>
      <dc:creator>adukes_splunk</dc:creator>
      <dc:date>2019-09-09T21:34:39Z</dc:date>
    </item>
    <item>
      <title>Re: Example of a brute force access behavior detected use case?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Example-of-a-brute-force-access-behavior-detected-use-case/m-p/474504#M58304</link>
      <description>&lt;P&gt;Added related video content.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2019 19:10:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Example-of-a-brute-force-access-behavior-detected-use-case/m-p/474504#M58304</guid>
      <dc:creator>sloshburch</dc:creator>
      <dc:date>2019-10-03T19:10:06Z</dc:date>
    </item>
  </channel>
</rss>

