<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I effectively whitelist events like excessive failed logins, and abnormal new processes? in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/How-do-I-effectively-whitelist-events-like-excessive-failed/m-p/630688#M15398</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253522"&gt;@2MuchC0ff33&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its strange because when I run a normal search string outside of the New Suppression setup wizard/box I get no errors.&lt;/P&gt;&lt;P&gt;But when I input the same thing into the box and attempt to save, I get the error.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nonetheless, unfortunately neither one worked and I still can't figure out why it won't accept the string.&lt;/P&gt;</description>
    <pubDate>Mon, 13 Feb 2023 17:42:05 GMT</pubDate>
    <dc:creator>MdSantana</dc:creator>
    <dc:date>2023-02-13T17:42:05Z</dc:date>
    <item>
      <title>How do I effectively whitelist events like excessive failed logins, and abnormal new processes?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-do-I-effectively-whitelist-events-like-excessive-failed/m-p/630356#M15358</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How do I effectively whitelist events like excessive failed logins, and abnormal new processes? These are known, non malicious issues in our network that generate a lot of hits that do not amount to anything upon extensive investigation.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Feb 2023 01:58:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-do-I-effectively-whitelist-events-like-excessive-failed/m-p/630356#M15358</guid>
      <dc:creator>MdSantana</dc:creator>
      <dc:date>2023-02-10T01:58:46Z</dc:date>
    </item>
    <item>
      <title>Re: How do I effectively whitelist events like excessive failed logins, and abnormal new processes?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-do-I-effectively-whitelist-events-like-excessive-failed/m-p/630405#M15365</link>
      <description>&lt;P&gt;Great question &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253749"&gt;@MdSantana&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;You can effectively whitelist events in Splunk, such as excessive failed logins and unusual new processes, by using the following methods:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Suppression rules: To suppress these events, create a suppression rule in Splunk.&lt;/LI&gt;&lt;LI&gt;Whitelist of source IP addresses: For these events, you can create a whitelist of source IP addresses.&lt;/LI&gt;&lt;LI&gt;Use of "ignore" or "exclusion" lists: For these events, you can create an ignore or exclusion list.&lt;/LI&gt;&lt;LI&gt;Use of event types: These events can be assigned specific event types.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;It should be noted that these methods should be used with caution, as they can also conceal legitimate security events. I recommend reading the Splunk documentation for more information on suppression rules, whitelist, ignore or exclusion lists, and event types:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Suppression Rules: &lt;A href="https://docs.splunk.com/Documentation/ES/6.3.0/admin/Suppressionrules" target="_blank"&gt;https://docs.splunk.com/Documentation/ES/6.3.0/admin/Suppressionrules&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Whitelist: &lt;A href="https://docs.splunk.com/Documentation/ES/6.3.0/admin/Whitelist" target="_blank"&gt;https://docs.splunk.com/Documentation/ES/6.3.0/admin/Whitelist&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Ignore or Exclusion Lists: &lt;A href="https://docs.splunk.com/Documentation/ES/6.3.0/admin/Ignorelist" target="_blank"&gt;https://docs.splunk.com/Documentation/ES/6.3.0/admin/Ignorelist&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Event Types: &lt;A href="https://docs.splunk.com/Documentation/Splunk/7.3.3/Search/Abouteventtypes" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/7.3.3/Search/Abouteventtypes&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Let me know if you need help developing commands.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Feb 2023 07:17:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-do-I-effectively-whitelist-events-like-excessive-failed/m-p/630405#M15365</guid>
      <dc:creator>2MuchC0ff33</dc:creator>
      <dc:date>2023-02-10T07:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: How do I effectively whitelist events like excessive failed logins, and abnormal new processes?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-do-I-effectively-whitelist-events-like-excessive-failed/m-p/630526#M15379</link>
      <description>&lt;P&gt;Thank you 2MuchC0ff33.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did a lot of searching to try and make sure I would only be whitelisting confirmed non malicious stuff while still allowing Splunk to do its job.&lt;/P&gt;&lt;P&gt;However, I have run into an issue while suppressing. Apparently my search cannot be parsed correctly.&amp;nbsp; Here it is;&lt;/P&gt;&lt;P&gt;| from datamodel:"Change"."Network_Changes" | search dvc="17x.xx.x.*" command="!exec: enable"&lt;/P&gt;&lt;P&gt;Not sure what the issue is, but any help is appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you again!&lt;/P&gt;</description>
      <pubDate>Fri, 10 Feb 2023 21:25:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-do-I-effectively-whitelist-events-like-excessive-failed/m-p/630526#M15379</guid>
      <dc:creator>MdSantana</dc:creator>
      <dc:date>2023-02-10T21:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: How do I effectively whitelist events like excessive failed logins, and abnormal new processes?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-do-I-effectively-whitelist-events-like-excessive-failed/m-p/630579#M15383</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253749"&gt;@MdSantana&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Using the "!" character in the search expression could be the source of the problem with the search query. In Splunk, the "!" character is used to negate a search term, so "!exec: enable" would match events where the value of the "command" field does not contain the string "exec: enable".&lt;/P&gt;&lt;P&gt;You could try escaping the "!" character by adding a backslash in front of it, as shown below:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| from datamodel:"Change"."Network_Changes" | search dvc="17x.xx.x.*" command="\!exec: enable"&lt;/LI-CODE&gt;&lt;P&gt;If this does not solve the problem, try replacing the "!" character with the "!" sequence, as shown below:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| from datamodel:"Change"."Network_Changes" | search dvc="17x.xx.x.*" command="\\!exec: enable"&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 13 Feb 2023 03:16:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-do-I-effectively-whitelist-events-like-excessive-failed/m-p/630579#M15383</guid>
      <dc:creator>2MuchC0ff33</dc:creator>
      <dc:date>2023-02-13T03:16:40Z</dc:date>
    </item>
    <item>
      <title>Re: How do I effectively whitelist events like excessive failed logins, and abnormal new processes?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-do-I-effectively-whitelist-events-like-excessive-failed/m-p/630688#M15398</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253522"&gt;@2MuchC0ff33&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its strange because when I run a normal search string outside of the New Suppression setup wizard/box I get no errors.&lt;/P&gt;&lt;P&gt;But when I input the same thing into the box and attempt to save, I get the error.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nonetheless, unfortunately neither one worked and I still can't figure out why it won't accept the string.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Feb 2023 17:42:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-do-I-effectively-whitelist-events-like-excessive-failed/m-p/630688#M15398</guid>
      <dc:creator>MdSantana</dc:creator>
      <dc:date>2023-02-13T17:42:05Z</dc:date>
    </item>
    <item>
      <title>Re: How do I effectively whitelist events like excessive failed logins, and abnormal new processes?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-do-I-effectively-whitelist-events-like-excessive-failed/m-p/631106#M15408</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253749"&gt;@MdSantana&lt;/a&gt;, Could you try manually creating the suppression rule by adding it to your Splunk configuration's transforms.conf file?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2023 01:53:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-do-I-effectively-whitelist-events-like-excessive-failed/m-p/631106#M15408</guid>
      <dc:creator>2MuchC0ff33</dc:creator>
      <dc:date>2023-02-16T01:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: How do I effectively whitelist events like excessive failed logins, and abnormal new processes?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-do-I-effectively-whitelist-events-like-excessive-failed/m-p/631208#M15415</link>
      <description>&lt;P&gt;Still doesn't work.&lt;/P&gt;&lt;P&gt;I really don't understand what the problem is with my search when it parses correctly in the search app, but fails in the new suppression wizard.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2023 15:52:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-do-I-effectively-whitelist-events-like-excessive-failed/m-p/631208#M15415</guid>
      <dc:creator>MdSantana</dc:creator>
      <dc:date>2023-02-16T15:52:37Z</dc:date>
    </item>
  </channel>
</rss>

