<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk + Crowdstrike (DnsRequest+ImageFileName join) in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Crowdstrike-DnsRequest-ImageFileName-join/m-p/559302#M10060</link>
    <description>&lt;P&gt;The explanation for this is that there is a limit on how many results can be returned in a sub-search (right-side of a join). I believe 50k results is the limit. So try to make sure your search is as narrow as possible.&lt;/P&gt;</description>
    <pubDate>Tue, 13 Jul 2021 19:09:35 GMT</pubDate>
    <dc:creator>swebb07g</dc:creator>
    <dc:date>2021-07-13T19:09:35Z</dc:date>
    <item>
      <title>Splunk + Crowdstrike (DnsRequest+ImageFileName join)</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Crowdstrike-DnsRequest-ImageFileName-join/m-p/412119#M4865</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I got this query from Crowdstrike Documentation https[://]www[.]crowdstrike[. ]com/blog/tech-center/hunt-threat-activity-falcon-endpoint-protection/&lt;/P&gt;

&lt;P&gt;Under "Events App: Step-By-Step Procedure" Step no. 4, there is this query:&lt;/P&gt;

&lt;P&gt;aid=* event_simpleName="DnsRequest" | rename ContextProcessId as TargetProcessId | join TargetProcessId [search aid=* event_simpleName="ProcessRollup2" ImageFileName="*notepad.exe"] | table ImageFileName DomainName&lt;/P&gt;

&lt;P&gt;Individually, the main search or the sub search works fine. If I join them like in the above and change &lt;EM&gt;notepad.exe to *chrome.exe, I am able to see all DnsRequests events from chrome.exe process. But if I only say ImageFileName="&lt;/EM&gt;.exe" in the subset, the resulting table has the correct DomainName column but the ImageFileName column contains only a single process (.e,.g \Device\HarddiskVolume2\Program Files\AppSense\Performance Manager\Agent\PmAgentAssist.exe). How come the search is only picking up this one process "pmAgentAssist.exe"? &lt;/P&gt;

&lt;P&gt;Any idea how to solve this? My goal is to locate all DNS requests made in all machines and determine the process/programs which sent the requests.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:56:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Crowdstrike-DnsRequest-ImageFileName-join/m-p/412119#M4865</guid>
      <dc:creator>splunkb0y</dc:creator>
      <dc:date>2020-09-29T20:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk + Crowdstrike (DnsRequest+ImageFileName join)</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Crowdstrike-DnsRequest-ImageFileName-join/m-p/412120#M4866</link>
      <description>&lt;P&gt;typo, ImageFileName=".exe" should be "ImageFileName="*.exe"&lt;/P&gt;</description>
      <pubDate>Fri, 17 Aug 2018 23:57:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Crowdstrike-DnsRequest-ImageFileName-join/m-p/412120#M4866</guid>
      <dc:creator>splunkb0y</dc:creator>
      <dc:date>2018-08-17T23:57:02Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk + Crowdstrike (DnsRequest+ImageFileName join)</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Crowdstrike-DnsRequest-ImageFileName-join/m-p/412121#M4867</link>
      <description>&lt;P&gt;Actually, this is the ImageFileName I get, if I don't specify a ComputerName on both Main and Sub search: &lt;BR /&gt;
\Device\HarddiskVolume2\Windows\System32\dllhost.exe&lt;/P&gt;</description>
      <pubDate>Sat, 18 Aug 2018 00:15:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Crowdstrike-DnsRequest-ImageFileName-join/m-p/412121#M4867</guid>
      <dc:creator>splunkb0y</dc:creator>
      <dc:date>2018-08-18T00:15:32Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk + Crowdstrike (DnsRequest+ImageFileName join)</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Crowdstrike-DnsRequest-ImageFileName-join/m-p/412122#M4868</link>
      <description>&lt;P&gt;I'm experiencing the same issue. Did you ever find a solution?&lt;/P&gt;

&lt;P&gt;I can say (not sure when this changed) that  TargetProcessId and ContextProcessId are now TargetProcessId_decimal and ContextProcessId_decimal. &lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 00:48:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Crowdstrike-DnsRequest-ImageFileName-join/m-p/412122#M4868</guid>
      <dc:creator>slw07gdev</dc:creator>
      <dc:date>2020-09-30T00:48:15Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk + Crowdstrike (DnsRequest+ImageFileName join)</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Crowdstrike-DnsRequest-ImageFileName-join/m-p/559302#M10060</link>
      <description>&lt;P&gt;The explanation for this is that there is a limit on how many results can be returned in a sub-search (right-side of a join). I believe 50k results is the limit. So try to make sure your search is as narrow as possible.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jul 2021 19:09:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Crowdstrike-DnsRequest-ImageFileName-join/m-p/559302#M10060</guid>
      <dc:creator>swebb07g</dc:creator>
      <dc:date>2021-07-13T19:09:35Z</dc:date>
    </item>
  </channel>
</rss>

