<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to exclude events with same session_id - Remote Desktop Network Bruteforce in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-exclude-events-with-same-session-id-Remote-Desktop/m-p/609975#M10988</link>
    <description>&lt;P&gt;The &lt;FONT face="courier new,courier"&gt;tstats&lt;/FONT&gt; command does not provide the session_id field so you won't be able to filter on it.&amp;nbsp; You'll have to modify the query so &lt;FONT face="courier new,courier"&gt;tstats&lt;/FONT&gt; returns session_id then you can include the field in your `remote_desktop_network_bruteforce_filter` macro.&lt;/P&gt;</description>
    <pubDate>Thu, 18 Aug 2022 12:50:35 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2022-08-18T12:50:35Z</dc:date>
    <item>
      <title>How to exclude events with same session_id - Remote Desktop Network Bruteforce?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-exclude-events-with-same-session-id-Remote-Desktop/m-p/609800#M10987</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We are trying to modify the existing query in the "Remote Desktop Network Bruteforce" correlation search present in the Splunk ES use cases to exclude events with the same session_id.&lt;/P&gt;
&lt;P&gt;The original query is:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime from datamodel=Network_Traffic where All_Traffic.app=rdp by All_Traffic.src All_Traffic.dest All_Traffic.dest_port | eventstats stdev(count) AS stdev avg(count) AS avg p50(count) AS p50 | where count&amp;gt;(avg + stdev*2) | rename All_Traffic.src AS src All_Traffic.dest AS dest | table firstTime lastTime src dest count avg p50 stdev | `remote_desktop_network_bruteforce_filter`&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;We have tried using the "dedup" command and the "distinct_count" function of stats command without success.&lt;BR /&gt;Thanks in advance,&lt;BR /&gt;Best Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2022 14:22:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-exclude-events-with-same-session-id-Remote-Desktop/m-p/609800#M10987</guid>
      <dc:creator>jmgonzalez</dc:creator>
      <dc:date>2022-08-26T14:22:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to exclude events with same session_id - Remote Desktop Network Bruteforce</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-exclude-events-with-same-session-id-Remote-Desktop/m-p/609975#M10988</link>
      <description>&lt;P&gt;The &lt;FONT face="courier new,courier"&gt;tstats&lt;/FONT&gt; command does not provide the session_id field so you won't be able to filter on it.&amp;nbsp; You'll have to modify the query so &lt;FONT face="courier new,courier"&gt;tstats&lt;/FONT&gt; returns session_id then you can include the field in your `remote_desktop_network_bruteforce_filter` macro.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Aug 2022 12:50:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-exclude-events-with-same-session-id-Remote-Desktop/m-p/609975#M10988</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2022-08-18T12:50:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to exclude events with same session_id - Remote Desktop Network Bruteforce</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-exclude-events-with-same-session-id-Remote-Desktop/m-p/610713#M10995</link>
      <description>&lt;P&gt;After including the "session_id" field within the tstats command, in the BY clause to extract it, we have observed that some results are excluded where there are several different values in the session_id field.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2022 15:24:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-exclude-events-with-same-session-id-Remote-Desktop/m-p/610713#M10995</guid>
      <dc:creator>jmgonzalez</dc:creator>
      <dc:date>2022-08-24T15:24:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to exclude events with same session_id - Remote Desktop Network Bruteforce</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-exclude-events-with-same-session-id-Remote-Desktop/m-p/610961#M11001</link>
      <description>&lt;P class="lia-align-left"&gt;Note that "session_id" is not an eval field in the Network Traffic data model, meaning that it could be null for some entries. If you add session_id to the by clause, these entries would be dismissed. If this is the case, you can either use the "&lt;SPAN&gt;fillnull_value&lt;/SPAN&gt;" argument on the tstats command, or instead of adding session_id after the by clause, add it as a values&amp;nbsp;function.&lt;/P&gt;&lt;PRE&gt;| tstats summariesonly=t count values(All_Traffic.session_id) as session_id min(_time) as firstTime max(_time) as lastTime from datamodel=Network_Traffic by All_Traffic.src All_Traffic.dest All_Traffic.dest_port&amp;nbsp;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2022 14:13:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-exclude-events-with-same-session-id-Remote-Desktop/m-p/610961#M11001</guid>
      <dc:creator>hettervik</dc:creator>
      <dc:date>2022-08-26T14:13:29Z</dc:date>
    </item>
  </channel>
</rss>

