<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic What is the best practice for building a Splunk Enterprise Security asset list off of DHCP data? in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/What-is-the-best-practice-for-building-a-Splunk-Enterprise/m-p/280129#M2267</link>
    <description>&lt;P&gt;What is the best way for Enterprise Security to handle assets that are assigned DHCP addresses?  Obviously the MAC address and the hostname should be fairly "stable", but what about IPs?  If the DHCP leases are short, a host could get multiple IPs over the course of a month or so.&lt;/P&gt;

&lt;P&gt;Do we just use the most recently assigned IP?  Do we add a week or a month's worth of IPs to a single asset?  What's the best practice?&lt;/P&gt;

&lt;P&gt;Thx.&lt;/P&gt;</description>
    <pubDate>Wed, 14 Dec 2016 18:53:45 GMT</pubDate>
    <dc:creator>responsys_cm</dc:creator>
    <dc:date>2016-12-14T18:53:45Z</dc:date>
    <item>
      <title>What is the best practice for building a Splunk Enterprise Security asset list off of DHCP data?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/What-is-the-best-practice-for-building-a-Splunk-Enterprise/m-p/280129#M2267</link>
      <description>&lt;P&gt;What is the best way for Enterprise Security to handle assets that are assigned DHCP addresses?  Obviously the MAC address and the hostname should be fairly "stable", but what about IPs?  If the DHCP leases are short, a host could get multiple IPs over the course of a month or so.&lt;/P&gt;

&lt;P&gt;Do we just use the most recently assigned IP?  Do we add a week or a month's worth of IPs to a single asset?  What's the best practice?&lt;/P&gt;

&lt;P&gt;Thx.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2016 18:53:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/What-is-the-best-practice-for-building-a-Splunk-Enterprise/m-p/280129#M2267</guid>
      <dc:creator>responsys_cm</dc:creator>
      <dc:date>2016-12-14T18:53:45Z</dc:date>
    </item>
    <item>
      <title>Re: What is the best practice for building a Splunk Enterprise Security asset list off of DHCP data?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/What-is-the-best-practice-for-building-a-Splunk-Enterprise/m-p/280130#M2268</link>
      <description>&lt;P&gt;Most recent IP. However, best practice would be to not use DHCP data (only) to build your asset list for Enterprise Security.&lt;/P&gt;

&lt;P&gt;Here are the fields needed:&lt;BR /&gt;
ip,mac,nt_host,dns,owner,priority,lat,long,city,country,bunit,category,pci_domain,is_expected,should_timesync,should_update,requires_av&lt;/P&gt;

&lt;P&gt;Reference:&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/ES/4.5.1/User/AssetandIdentityLookupReference" target="_blank"&gt;http://docs.splunk.com/Documentation/ES/4.5.1/User/AssetandIdentityLookupReference&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;DHCP data will only get you the first four fields. Combine it with Active Directory, SCCM, McAfee ePO and etc., would get your better results.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 12:07:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/What-is-the-best-practice-for-building-a-Splunk-Enterprise/m-p/280130#M2268</guid>
      <dc:creator>quihong</dc:creator>
      <dc:date>2020-09-29T12:07:52Z</dc:date>
    </item>
    <item>
      <title>Re: What is the best practice for building a Splunk Enterprise Security asset list off of DHCP data?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/What-is-the-best-practice-for-building-a-Splunk-Enterprise/m-p/280131#M2269</link>
      <description>&lt;P&gt;A minimum best practice would be to add DHCP as IP ranges and set the category accordingly.  If the Pools are limited in location where they are used I would also populate the location fields for the entries. You won't have host name matches but at least you can match on the IPs if they occur in network and IDS type logs.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/ES/4.6.0/User/AssetandIdentityLookupReference"&gt;http://docs.splunk.com/Documentation/ES/4.6.0/User/AssetandIdentityLookupReference&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;You could optionally have a DHCP specific asset table with NO ips but include all host names and mac addresses.  ES will cook all the asset information together. If something shows up as an IP you would get the information derived from the CIDR of the pool but no host name. If it shows in logs by name you would get that asset detail but without IP address.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Feb 2017 00:37:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/What-is-the-best-practice-for-building-a-Splunk-Enterprise/m-p/280131#M2269</guid>
      <dc:creator>starcher</dc:creator>
      <dc:date>2017-02-09T00:37:24Z</dc:date>
    </item>
    <item>
      <title>Re: What is the best practice for building a Splunk Enterprise Security asset list off of DHCP data?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/What-is-the-best-practice-for-building-a-Splunk-Enterprise/m-p/280132#M2270</link>
      <description>&lt;P&gt;You could also leverage the DHCP to maintain a time based lookup and apply within the specific searches as needed.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Feb 2017 12:31:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/What-is-the-best-practice-for-building-a-Splunk-Enterprise/m-p/280132#M2270</guid>
      <dc:creator>starcher</dc:creator>
      <dc:date>2017-02-11T12:31:30Z</dc:date>
    </item>
  </channel>
</rss>

