<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Default Account Usage Correlation Search - All user as default in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Default-Account-Usage-Correlation-Search-All-user-as-default/m-p/333887#M3119</link>
    <description>&lt;P&gt;Hello there,&lt;/P&gt;

&lt;P&gt;On ES (4.7.2), the correlation search "Default Account Usage" is supposed to create notable events for default accounts as stated in its description:&lt;/P&gt;

&lt;P&gt;"Discovers use of default accounts (such as admin, administrator, etc.). Default accounts have default passwords and are therefore commonly targeted by attackers using brute force attack tools."&lt;/P&gt;

&lt;P&gt;It seems however that the correlation search does not differentiates between regular users and default accounts.&lt;/P&gt;

&lt;P&gt;When looking at the correlation search, it does simply search into tag= auth + default data model.&lt;/P&gt;

&lt;P&gt;| tstats summariesonly=true allow_old_summaries=true max(_time) as "lastTime",values(Authentication.tag) as "tag",count from datamodel=Authentication.Authentication where   nodename=Authentication.Default_Authentication.Successful_Default_Authentication  by "Authentication.dest","Authentication.user","Authentication.app"  | rename "Authentication.dest" as "dest","Authentication.user" as "user","Authentication.app" as "app"&lt;/P&gt;

&lt;P&gt;Event in Splunk Demo platform, all users are listed in the results not just default accounts like admins and the like.&lt;/P&gt;

&lt;P&gt;I am deducing that, the CIM Authentication should be understood like this :&lt;/P&gt;

&lt;P&gt;regular user -&amp;gt; tag = auth&lt;/P&gt;

&lt;P&gt;default account -&amp;gt; tag = auth + default&lt;/P&gt;

&lt;P&gt;priviledged user -&amp;gt; tag = auth + priviledged&lt;/P&gt;

&lt;P&gt;Thing is :&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;&lt;P&gt;sub dataset names are hardly explained. What is expected in these sub datasets is hard to know.&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;if this is the case, then most TAs should be reworked because most of them map the default tag for all authentication events (cf. Win / Nix TAs)&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;it seems that there was a lookup to filter default account in the previous version of ES (see : &lt;A href="https://answers.splunk.com/answers/120628/manage-splunk-app-for-enterprise-security-default-account-recognition.html" target="_blank"&gt;https://answers.splunk.com/answers/120628/manage-splunk-app-for-enterprise-security-default-account-recognition.html&lt;/A&gt;). Is there an equivalent in 4.7 version ?&lt;/P&gt;&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Maybe identity lookup should just contain this default accounts categorized as default. But it is not done this way in the demo identity lookup, so I am not sure.&lt;/P&gt;

&lt;P&gt;If anyone has a clue on this, it would be great!&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 17:11:20 GMT</pubDate>
    <dc:creator>support0</dc:creator>
    <dc:date>2020-09-29T17:11:20Z</dc:date>
    <item>
      <title>Default Account Usage Correlation Search - All user as default</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Default-Account-Usage-Correlation-Search-All-user-as-default/m-p/333887#M3119</link>
      <description>&lt;P&gt;Hello there,&lt;/P&gt;

&lt;P&gt;On ES (4.7.2), the correlation search "Default Account Usage" is supposed to create notable events for default accounts as stated in its description:&lt;/P&gt;

&lt;P&gt;"Discovers use of default accounts (such as admin, administrator, etc.). Default accounts have default passwords and are therefore commonly targeted by attackers using brute force attack tools."&lt;/P&gt;

&lt;P&gt;It seems however that the correlation search does not differentiates between regular users and default accounts.&lt;/P&gt;

&lt;P&gt;When looking at the correlation search, it does simply search into tag= auth + default data model.&lt;/P&gt;

&lt;P&gt;| tstats summariesonly=true allow_old_summaries=true max(_time) as "lastTime",values(Authentication.tag) as "tag",count from datamodel=Authentication.Authentication where   nodename=Authentication.Default_Authentication.Successful_Default_Authentication  by "Authentication.dest","Authentication.user","Authentication.app"  | rename "Authentication.dest" as "dest","Authentication.user" as "user","Authentication.app" as "app"&lt;/P&gt;

&lt;P&gt;Event in Splunk Demo platform, all users are listed in the results not just default accounts like admins and the like.&lt;/P&gt;

&lt;P&gt;I am deducing that, the CIM Authentication should be understood like this :&lt;/P&gt;

&lt;P&gt;regular user -&amp;gt; tag = auth&lt;/P&gt;

&lt;P&gt;default account -&amp;gt; tag = auth + default&lt;/P&gt;

&lt;P&gt;priviledged user -&amp;gt; tag = auth + priviledged&lt;/P&gt;

&lt;P&gt;Thing is :&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;&lt;P&gt;sub dataset names are hardly explained. What is expected in these sub datasets is hard to know.&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;if this is the case, then most TAs should be reworked because most of them map the default tag for all authentication events (cf. Win / Nix TAs)&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;it seems that there was a lookup to filter default account in the previous version of ES (see : &lt;A href="https://answers.splunk.com/answers/120628/manage-splunk-app-for-enterprise-security-default-account-recognition.html" target="_blank"&gt;https://answers.splunk.com/answers/120628/manage-splunk-app-for-enterprise-security-default-account-recognition.html&lt;/A&gt;). Is there an equivalent in 4.7 version ?&lt;/P&gt;&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Maybe identity lookup should just contain this default accounts categorized as default. But it is not done this way in the demo identity lookup, so I am not sure.&lt;/P&gt;

&lt;P&gt;If anyone has a clue on this, it would be great!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:11:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Default-Account-Usage-Correlation-Search-All-user-as-default/m-p/333887#M3119</guid>
      <dc:creator>support0</dc:creator>
      <dc:date>2020-09-29T17:11:20Z</dc:date>
    </item>
    <item>
      <title>Re: Default Account Usage Correlation Search - All user as default</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Default-Account-Usage-Correlation-Search-All-user-as-default/m-p/333888#M3120</link>
      <description>&lt;P&gt;The TAs aren't the issue in this case.  Check out &lt;CODE&gt;tags.conf&lt;/CODE&gt; in the Windows and nix TAs and you won't find any mention of setting the &lt;CODE&gt;default&lt;/CODE&gt; tag.&lt;/P&gt;

&lt;P&gt;What you're seeing is the ES identity management setting this tag based on the usernames.&lt;/P&gt;

&lt;P&gt;If you look at the output of &lt;CODE&gt;bin/splunk btool tags list --debug&lt;/CODE&gt; you'll see (at least) these entries, as provided by ES identity management:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;etc/apps/Splunk_SA_CIM/default/tags.conf             [is_default=true]
etc/apps/Splunk_SA_CIM/default/tags.conf             default = enabled

etc/apps/Splunk_SA_CIM/default/tags.conf             [src_user_category=default]
etc/apps/Splunk_SA_CIM/default/tags.conf             default = enabled

etc/apps/Splunk_SA_CIM/default/tags.conf             [user_category=default]
etc/apps/Splunk_SA_CIM/default/tags.conf             default = enabled
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And if you look at the builtin identity CSVs you'll probably see some of this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;./etc/apps/SA-IdentityManagement/lookups/administrative_identities.csv:3comcso,,,,,,,,,,,,default|privileged,,,,,,,
./etc/apps/SA-IdentityManagement/lookups/administrative_identities.csv:adfexc,,,,,,,,,,,,default|privileged,,,,,,,
./etc/apps/SA-IdentityManagement/lookups/administrative_identities.csv:adm,,,,,,,,,,,,default|privileged,,,,,,,
./etc/apps/SA-IdentityManagement/lookups/administrative_identities.csv:admin|administrator,,,,,,,,,,,,default|privileged,,,,,,,
./etc/apps/SA-IdentityManagement/lookups/administrative_identities.csv:anonymous,,,,,,,,,,,,default|privileged,,,,,,,
./etc/apps/SA-IdentityManagement/lookups/administrative_identities.csv:adminuser,,,,,,,,,,,,default|privileged,,,,,,,
./etc/apps/SA-IdentityManagement/lookups/administrative_identities.csv:advmail,,,,,,,,,,,,default|privileged,,,,,,,
./etc/apps/SA-IdentityManagement/lookups/administrative_identities.csv:bciim,,,,,,,,,,,,default|privileged,,,,,,,
./etc/apps/SA-IdentityManagement/lookups/administrative_identities.csv:bcms,,,,,,,,,,,,default|privileged,,,,,,,
./etc/apps/SA-IdentityManagement/lookups/administrative_identities.csv:browse,,,,,,,,,,,,default|privileged,,,,,,,
./etc/apps/SA-IdentityManagement/lookups/administrative_identities.csv:cisco,,,,,,,,,,,,default|privileged,,,,,,,
./etc/apps/SA-IdentityManagement/lookups/administrative_identities.csv:cusadmin,,,,,,,,,,,,default|privileged,,,,,,,
./etc/apps/SA-IdentityManagement/lookups/administrative_identities.csv:cust,,,,,,,,,,,,default|privileged,,,,,,,
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;ES is configured to set the default tag if any of the identities it has are found in the username fields it knows about are defined in your identity lookups with the &lt;CODE&gt;default&lt;/CODE&gt; category.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2017 01:36:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Default-Account-Usage-Correlation-Search-All-user-as-default/m-p/333888#M3120</guid>
      <dc:creator>micahkemp</dc:creator>
      <dc:date>2017-12-12T01:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: Default Account Usage Correlation Search - All user as default</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Default-Account-Usage-Correlation-Search-All-user-as-default/m-p/333889#M3121</link>
      <description>&lt;P&gt;Alright,&lt;/P&gt;

&lt;P&gt;More clearer now.&lt;/P&gt;

&lt;P&gt;So I usually build my TAs mapped to Authentication DM like this :&lt;/P&gt;

&lt;P&gt;tags.conf&lt;/P&gt;

&lt;P&gt;[eventtype=foo]&lt;BR /&gt;
authentication = enabled&lt;BR /&gt;
default = enabled&lt;/P&gt;

&lt;P&gt;Thanks for making me realize that this was a bad habit!&lt;/P&gt;

&lt;P&gt;It should be :&lt;/P&gt;

&lt;P&gt;[eventtype=bar]&lt;BR /&gt;
authentication = enabled&lt;/P&gt;

&lt;P&gt;AND/OR :&lt;/P&gt;

&lt;P&gt;[eventtype=foo]&lt;BR /&gt;
authentication = enabled&lt;BR /&gt;
privileged = enabled&lt;/P&gt;

&lt;P&gt;for special authentication events for which you know its a privileged access.&lt;/P&gt;

&lt;P&gt;For instance in Windows TA :&lt;/P&gt;

&lt;P&gt;[windows_special_privileges]&lt;BR /&gt;
search = sourcetype=*:Security (EventCode=4672 OR EventCode=576)&lt;/P&gt;

&lt;H1&gt;tags = authentication privileged&lt;/H1&gt;

&lt;P&gt;Then ES adds a default/privilged tag based on :&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;administrative_identities.csv&lt;/LI&gt;
&lt;LI&gt;configured identities.csv&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Thanks a lot!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:13:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Default-Account-Usage-Correlation-Search-All-user-as-default/m-p/333889#M3121</guid>
      <dc:creator>support0</dc:creator>
      <dc:date>2020-09-29T17:13:30Z</dc:date>
    </item>
  </channel>
</rss>

