<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Separating Kerberos Events in Datamodel.Authentication in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Separating-Kerberos-Events-in-Datamodel-Authentication/m-p/399516#M4515</link>
    <description>&lt;P&gt;If you don't need Logon Process: Kerberos events, you can filter them in the universal forwarder on the windows server using blacklist to filter 4624 with kerberos.&lt;/P&gt;

&lt;P&gt;On the other hand, if you do not want to filter them (as they may be required for forensics/analysis of auth processes during incident), you can define a custom field in the Authentication datamodel and map logon process which can be used to filter in your tstats search .&lt;/P&gt;</description>
    <pubDate>Wed, 16 Jan 2019 14:57:37 GMT</pubDate>
    <dc:creator>lakshman239</dc:creator>
    <dc:date>2019-01-16T14:57:37Z</dc:date>
    <item>
      <title>Separating Kerberos Events in Datamodel.Authentication</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Separating-Kerberos-Events-in-Datamodel-Authentication/m-p/399515#M4514</link>
      <description>&lt;P&gt;Greetings--&lt;/P&gt;

&lt;P&gt;Kerberos will attempt to impersonate a user by requesting tickets from the Domain Controllers on any domain joined computers OR if a user is logging into a .NET web service, this generates a LOT of noise and triggers our Brute Force, Excessive Login, and Geographically Improbable Access notables.&lt;BR /&gt;
The goal is to clean-up and/or suppress &lt;STRONG&gt;Notable Events&lt;/STRONG&gt; within &lt;STRONG&gt;Enterprise Security&lt;/STRONG&gt; that are related to Kerberos.&lt;/P&gt;

&lt;P&gt;Looking at:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; |from datamodel:"Authentication"."Authentication" | search kerberos
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;We see that each kerberos logon process contains 3 event codes AS signature_id:&lt;BR /&gt;
4624&lt;BR /&gt;&lt;BR /&gt;
4769&lt;BR /&gt;&lt;BR /&gt;
4768&lt;/P&gt;

&lt;P&gt;For the latter two, &lt;/P&gt;

&lt;P&gt;4769:--&lt;BR /&gt;
TaskCategory=Kerberos Service Ticket Operations&lt;/P&gt;

&lt;P&gt;4768:--&lt;BR /&gt;
TaskCategory=Kerberos Authentication Service&lt;/P&gt;

&lt;P&gt;I can modify the Correlation Searches to filter event 4768 or 4769 as they relate exclusively to Kerberos.&lt;BR /&gt;
e.g.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| `tstats` min(_time),earliest(Authentication.app) from datamodel=Authentication.Authentication where Authentication.action="success" AND Authentication.signature_id!="4768" AND Authentication.signature_id!="4768"  by Authentication.src,Authentication.user [...and so forth...]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The issue: &lt;BR /&gt;
Events 4624 are generated for ANY logon event, kerberos or otherwise.&lt;BR /&gt;
Looking at a RAW event, I see that 4624: contains a field:   Logon Process: Kerberos:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Detailed Authentication Information:
    Logon Process:      Kerberos
    Authentication Package: Kerberos
    Transited Services:
    Package Name (NTLM only):
    Key Length:     0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This is properly extracted on index="wineventlog:security" but does not seem to be so when we do a search against the datamodel (which is primarily CIM fields).&lt;/P&gt;

&lt;P&gt;Question:&lt;BR /&gt;
How else can I isolate these events and use them in Correlation Searches?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jan 2019 19:14:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Separating-Kerberos-Events-in-Datamodel-Authentication/m-p/399515#M4514</guid>
      <dc:creator>richardphung</dc:creator>
      <dc:date>2019-01-15T19:14:09Z</dc:date>
    </item>
    <item>
      <title>Re: Separating Kerberos Events in Datamodel.Authentication</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Separating-Kerberos-Events-in-Datamodel-Authentication/m-p/399516#M4515</link>
      <description>&lt;P&gt;If you don't need Logon Process: Kerberos events, you can filter them in the universal forwarder on the windows server using blacklist to filter 4624 with kerberos.&lt;/P&gt;

&lt;P&gt;On the other hand, if you do not want to filter them (as they may be required for forensics/analysis of auth processes during incident), you can define a custom field in the Authentication datamodel and map logon process which can be used to filter in your tstats search .&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 14:57:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Separating-Kerberos-Events-in-Datamodel-Authentication/m-p/399516#M4515</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2019-01-16T14:57:37Z</dc:date>
    </item>
  </channel>
</rss>

