<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identifying events that originate greater than 50 miles from a lon\lat. in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Identifying-events-that-originate-greater-than-50-miles-from-a/m-p/429215#M5562</link>
    <description>&lt;P&gt;couple of accepted answers in this portal that leads to this blog:&lt;BR /&gt;
&lt;A href="http://www.sedward5.com/detecting-credential-theft-using-splunk-geographic-information/"&gt;http://www.sedward5.com/detecting-credential-theft-using-splunk-geographic-information/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;here are the answers:&lt;BR /&gt;
&lt;A href="https://answers.splunk.com/answers/219607/how-to-search-concurrent-logins-from-geographicall.html"&gt;https://answers.splunk.com/answers/219607/how-to-search-concurrent-logins-from-geographicall.html&lt;/A&gt;&lt;BR /&gt;
&lt;A href="https://answers.splunk.com/answers/169873/how-to-set-up-an-alert-to-detect-login-abuse-and-c.html"&gt;https://answers.splunk.com/answers/169873/how-to-set-up-an-alert-to-detect-login-abuse-and-c.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;hope it helps&lt;/P&gt;</description>
    <pubDate>Tue, 30 Apr 2019 00:00:03 GMT</pubDate>
    <dc:creator>adonio</dc:creator>
    <dc:date>2019-04-30T00:00:03Z</dc:date>
    <item>
      <title>Identifying events that originate greater than 50 miles from a lon\lat.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Identifying-events-that-originate-greater-than-50-miles-from-a/m-p/429212#M5559</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;We have multiple international locations (Japan, Italy, Spain ect...) and are looking to identify events that occur outside a 50 mile radius from each location using their latitude and longitude.  The end goal is to set different thresholds for these sites.  Id imagine ill need to create a lookup for each locations latitude and longitude for the query to reference.  &lt;/P&gt;

&lt;P&gt;I'm not exactly sure where to begin and hope you guys can point me in the right direction. &lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2019 18:46:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Identifying-events-that-originate-greater-than-50-miles-from-a/m-p/429212#M5559</guid>
      <dc:creator>bbraun</dc:creator>
      <dc:date>2019-04-29T18:46:16Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying events that originate greater than 50 miles from a lon\lat.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Identifying-events-that-originate-greater-than-50-miles-from-a/m-p/429213#M5560</link>
      <description>&lt;P&gt;Have you looked access anomalies dashboard which is available as part of user activity monitoring? Geographically Improbable Accesses - &lt;A href="https://docs.splunk.com/Documentation/ES/5.3.0/User/UserRisk#Access_Anomalies"&gt;https://docs.splunk.com/Documentation/ES/5.3.0/User/UserRisk#Access_Anomalies&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2019 20:26:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Identifying-events-that-originate-greater-than-50-miles-from-a/m-p/429213#M5560</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2019-04-29T20:26:43Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying events that originate greater than 50 miles from a lon\lat.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Identifying-events-that-originate-greater-than-50-miles-from-a/m-p/429214#M5561</link>
      <description>&lt;P&gt;yea, I figured I could steal logic from the Correlation Search as a plan B.  I was hoping someone had already tackled this issue since I dont have a lot of experience building queries.  &lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2019 20:51:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Identifying-events-that-originate-greater-than-50-miles-from-a/m-p/429214#M5561</guid>
      <dc:creator>bbraun</dc:creator>
      <dc:date>2019-04-29T20:51:15Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying events that originate greater than 50 miles from a lon\lat.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Identifying-events-that-originate-greater-than-50-miles-from-a/m-p/429215#M5562</link>
      <description>&lt;P&gt;couple of accepted answers in this portal that leads to this blog:&lt;BR /&gt;
&lt;A href="http://www.sedward5.com/detecting-credential-theft-using-splunk-geographic-information/"&gt;http://www.sedward5.com/detecting-credential-theft-using-splunk-geographic-information/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;here are the answers:&lt;BR /&gt;
&lt;A href="https://answers.splunk.com/answers/219607/how-to-search-concurrent-logins-from-geographicall.html"&gt;https://answers.splunk.com/answers/219607/how-to-search-concurrent-logins-from-geographicall.html&lt;/A&gt;&lt;BR /&gt;
&lt;A href="https://answers.splunk.com/answers/169873/how-to-set-up-an-alert-to-detect-login-abuse-and-c.html"&gt;https://answers.splunk.com/answers/169873/how-to-set-up-an-alert-to-detect-login-abuse-and-c.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;hope it helps&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2019 00:00:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Identifying-events-that-originate-greater-than-50-miles-from-a/m-p/429215#M5562</guid>
      <dc:creator>adonio</dc:creator>
      <dc:date>2019-04-30T00:00:03Z</dc:date>
    </item>
  </channel>
</rss>

