<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: First Time Seen Running Windows Service Alert On Splunk Enterprise Security in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/First-Time-Seen-Running-Windows-Service-Alert-On-Splunk/m-p/469911#M7152</link>
    <description>&lt;P&gt;the CS is using a lookup (previously_seen_running_windows_services) to check the seen services. Every time search runs splunk get this lookup to compare and records whatever he finds new. Its Ok to look just into the last 60 min since every time the search runs you are also calculating the difference from what you have recorded.&lt;/P&gt;

&lt;P&gt;Check if the lookup previously_seen_running_windows_services is been properly written into. &lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 02:02:50 GMT</pubDate>
    <dc:creator>diogofgm</dc:creator>
    <dc:date>2020-09-30T02:02:50Z</dc:date>
    <item>
      <title>First Time Seen Running Windows Service Alert On Splunk Enterprise Security</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/First-Time-Seen-Running-Windows-Service-Alert-On-Splunk/m-p/469910#M7151</link>
      <description>&lt;P&gt;Hi Splunkers,&lt;/P&gt;

&lt;P&gt;We have realized our "First Time Seen Running Windows Service " Correlation search seen below has been giving alot of false positives. This correlation search came with Splunk ES Content Update.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=wineventlog eventtype=wineventlog_system signature_id=7036 
| rex field=Message "The (?&amp;lt;serviceName&amp;gt;[\w\s-]*) service entered the (?&amp;lt;action&amp;gt;\w*) state" 
| where action="running" 
| inputlookup append=t previously_seen_running_windows_services 
| multireport 
    [| stats earliest(eval(coalesce(_time, firstTime))) as firstTime, latest(eval(coalesce(_time, lastTime))) as lastTime by serviceName 
    | outputlookup previously_seen_running_windows_services 
    | where fact=fiction] 
    [| eventstats earliest(eval(coalesce(_time, firstTime))) as firstTime, latest(eval(coalesce(_time, lastTime))) as lastTime by serviceName 
    | where firstTime &amp;gt;= relative_time(now(), "-60m@m") AND isnotnull(_time) 
    | stats values(dest) as dest by _time, serviceName] 
| table _time, serviceName, dest
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;After inspecting every hostname with this alert we have come to conclusion that we have actually seen this service before on the hostname. The alarm actually looks only for the last sixty minutes of the hostname. Is this rule intented that way or is there a method to fix and get cleaner positive results ? &lt;/P&gt;

&lt;P&gt;We know that any services ran before, and still is running even though the alarm keeps mentioning that the service was seen running for the first time.&lt;/P&gt;

&lt;P&gt;Thanks, Regards .&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2019 10:20:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/First-Time-Seen-Running-Windows-Service-Alert-On-Splunk/m-p/469910#M7151</guid>
      <dc:creator>burakatabay</dc:creator>
      <dc:date>2019-08-31T10:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: First Time Seen Running Windows Service Alert On Splunk Enterprise Security</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/First-Time-Seen-Running-Windows-Service-Alert-On-Splunk/m-p/469911#M7152</link>
      <description>&lt;P&gt;the CS is using a lookup (previously_seen_running_windows_services) to check the seen services. Every time search runs splunk get this lookup to compare and records whatever he finds new. Its Ok to look just into the last 60 min since every time the search runs you are also calculating the difference from what you have recorded.&lt;/P&gt;

&lt;P&gt;Check if the lookup previously_seen_running_windows_services is been properly written into. &lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 02:02:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/First-Time-Seen-Running-Windows-Service-Alert-On-Splunk/m-p/469911#M7152</guid>
      <dc:creator>diogofgm</dc:creator>
      <dc:date>2020-09-30T02:02:50Z</dc:date>
    </item>
    <item>
      <title>Re: First Time Seen Running Windows Service Alert On Splunk Enterprise Security</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/First-Time-Seen-Running-Windows-Service-Alert-On-Splunk/m-p/469912#M7153</link>
      <description>&lt;P&gt;I think the logic should be tweaked at the end to negate it at the end from the lookup file  or It could be done at the beginning also. Am posting to negate it at the end&lt;/P&gt;

&lt;P&gt;eventtype=wineventlog_system signature_id=7036&lt;BR /&gt;
| rex field=Message "The (?[\w\s-]) service entered the (?\w) state" | where action="running" | inputlookup append=t previously_seen_running_windows_services | multireport [| stats earliest(eval(coalesce(_time, firstTime))) as firstTime, latest(eval(coalesce(_time, lastTime))) as lastTime by serviceName | outputlookup previously_seen_running_windows_services | where fact=fiction ] [| eventstats earliest(eval(coalesce(_time, firstTime))) as firstTime, latest(eval(coalesce(_time, lastTime))) as lastTime by serviceName | where firstTime &amp;gt;= relative_time(now(), "-60m@m") AND isnotnull(_time) | stats values(dest) as dest by _time, serviceName] | table _time, serviceName, dest | search NOT [| inputlookup previously_seen_running_windows_services | fields _time, serviceName, dest]&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:47:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/First-Time-Seen-Running-Windows-Service-Alert-On-Splunk/m-p/469912#M7153</guid>
      <dc:creator>muralimadhavan</dc:creator>
      <dc:date>2020-09-30T03:47:25Z</dc:date>
    </item>
  </channel>
</rss>

