<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multisearching in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Multisearching/m-p/475822#M7474</link>
    <description>&lt;P&gt;Hi, I would suggest you get a wildcard before and after the surnames that way the lookup entry would look like &lt;EM&gt;smith&lt;/EM&gt;. To do that you can edit the ldapsearch query and add the following in the end: &lt;CODE&gt;| eval Surname= "*" + Surname + "*"&lt;/CODE&gt;. That should add the wildcards on the lookup you're using to whitelist.&lt;BR /&gt;
Hopefully that helps&lt;/P&gt;</description>
    <pubDate>Wed, 08 Jan 2020 14:34:26 GMT</pubDate>
    <dc:creator>gfreitas</dc:creator>
    <dc:date>2020-01-08T14:34:26Z</dc:date>
    <item>
      <title>Multisearching</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Multisearching/m-p/475819#M7471</link>
      <description>&lt;P&gt;Hi All,&lt;BR /&gt;
First post on here. Hopefully this makes sense and isn't overly convoluted.&lt;/P&gt;

&lt;P&gt;So, I have a datamodel correlation search in Enterprise Security that looks for accounts being deleted:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| from datamodel:"Change_Analysis"."Account_Management" | where 'tag'="delete" | search NOT "changed: /usr*" | stats max(_time) as "lastTime",latest(_raw) as "orig_raw",values(result) as "signature",values(src) as "src",values(dest) as "dest",count by "src_user","user" | where 'count'&amp;gt;0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This is great, however I have an access management team and I don't want their accounts to trigger a notable event. I understand that I can put exceptions in for each member of the team, but there would be an admin overhead to keep this up to date.&lt;BR /&gt;
I have a ldapsearchthat extracts the surnames of the team members from active directory:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| ldapsearch search="(&amp;amp;(objectClass=group) (cn=*))" attrs="member,sAMAccountName" basedn="CN=&amp;lt;GroupName&amp;gt;,OU=&amp;lt;OU&amp;gt;,DC=&amp;lt;DC&amp;gt;" 
| rex field=member "CN=([^,\d]*)* (?&amp;lt;Surnames&amp;gt;[^,\d]*)" 
| table Surnames 
| mvexpand Surnames
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Is there a way to combine these searches and get the correlation search to look at the list of surnames and not trigger if a match is found? They won't be an exact match but the surname of the user will be present in the account name used to admin my DC.&lt;/P&gt;

&lt;P&gt;Thanks all!!&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jan 2020 09:52:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Multisearching/m-p/475819#M7471</guid>
      <dc:creator>celdridge1988</dc:creator>
      <dc:date>2020-01-07T09:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: Multisearching</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Multisearching/m-p/475820#M7472</link>
      <description>&lt;P&gt;Hi I would suggest you write the results from your ldapsearch to a lookup, let's say &lt;CODE&gt;access_mgmt_team.csv&lt;/CODE&gt;.&lt;BR /&gt;
Then I would change the correlation search to not search for those users using the &lt;CODE&gt;format&lt;/CODE&gt; command. Example below of a subsearch&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| from datamodel:"Change_Analysis"."Account_Management" 
| where 'tag'="delete" 
| search NOT "changed: /usr*"  [|inputlookup access_mgmt_team.csv | format "(" "NOT (" "AND" ")" "OR" ")"]
| stats max(_time) as "lastTime",latest(_raw) as "orig_raw",values(result) as "signature",values(src) as "src",values(dest) as "dest",count by "src_user","user" 
| where 'count'&amp;gt;0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hope this helps&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jan 2020 11:33:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Multisearching/m-p/475820#M7472</guid>
      <dc:creator>gfreitas</dc:creator>
      <dc:date>2020-01-07T11:33:21Z</dc:date>
    </item>
    <item>
      <title>Re: Multisearching</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Multisearching/m-p/475821#M7473</link>
      <description>&lt;P&gt;Hi, Thank you for such a quick response. &lt;BR /&gt;
I've created the lookup however it's not removing the entries for the team. Could it be because i'm only extracting their surnames from the lookup which isn't exactly the user account name? For instance, using the name 'John Smith' as an example to this situation. The LDAP search would take 'Smith' and list it in the .csv. The account name format he would have is 'dd_smithl' so I want to compare the csv, get it to see smith is there and detect smith in the account name. &lt;BR /&gt;
Sorry, Getting quite complex now. &lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2020 12:03:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Multisearching/m-p/475821#M7473</guid>
      <dc:creator>celdridge1988</dc:creator>
      <dc:date>2020-01-08T12:03:33Z</dc:date>
    </item>
    <item>
      <title>Re: Multisearching</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Multisearching/m-p/475822#M7474</link>
      <description>&lt;P&gt;Hi, I would suggest you get a wildcard before and after the surnames that way the lookup entry would look like &lt;EM&gt;smith&lt;/EM&gt;. To do that you can edit the ldapsearch query and add the following in the end: &lt;CODE&gt;| eval Surname= "*" + Surname + "*"&lt;/CODE&gt;. That should add the wildcards on the lookup you're using to whitelist.&lt;BR /&gt;
Hopefully that helps&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2020 14:34:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Multisearching/m-p/475822#M7474</guid>
      <dc:creator>gfreitas</dc:creator>
      <dc:date>2020-01-08T14:34:26Z</dc:date>
    </item>
  </channel>
</rss>

