<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Automating queries based on FireEye &amp;quot;malware-object detected&amp;quot; in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/Automating-queries-based-on-FireEye-quot-malware-object-detected/m-p/109500#M1603</link>
    <description>&lt;P&gt;There is a cool app for FireEye devices &lt;A href="https://splunkbase.splunk.com/app/1845/"&gt;https://splunkbase.splunk.com/app/1845/&lt;/A&gt;. This might address your problem. &lt;/P&gt;</description>
    <pubDate>Thu, 14 May 2015 05:22:16 GMT</pubDate>
    <dc:creator>satishsdange</dc:creator>
    <dc:date>2015-05-14T05:22:16Z</dc:date>
    <item>
      <title>Automating queries based on FireEye "malware-object detected"</title>
      <link>https://community.splunk.com/t5/Alerting/Automating-queries-based-on-FireEye-quot-malware-object-detected/m-p/109499#M1602</link>
      <description>&lt;P&gt;We currently have fireeye allerts coming in as log events that will be indexed.  Some that are labeled as "malware-object detected" are currently manually processed by our analysts.  They collect various fields (source/destnation IPs, time stamp, etc.), and build a query based on other logs (proxy, dns, exchange, etc.) as a way to build a "context" of the possible infection.&lt;BR /&gt;
The idea is to automate this query search process every time a "malware-obeject detected" log is received and indexed.&lt;BR /&gt;
May I get some pointers from you on how to proceed in terms of techniques and documentation?&lt;BR /&gt;
Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2015 16:27:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Automating-queries-based-on-FireEye-quot-malware-object-detected/m-p/109499#M1602</guid>
      <dc:creator>Thuan</dc:creator>
      <dc:date>2015-05-13T16:27:49Z</dc:date>
    </item>
    <item>
      <title>Re: Automating queries based on FireEye "malware-object detected"</title>
      <link>https://community.splunk.com/t5/Alerting/Automating-queries-based-on-FireEye-quot-malware-object-detected/m-p/109500#M1603</link>
      <description>&lt;P&gt;There is a cool app for FireEye devices &lt;A href="https://splunkbase.splunk.com/app/1845/"&gt;https://splunkbase.splunk.com/app/1845/&lt;/A&gt;. This might address your problem. &lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2015 05:22:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Automating-queries-based-on-FireEye-quot-malware-object-detected/m-p/109500#M1603</guid>
      <dc:creator>satishsdange</dc:creator>
      <dc:date>2015-05-14T05:22:16Z</dc:date>
    </item>
  </channel>
</rss>

