<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: need help Top malware/suspicious site in Reporting</title>
    <link>https://community.splunk.com/t5/Reporting/need-help-Top-malware-suspicious-site/m-p/298011#M10046</link>
    <description>&lt;P&gt;strange: in the default bcoat_proxysg extraction there are "action" and "http_referrer" (URL), I don't know what is "info".&lt;BR /&gt;
Are you using the default App's sourcetype?&lt;BR /&gt;
I used it, but rebuilding all dashboards because the old ones were created in extended XML (deprecated by Splunk).&lt;BR /&gt;
Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 12:51:24 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2020-09-29T12:51:24Z</dc:date>
    <item>
      <title>need help Top malware/suspicious site</title>
      <link>https://community.splunk.com/t5/Reporting/need-help-Top-malware-suspicious-site/m-p/298008#M10043</link>
      <description>&lt;P&gt;Hi People,&lt;/P&gt;

&lt;P&gt;I am using Bluecoat proxy at this time and I am trying to get the report based on Malicious/Suspicious.  I am running below query. &lt;/P&gt;

&lt;P&gt;sourcetype=bluecoat*  categories("Malicious" OR "Phishing" OR "Suspicious")  | fields add - status, - action, - host | stats  count by host | sort  – host&lt;/P&gt;

&lt;P&gt;Raw log: &lt;/P&gt;

&lt;P&gt;Feb 14 06:31:42  Feb 14 14:31:41 ProxySG: 3B0002 2017-02-14 14:31:41 1 src=x.x.x.x status=403 action=TCP_DENIED 803 379 method=GET protocol=http host=adgebra.co.in port=80 path=/Spike/spike.js      &lt;A href="http://tamil.oneindia.com/news/tamilnadu/da-case-who-is-a4-ilavarasi-274085.html" target="_blank"&gt;http://tamil.oneindia.com/news/tamilnadu/da-case-who-is-a4-ilavarasi-274085.html&lt;/A&gt; useragent=Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36 categories=Web Ads/Analytics;Suspicious  74.117.128.45(97306393) UNKNOWN_EVENT pe_policy_action_log_message.cpp 44&lt;/P&gt;

&lt;P&gt;How would I add URL info, action and status info into statistic result as those are not showing into default filed?&lt;/P&gt;

&lt;P&gt;Kind Regards,&lt;BR /&gt;
Steave&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 12:51:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/need-help-Top-malware-suspicious-site/m-p/298008#M10043</guid>
      <dc:creator>Steave4app</dc:creator>
      <dc:date>2020-09-29T12:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: need help Top malware/suspicious site</title>
      <link>https://community.splunk.com/t5/Reporting/need-help-Top-malware-suspicious-site/m-p/298009#M10044</link>
      <description>&lt;P&gt;Hi Steave4app,&lt;BR /&gt;
to insert other fields in a stats command you can:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;insert it after "by" clause using that field as key in stats,&lt;/LI&gt;
&lt;LI&gt;before count, inserting values(URL) AS URL values(info) AS info values(action) AS action.
The problem is that, if you have many values, your report could be unreadable.&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;In addition remember that this App uses Summary indexes, so you have to insert these fields in GROUPBY clause in tstats command.&lt;/P&gt;

&lt;P&gt;Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2017 15:00:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/need-help-Top-malware-suspicious-site/m-p/298009#M10044</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2017-02-14T15:00:57Z</dc:date>
    </item>
    <item>
      <title>Re: need help Top malware/suspicious site</title>
      <link>https://community.splunk.com/t5/Reporting/need-help-Top-malware-suspicious-site/m-p/298010#M10045</link>
      <description>&lt;P&gt;Hi Cusello,&lt;/P&gt;

&lt;P&gt;Happy to see you. &lt;/P&gt;

&lt;P&gt;I have done that but it is not working.  Interesting this is,   they things are not describing as field.&lt;/P&gt;

&lt;P&gt;status=403 action=TCP_DENIED 803 379 method=GET protocol=http host=adgebra.co.in port=80 path=/Spike/spike.js &lt;A href="http://tamil.oneindia.com/news/tamilnadu/da-case-who-is-a4-ilavarasi-274085.html"&gt;http://tamil.oneindia.com/news/tamilnadu/da-case-who-is-a4-ilavarasi-274085.html&lt;/A&gt; useragent=Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36 categories=Web &lt;/P&gt;

&lt;P&gt;So if they are not field, how would it work into stats count by query? &lt;/P&gt;

&lt;P&gt;Kind Regards,&lt;BR /&gt;
Steave&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2017 15:20:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/need-help-Top-malware-suspicious-site/m-p/298010#M10045</guid>
      <dc:creator>Steave4app</dc:creator>
      <dc:date>2017-02-14T15:20:33Z</dc:date>
    </item>
    <item>
      <title>Re: need help Top malware/suspicious site</title>
      <link>https://community.splunk.com/t5/Reporting/need-help-Top-malware-suspicious-site/m-p/298011#M10046</link>
      <description>&lt;P&gt;strange: in the default bcoat_proxysg extraction there are "action" and "http_referrer" (URL), I don't know what is "info".&lt;BR /&gt;
Are you using the default App's sourcetype?&lt;BR /&gt;
I used it, but rebuilding all dashboards because the old ones were created in extended XML (deprecated by Splunk).&lt;BR /&gt;
Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 12:51:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/need-help-Top-malware-suspicious-site/m-p/298011#M10046</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-09-29T12:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: need help Top malware/suspicious site</title>
      <link>https://community.splunk.com/t5/Reporting/need-help-Top-malware-suspicious-site/m-p/298012#M10047</link>
      <description>&lt;P&gt;You need to verify what fields have already been extracted.  So, with your _raw event, look at the interesting fields and see what field (if any)  the &lt;A href="http://...html" target="test_blank"&gt;http://...html&lt;/A&gt; value has been loaded into.   &lt;/P&gt;

&lt;P&gt;If it has not been extracted into anything, then you will probably want to use a regex to load the URL data into a field that you can use the list aggregate command on.  &lt;/P&gt;

&lt;P&gt;Here's one link to a thread that deals with that.  &lt;A href="https://answers.splunk.com/answers/93003/regex-for-url-parsing.html"&gt;https://answers.splunk.com/answers/93003/regex-for-url-parsing.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2017 16:06:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/need-help-Top-malware-suspicious-site/m-p/298012#M10047</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2017-02-14T16:06:26Z</dc:date>
    </item>
  </channel>
</rss>

