<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic dnsrequest url or query help in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/dnsrequest-url-or-query-help/m-p/540676#M152976</link>
    <description>&lt;P&gt;Hi Splunk community,&lt;/P&gt;&lt;P&gt;I am trying to determine the impact of removing Adobe Flash from our environment.&lt;/P&gt;&lt;P&gt;I have done basic search and the results returned are much higher than expected. This would most probably be because staff are accessing external content as well as internally hosted.&lt;/P&gt;&lt;P&gt;Is it possible to have a query that tells me which url has invoked flash player?&lt;/P&gt;&lt;P&gt;I have tried:&lt;/P&gt;&lt;P&gt;event_simpleName=ProcessRollup* FileName=FlashUtil*_ActiveX.exe&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;FileName=Flash*.ocx&lt;/P&gt;&lt;P&gt;The query returns, hostname, timestamp of execution, username, and others but i don't get the dns requests or url that invoked flash player.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So far to get around this I do another separate search (query) on the host, based on the timestamp (of the results of above query) looking up the dns request.&lt;/P&gt;&lt;P&gt;Example result:&lt;/P&gt;&lt;P&gt;Domainname: host: user: filename: commandline:&lt;/P&gt;&lt;P&gt;ssl.gstatic.com computer123 user123 iexplore.exe "C:\Program Files\Internet Explorer\iexplore.exe" &lt;A href="https://docs.google.com/spreadsheets/z/xyz/edit?usp=drive_web" target="_blank" rel="noopener"&gt;https://docs.google.com/spreadsheets/z/xyz/edit?usp=drive_web&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Most DNS requests are within fraction of the second or +1 second.&lt;/P&gt;&lt;P&gt;Finding a computer with useful data is a draw of the luck and very time consuming.&lt;/P&gt;&lt;P&gt;Is anyone able to help with the above query?&lt;/P&gt;&lt;P&gt;I am trying to have on query that gives me hostname, username, timestamp, app e.g.&amp;nbsp;&amp;nbsp;FlashUtil*_ActiveX.exe and dns request or url, or commandline.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We use crowdstrike for end-point protection and the logs are feed to splunk by the crowdstrike agent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 20 Feb 2021 22:36:00 GMT</pubDate>
    <dc:creator>tod_s</dc:creator>
    <dc:date>2021-02-20T22:36:00Z</dc:date>
    <item>
      <title>dnsrequest url or query help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/dnsrequest-url-or-query-help/m-p/540676#M152976</link>
      <description>&lt;P&gt;Hi Splunk community,&lt;/P&gt;&lt;P&gt;I am trying to determine the impact of removing Adobe Flash from our environment.&lt;/P&gt;&lt;P&gt;I have done basic search and the results returned are much higher than expected. This would most probably be because staff are accessing external content as well as internally hosted.&lt;/P&gt;&lt;P&gt;Is it possible to have a query that tells me which url has invoked flash player?&lt;/P&gt;&lt;P&gt;I have tried:&lt;/P&gt;&lt;P&gt;event_simpleName=ProcessRollup* FileName=FlashUtil*_ActiveX.exe&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;FileName=Flash*.ocx&lt;/P&gt;&lt;P&gt;The query returns, hostname, timestamp of execution, username, and others but i don't get the dns requests or url that invoked flash player.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So far to get around this I do another separate search (query) on the host, based on the timestamp (of the results of above query) looking up the dns request.&lt;/P&gt;&lt;P&gt;Example result:&lt;/P&gt;&lt;P&gt;Domainname: host: user: filename: commandline:&lt;/P&gt;&lt;P&gt;ssl.gstatic.com computer123 user123 iexplore.exe "C:\Program Files\Internet Explorer\iexplore.exe" &lt;A href="https://docs.google.com/spreadsheets/z/xyz/edit?usp=drive_web" target="_blank" rel="noopener"&gt;https://docs.google.com/spreadsheets/z/xyz/edit?usp=drive_web&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Most DNS requests are within fraction of the second or +1 second.&lt;/P&gt;&lt;P&gt;Finding a computer with useful data is a draw of the luck and very time consuming.&lt;/P&gt;&lt;P&gt;Is anyone able to help with the above query?&lt;/P&gt;&lt;P&gt;I am trying to have on query that gives me hostname, username, timestamp, app e.g.&amp;nbsp;&amp;nbsp;FlashUtil*_ActiveX.exe and dns request or url, or commandline.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We use crowdstrike for end-point protection and the logs are feed to splunk by the crowdstrike agent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Feb 2021 22:36:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/dnsrequest-url-or-query-help/m-p/540676#M152976</guid>
      <dc:creator>tod_s</dc:creator>
      <dc:date>2021-02-20T22:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: dnsrequest url or query help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/dnsrequest-url-or-query-help/m-p/540686#M152984</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231686"&gt;@tod_s&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you use proxies and can log response content types, you could look for e.g.&amp;nbsp;&lt;SPAN&gt;application/x&lt;/SPAN&gt;&lt;SPAN&gt;-shockwave-flash or other Flash related content types.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 21 Feb 2021 01:27:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/dnsrequest-url-or-query-help/m-p/540686#M152984</guid>
      <dc:creator>tscroggins</dc:creator>
      <dc:date>2021-02-21T01:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: dnsrequest url or query help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/dnsrequest-url-or-query-help/m-p/540916#M153092</link>
      <description>&lt;P&gt;Hi tscroggins,&lt;/P&gt;&lt;P&gt;No proxies used - but our Crowdstrike agent collects detailed activity information, and exports logs to splunk. dns request; network connection, log on user, process running, etc.. being captured&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Feb 2021 22:32:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/dnsrequest-url-or-query-help/m-p/540916#M153092</guid>
      <dc:creator>tod_s</dc:creator>
      <dc:date>2021-02-22T22:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: dnsrequest url or query help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/dnsrequest-url-or-query-help/m-p/540950#M153111</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231686"&gt;@tod_s&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've not done this with Flash specifically, but I recommend asking your vendor to suggest or provide methods of logging access to Flash content as an indicator of compromise.&lt;/P&gt;&lt;P&gt;I mentioned proxies because they're often configured to re-encrypt traffic for inspection and logging.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2021 03:28:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/dnsrequest-url-or-query-help/m-p/540950#M153111</guid>
      <dc:creator>tscroggins</dc:creator>
      <dc:date>2021-02-23T03:28:06Z</dc:date>
    </item>
  </channel>
</rss>

