<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows Defender discovery on Splunk? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Windows-Defender-discovery-on-Splunk/m-p/552927#M156957</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/234774"&gt;@SecurityBear&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;good for you, see next time!&lt;/P&gt;&lt;P&gt;If this answer solves your need, please, accept it for the other people of Community.&lt;/P&gt;&lt;P&gt;Ciao and happy splunking.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 25 May 2021 12:05:54 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2021-05-25T12:05:54Z</dc:date>
    <item>
      <title>Windows Defender discovery on Splunk?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Defender-discovery-on-Splunk/m-p/552916#M156953</link>
      <description>&lt;P&gt;Hi everybody.&lt;BR /&gt;&lt;BR /&gt;I'm back using Splunk after some years, so I'm a bit "rusty".&lt;/P&gt;&lt;P&gt;This is my scenario: suppose I have a network with some hosts, both workstation and servers. I know only that an antivirus is installed on them, but not which one for all of the hosts. What I know is:&lt;BR /&gt;&lt;BR /&gt;1. Some hosts has Windows Defender, other not.&lt;BR /&gt;2. The Windows Defender Logs are configured to be sent to splunk.&lt;/P&gt;&lt;P&gt;The other data mising is: the hosts with Defender, how are configured to get data? With a Splunk app? This is a data I have not.&lt;/P&gt;&lt;P&gt;So, my question is: is there a Splunk query that I can use to discover if Defender is in execution or not. formatting the result to show the hostname of every machine?&lt;/P&gt;</description>
      <pubDate>Tue, 25 May 2021 10:13:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Defender-discovery-on-Splunk/m-p/552916#M156953</guid>
      <dc:creator>SecurityBear</dc:creator>
      <dc:date>2021-05-25T10:13:08Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Defender discovery on Splunk?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Defender-discovery-on-Splunk/m-p/552918#M156954</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/234774"&gt;@SecurityBear&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;are you abke to identify Windows Defender's logs?&lt;/P&gt;&lt;P&gt;if yes (e.g. they are in a special Index, e.g. windefender), you can easily list all the hostnames in that index:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=windefender
| stats count BY host&lt;/LI-CODE&gt;&lt;P&gt;If instead your problem is to identify Defender's logs, you could see if you're using the Add-on for Defender (&lt;A href="https://splunkbase.splunk.com/app/3734/" target="_blank"&gt;https://splunkbase.splunk.com/app/3734/&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;In this TA you can identify Defender's Logs.&lt;/P&gt;&lt;P&gt;if instead you don't use the above TA, you should see in your inputs.conf where these logs are stored and which is the sourcetype and the source.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 25 May 2021 10:21:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Defender-discovery-on-Splunk/m-p/552918#M156954</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2021-05-25T10:21:51Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Defender discovery on Splunk?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Defender-discovery-on-Splunk/m-p/552921#M156956</link>
      <description>&lt;P&gt;I understand: many thanks Giuseppe.&lt;/P&gt;</description>
      <pubDate>Tue, 25 May 2021 10:38:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Defender-discovery-on-Splunk/m-p/552921#M156956</guid>
      <dc:creator>SecurityBear</dc:creator>
      <dc:date>2021-05-25T10:38:21Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Defender discovery on Splunk?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Defender-discovery-on-Splunk/m-p/552927#M156957</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/234774"&gt;@SecurityBear&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;good for you, see next time!&lt;/P&gt;&lt;P&gt;If this answer solves your need, please, accept it for the other people of Community.&lt;/P&gt;&lt;P&gt;Ciao and happy splunking.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 May 2021 12:05:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Defender-discovery-on-Splunk/m-p/552927#M156957</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2021-05-25T12:05:54Z</dc:date>
    </item>
  </channel>
</rss>

