<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to modify the below search so I can get only servers which are infected ? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-modify-the-below-search-so-I-can-get-only-servers-which/m-p/216091#M176237</link>
    <description>&lt;P&gt;Hi Niketnilay,&lt;/P&gt;

&lt;P&gt;Thanks million that worked like a charm.&lt;/P&gt;

&lt;P&gt;Regards&lt;BR /&gt;
Pradeep&lt;/P&gt;</description>
    <pubDate>Thu, 10 Nov 2016 07:11:11 GMT</pubDate>
    <dc:creator>seetharamanPr</dc:creator>
    <dc:date>2016-11-10T07:11:11Z</dc:date>
    <item>
      <title>How to modify the below search so I can get only servers which are infected ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-modify-the-below-search-so-I-can-get-only-servers-which/m-p/216087#M176233</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;

&lt;P&gt;We have our Symantec End Point Protection which is sending logs and it is monitoring both servers and user PCs. I have written this search based on the IP subnet where our Servers are present the problem with this we are also having user PC in the same subnet and with the search that I have written I am getting both servers and PCs. How can I get only servers which are infected. The below is the original search that I have written&lt;/P&gt;

&lt;P&gt;index=sep sourcetype="symantec:ep:risk:file" | search dest_ip="10.4.&lt;EM&gt;.&lt;/EM&gt;" | stats  values(signature) as multiple by dest | eventstats  dc(multiple) as multiple_malware by dest | rename  dest as "Target_Device", multiple as "Malware", multiple_malware as "Malware_Count"&lt;/P&gt;

&lt;P&gt;Apart from this I have also tried to us the first 3 letters with which the servers begin like the one below &lt;/P&gt;

&lt;P&gt;index=sep sourcetype="symantec:ep:risk:file" | search RIYS*  | stats  values(signature) as multiple by dest | eventstats  dc(multiple) as multiple_malware by dest | rename  dest as "Target_Device", multiple as "Malware", multiple_malware as "Malware_Count"&lt;/P&gt;

&lt;P&gt;This does not yeild any reults. So I tried with the IP and the first three letters of the server name but that search still gives me the PCs as well. Any suggestion on how to modify this search to get only infected servers would be of great help.&lt;/P&gt;

&lt;P&gt;Thank you in advance &lt;BR /&gt;
Pradeep Seetharaman&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 11:44:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-modify-the-below-search-so-I-can-get-only-servers-which/m-p/216087#M176233</guid>
      <dc:creator>seetharamanPr</dc:creator>
      <dc:date>2020-09-29T11:44:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to modify the below search so I can get only servers which are infected ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-modify-the-below-search-so-I-can-get-only-servers-which/m-p/216088#M176234</link>
      <description>&lt;P&gt;Can you give field name for extracted field for system name along with couple of examples for Server Names and Desktop Names?&lt;/P&gt;</description>
      <pubDate>Thu, 10 Nov 2016 06:52:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-modify-the-below-search-so-I-can-get-only-servers-which/m-p/216088#M176234</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2016-11-10T06:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to modify the below search so I can get only servers which are infected ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-modify-the-below-search-so-I-can-get-only-servers-which/m-p/216089#M176235</link>
      <description>&lt;P&gt;Hi Niketnilay,&lt;/P&gt;

&lt;P&gt;Find below the names of the severs and PC. The first 2 are servers and the last one is PC&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Target_Device   Malware Malware_Count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;1   RIYSVMOD-001    WS.Reputation.1 1&lt;BR /&gt;
2   RIYSVNFS-001    Trojan.Gen.2    1&lt;BR /&gt;
3   rc-9511 Packed.Dromedan!lnk 1&lt;/P&gt;</description>
      <pubDate>Thu, 10 Nov 2016 06:59:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-modify-the-below-search-so-I-can-get-only-servers-which/m-p/216089#M176235</guid>
      <dc:creator>seetharamanPr</dc:creator>
      <dc:date>2016-11-10T06:59:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to modify the below search so I can get only servers which are infected ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-modify-the-below-search-so-I-can-get-only-servers-which/m-p/216090#M176236</link>
      <description>&lt;P&gt;Looked at your query and seems like extracted field is dest, which you rename later as Target_Device. So, Try the following (search filter on required fields should be applied as early as possible):&lt;/P&gt;

&lt;P&gt;index=sep sourcetype="symantec:ep:risk:file" &lt;STRONG&gt;dest="RIY*"|&lt;/STRONG&gt; stats values(signature) as multiple by dest | eventstats dc(multiple) as multiple_malware by dest | rename dest as "Target_Device", multiple as "Malware", multiple_malware as "Malware_Count"&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 11:47:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-modify-the-below-search-so-I-can-get-only-servers-which/m-p/216090#M176236</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2020-09-29T11:47:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to modify the below search so I can get only servers which are infected ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-modify-the-below-search-so-I-can-get-only-servers-which/m-p/216091#M176237</link>
      <description>&lt;P&gt;Hi Niketnilay,&lt;/P&gt;

&lt;P&gt;Thanks million that worked like a charm.&lt;/P&gt;

&lt;P&gt;Regards&lt;BR /&gt;
Pradeep&lt;/P&gt;</description>
      <pubDate>Thu, 10 Nov 2016 07:11:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-modify-the-below-search-so-I-can-get-only-servers-which/m-p/216091#M176237</guid>
      <dc:creator>seetharamanPr</dc:creator>
      <dc:date>2016-11-10T07:11:11Z</dc:date>
    </item>
  </channel>
</rss>

