<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unauthorized Vulnerability Scan - External in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243650#M189035</link>
    <description>&lt;P&gt;can you elaborate your question?  what do you mean by "I am not sure to put where or search command"&lt;/P&gt;</description>
    <pubDate>Tue, 05 Jul 2016 08:52:57 GMT</pubDate>
    <dc:creator>xavierpaul</dc:creator>
    <dc:date>2016-07-05T08:52:57Z</dc:date>
    <item>
      <title>Unauthorized Vulnerability Scan - External</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243649#M189034</link>
      <description>&lt;P&gt;HI everyone,&lt;/P&gt;

&lt;P&gt;I am trying to figure out about Unauthorised Vulnerability Scan - External.. we detected an external host using a script or vulnerability tool to probe our network in an attempt to locate an exploitable vulnerability. How can I configure an alert to notify me when someone doing the external vulnerability scan to our network by using different signatures against one or two minute margin.&lt;/P&gt;

&lt;P&gt;index=paloxx dest_ip=1xx.1x.x0.x0 | bin _time span=2m | stats dc(signature),dc(dest_ip) as DEST by src_ip | where DEST&amp;gt;500&lt;/P&gt;

&lt;P&gt;I am not sure to put where or search command&lt;BR /&gt;
Really appreciate any help on this.&lt;/P&gt;

&lt;P&gt;Cheers&lt;/P&gt;

&lt;P&gt;Rashid&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:08:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243649#M189034</guid>
      <dc:creator>rashid47010</dc:creator>
      <dc:date>2020-09-29T10:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: Unauthorized Vulnerability Scan - External</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243650#M189035</link>
      <description>&lt;P&gt;can you elaborate your question?  what do you mean by "I am not sure to put where or search command"&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jul 2016 08:52:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243650#M189035</guid>
      <dc:creator>xavierpaul</dc:creator>
      <dc:date>2016-07-05T08:52:57Z</dc:date>
    </item>
    <item>
      <title>Re: Unauthorized Vulnerability Scan - External</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243651#M189036</link>
      <description>&lt;P&gt;I am talking about where or search command. my requirement is when the number of distinct signature is more than 10 from singly source IP. &lt;/P&gt;</description>
      <pubDate>Tue, 05 Jul 2016 09:52:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243651#M189036</guid>
      <dc:creator>rashid47010</dc:creator>
      <dc:date>2016-07-05T09:52:59Z</dc:date>
    </item>
    <item>
      <title>Re: Unauthorized Vulnerability Scan - External</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243652#M189037</link>
      <description>&lt;P&gt;Like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=paloxx dest_ip=1xx.1x.x0.x0 | bin _time span=2m
| stats dc(signature) AS signatureDC dc(dest_ip) as destDC by src_ip
| where destDC&amp;gt;500 AND signatureDC&amp;gt;10
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The &lt;CODE&gt;AND&lt;/CODE&gt; must be all-uppercase.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jul 2016 14:24:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243652#M189037</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-07-05T14:24:46Z</dc:date>
    </item>
    <item>
      <title>Re: Unauthorized Vulnerability Scan - External</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243653#M189038</link>
      <description>&lt;P&gt;Thanks wood,&lt;/P&gt;

&lt;P&gt;Thanks for your response. the final query is (according to me)(appreciate your comments on that if ay):&lt;BR /&gt;
index=palxxx src_ip=1xx.x5.xx.xx dest_ip=1x3.x9.xx.xxx dest_port=80 | bin _time span=1h | stats dc(signature) as signatureDC dc(dest_ip) as destDC by src_ip |  where signatureDC&amp;gt;6&lt;/P&gt;

&lt;P&gt;now I have multiple IPs destining to dest_ip=1x3.x9.xx.xxx dest_port=80&lt;/P&gt;

&lt;P&gt;src_ip                                 |SignatureDC                                      |destDC&lt;BR /&gt;
xxx.xxx.xxx.xxx                    x                                                           x&lt;BR /&gt;
xxx.xxx.xxx.xxx                    x                                                           x&lt;BR /&gt;
xxx.xxx.xxx.xxx                    x                                                           x&lt;BR /&gt;
xxx.xxx.xxx.xxx                    x                                                           x&lt;BR /&gt;
xxx.xxx.xxx.xxx                    x                                                           x&lt;BR /&gt;
xxx.xxx.xxx.xxx                    x                                                           x&lt;/P&gt;

&lt;P&gt;I want to create a real time alter. &lt;BR /&gt;
which option I should select under &lt;STRONG&gt;"trigger condition"--&amp;gt; trigger alert when&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:08:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243653#M189038</guid>
      <dc:creator>rashid47010</dc:creator>
      <dc:date>2020-09-29T10:08:32Z</dc:date>
    </item>
    <item>
      <title>Re: Unauthorized Vulnerability Scan - External</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243654#M189039</link>
      <description>&lt;P&gt;I highly advise you not to use real-time.  Instead I would run run it every 5 or 10 minutes for the last hour.  The trigger is the threshold that &lt;EM&gt;you&lt;/EM&gt; desire.  It is probably best to put the threshold into the search (like we did with the &lt;CODE&gt;| where destDC&amp;gt;500 AND signatureDC&amp;gt;1&lt;/CODE&gt; and then just set the trigger to &lt;CODE&gt;Number of events&lt;/CODE&gt; (in the final results set of your search) &lt;CODE&gt;Is greater than 0&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 12:50:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243654#M189039</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-07-06T12:50:43Z</dc:date>
    </item>
    <item>
      <title>Re: Unauthorized Vulnerability Scan - External</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243655#M189040</link>
      <description>&lt;P&gt;Thanks wood, &lt;BR /&gt;
Actually I am new to splunk. I need your further support to finalise my first alert(if results are as required then we can configure it as permanent correlation rule).&lt;BR /&gt;
I have some question in my mind. appreciate for your kind response on them.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;why you use the destDC&amp;gt;500 whereas I have only destination IP.&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Final Query: &lt;BR /&gt;
index=paloalto_pa dest_ip=193.19.90.20 dest_port=80 | bin _time span=1h | stats dc(signature) as signatureDC dc(dest_ip) as destDC by src_ip | where signatureDC&amp;gt;6&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;I configure the alert as below:&lt;/STRONG&gt;&lt;BR /&gt;
1- It will run every after 30 minutes for last one hour data.&lt;BR /&gt;
&lt;STRONG&gt;earliest: -2h@h&lt;BR /&gt;
latest: -1h@h&lt;BR /&gt;
cron expression: 0/30 * * * ***&lt;BR /&gt;
is that right....?&lt;BR /&gt;
2- As Suggested. I configure the trigger conditions to:&lt;BR /&gt;
tirgger alert when: number of results is greater than 0&lt;BR /&gt;
and trigger for each result.&lt;BR /&gt;
 **I select the throttle&lt;/STRONG&gt; and I select &lt;STRONG&gt;src_ip&lt;/STRONG&gt; for &lt;BR /&gt;
&lt;STRONG&gt;the suppress results containing field value&lt;/STRONG&gt; &lt;BR /&gt;
and suppress the trigger for 4 hours.&lt;/P&gt;

&lt;P&gt;Please advise. It will give ma a great start to understand the alters and their configuration parameters.&lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:09:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243655#M189040</guid>
      <dc:creator>rashid47010</dc:creator>
      <dc:date>2020-09-29T10:09:05Z</dc:date>
    </item>
    <item>
      <title>Re: Unauthorized Vulnerability Scan - External</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243656#M189041</link>
      <description>&lt;P&gt;I said "LIKE we did with ..." not "EXACTLY AS we did with ...".  I man to put the threshold criteria, whatever it is, into the search, not the alert configuration.  You have to decide on the alert threshold criteria.&lt;/P&gt;

&lt;P&gt;1 - Yes.&lt;/P&gt;

&lt;P&gt;2 - Yes, but only if you select to alert&lt;CODE&gt;once for every event&lt;/CODE&gt;.  Then for every event (which corresponds to any particular src_ip) you will at most get 1 alert ever 4 hours.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jul 2016 12:54:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243656#M189041</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-07-07T12:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: Unauthorized Vulnerability Scan - External</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243657#M189042</link>
      <description>&lt;P&gt;Thanks wood&lt;BR /&gt;
Highly appreciate your kind response&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jul 2016 10:54:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Unauthorized-Vulnerability-Scan-External/m-p/243657#M189042</guid>
      <dc:creator>rashid47010</dc:creator>
      <dc:date>2016-07-08T10:54:29Z</dc:date>
    </item>
  </channel>
</rss>

