<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ransomware in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-detect-Ransomware-using-splunk/m-p/601430#M209316</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/246740"&gt;@Gauri001&lt;/a&gt;Also remember that splunk on its own does not "detect" anything. Splunk, using proper searches, can deduce information from the data it's given. If you don't have relevant data onboarded from source machines splunk won't be able to "detect" anything. It's not an EDR solution.&lt;/P&gt;</description>
    <pubDate>Sat, 11 Jun 2022 20:07:30 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2022-06-11T20:07:30Z</dc:date>
    <item>
      <title>How to detect Ransomware using splunk?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-detect-Ransomware-using-splunk/m-p/601427#M209314</link>
      <description>&lt;P&gt;Q): How to detect ransomware using Splunk?,&amp;nbsp; please give query also to create alert in ransomware,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jun 2022 17:41:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-detect-Ransomware-using-splunk/m-p/601427#M209314</guid>
      <dc:creator>Gauri001</dc:creator>
      <dc:date>2022-06-13T17:41:20Z</dc:date>
    </item>
    <item>
      <title>Re: Ransomware</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-detect-Ransomware-using-splunk/m-p/601428#M209315</link>
      <description>&lt;P&gt;Splunk doesn't detect ransomware directly.&amp;nbsp; Instead, it detects behaviors that could indicate the presence of ransomware, such as a sudden increase in file writes (as when files are encrypted) or filename extensions commonly used by ransomware.&lt;/P&gt;&lt;P&gt;Install the Splunk Security Essentials app and search for "ransomware" to find suggested queries.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Jun 2022 17:52:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-detect-Ransomware-using-splunk/m-p/601428#M209315</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2022-06-11T17:52:59Z</dc:date>
    </item>
    <item>
      <title>Re: Ransomware</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-detect-Ransomware-using-splunk/m-p/601430#M209316</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/246740"&gt;@Gauri001&lt;/a&gt;Also remember that splunk on its own does not "detect" anything. Splunk, using proper searches, can deduce information from the data it's given. If you don't have relevant data onboarded from source machines splunk won't be able to "detect" anything. It's not an EDR solution.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Jun 2022 20:07:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-detect-Ransomware-using-splunk/m-p/601430#M209316</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2022-06-11T20:07:30Z</dc:date>
    </item>
  </channel>
</rss>

