<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to search Windows DNS logs for FQDN? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Windows-DNS-logs-for-FQDN/m-p/122473#M33000</link>
    <description>&lt;P&gt;Whoa..  That whole site is gone.&lt;/P&gt;

&lt;P&gt;Thank God for Internet Archive:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://web.archive.org/web/20120717052050/http://www.stratumsecurity.com:80/2012/07/03/splunk-security/"&gt;http://web.archive.org/web/20120717052050/http://www.stratumsecurity.com:80/2012/07/03/splunk-security/&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 13 Jul 2017 17:22:13 GMT</pubDate>
    <dc:creator>reswob4</dc:creator>
    <dc:date>2017-07-13T17:22:13Z</dc:date>
    <item>
      <title>How to search Windows DNS logs for FQDN?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Windows-DNS-logs-for-FQDN/m-p/122467#M32994</link>
      <description>&lt;P&gt;Splunk has our Windows DNS lookups as image(7)site(3)com.  How do I search for image.site.com?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2015 19:38:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Windows-DNS-logs-for-FQDN/m-p/122467#M32994</guid>
      <dc:creator>CarolinasFan</dc:creator>
      <dc:date>2015-01-29T19:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to search Windows DNS logs for FQDN?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Windows-DNS-logs-for-FQDN/m-p/122468#M32995</link>
      <description>&lt;P&gt;This is the method I used to set up the DNS in splunk and it works very nicely&lt;/P&gt;

&lt;P&gt;&lt;A href="http://stratumsecurity.com/2012/07/03/splunk-security/"&gt;http://stratumsecurity.com/2012/07/03/splunk-security/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2015 20:04:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Windows-DNS-logs-for-FQDN/m-p/122468#M32995</guid>
      <dc:creator>reswob4</dc:creator>
      <dc:date>2015-01-29T20:04:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to search Windows DNS logs for FQDN?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Windows-DNS-logs-for-FQDN/m-p/122469#M32996</link>
      <description>&lt;P&gt;Thanks - I may be missing something, but is there a way I can format the search criteria without changing how the DNS is indexed?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2015 20:25:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Windows-DNS-logs-for-FQDN/m-p/122469#M32996</guid>
      <dc:creator>CarolinasFan</dc:creator>
      <dc:date>2015-01-29T20:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: How to search Windows DNS logs for FQDN?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Windows-DNS-logs-for-FQDN/m-p/122470#M32997</link>
      <description>&lt;P&gt;First question, to make sure we are on the same page:  Are you collecting the DNS Trace Logs?  If not, you won't be able to do the searches you are talking about.  Searching against the logs Windows DNS records in its own eventlogs won't get you much information.&lt;/P&gt;

&lt;P&gt;Now, if you are collecting the DNS trace logs, here's what I did:&lt;/P&gt;

&lt;P&gt;Based on the link above, I created two field extractions:&lt;/P&gt;

&lt;P&gt;(from my props.conf)&lt;BR /&gt;
EXTRACT-Domain = (?i) .*? .(?P[-a-zA-Z0-9@:%_+.~#?;//=]{2,256}.[a-z]{2,6})&lt;BR /&gt;
EXTRACT-src = (?i) Rcv (?P\d+.\d+.\d+.\d+)&lt;/P&gt;

&lt;P&gt;These allow me to search by FQDN right in splunk.  &lt;/P&gt;

&lt;P&gt;If you want to search directly without changing how it's indexed, you may be able to leverage the regex above in the search parameters.&lt;/P&gt;

&lt;P&gt;I suggest you create these under FIELDS --&amp;gt; FIELD EXTRACTIONS for whatever sourcetype is collecting your DNS Trace logs.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2015 20:52:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Windows-DNS-logs-for-FQDN/m-p/122470#M32997</guid>
      <dc:creator>reswob4</dc:creator>
      <dc:date>2015-01-29T20:52:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to search Windows DNS logs for FQDN?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Windows-DNS-logs-for-FQDN/m-p/122471#M32998</link>
      <description>&lt;P&gt;If you want to get a correct field in place without having to modify the existing log file at index-time the way the other answer specifies, you will want to use the following field extraction in props.conf based on the TA included with the Windows Infrastructure app on Splunkbase. You can apply this eval statement to any sourcetype if you've brought in your DNS logs some other way.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[MSAD:NT6:DNS]
EVAL-fqdn=trim(replace(src_domain,"\([0-9]+\)","."),".")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This will replace all of the numbers in parentheses with dots, then trim the dots from the beginning and end so it will match how FQDN is usually represented in other apps and threat lists for correlation.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 18:58:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Windows-DNS-logs-for-FQDN/m-p/122471#M32998</guid>
      <dc:creator>delink</dc:creator>
      <dc:date>2015-09-09T18:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to search Windows DNS logs for FQDN?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Windows-DNS-logs-for-FQDN/m-p/122472#M32999</link>
      <description>&lt;P&gt;reswob4, any chance you can share the information from this site? Looks like its currently down and I am also trying to get rid of the (3) etc from my DNS logs. &lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2017 00:04:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Windows-DNS-logs-for-FQDN/m-p/122472#M32999</guid>
      <dc:creator>trevorQmulos</dc:creator>
      <dc:date>2017-07-11T00:04:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to search Windows DNS logs for FQDN?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Windows-DNS-logs-for-FQDN/m-p/122473#M33000</link>
      <description>&lt;P&gt;Whoa..  That whole site is gone.&lt;/P&gt;

&lt;P&gt;Thank God for Internet Archive:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://web.archive.org/web/20120717052050/http://www.stratumsecurity.com:80/2012/07/03/splunk-security/"&gt;http://web.archive.org/web/20120717052050/http://www.stratumsecurity.com:80/2012/07/03/splunk-security/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jul 2017 17:22:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Windows-DNS-logs-for-FQDN/m-p/122473#M33000</guid>
      <dc:creator>reswob4</dc:creator>
      <dc:date>2017-07-13T17:22:13Z</dc:date>
    </item>
  </channel>
</rss>

