<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: New rule in detecting multiple requests for a known Malicious destination from a single source could use help with the way the rule is written in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/New-rule-in-detecting-multiple-requests-for-a-known-Malicious/m-p/136040#M37213</link>
    <description>&lt;P&gt;Sure - this looks like a search that returns information. However, it probably won't get the categories you are looking for. The below splits out the categories into the cim field "category". If this works for what you are looking for, then it makes sense.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=app_proxy sourcetype=bcoat_proxysg_app OR sourcetype=bcoat_proxyclient_app category="Malicous Sources" OR category="Botnets" | stats count by username,host,referrer | where count&amp;gt; 1 | table _time username,host,referrer filter_results
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Tue, 23 Sep 2014 16:30:26 GMT</pubDate>
    <dc:creator>alacercogitatus</dc:creator>
    <dc:date>2014-09-23T16:30:26Z</dc:date>
    <item>
      <title>New rule in detecting multiple requests for a known Malicious destination from a single source could use help with the way the rule is written</title>
      <link>https://community.splunk.com/t5/Splunk-Search/New-rule-in-detecting-multiple-requests-for-a-known-Malicious/m-p/136036#M37209</link>
      <description>&lt;P&gt;index=app_proxy sourcetype=bcoat_proxysg_app OR sourcetype=bcoat_proxyclient_app categories="Malicous Sources" OR "Botnets" | stats count by username,host,referrer | count&amp;gt; 1 | table  _time username,host,referrer filter_results&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 17:39:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/New-rule-in-detecting-multiple-requests-for-a-known-Malicious/m-p/136036#M37209</guid>
      <dc:creator>ahmar74</dc:creator>
      <dc:date>2020-09-28T17:39:40Z</dc:date>
    </item>
    <item>
      <title>Re: New rule in detecting multiple requests for a known Malicious destination from a single source could use help with the way the rule is written</title>
      <link>https://community.splunk.com/t5/Splunk-Search/New-rule-in-detecting-multiple-requests-for-a-known-Malicious/m-p/136037#M37210</link>
      <description>&lt;P&gt;Do elaborate on what you actually need help with.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2014 09:50:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/New-rule-in-detecting-multiple-requests-for-a-known-Malicious/m-p/136037#M37210</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2014-09-23T09:50:39Z</dc:date>
    </item>
    <item>
      <title>Re: New rule in detecting multiple requests for a known Malicious destination from a single source could use help with the way the rule is written</title>
      <link>https://community.splunk.com/t5/Splunk-Search/New-rule-in-detecting-multiple-requests-for-a-known-Malicious/m-p/136038#M37211</link>
      <description>&lt;P&gt;does the rule make sense to you as is?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2014 11:57:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/New-rule-in-detecting-multiple-requests-for-a-known-Malicious/m-p/136038#M37211</guid>
      <dc:creator>ahmar74</dc:creator>
      <dc:date>2014-09-23T11:57:47Z</dc:date>
    </item>
    <item>
      <title>Re: New rule in detecting multiple requests for a known Malicious destination from a single source could use help with the way the rule is written</title>
      <link>https://community.splunk.com/t5/Splunk-Search/New-rule-in-detecting-multiple-requests-for-a-known-Malicious/m-p/136039#M37212</link>
      <description>&lt;P&gt;There's likely a syntax error in &lt;CODE&gt;| count &amp;gt; 1 |&lt;/CODE&gt; due to lack of a search command such as &lt;CODE&gt;search&lt;/CODE&gt; or &lt;CODE&gt;where&lt;/CODE&gt; - both will achieve what you wanted and throw out events with &lt;CODE&gt;count=1&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2014 14:55:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/New-rule-in-detecting-multiple-requests-for-a-known-Malicious/m-p/136039#M37212</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2014-09-23T14:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: New rule in detecting multiple requests for a known Malicious destination from a single source could use help with the way the rule is written</title>
      <link>https://community.splunk.com/t5/Splunk-Search/New-rule-in-detecting-multiple-requests-for-a-known-Malicious/m-p/136040#M37213</link>
      <description>&lt;P&gt;Sure - this looks like a search that returns information. However, it probably won't get the categories you are looking for. The below splits out the categories into the cim field "category". If this works for what you are looking for, then it makes sense.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=app_proxy sourcetype=bcoat_proxysg_app OR sourcetype=bcoat_proxyclient_app category="Malicous Sources" OR category="Botnets" | stats count by username,host,referrer | where count&amp;gt; 1 | table _time username,host,referrer filter_results
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 23 Sep 2014 16:30:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/New-rule-in-detecting-multiple-requests-for-a-known-Malicious/m-p/136040#M37213</guid>
      <dc:creator>alacercogitatus</dc:creator>
      <dc:date>2014-09-23T16:30:26Z</dc:date>
    </item>
    <item>
      <title>Re: New rule in detecting multiple requests for a known Malicious destination from a single source could use help with the way the rule is written</title>
      <link>https://community.splunk.com/t5/Splunk-Search/New-rule-in-detecting-multiple-requests-for-a-known-Malicious/m-p/136041#M37214</link>
      <description>&lt;P&gt;Additionally, after the &lt;CODE&gt;stats&lt;/CODE&gt; there are no &lt;CODE&gt;_time&lt;/CODE&gt; and &lt;CODE&gt;filter_results&lt;/CODE&gt; columns, so listing them in &lt;CODE&gt;table&lt;/CODE&gt; doesn't seem to make sense to me.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Sep 2014 08:55:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/New-rule-in-detecting-multiple-requests-for-a-known-Malicious/m-p/136041#M37214</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2014-09-24T08:55:29Z</dc:date>
    </item>
  </channel>
</rss>

