<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to search and compare virus alert data to see if a client had an infection that was not removed, but was successfully removed later? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-and-compare-virus-alert-data-to-see-if-a-client/m-p/231810#M68765</link>
    <description>&lt;P&gt;Avoid &lt;CODE&gt;transaction&lt;/CODE&gt; whenever possible so try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | stats values(*) dc(_time) AS numTimes earliest(status) AS firstStatus latest(status) AS lastStatus BY computer malware | where numTimes&amp;gt;1 and firstStatus="Falled" AND NOT lastStatus="Succeeded"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Or maybe even just this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | stats values(*) dc(_time) AS numTimes BY computer malware | where numTimes&amp;gt;1 AND status="Falled" AND NOT status="Succeeded"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Fri, 04 Mar 2016 14:38:04 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2016-03-04T14:38:04Z</dc:date>
    <item>
      <title>How to search and compare virus alert data to see if a client had an infection that was not removed, but was successfully removed later?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-and-compare-virus-alert-data-to-see-if-a-client/m-p/231808#M68763</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;

&lt;P&gt;We have virus alerts in Splunk. What I would like to do is to create on overview to check if a certain client had an infection where AV was not able to remove it, but maybe a couple of hours later, the AV was able to successfully remove it. The target would be a list of "really" infected devices.&lt;/P&gt;

&lt;P&gt;Let's assume these two example events happen:&lt;/P&gt;

&lt;P&gt;First Event:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Mar  4 09:32:07 Malware detected (Malware Name: BAD VIRUS, 2. Computer name: COMPUTER, Detection time(UTC time): 3/3/2016 10:07:53 AM, Malware file path: FILEPATH, Remediation action: Quarantine, Action status: Failed)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And then a bit later a 2nd one occurs:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Mar  4 12:32:07 Malware detected (Malware Name: BAD VIRUS, 2. Computer name: COMPUTER, Detection time(UTC time): 3/3/2016 11:07:53 AM, Malware file path: FILEPATH, Remediation action: Quarantine, Action status: Succeeded)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The following fields I have:&lt;BR /&gt;
 &lt;STRONG&gt;_time&lt;/STRONG&gt;&lt;BR /&gt;
&lt;STRONG&gt;malware&lt;/STRONG&gt; --&amp;gt; Malware Name&lt;BR /&gt;
&lt;STRONG&gt;computer&lt;/STRONG&gt; --&amp;gt; the affected device&lt;BR /&gt;
&lt;STRONG&gt;action_status&lt;/STRONG&gt; --&amp;gt; Succeeded or Failed&lt;/P&gt;

&lt;P&gt;Basically, the comparison of the two events should be like:&lt;BR /&gt;
show devices where&lt;BR /&gt;
malwareOLD = malwareNEW&lt;BR /&gt;
computerOLD = computerNEW&lt;BR /&gt;
_timeOLD different than _timeNEW&lt;BR /&gt;
action_statusOLD = Failed and action_statusNEW IS NOT Succeeded&lt;/P&gt;

&lt;P&gt;I hope you understand what I mean.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 08:58:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-and-compare-virus-alert-data-to-see-if-a-client/m-p/231808#M68763</guid>
      <dc:creator>zimmermann_0</dc:creator>
      <dc:date>2020-09-29T08:58:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to search and compare virus alert data to see if a client had an infection that was not removed, but was successfully removed later?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-and-compare-virus-alert-data-to-see-if-a-client/m-p/231809#M68764</link>
      <description>&lt;P&gt;You could try using the &lt;CODE&gt;transaction&lt;/CODE&gt;command here ...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; your_base_search | transaction malware, computer endswith="Succeeded" keepevicted=true | search closed_txn=0
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 04 Mar 2016 10:57:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-and-compare-virus-alert-data-to-see-if-a-client/m-p/231809#M68764</guid>
      <dc:creator>DMohn</dc:creator>
      <dc:date>2016-03-04T10:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to search and compare virus alert data to see if a client had an infection that was not removed, but was successfully removed later?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-and-compare-virus-alert-data-to-see-if-a-client/m-p/231810#M68765</link>
      <description>&lt;P&gt;Avoid &lt;CODE&gt;transaction&lt;/CODE&gt; whenever possible so try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | stats values(*) dc(_time) AS numTimes earliest(status) AS firstStatus latest(status) AS lastStatus BY computer malware | where numTimes&amp;gt;1 and firstStatus="Falled" AND NOT lastStatus="Succeeded"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Or maybe even just this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | stats values(*) dc(_time) AS numTimes BY computer malware | where numTimes&amp;gt;1 AND status="Falled" AND NOT status="Succeeded"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 04 Mar 2016 14:38:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-and-compare-virus-alert-data-to-see-if-a-client/m-p/231810#M68765</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-03-04T14:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to search and compare virus alert data to see if a client had an infection that was not removed, but was successfully removed later?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-and-compare-virus-alert-data-to-see-if-a-client/m-p/231811#M68766</link>
      <description>&lt;P&gt;thanks to both, woodcock's solution seems to do what I need &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2016 05:48:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-and-compare-virus-alert-data-to-see-if-a-client/m-p/231811#M68766</guid>
      <dc:creator>zimmermann_0</dc:creator>
      <dc:date>2016-03-07T05:48:21Z</dc:date>
    </item>
  </channel>
</rss>

