<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to search email logs for potential SPAM IOC via character count or special characters in a field? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-email-logs-for-potential-SPAM-IOC-via-character/m-p/238451#M70838</link>
    <description>&lt;P&gt;As a further refinement to this, is it possible in Splunk to weight evals, such as if a user sends or receives an email with a Subject over 200 characters in length, a weight or rating of 5 is assigned, if the recipient list is greater than 10 people a weight or rating of 5 is assigned,  and so on so users with a higher weight/rating bubble up to the top of the report.&lt;/P&gt;

&lt;P&gt;Thx&lt;/P&gt;</description>
    <pubDate>Wed, 06 Jul 2016 14:26:17 GMT</pubDate>
    <dc:creator>jwalzerpitt</dc:creator>
    <dc:date>2016-07-06T14:26:17Z</dc:date>
    <item>
      <title>How to search email logs for potential SPAM IOC via character count or special characters in a field?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-email-logs-for-potential-SPAM-IOC-via-character/m-p/238450#M70837</link>
      <description>&lt;P&gt;We are ingesting some of our email logs, and one of the fields is 'Subject'. &lt;/P&gt;

&lt;P&gt;I was wondering if anyone has created a search that looks for potential SPAM IOC via the following methods:&lt;/P&gt;

&lt;P&gt;1) Character count - I'd like to create a search that creates buckets that shows a count of Subject length of 1-10, 11-20, 21-30, etc) &lt;BR /&gt;
2) Number of special characters in the Subject field - once again create a search for the count of buckets from 1-3, 4-6, etc., or even the number of special characters in a row, such as two or ,more (!!, !!!, etc.).&lt;/P&gt;

&lt;P&gt;Not limited to those two ideas of course, but would appreciate any feedback.&lt;/P&gt;

&lt;P&gt;Thx&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 13:57:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-email-logs-for-potential-SPAM-IOC-via-character/m-p/238450#M70837</guid>
      <dc:creator>jwalzerpitt</dc:creator>
      <dc:date>2016-07-06T13:57:31Z</dc:date>
    </item>
    <item>
      <title>Re: How to search email logs for potential SPAM IOC via character count or special characters in a field?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-email-logs-for-potential-SPAM-IOC-via-character/m-p/238451#M70838</link>
      <description>&lt;P&gt;As a further refinement to this, is it possible in Splunk to weight evals, such as if a user sends or receives an email with a Subject over 200 characters in length, a weight or rating of 5 is assigned, if the recipient list is greater than 10 people a weight or rating of 5 is assigned,  and so on so users with a higher weight/rating bubble up to the top of the report.&lt;/P&gt;

&lt;P&gt;Thx&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 14:26:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-email-logs-for-potential-SPAM-IOC-via-character/m-p/238451#M70838</guid>
      <dc:creator>jwalzerpitt</dc:creator>
      <dc:date>2016-07-06T14:26:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to search email logs for potential SPAM IOC via character count or special characters in a field?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-email-logs-for-potential-SPAM-IOC-via-character/m-p/238452#M70839</link>
      <description>&lt;P&gt;Are you looking for how to implement your ideas or confirmation on your ideas as appropriate for helping find spam?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 16:17:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-email-logs-for-potential-SPAM-IOC-via-character/m-p/238452#M70839</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-07-06T16:17:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to search email logs for potential SPAM IOC via character count or special characters in a field?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-email-logs-for-potential-SPAM-IOC-via-character/m-p/238453#M70840</link>
      <description>&lt;P&gt;Looking for ideas on how to implement if possible (as I would think others have tackled this before)&lt;/P&gt;

&lt;P&gt;Thx&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 16:36:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-email-logs-for-potential-SPAM-IOC-via-character/m-p/238453#M70840</guid>
      <dc:creator>jwalzerpitt</dc:creator>
      <dc:date>2016-07-06T16:36:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to search email logs for potential SPAM IOC via character count or special characters in a field?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-email-logs-for-potential-SPAM-IOC-via-character/m-p/238454#M70841</link>
      <description>&lt;P&gt;1: Like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | eval SubjectLen=length(Subject) | bucket SubjectLen span=10
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;2: Like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | eval SubjectLen=length(Subject)
| eval SubjectCopy=Subject | rex field=SubjectCopy mode=sed "s/[ListOfSpecialCharactersHere]//g"
| eval specialCharCount = SubjectLen - length(SubjectCopy)
| field - SubjectCopy
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 06 Jul 2016 19:31:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-email-logs-for-potential-SPAM-IOC-via-character/m-p/238454#M70841</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-07-06T19:31:56Z</dc:date>
    </item>
  </channel>
</rss>

