<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Would my search detect a malicious user, attempting to connect to multiple destinations, but only one failed login to each destination? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Would-my-search-detect-a-malicious-user-attempting-to-connect-to/m-p/319520#M95537</link>
    <description>&lt;P&gt;Sure.  I wondered about that.  &lt;/P&gt;

&lt;P&gt;Look up the eventSearch value in the search.log for your original tstats search, and see what splunk substituted for "Authentication.dest" .  Use that same underlying data model item in the "list() as dest" clause.&lt;/P&gt;</description>
    <pubDate>Wed, 01 Mar 2017 06:13:59 GMT</pubDate>
    <dc:creator>DalJeanis</dc:creator>
    <dc:date>2017-03-01T06:13:59Z</dc:date>
    <item>
      <title>Would my search detect a malicious user, attempting to connect to multiple destinations, but only one failed login to each destination?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Would-my-search-detect-a-malicious-user-attempting-to-connect-to/m-p/319517#M95534</link>
      <description>&lt;P&gt;Problem with this search?&lt;/P&gt;

&lt;P&gt;Would the following search detect a malicious user, trying to connect to multiple destinations using a specific username, but only one failed login to each destination? My understanding is that the count against one specific destination would have to be greater than 5 for this to fire an alert.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats `summariesonly` count from datamodel=Authentication where nodename=Authentication.Failed_Authentication by "Authentication.user","Authentication.dest"  
| rename "Authentication.user" as "user ","Authentication.dest" as "dest" 
| where 'count'&amp;gt;5
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Would it however detect an attack against say, 100 destinations, where there was just 1 failed login against each host? Someone trying to brute force a username 'Administratror' for example and fly under the &amp;gt;5 trigger?&lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Feb 2017 10:44:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Would-my-search-detect-a-malicious-user-attempting-to-connect-to/m-p/319517#M95534</guid>
      <dc:creator>jacqu3sy</dc:creator>
      <dc:date>2017-02-27T10:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: Would my search detect a malicious user, attempting to connect to multiple destinations, but only one failed login to each destination?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Would-my-search-detect-a-malicious-user-attempting-to-connect-to/m-p/319518#M95535</link>
      <description>&lt;P&gt;You are correct that it would not detect such an attack.  You could set up an additional search (with perhaps a different threshold for triggering) by moving the "by destination" portion of the search, something like this.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; | tstats `summariesonly` count list ("Authentication.dest") as "dest" from datamodel=Authentication where nodename=Authentication.Failed_Authentication by "Authentication.user"
 | rename "Authentication.user" as "user "
 | where 'count'&amp;gt;10
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 27 Feb 2017 15:49:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Would-my-search-detect-a-malicious-user-attempting-to-connect-to/m-p/319518#M95535</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2017-02-27T15:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: Would my search detect a malicious user, attempting to connect to multiple destinations, but only one failed login to each destination?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Would-my-search-detect-a-malicious-user-attempting-to-connect-to/m-p/319519#M95536</link>
      <description>&lt;P&gt;Thanks for confirming. Much appreciated.&lt;/P&gt;

&lt;P&gt;I did try your alternative search but it returned;&lt;BR /&gt;
Error in 'stats' command: The argument '(Authentication.dest)' is invalid. &lt;/P&gt;

&lt;P&gt;I'll play around with it. Thanks again.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Feb 2017 16:20:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Would-my-search-detect-a-malicious-user-attempting-to-connect-to/m-p/319519#M95536</guid>
      <dc:creator>jacqu3sy</dc:creator>
      <dc:date>2017-02-27T16:20:26Z</dc:date>
    </item>
    <item>
      <title>Re: Would my search detect a malicious user, attempting to connect to multiple destinations, but only one failed login to each destination?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Would-my-search-detect-a-malicious-user-attempting-to-connect-to/m-p/319520#M95537</link>
      <description>&lt;P&gt;Sure.  I wondered about that.  &lt;/P&gt;

&lt;P&gt;Look up the eventSearch value in the search.log for your original tstats search, and see what splunk substituted for "Authentication.dest" .  Use that same underlying data model item in the "list() as dest" clause.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2017 06:13:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Would-my-search-detect-a-malicious-user-attempting-to-connect-to/m-p/319520#M95537</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2017-03-01T06:13:59Z</dc:date>
    </item>
  </channel>
</rss>

