Alerting

Help with Splunk alert to identify application control violation

radparik
Engager

Hello,

I am trying to figure out how to have Splunk detect multiple application control violations on the system. Looking to have the alert trigger if there are more than 5 windows events from a single IP source.

Does anyone know how I can go about this?

Labels (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

It would help to have more information about your use case.  In general, it's like this: read events, count them, filter on the count, trigger an alert.

index=windows
| stats count by ip
| where count > 5

Have the alert trigger when the number of results from this search is not zero.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...