Alerting

Help with Splunk alert to identify application control violation

radparik
Engager

Hello,

I am trying to figure out how to have Splunk detect multiple application control violations on the system. Looking to have the alert trigger if there are more than 5 windows events from a single IP source.

Does anyone know how I can go about this?

Labels (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

It would help to have more information about your use case.  In general, it's like this: read events, count them, filter on the count, trigger an alert.

index=windows
| stats count by ip
| where count > 5

Have the alert trigger when the number of results from this search is not zero.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

See Splunk Platform & Observability Innovations at Cisco Live EMEA

Hi Splunkers, Learn about what’s next for Splunk Platform at Cisco Live EMEA.  Data silos are a big challenge ...

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...