Alerting

What is best practice for tuning processes?

Ring
New Member

chrome.exe and acrobat.exe are very noisy in our environment. I don't want to just exclude the process name because the actual process could be malicious. Was just wondering what best practice would be to make it less noisy. I was thinking of excluding the process name only if it matches the correct sha256 or is there a better way? 

Labels (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

Your question is very ambiguous. What logs are you talking about? How are you getting them? Do you want to limit the logs ingested or just filter out during search? And so on. And so on.

0 Karma

Ring
New Member

Our original Splunk engineer left so I was sort of put as the rule tuning guy for the time being and don't have that much experience yet. The alert itself is the Unusually Long Command Line rule and I'm trying to work with the correlation search so that it is not as noisy. I was just wondering if there is a best practice when trying to tune out excel.exe, acrobat.exe, chrome.exe, etc type of processes if that makes sense. 

0 Karma
Get Updates on the Splunk Community!

Index This | Why do they call it hyper text?

November 2023 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

State of Splunk Careers 2023: Career Resilience and the Continued Value of Splunk

For the past three years, Splunk has partnered with Enterprise Strategy Group to conduct a survey that gauges ...

The Great Resilience Quest: 9th Leaderboard Update

The ninth leaderboard update (11.9-11.22) for The Great Resilience Quest is out >> Kudos to all the ...