All Apps and Add-ons

How to create a detection rule on the LLMNR protocol knowing that I don't have Sysmon just with the logs?

Massin
Observer

Hello,
I wanted to create a detection rule on the LLMNR protocol knowing that I don't have Sysmon just with the logs.
Can you help me please?
thank you and have a great day

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please help us help you by telling us more about the use case.

What exactly are you trying to detect?  I presume the information needed usually is supplied by sysmon - have you verified the same information is available in your logs?

---
If this reply helps you, Karma would be appreciated.
0 Karma

Massin
Observer

I try to detect the LLMNR protocol if it is activated by a malicious user

0 Karma

richgalloway
SplunkTrust
SplunkTrust

We still need more information about the use case.  How do you determine the user is malicious?  Have you verified your logs contain the necessary information?

---
If this reply helps you, Karma would be appreciated.
0 Karma

Massin
Observer

Thank you,
we don't have a sysmon

0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...