- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
How to create a detection rule on the LLMNR protocol knowing that I don't have Sysmon just with the logs?
Massin
Observer
02-25-2022
07:14 AM
Hello,
I wanted to create a detection rule on the LLMNR protocol knowing that I don't have Sysmon just with the logs.
Can you help me please?
thank you and have a great day
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

richgalloway

SplunkTrust
02-25-2022
07:27 AM
Please help us help you by telling us more about the use case.
What exactly are you trying to detect? I presume the information needed usually is supplied by sysmon - have you verified the same information is available in your logs?
---
If this reply helps you, Karma would be appreciated.
If this reply helps you, Karma would be appreciated.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Massin
Observer
02-25-2022
08:12 AM
I try to detect the LLMNR protocol if it is activated by a malicious user
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

richgalloway

SplunkTrust
02-25-2022
08:40 AM
We still need more information about the use case. How do you determine the user is malicious? Have you verified your logs contain the necessary information?
---
If this reply helps you, Karma would be appreciated.
If this reply helps you, Karma would be appreciated.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Massin
Observer
02-25-2022
08:10 AM
Thank you,
we don't have a sysmon
