All Apps and Add-ons

How to create a detection rule on the LLMNR protocol knowing that I don't have Sysmon just with the logs?

Massin
Observer

Hello,
I wanted to create a detection rule on the LLMNR protocol knowing that I don't have Sysmon just with the logs.
Can you help me please?
thank you and have a great day

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please help us help you by telling us more about the use case.

What exactly are you trying to detect?  I presume the information needed usually is supplied by sysmon - have you verified the same information is available in your logs?

---
If this reply helps you, Karma would be appreciated.
0 Karma

Massin
Observer

I try to detect the LLMNR protocol if it is activated by a malicious user

0 Karma

richgalloway
SplunkTrust
SplunkTrust

We still need more information about the use case.  How do you determine the user is malicious?  Have you verified your logs contain the necessary information?

---
If this reply helps you, Karma would be appreciated.
0 Karma

Massin
Observer

Thank you,
we don't have a sysmon

0 Karma
Get Updates on the Splunk Community!

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Community Content Calendar, October Edition

Welcome to the October edition of our Community Spotlight! The Splunk Community is a treasure trove of ...

SOC4Kafka - New Kafka Connector Powered by OpenTelemetry

The new SOC4Kafka connector, built on OpenTelemetry, enables the collection of Kafka messages and forwards ...