Hello,
I have set up a home lab with splunk. I have splunk enterprise on my admin Windows vm where i make all the changes, and a second Windows vm that is the "Victim". Then i have an attack machine that is kali linux. all machines are on the same network, i can ping each machine each way.
The idea is to simulate real world SOC experience. I have splunk forwarder installed on the victim machine. I am forwarding all windows logs (Sytem, security, application, and setup). I have ran multiple NMAP scans on the victim machine.
I have forward the logs to an Index called "wineventlog". and my machine is called "Victim".
I have used the splunk guide on detecting port scanning and it yields no results, i have also use security essentials "internal horizontal scan". and it gives an error.
Ive also checked and i am getting logs sent, i can see them in the index.
I have no idea why none of my searches are not working. I dont know where to begin, am i not getting the right data forwarded to splunk? am i not searching right? or have i missed a step?
Please note i have absolutely no experience with splunk. Im from an IT background so im not too useless but im absolutely lost when it comes to splunk.
Any helps or suggestions is much much much appreciated and needed. I am totally lost. Apologies if i have not provided enough information, can provide more if needed. Pictures included in post.
@joe2- I would like to clarify few points and I think you will get the idea on how you can do something like that:
Summary:
I hope this helps!!! Kindly upvote if it does!!!