Reporting

How to set up a scheduled search that looks for the usage of the delete command in my environment?

jward6004
Explorer

I want to set up a scheduled search that will look for the usage of the delete command in my environment.

This action is secured by the can_delete user role currently.

0 Karma

inventsekar
SplunkTrust
SplunkTrust

This search will show you if anyone has run the delete command .. you can save this as a scheduled search..

index=_audit sourcetype=audittrail action=search search=*delete* 
 | where match(search,"\|\s*delete")
 | table _time search user
thanks and best regards,
Sekar

PS - If this or any post helped you in any way, pls consider upvoting, thanks for reading !
0 Karma

sundareshr
Legend

Set you alert to this query. If count>0, alert

index=_audit sourcetype=audittrail delete | regex _raw="\|\s*delete" 
0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...