Reporting

Search for all email files

tony_pham
New Member

Hi, 

how would I detect and monitor processes and command-line arguments for actions that could be taken to gather local email files. For example, I want to be alerted if an adversary gathers or moves email files. Most email files have .eml, .pst, .ost extension. I thought about doing regex search for all the files ending with that extension. What do you think?

 

Labels (2)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

What data / events are you planning on searching for this information? Is it already in splunk in some form? Or is it a question more about how you would gather this information in the first place, e.g. keystroke trace on your adversary's device? 🙂

0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...