Security

I've got my data in but I now need to get some good use cases out of the windows log data!

achauhan2098
Engager
Relatively new to splunk but after a few challenges I have my splunk deployment up and running. I've limited this to 7 specific window event codes, namely (4776,4720,4723,1102,4624,4726,4625). I dont have the stick with these but I had advice from Splunk that this would be a good start.
 
However I now need to turn these into a good set of security use cases. I probably need to expand my inputs.conf file as currently its deliberately limited:
 
[WinEventLog://Application]
disabled = 1
start_from = oldest
current_only = 0
checkpointInterval = 5
renderXml=true
[WinEventLog://Security]
disabled = 0
start_from = oldest
current_only = 0
evt_resolve_ad_obj = 1
checkpointInterval = 5
whitelist = 4776,4720,4723,1102,4624,4726,4625
index=wineventlog
renderXml=true
 
[WinEventLog://System]
disabled = 1
start_from = oldest
current_only = 0
checkpointInterval = 5
renderXml=true
 
So my question is to get some good security event logs from what I have configured above, do I just work with this and try to get the search terms to match what I'm trying to achieve or is there anything more fundamental I need to change first?
 
Also, if there are any good resources for windows security searches that would be great.
 
Thanks!
Labels (3)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @achauhan2098,

welcome in the Splunk Community!

At first i hint to add some other EventCodes to complete your first windows analysis with the following:

  • access
    • 4634 Logout: it's useful to understand the session closing;

then, if you have logs from the Domain Controllers, are very useful for Security monitoring:

  • Group Change Monitoring:
    • Event 4727         A Security-enabled Global Group was created

    • Event 4737         A Security-enabled Global Group was changed

    • Event 4728         A member was added to a security-enabled Global group

    • Event 4729         A member was removed from a security-enabled Global group

    • Event 4730         A Security-enabled Global Group was removed

      Event 4754         A Security-enabled Universal Group was created

    • Event 4755         A Security-enabled Universal Group was changed

    • Event 4756         A member was added to a security-enabled Universal group

    • Event 4757         A member was removed from a security-enabled Universal group

    • Event 4758         A Security-enabled Universal Group was removed

    • Event 4731         A Security-enabled Local Group was created

    • Event 4735         A Security-enabled Local Group was changed

    • Event 4732         A member was added to a security-enabled Domain Local group

    • Event 4733         A member was removed from a security-enabled Domain Local group

    • Event 4734         A Security-enabled Domain Local Group was removed

    • Event 4781         Group Rename

    • Event 4764         Group Change Type

  • User Change Monitoring:
    • Event 4720         A user account was created

    • Event 4724         An attempt was made to reset an account Password

    • Event 4738         A User account was changed

    • Event 4725         A user account was disabled

    • Event 4722         A user account was enabled

    • Event 4726         A user account was deleted

  • Policy Change Monitoring:
    • 4719 Policy Change

To have these EventCodes from the Domain Controllers you have to enable them because, by default, they are disabled.

Anyway, the EventCodes you're ingesting are:

  • 4776: The domain controller attempted to validate the credentials for an account,
  • 4720: A user account was created,
  • 4723: An attempt was made to change an account's password,
  • 1102: The audit log was cleared,
  • 4624: Login,
  • 4726: A user account was deleted,
  • 4625: Logfail.

So these are some immediate security Use Cases that you can develop:

  • Brute force: many login in a period on the same server,
  • audit logs deletion,
  • User accounts managing (creation and deletion).

If you're interested to Security Use Cases, I hint to install the Splunk Security Essentials App (https://splunkbase.splunk.com/app/3435/) that propose all the Use Case possible with your data.

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...