Security

User logged in having DBA privileges

vikkysplunk
Path Finder

Hi,  Please could you help me to create the below use case in splunk.

 

1) User logged in having DBA privileges

 

2) Admin adding or removing Softwares/application on machines

 

3)email with malicious attachments

4)Social Engineering Attacks - Potential Phishing

5) Addition of new infrastructure in the network New VLAN creation

6) Detection of covert channels

Labels (1)
Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

What have you tried so far?

Have you checked out the Splunk Security Essentials app?

---
If this reply helps you, Karma would be appreciated.
0 Karma

vikkysplunk
Path Finder

@richgalloway 

 

I created all above use cases except below and I am using cisco iron port for email security, so please can you help me on these?

3)email with malicious attachments

4)Social Engineering Attacks - Potential Phishing

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Splunk does not scan emails or attachments so it would not be the one to decide which emails are phishes or contain malware.  That decision is left to email scanning software which reports it findings to Splunk where they can be searched and reported/alerted.

---
If this reply helps you, Karma would be appreciated.

vikkysplunk
Path Finder

@richgalloway Hello,

 

Yes, already i have verified on Security Essentials app and i have not found anything related to these use cases

0 Karma
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

New This Month - Observability Updates Give Extended Visibility and Improve User ...

This month is a collection of special news! From Magic Quadrant updates to AppDynamics integrations to ...

Intro to Splunk Synthetic Monitoring

In our last post, we mentioned that the 3 key pieces of observability – metrics, logs, and traces – provide ...