Security

analyze this data in Splunk

tuts
Path Finder

Scenario: The device has been compromised, and we want to understand how the breach occurred. We have extracted data from the device from the Setup, Security, and Application logs in CSV format and uploaded it to Splunk.

Question: What is the best way to automatically analyze this data in Splunk and identify any suspicious information

Tags (1)
0 Karma

tuts
Path Finder

That's sad.
Are there other tools that help me with analysis?
And what do you advise

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @tuts ,

I performed a similar search in the past: there's no automatic analysis that you can perform, youcan search for the inbound accesses and outbound transaction, you can only search, with a security specialist to identify some possible threat or compromise.

Ciao.

Giuseppe

0 Karma

tuts
Path Finder

That's sad.
Are there other tools that help me with analysis?
And what do you advise

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @tuts ,

in my opinion, only the knowledge of a security analyst can help you in the search.

You could install some app for the technologies you have but, I think that only a deep knowledge of attack methods and technics can support you.

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...