Splunk Enterprise Security

How do I search for rogue Server added to my environment including info about the Hacker(s)

SamHTexas
Builder

How do I search for rogue Server added to my environment including info about the Hacker(s)

Labels (1)
Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

That's what's called Hardware Asset Management (HWAM).  You have a list of devices that are allowed/expected on the on the network and a list of devices that ARE on the network then you compare them.  Any unexpected devices are considered rogue until they are discovered to be legitimate.

See https://us-cert.cisa.gov/cdm/capabilities/hwam and https://us-cert.cisa.gov/sites/default/files/cdm_files/HWAM_CapabilityDescription.pdf

Information about the "hacker" is harder to come by.  With luck, when you find the rogue machine you'll also find the person responsible (the user, most likely).

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Shape the Future of Splunk: Join the Product Research Lab!

Join the Splunk Product Research Lab and connect with us in the Slack channel #product-research-lab to get ...