Splunk Enterprise Security

Palo log issue

Splunkers2
Observer

Hi all,

I'm having issues comparing user field in Palo Alto traffic logs vs last user reported by Crowdstrike/Windows events.Palo-Alto traffic logs is showing a different user in logs initiating the traffic during the time window compared to Crowd strike last user login reported for same endpoint.

Has anyone you know faced similar issue ?

 

Thanks 

Labels (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

If I understand correctly what you're saying, it's not a problem with Splunk but rather with quality of your data. If the same "truth" in reality is expressed as events saying different things in Splunk it means there's something wrong with your sources setup.

inventsekar
SplunkTrust
SplunkTrust

Hi @Splunkers2 May we know if you use the CIM pls. 

pls copy paste the Splunk Search query you used(remove sensitive data beofre), thanks

thanks and best regards,
Sekar

PS - If this or any post helped you in any way, pls consider upvoting, thanks for reading !
0 Karma

dural_yyz
Motivator

Since both of these are data source content issues it's difficult to determine from the Splunk side.  I would start with more research at a specific machine side.  What traffic is being generated and from what application.  Who if anyone is logged in live.

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...