- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Splunk Enterprise Security: How to modify the Top Infections Search to exclude results where signature=Tracking Cookies?
kmcaloon
Explorer
11-05-2015
11:10 AM
Can someone help me modify the Top Infections search? It is using tstats and a datamodel. I'm trying to exclude results where signature=Tracking Cookies, but usual exclusion methods aren't working with tstats and datamodel. The dashboard search is below.
| tstats `summariesonly` dc(Malware_Attacks.dest) as dest_count from datamodel=Malware where * by Malware_Attacks.signature | `drop_dm_object_name("Malware_Attacks")` | sort 10 - dest_count
This search results in a chart with the signature name in one column and dest_count in the next column. I would like to exclude results that match on signature that equals "Tracking Cookies".
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
mcronkrite

Splunk Employee
12-08-2015
10:32 AM
Look at your data that is tagged Malware, and Attack.
This is what is being collected to include.
So you need to modify the event type for the tags, malware and attack, and add to that search to exclude the data you don't want.
