Splunk Enterprise

How do I effectively whitelist events like excessive failed logins, and abnormal new processes?

MdSantana
Explorer

Hello,

 

How do I effectively whitelist events like excessive failed logins, and abnormal new processes? These are known, non malicious issues in our network that generate a lot of hits that do not amount to anything upon extensive investigation.


Thanks in advance.

Labels (1)
Tags (2)
0 Karma

2MuchC0ff33
Explorer

@MdSantana, Could you try manually creating the suppression rule by adding it to your Splunk configuration's transforms.conf file?

0 Karma

MdSantana
Explorer

Still doesn't work.

I really don't understand what the problem is with my search when it parses correctly in the search app, but fails in the new suppression wizard.

0 Karma

2MuchC0ff33
Explorer

Great question @MdSantana 

You can effectively whitelist events in Splunk, such as excessive failed logins and unusual new processes, by using the following methods:

  1. Suppression rules: To suppress these events, create a suppression rule in Splunk.
  2. Whitelist of source IP addresses: For these events, you can create a whitelist of source IP addresses.
  3. Use of "ignore" or "exclusion" lists: For these events, you can create an ignore or exclusion list.
  4. Use of event types: These events can be assigned specific event types.

It should be noted that these methods should be used with caution, as they can also conceal legitimate security events. I recommend reading the Splunk documentation for more information on suppression rules, whitelist, ignore or exclusion lists, and event types:

Let me know if you need help developing commands.

MdSantana
Explorer

Thank you 2MuchC0ff33.

 

I did a lot of searching to try and make sure I would only be whitelisting confirmed non malicious stuff while still allowing Splunk to do its job.

However, I have run into an issue while suppressing. Apparently my search cannot be parsed correctly.  Here it is;

| from datamodel:"Change"."Network_Changes" | search dvc="17x.xx.x.*" command="!exec: enable"

Not sure what the issue is, but any help is appreciated.

 

Thank you again!

0 Karma

2MuchC0ff33
Explorer

Hi @MdSantana 

Using the "!" character in the search expression could be the source of the problem with the search query. In Splunk, the "!" character is used to negate a search term, so "!exec: enable" would match events where the value of the "command" field does not contain the string "exec: enable".

You could try escaping the "!" character by adding a backslash in front of it, as shown below:

| from datamodel:"Change"."Network_Changes" | search dvc="17x.xx.x.*" command="\!exec: enable"

If this does not solve the problem, try replacing the "!" character with the "!" sequence, as shown below:

| from datamodel:"Change"."Network_Changes" | search dvc="17x.xx.x.*" command="\\!exec: enable"

MdSantana
Explorer

Hi @2MuchC0ff33 ,

 

Its strange because when I run a normal search string outside of the New Suppression setup wizard/box I get no errors.

But when I input the same thing into the box and attempt to save, I get the error.

 

Nonetheless, unfortunately neither one worked and I still can't figure out why it won't accept the string.

0 Karma
Get Updates on the Splunk Community!

AppDynamics Summer Webinars

This summer, our mighty AppDynamics team is cooking up some delicious content on YouTube Live to satiate your ...

SOCin’ it to you at Splunk University

Splunk University is expanding its instructor-led learning portfolio with dedicated Security tracks at .conf25 ...

Credit Card Data Protection & PCI Compliance with Splunk Edge Processor

Organizations handling credit card transactions know that PCI DSS compliance is both critical and complex. The ...