Splunk Enterprise

How do I effectively whitelist events like excessive failed logins, and abnormal new processes?

MdSantana
Explorer

Hello,

 

How do I effectively whitelist events like excessive failed logins, and abnormal new processes? These are known, non malicious issues in our network that generate a lot of hits that do not amount to anything upon extensive investigation.


Thanks in advance.

Labels (1)
Tags (2)
0 Karma

2MuchC0ff33
Explorer

@MdSantana, Could you try manually creating the suppression rule by adding it to your Splunk configuration's transforms.conf file?

0 Karma

MdSantana
Explorer

Still doesn't work.

I really don't understand what the problem is with my search when it parses correctly in the search app, but fails in the new suppression wizard.

0 Karma

2MuchC0ff33
Explorer

Great question @MdSantana 

You can effectively whitelist events in Splunk, such as excessive failed logins and unusual new processes, by using the following methods:

  1. Suppression rules: To suppress these events, create a suppression rule in Splunk.
  2. Whitelist of source IP addresses: For these events, you can create a whitelist of source IP addresses.
  3. Use of "ignore" or "exclusion" lists: For these events, you can create an ignore or exclusion list.
  4. Use of event types: These events can be assigned specific event types.

It should be noted that these methods should be used with caution, as they can also conceal legitimate security events. I recommend reading the Splunk documentation for more information on suppression rules, whitelist, ignore or exclusion lists, and event types:

Let me know if you need help developing commands.

MdSantana
Explorer

Thank you 2MuchC0ff33.

 

I did a lot of searching to try and make sure I would only be whitelisting confirmed non malicious stuff while still allowing Splunk to do its job.

However, I have run into an issue while suppressing. Apparently my search cannot be parsed correctly.  Here it is;

| from datamodel:"Change"."Network_Changes" | search dvc="17x.xx.x.*" command="!exec: enable"

Not sure what the issue is, but any help is appreciated.

 

Thank you again!

0 Karma

2MuchC0ff33
Explorer

Hi @MdSantana 

Using the "!" character in the search expression could be the source of the problem with the search query. In Splunk, the "!" character is used to negate a search term, so "!exec: enable" would match events where the value of the "command" field does not contain the string "exec: enable".

You could try escaping the "!" character by adding a backslash in front of it, as shown below:

| from datamodel:"Change"."Network_Changes" | search dvc="17x.xx.x.*" command="\!exec: enable"

If this does not solve the problem, try replacing the "!" character with the "!" sequence, as shown below:

| from datamodel:"Change"."Network_Changes" | search dvc="17x.xx.x.*" command="\\!exec: enable"

MdSantana
Explorer

Hi @2MuchC0ff33 ,

 

Its strange because when I run a normal search string outside of the New Suppression setup wizard/box I get no errors.

But when I input the same thing into the box and attempt to save, I get the error.

 

Nonetheless, unfortunately neither one worked and I still can't figure out why it won't accept the string.

0 Karma
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...