Splunk Search

How to identify an unusual source sending a high volume of emails, excluding VCP public wifi from the 172 Host?

AL3Z
Builder

Hi,

I'm trying to build a search query for the Unexpected Host Sending a Large Amount of Email  in which i need to Exclude the  vcp public wifi anything come from 172 Host.

| tstats `summariesonly` count from datamodel=Network_Traffic where All_Traffic.app=*smtp* ` `unexpected_host_sending_a_large_amount_of_email_filter` NOT All_Traffic.dest=167.228.0.0/16 by All_Traffic.src All_Traffic.dest All_Traffic.src_category _time span=1h | rename All_Traffic.* as * | bin _time span=1d as day | eventstats dc(day) as day_count by src | 

How to edit the search accordingly.
Thanks.

Labels (2)
0 Karma

AL3Z
Builder

@caiosalonso 

How do we exclude src_ip!=172.30.* AND FromZone!="WIRELESS_VCP_ACTIVATION" from  datamodel Network_Traffic its not working as expected.

0 Karma

caiosalonso
Path Finder

Hi,

Just to confirm, do you need to add a filter to exclude events from a specifc Source IP Address in this query?

0 Karma

AL3Z
Builder

yes

 

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...