Splunk Search

New rule in detecting multiple requests for a known Malicious destination from a single source could use help with the way the rule is written

ahmar74
Explorer

index=app_proxy sourcetype=bcoat_proxysg_app OR sourcetype=bcoat_proxyclient_app categories="Malicous Sources" OR "Botnets" | stats count by username,host,referrer | count> 1 | table _time username,host,referrer filter_results

Tags (1)
0 Karma

martin_mueller
SplunkTrust
SplunkTrust

Additionally, after the stats there are no _time and filter_results columns, so listing them in table doesn't seem to make sense to me.

0 Karma

alacercogitatus
SplunkTrust
SplunkTrust

Sure - this looks like a search that returns information. However, it probably won't get the categories you are looking for. The below splits out the categories into the cim field "category". If this works for what you are looking for, then it makes sense.

index=app_proxy sourcetype=bcoat_proxysg_app OR sourcetype=bcoat_proxyclient_app category="Malicous Sources" OR category="Botnets" | stats count by username,host,referrer | where count> 1 | table _time username,host,referrer filter_results

martin_mueller
SplunkTrust
SplunkTrust

There's likely a syntax error in | count > 1 | due to lack of a search command such as search or where - both will achieve what you wanted and throw out events with count=1.

0 Karma

ahmar74
Explorer

does the rule make sense to you as is?

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

Do elaborate on what you actually need help with.

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...