Splunk Search

Splunk Search: Lateral Movement

johann2017
Explorer

Hello! I am wanting to build a search that can help detect lateral movement. I want to see when the same user is logging into multiple machines in a specific period of time. For example, an admin account gets compromised. That same admin account was then used to log into 50 different computers in the course of an hour. How would I run a search similar to something like that?

Tags (1)
0 Karma

sduff_splunk
Splunk Employee
Splunk Employee

Something like the following would count the number of unique hostnames ( dc = distinct count) that the Admin has logged into.

index=wineventlog Logon user=Administrator earliest=-65m@m | stats dc(hostname), values(hostname)

You may also want to look at the Security Essentials app, https://splunkbase.splunk.com/app/3435/ , which hassome examples of such searches and use-cases.

0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...