Splunk Search

Windows Defender discovery on Splunk?

SecurityBear
Engager

Hi everybody.

I'm back using Splunk after some years, so I'm a bit "rusty".

This is my scenario: suppose I have a network with some hosts, both workstation and servers. I know only that an antivirus is installed on them, but not which one for all of the hosts. What I know is:

1. Some hosts has Windows Defender, other not.
2. The Windows Defender Logs are configured to be sent to splunk.

The other data mising is: the hosts with Defender, how are configured to get data? With a Splunk app? This is a data I have not.

So, my question is: is there a Splunk query that I can use to discover if Defender is in execution or not. formatting the result to show the hostname of every machine?

Labels (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @SecurityBear,

are you abke to identify Windows Defender's logs?

if yes (e.g. they are in a special Index, e.g. windefender), you can easily list all the hostnames in that index:

index=windefender
| stats count BY host

If instead your problem is to identify Defender's logs, you could see if you're using the Add-on for Defender (https://splunkbase.splunk.com/app/3734/).

In this TA you can identify Defender's Logs.

if instead you don't use the above TA, you should see in your inputs.conf where these logs are stored and which is the sourcetype and the source.

Ciao.

Giuseppe

View solution in original post

0 Karma

SecurityBear
Engager

I understand: many thanks Giuseppe.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @SecurityBear,

good for you, see next time!

If this answer solves your need, please, accept it for the other people of Community.

Ciao and happy splunking.

Giuseppe

P.S.: Karma Points are appreciated 😉

gcusello
SplunkTrust
SplunkTrust

Hi @SecurityBear,

are you abke to identify Windows Defender's logs?

if yes (e.g. they are in a special Index, e.g. windefender), you can easily list all the hostnames in that index:

index=windefender
| stats count BY host

If instead your problem is to identify Defender's logs, you could see if you're using the Add-on for Defender (https://splunkbase.splunk.com/app/3734/).

In this TA you can identify Defender's Logs.

if instead you don't use the above TA, you should see in your inputs.conf where these logs are stored and which is the sourcetype and the source.

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...