Hello all,
Thank you for taking the time to consider my question, I'm mainly seeking to find if it's possible to better enrich the data that is obtained from Windows hosts running Splunk UF v8.2.5...
See more...
Hello all,
Thank you for taking the time to consider my question, I'm mainly seeking to find if it's possible to better enrich the data that is obtained from Windows hosts running Splunk UF v8.2.5, namely [WinEventLog:Security] and [WinNetMon] capabilities.
Currently we monitor for all new process run, as well as collect logs for unfamiliar IPv4 addresses reached out to by creating a inputs.conf blacklist for internal IPv4s and common websites. I'm curious if we can further enrich this data by using powershell scripts to lookup these IPv4s according to that hosts DNS resolution, (not retroactively resolving them at the point of analysis, which can lead to different results if the endpoint's DNS cache was compromised).
Additionally, I'm wondering if it's possible to use something like a powershell script to retrieve the SHA256 file hash of new processes run with the parsed log. It could be that what I need to do is just run Sysmon and monitor that, and I'm very much for that, but I've heard from more veteran employees at the company I'm currently at that sysmon killed performance and isn't feasible on endpoints. I'm very much a rookie and wasn't in a position to argue otherwise, but as far as I know sysmon has a rather light footprint in comparison to it's robust capabilities.
Any advice on these topics is greatly appreciated, and will be rewarded with karma!