Activity Feed
- Got Karma for Re: Add Threat Intelligence to Enterprise Security search head cluster. 06-05-2020 12:48 AM
- Got Karma for Re: How to restore Glass Tables - ES Deployment Template. 06-05-2020 12:48 AM
- Got Karma for Re: Regex for extraction between text and second comma. 06-05-2020 12:47 AM
- Got Karma for Re: Does SA-SPLICE or the Splunk App for Enterprise Security support certificate-based authentication to TAXII service such as FS-ISAC?. 06-05-2020 12:47 AM
- Got Karma for Re: what the Referer URL field actually is?. 06-05-2020 12:46 AM
- Got Karma for Re: what the Referer URL field actually is?. 06-05-2020 12:46 AM
- Got Karma for Re: what the Referer URL field actually is?. 06-05-2020 12:46 AM
- Got Karma for Re: what the Referer URL field actually is?. 06-05-2020 12:46 AM
- Posted Re: How to restore Glass Tables - ES Deployment Template on Splunk Enterprise Security. 04-24-2017 03:57 PM
- Posted Re: Add Threat Intelligence to Enterprise Security search head cluster on Deployment Architecture. 05-12-2016 12:18 PM
- Posted Re: Does SA-SPLICE or the Splunk App for Enterprise Security support certificate-based authentication to TAXII service such as FS-ISAC? on Splunk Enterprise Security. 06-16-2015 10:09 AM
- Posted Re: Regex for extraction between text and second comma on Splunk Search. 07-09-2014 09:52 AM
- Posted Re: what the Referer URL field actually is? on Dashboards & Visualizations. 06-16-2014 09:52 AM
- Posted Re: what the Referer URL field actually is? on Dashboards & Visualizations. 06-13-2014 09:45 AM
Topics I've Started
No posts to display.
04-24-2017
03:57 PM
1 Karma
Hi Season!
When you say you "cleared" the glasstable, is it safe to assume that this was done using the "clear" action available when editing a glasstable? Or was the glasstable removed/deleted from the system?
There is a way to restore the glasstable but it unfortunately can only be done if you have disk access to the system. If you do have disk access to the system, following the steps below should fix the issue.
These steps will walk you through the removal of the "ess_content_importer" metadata file. This file tracks which apps have had glass table content imported and which have not. Deleting it will force all content to be reimported for all installed apps. That said, the importer will NOT overwrite any existing content, so modifications to existing glass tables will remain unchanged.
Delete the "ES Deployment Template" from within the "Saved Glass Tables" dashboard (called "Glass Tables" in the nav bar).
Once the glass table has been deleted, navigate to the following directory on disk: "$SPLUNK_HOME/var/lib/splunk/modinputs/ess_content_importer"
Once in this directory, delete the "ess_content_importer" file. Make sure you delete the "ess_content_importer" file (there is no extension for the file) and not the directory. It can be a bit confusing because the file name is the same as the name of the directory that contains it. To be clear, the full path of the file that needs to be removed is: "$SPLUNK_HOME/var/lib/splunk/modinputs/ess_content_importer/ess_content_importer".
Note that this resolution is only needed for the out-of-the-box glass tables because they were shipped within the SplunkEnterpriseSecuritySuite app, which cannot be disabled and re-enabled. To reimport content for any other other apps, you can follow the steps outlined in the documentation linked below.
http://docs.splunk.com/Documentation/ES/4.7.0/User/ManageGlassTable#Restore_a_glass_table_that_you_deleted_after_importing_it_as_part_of_an_app_2
Hope this helps! Let me know if it doesn't.
Kindest Regards,
~Brian
... View more
05-12-2016
12:18 PM
1 Karma
Hi clarkwh2 --
The conf file used to store TAXII feed configurations is ../local/inputs.conf. An example entry would look like:
[threatlist://<input_name>]
description = TAXII description
disabled = false
interval = 86400
post_args = collection="<taxii_collection>" earliest="-1y" taxii_username="user" taxii_password="pass"
type = taxii
url = <url to taxii discovery service>
Docs pertaining to the available options for this modular input can be found in SA-ThreatIntelligence, under README/inputs.conf.spec
Hope this helps,
~Brian
... View more
06-16-2015
10:09 AM
1 Karma
Hi nyfaisal --
ES 3.3 currently only supports basic HTTP authentication over HTTP/HTTPS to a TAXII feed. Credentials for the feed can be stored either in the POST Arguments for the Threat Intelligence Download or referenced from the ES Credential Manager. Certificate based authentication to TAXII feeds via the taxii_cert_pem/taxii_cert_key parameters is not yet supported in Enterprise Security.
~Brian
... View more
07-09-2014
09:52 AM
1 Karma
Hi Bliide --
If I understand you correctly, please correct me if I'm wrong, you would like capture the following from the above log?:
RegNum: 5.100.1, size of 0 bytes is invalid (-2147483638)
And not the entire RegNum field, correct?
RegNum: 5.100.1, size of 0 bytes is invalid (-2147483638), RegisterMsg.cpp line 263 (class CRegisterFromDeviceMsg).
For the former, you can capture it in many different ways but it would be based on the assumption that there will always be a second perior within that field. If there isn't, the regex would likely fail. If you can rely on there always being 2 periods within that field you may be able to use the following regex to capture that data.
(?<field_name>RegNum\:.*\b\,.*)(?=\,)
However, if you'd rather capture the entire field value you could use the following:
(?<=RegNum\:\s{1})(?<regnum>.*)(?=Handled\:)
Hope this helps!
Kind Regards,
~Brian
... View more
06-16-2014
09:52 AM
1 Karma
Those appear to be referrers from Google's GMail and Microsoft's Live Mail public email services. If those were set as referrers then it would likely indicate a user followed a link provided in an email. Of which they would have had to of opened using their web browsers, instead of an email client like Outlook. Additionally, if an employee were to access their corporate email using their web browser, via Outlook Web Access or the like, their browser would generate a referrer header for any links that were followed from within any opened emails.
Hope this helps!
~Brian
... View more
06-13-2014
09:45 AM
3 Karma
Hello --
The HTTP referrer is appended to the HTTP header by the browser whenever a user navigates to a URL from a link in another site. Google is commonly seen as a referrer because many people navigate to websites that they search for using their search engine. For instance, if you search for splunk on google.com and then click on the link to Splunks homepage, a google referrer will get appended to the HTTP header by your browser.
As far as I know, Email clients do not append HTTP referrers for links contained within the email. However, you should be able to track the HTTP referrers for sites that are linking to your site and then attempt to match the results against known bad domains to identify any malicious domains that are linking to your site.
If you're currently using Splunks Enterprise Security application, it comes preloaded with a bunch of threat intelligence sources that you can use to match against the referrer headers. If you don't currently use Splunks Enterprise Security application, there are still a number of public domain threat sources you can gather intel from and pass to splunk for matching.
Hope this helps.
~Brian
... View more