Splunk Enterprise Security

Problem with Enterprise Security Correlation Search

dgillette3
Explorer

This Enterprise Security correlation search "Anomalous Audit Trail Activity Detected" is generating a whole bunch of false positives.

| from datamodel:"Change_Analysis"."Auditing_Changes" | where ('action'="cleared" OR 'action'="stopped") | stats max(_time) as "lastTime",latest(_raw) as "orig_raw",count by "dest","result" | rename "result" as "signature"

The search returns results if tag=audit or change and action=cleared or stopped. Windows Security Event ID 1100 meets the conditions. The event is generated when the logging service is shutdown, say by someone trying to hide their tracks, but it's also generated during normal system shutdown. I'm trying to fix the search.

I want to exclude an 1100 event if an event 4647 also occurs within a span of 1 minute.

I don't know if I'm on the right track or not. I've got this search written but I'm not sure how to merge it with the correlation search.

index="winevtsec" sourcetype="WinEventLog:Security" | transaction host startswith="EventCode=4647" endswith="EventCode=1100" maxspan=1m

Any help would be appreciated.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog
Get Updates on the Splunk Community!

Thanks for the Memories! Splunk University, .conf25, and our Community

Thank you to everyone in the Splunk Community who joined us for .conf25, which kicked off with our iconic ...

Data Persistence in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. What happens if the OpenTelemetry collector ...

Introducing Splunk 10.0: Smarter, Faster, and More Powerful Than Ever

Now On Demand Whether you're managing complex deployments or looking to future-proof your data ...