Splunk® Enterprise Security

Administer Splunk Enterprise Security

Identify the relevant use case for your detection in Splunk Enterprise Security

Follow these steps to identify the relevant security use case to trigger a specific detection in Splunk Enterprise Security:

Step 1: Plan the use case for a detection

Create a detection to address a security use case or problem that you want to solve. For example, suspicious power shell commands or endpoint detection or response (EDR) alerts. Similarly, if you want to know when vulnerability scanners scan your network, or a high number of devices are infected with the same strain of malware, you can create a detection to detect that behavior and alert you. Use a detection to identify patterns in your data that can indicate a security risk.

Following are some potential use cases:

  • Identify when high-risk users log in to machines infected with malware.
  • Identify vulnerability scanning behavior in your network.
  • Validate that your access control deprovisioning process is working as expected by monitoring inactive and expired account activity.
  • Look for compromised accounts by identifying geographically impossible logins.

Step 2: Define the use case for the search

Develop a use case that you want the search to address before you start creating the search. In this example, we can create the Excessive Failed Logins detection, which is designed to detect brute force access attempts. A security analyst wants to know all the users that attempted to log in to an application and failed to type their passwords correctly at least six times within a certain period of time. The Excessive Failed Logins detection available in Splunk Enterprise Security captures that use case and performs the following functions:

  • Search the authentication source events from an application.
  • Count the number of failures by user.
  • Create an alert for more than six failures over a selected time period.

This detection addresses the use case by searching authentication events, counting the number of access failures, and alerting if there are too many failures over a specific period of time.

As another example, a security analyst wants to know if more than 10 computers on the network failed to update their virus signatures for a week. The High Number of Hosts Not Updating Malware Signatures detection included in Splunk Enterprise Security captures that use case and performs the following functions:

  • Search the antivirus source events.
  • Evaluate the date of the last antivirus signature file update on a host.
  • Compare the last updated date to the time that the search is running.
  • Collect events where the last updated date is more than 7 days before the time that the search is running.
  • Count the collected events.
  • Create an alert if there are more than 10 collected events.

Step 3: Find the data to fit the use case

After you determine the security use case that you want your detection to address, use the following list to determine which data sources are relevant to the use case.

  • Determine what data you need to address the use case.
  • Determine which data models and data model objects contain that data in the Splunk app for CIM.
  • Make sure that the data is in the data model.

In this case, the Excessive Failed Logins detection looks for data related to logins, so it uses the Authentication data model as the data source. By using a data model rather than searching a specific source type directly, the detection can search a wide variety of data sources related to authentication, such as operating systems, applications, without needing to be changed. Relying on data models in detections allows you to write one detection for multiple types of data.

See also

For more information on data models and using detections to search for behavioral patterns in Splunk Enterprise Security, see the product documentation:

Last modified on 24 September, 2024
Use detections to search for threats in Splunk Enterprise Security   Create event-based detections in Splunk Enterprise Security

This documentation applies to the following versions of Splunk® Enterprise Security: 8.0.0, 8.0.1


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters