Splunk® User Behavior Analytics

Install and Upgrade Splunk User Behavior Analytics

This documentation does not apply to the most recent version of Splunk® User Behavior Analytics. For documentation on the most recent version, go to the latest release.

Configure Splunk UBA

Configure Splunk UBA to provide more accurate and specific anomaly and threat detection. As needed, complete these configurations before adding data to Splunk UBA. Not all configuration changes are needed for all deployments.

In a distributed deployment, make the configuration changes on the management server and deploy the changes to the other servers after your changes are complete. See Deploy configuration changes to other servers.

How to use the Settings window

Splunk UBA configuration options are available from Splunk UBA by accessing the Settings window under Manage > Settings.

In most cases, Splunk UBA restarts each time you select OK in the Settings window. Make all desired configuration changes in the Settings window before you select OK.

After Splunk UBA is restarted, you can check the system status to validate that you made all required configurations. See Check system status before and after installation.

Set internal IP range and associated office locations

Specify the IP range used internally in your organization, using CIDR format to reference the top-level internal IP blocks. This is required to allow Splunk UBA to identify which machines are internal to your network and accurately identify external IP networks. Network traffic internal to your organization is processed differently from external network traffic, and different anomalies and threats are created as a result. If the list of internal IP address ranges is incomplete, you can miss anomalies and threats.

You can also associate the CIDR IP ranges with office locations. This information is used to create accurate anomalies and help visualize internal device locations. If your company has multiple office locations and IP ranges assigned to specific locations, use multiple lines to associate each IP address range with an office location. Use one line for each IP address range, even if they all apply to the same location. This internalGeoAttributions parameter takes precedence over the default office location set in uba-site.properties.

Splunk UBA supports:

  • A maximum of 40,000 IP CIDR blocks or IP addresses.
  • A maximum of 40,000 internal geolocations.

Exceeding these limits can negatively affect Splunk UBA's performance. See below for an example and more details.

  1. Look up the latitude and longitude of the office locations.
  2. From the command line, open the configuration directory.
    cd /etc/caspida/local/conf/etl/configuration
  3. Open the /etc/caspida/local/conf/etl/configuration/EntityValidations.json file in an editor and fill out the empty set for the internalIPRange. For example:
    "internalIPRange" : ["199.79.0.0/16","220.200.0.0/16"]

    The private IP ranges "10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16", as specified by RFC1918, along with "127.0.0.0/8", "169.254.0.0/16", are already scoped as Internal by default and need not be added to this file.

  4. (Optional) Fill out the empty set for the internalGeoAttributions to assign the IP ranges to the office locations. For example, to associate four IP address CIDR ranges with San Jose, New York, and Dallas office locations, assign the locations like the following example:
      "internalGeoAttributions" : [
         {"cidr": "10.0.0.0/8", "location": {"city": "San Jose", "countryCode": "US", "latitude": 37.3382, "longitude":-121.8863}},
         {"cidr": "172.16.0.0/16", "location": {"city": "New York", "countryCode": "US", "latitude":40.788614 , "longitude":-73.9696091}},
         {"cidr": "192.168.0.0/16", "location": {"city": "Dallas", "countryCode": "US", "latitude": 32.8208751, "longitude":-96.8714253}},
         {"cidr": "199.79.0.0/16", "location": {"city": "San Jose", "countryCode": "US", "latitude": 37.3382, "longitude":-121.8863}}
      ]
    

    If you choose to perform this optional step, be sure to end the preceding internalIPRange block with a comma (,) character at the end of the line.

  5. Save your changes.
  6. Run the following command to validate the JSON in the EntityValidations.json file:
    /opt/caspida/bin/status/check_entity_validations.sh -v

    A sample output from this command is shown below:

    /etc/caspida/local/conf/etl/configuration/EntityValidations.json: parsed successfully
      #internalIPRanges: 7
      #internalGeoAttributions: 2
    
    This utility merges JSONs from internal & /etc/caspida/local/conf/etl/configuration/EntityValidations.json
      Make sure you run: Caspida sync-cluster to copy the /etc/caspida/local/conf/etl/configuration/EntityValidations.json to all nodes in the cluster 
    

    See Deploy configuration changes to other servers in a distributed deployment for instructions on running the sync-cluster command.

If data ingestion has already started, stop and start the data sources on the Data Sources page for the changes to take effect.

Set default office location

Set the default location for your office, if applicable, to allow Splunk UBA to display the appropriate location for location-based visualizations. Make this configuration change in order for geolocation visualizations in Splunk UBA to be accurate.

  1. Look up the latitude and longitude of your address.
  2. In Splunk UBA, select Manage > Settings.
  3. Select Geo Location.
  4. Specify the latitude and longitude of your address.
  5. Specify a name for this address (the default is "Internal Network").
  6. Select Show Geo Maps to use location-based visualizations in Splunk UBA.
    This screenshot shows how to configure the default office location in Splunk UBA. In the Settings window, Geo Location is selected. The Latitude field contains a value of 37.37. The Longitude field contains a value of -121.92. The Name field contains the value InternalNetwork. The checkbox in the Show Geo Maps field is selected.
  7. Update any other settings you want to configure. Otherwise, click OK to restart Splunk UBA.

    Only Splunk UBA is restarted when you click '''OK'''.

Configure additional logging for Splunk UBA activities

By default, the log files for Splunk UBA exclude user activity in the following areas:

  • Postgres
  • Impala
  • Influx
  • JobManager

To log additional details for user activity in Splunk UBA in these areas, perform the following tasks:

  1. In Splunk UBA, select Manage > Settings.
  2. Select Logging.
  3. Select the desired items you want to log.
    This screenshot shows the Settings dialog with Logging selected. All four items on the screen are selected: Postgres, Impala, Influx, and JobManager.
  4. Update any other settings you want to configure. Otherwise, click OK to restart Splunk UBA.

    Only the Splunk UBA user interface is restarted when you click '''OK'''.

The Splunk UBA log files, along with log files for other UBA components, can be downloaded using System > Download Diagnostics. Make sure the UI option is selected to download diagnostics data for Splunk UBA.

This screenshot shows the Download Diagnostics dialog with UI selected and highlighted.

See Collect diagnostic data from your Splunk UBA deployment.

Configure email alerts to your Splunk UBA deployment administrators

You can set up email alerts to the administrators of your Splunk UBA deployment. If you set this up, the system sends emails when it detects a severe system-related event, such as a full hard disk or if event processing stops.

Do not send these system-level emails to your data scientists, research teams, or security analysts. Appropriate threat and anomaly data can be sent to your data scientists, research teams, or security analysts by configuring your email server as an output connector. See Send Splunk UBA threats to analysts using email.

Prerequisite for configuring email alerts in Splunk UBA

Set up the email output connector so that Splunk UBA can send email. See Set up the email server as an output connector.

Steps for configuring email alerts in Splunk UBA

To configure email alerts in Splunk UBA, perform the following tasks:

  1. In Splunk UBA, select Manage > Settings.
  2. Select Alerts.
  3. List the desired recipients separated on separate lines. For example, to send email alerts to uba_admin@yourorg.com and jb@yourorg.com, enter each email address on a separate line.
  4. To send an email if event processing stops, select Alert when processing stops.
  5. Configure a minimum EPS in the Min EPS field. An email is sent when the EPS falls below the configured threshold.
  6. Configure an alert frequency interval in seconds in the Alert interval (in seconds) field.
    This screenshot shows how to configure email alerts in Splunk UBA. In the Settings window, the Alerts items is selected on the left. In the Recipients for alert messages field, there are two items on separate lines: uba_admin@yourorg.com, and jb@yourorg.com. The checkbox in the Alert when processing stops field is checked. The Min EPS field has a value of 0. Then "Alert interval (in seconds)" field has a value of 3600.
  7. Update any other settings you want to configure. Otherwise, click OK to restart Splunk UBA.

Specify the host name of your Splunk UBA server

Configure the host name or IP address of the Splunk UBA server. This setting is required by Splunk Enterprise Security for viewing contributing anomalies in Splunk UBA.

  1. In Splunk UBA, select Manage > Settings.
  2. Select Alerts.
  3. Specify the host name or IP address of the Splunk UBA server in the Host name (or IP address) of your Splunk UBA's UI server field.
    This screenshot shows the Settings window with Alerts selected. The Host name (or IP address) of your Splunk UBA's UI server field contains the IP address 10.10.128.126.
  4. Update any other settings you want to configure. Otherwise, click OK to restart Splunk UBA.

Configure flag to enable or disable Splunk SSL certificate validation

The validate.splunk.ssl.certificate flag identifies whether or not Splunk Datasource certificates get validated in the case of HTTPS protocol.

By default the validate.splunk.ssl.certificate flag is "False". To elevate security protection from MITM and SSRF attacks, follow the steps in Configure UBA to validate SSL certificate of Splunk Enterprise Platform.

Value of validate.splunk.ssl.certificate Protocol Description
True HTTP All datasources running on HTTP protocol are unable to communicate. Certificate validation required. There is no SSL certificate available for HTTP data sources.
True HTTPS All datasources running on HTTPS protocol must add a certificate for certificate validation.
False HTTP You can configure all datasources running on HTTP protocol in UBA.
False HTTPS You can configure all datasources running on HTTPS protocol in UBA. No SSL certificates required.

Steps for enabling or disabling Splunk SSL certificate validation

You can change the value of validate.splunk.ssl.certificate to "True" or "False" using the following steps:

  1. First, ssh to caspida user by ssh caspida@<VM-Hostname>.
  2. Run the command to stop caspida.
  3. Navigate to the /etc/caspida/local/conf directory.
  4. Edit the uba-site.properties file and configure validate.splunk.ssl.certificate flag to "True" or "False".
  5. Save the changes.
  6. Run the sync-cluster command for the multi-node deployments:
    /opt/caspida/bin/Caspida sync-cluster /etc/caspida/local/conf
  7. Run the command to start caspida.

The validate.splunk.ssl.certificate value is not separate for every data source. Running multiple data sources with both HTTP and HTTPS protocol, with the validate.splunk.ssl.certificate flag set as "True" can stop data sources running on HTTP protocol.

Configure UBA to validate the SSL certificate of your Splunk Enterprise platform for single node deployment

  1. Log into your Splunk platform instance.
  2. Copy the ca.pem.default from /opt/splunk/etc/auth and paste it under the /home/caspida directory in UBA.
  3. Log into the Splunk UBA management server as the caspida user.
  4. Ensure that $JAVA_HOME is set correctly on your system. Run the CaspidaCommonEnv.sh script to set the following environment variable:
    . /opt/caspida/bin/CaspidaCommonEnv.sh
  5. Import the ca.pem.default certificate to the Java certificate store. On RHEL systems, use the following command:
    sudo keytool -keystore $JAVA_HOME/lib/security/cacerts -storepass 
    changeit -import -trustcacerts -alias SplunkESRootCA -file 
    ~/ca.pem.default

    On other Linux systems, use the following command:

    sudo keytool -keystore $JAVA_HOME/jre/lib/security/cacerts 
    -storepass changeit -import -trustcacerts -alias SplunkESRootCA 
    -file ~/ca.pem.default
  6. From the command line of the Splunk UBA management server, edit the /etc/caspida/local/conf/uba-site.properties file to change or add the following parameter from "false" to "true" as shown: validate.splunk.ssl.certificate=true
  7. Run the following command:
    sed --in-place=".bak" 's/validateSplunkHost(hostname/validateSplunkHost(hostname + ":" + this._requestOptions.port/' /opt/caspida/web/caspida-ui/server/security/splunkLoginProvider.js
  8. Restart Splunk UBA. Run the following commands on the Splunk UBA management server:
    /opt/caspida/bin/Caspida stop-all
    /opt/caspida/bin/Caspida start-all

Configure UBA to validate the SSL certificate of your Splunk Enterprise platform for multi-node deployment

  1. Log into your Splunk platform instance.
  2. Copy the ca.pem.default from /opt/splunk/etc/auth and paste it under the /home/caspida directory in UBA management server and Jobmanager nodes.
  3. Log into the Splunk UBA management server as the caspida user and follow steps 4 and 5 on both the UBA management server and the UBA Jobmanager nodes.
    • In a multi-node deployment you can get the list of Jobmanager nodes using the following command:
      grep jobmanager /opt/caspida/conf/deployment/caspida-deployment.conf 

      Example of a 20 node deployment:

      jobmanager.restServer=uba-node1:9002
      jobmanager.agents=uba-node3,uba-node4,uba-node17,uba-node18,uba-node19,uba-node20
      
    • The resulting list of Jobmanager.agents are your Jobmanager nodes.
  4. Ensure that $JAVA_HOME is set correctly on your system. Run the CaspidaCommonEnv.sh script to set the following environment variable:
    . /opt/caspida/bin/CaspidaCommonEnv.sh
  5. Import the ca.pem.default certificate to the Java certificate store.
    On RHEL systems, use the following command:
    sudo keytool -keystore $JAVA_HOME/lib/security/cacerts -storepass 
    changeit -import -trustcacerts -alias SplunkESRootCA -file 
    ~/ca.pem.default

    On other Linux systems, use the following command:

    sudo keytool -keystore $JAVA_HOME/jre/lib/security/cacerts 
    -storepass changeit -import -trustcacerts -alias SplunkESRootCA 
    -file ~/ca.pem.default
  6. From the command line of the Splunk UBA management server, edit the /etc/caspida/local/conf/uba-site.properties file to change or add the following parameter from "false" to "true" as shown: validate.splunk.ssl.certificate=true
  7. Run the sync-cluster command for the multi-node deployment:
    /opt/caspida/bin/Caspida sync-cluster /etc/caspida/local/conf
    
  8. Run the following command:
    sed --in-place=".bak" 
    's/validateSplunkHost(hostname/validateSplunkHost(hostname + ":" + 
    this._requestOptions.port/' 
    /opt/caspida/web/caspida-ui/server/security/splunkLoginProvider.js
  9. Restart Splunk UBA. Run the following commands on the Splunk UBA management server:
    /opt/caspida/bin/Caspida stop-all
    /opt/caspida/bin/Caspida start-all

Configure maximum allowed file size in Splunk UBA

If you want to restrict users from uploading a file exceeding a specific size in MB, perform the following configuration steps. This setting is stored in the uba-site.properties file.

  1. In Splunk UBA, select Manage > Settings.
  2. Select Other System Configuration.
  3. In the Max File Upload Size (MB) field, define the maximum file size. The field accepts an input between 1 and 500. For example, if you want to restrict users from uploading files that exceed 300 MB, input 300. By default, the maximum file size is 500 MB if not otherwise provided. This image shows the Settings page for Splunk UBA. Here you can use the Max File Upload Size field to define the maximum file size for users.
  4. Update any other settings you want to configure. Otherwise, click OK to restart Splunk UBA.

Configure file types to restrict upload in Splunk UBA

If you want to restrict users from uploading a file of specific type, perform the following the configuration steps. This setting is stored in the uba-site.properties file.

  1. In Splunk UBA, select Manage > Settings.
  2. Select Other System Configuration.
  3. In the File Type Exclusion field, add the file type you want to restrict. You must add the file type on a new line so it translates to a comma separated file type in uba-site.properties. By default, a few specific file types are already prevented from uploading. This image shows the Settings page for Splunk UBA. On the field labeled File Type Exclusion you can add the file type you want to restrict.
  4. Update any other settings you want to configure. Otherwise, click OK to restart Splunk UBA.

Add a list of your competitors

To identify when users interact with competitor websites or email addresses, add a list of competitor email domains to Splunk UBA.

  1. In Splunk UBA, select Manage > Settings.
  2. Select ETL & Analytics.
  3. In the Competitor Domains field, type a list of domain names separated by line breaks. For example, to identify when users interact with competitors of your organization, such as Splunk and Example Company, enter splunk.com and example.com on separate lines:
    This screenshot shows how to configure competitor domains in Splunk UBA. In the Settings window, the ETL & Analytics item is selected. In the Competitor Domains field, there are two lines of text. The first line contains example.com, and the second line contains splunk.com.
  4. Update any other settings you want to configure. Otherwise, click OK to restart Splunk UBA.

Splunk UBA uses the information in the file to create anomalies when events indicate that employees are interacting with competitors.

Connect Splunk UBA to Splunk Enterprise to view an anomaly's raw events

Connect Splunk UBA to your Splunk Enterprise search head to drill down from the anomaly details to view some specific events in Splunk Enterprise that caused an anomaly to be raised in Splunk UBA. See Use Event Drilldown to review an anomaly's raw events.

To connect Splunk UBA to Splunk Enterprise to view an anomaly's raw events, perform the following tasks:

  1. In Splunk UBA, select Manage > Settings.
  2. Select Anomalies.
  3. Click Add New to add a single search head. Specify the following information:
    Parameter Description
    Host The host machine, such as the host part of the URL when creating the datasource. If a Public Host is specified, Splunk UBA submits the search to the link generated using the Public Host value. Use the fully qualified domain name (FQDN) when specifying the host, such as an IP address like 192.168.10.12 or server.examplecompany.com. Do not include https:// in the host name.
    Public Host The public IP/DNS of the host machine. This needs to be configured when working with AWS deployments. This can also be used to map the Host to a different server. For example, you can specify server1 as the Host use by data sources to get data into Splunk UBA, and also specify server2 running Splunk Enterprise as the Public Host to for the event drilldown links.
    Reverse Proxy Folder The root_endpoint of Splunk Web if your environment hosts Splunk Web behind a proxy that does not place Splunk Web at the proxy's root. See Use Splunk Web with a reverse proxy configuration.
    Management Port The port that the Splunk Enterprise data sources use to talk to splunkd. This is normally the port of the URL specified when creating the data source. By default, the management port uses HTTPS.
    HTTP Port The port used to access Splunk Web.
    Secure HTTP Port Click the checkbox to use HTTPS instead of HTTP to access Splunk Web. If you choose to use HTTPS, you must also change the port number in the HTTP Port column to match your HTTPS port, such as 443.
    Cluster Number Number representing the cluster where the search head is located. All search heads returning results from the same indexer are considered to be part of the same cluster. Only numerical values are supported.


    Use 1 to represent the first search head you connect to Splunk UBA. If you have a second search head returning results from a different indexer, use 2 to represent that second search head, then 3 for the third, and so on.

    Primary Click the checkbox to make this search head the primary dedicated search head. Splunk UBA will always send searches to this search head.

    Splunk UBA can ingest data from multiple Splunk search heads in multiple clusters. This configuration allows you to specify the Splunk search heads and clusters that should be used. Without this, Splunk UBA assumes all Splunk search heads are part of a single cluster.
    This screenshot shows the Settings page with Anomalies selected. The fields in the screenshot are described in the text immediately following the image.

    Use a third-party hardware or software load balancer in front of your set of clustered search heads to access the set of search heads through a single interface, without needing to specify a particular one. Configure the load balancer so that user sessions are "sticky" or "persistent" to remain on a single search head throughout the session. See Use a load balancer with search head clustering in the Splunk Enterprise Distributed Search manual.
  4. Update any other settings you want to configure. Otherwise, click OK to restart Splunk UBA.

Define the AD domains in use for devices

Set the domains that you want to have Splunk UBA designate as internal, and normalize device names to use only their short name.

Get a list of all internal domains

Get a list of all internal domains in your environment. After you identify your internal domains, enter the domains into the Settings window. Splunk UBA treats all domains not listed here as external domains.

Use the following search to parse Windows 4624 (logon) events logged from the Splunk Add-on for Microsoft Windows:

sourcetype=XmlWinEventLog source=XmlWinEventLog:Security EventCode=4624 Computer=* | rex field=Computer "^[^.]+.(?<deviceDomains>\S+)" | stats latest(_time) by deviceDomains | table deviceDomains

If you are using a version of the Splunk Add-on for Microsoft Windows older than 6.0.0, use the following search instead:

sourcetype="WinEventLog:Security" EventCode=term(4624) earliest=-7d@d ComputerName="*.*"  | rex field=ComputerName "^[^.]+.(?<deviceDomains>\S+)"  | stats latest(_time) by deviceDomains  | table deviceDomains

Set internal domains

All devices created using a Fully Qualified Domain Name (FQDN), such as host.example.com or www.sf.example.com, are considered external devices by default. You can configure them to be internal domains by using the settings in Splunk UBA.

  1. In Splunk UBA, select Manage > Settings.
  2. Select User, Device & Domain.
  3. In the Internal domains field, specify a list of internal domains on separate lines.

    Do not remove the local and localdomain entries.

    This screenshot shows the Settings dialog with User, Device & Domain selected. The "Internal domais" field is populated with the following domains, each on a separate line: local, localdomain, text.example.com, dev.example.com, and example.com.

    A longest suffix match is used to identify matching devices. For example, defining the internal domains as:

    local
    localdomain
    test.example.com
    dev.example.com
    example.com
    

    means that test.example.com, dev.example.com, and example.com are created as internal devices. If the property setting is changed to the following:

    local
    localdomain
    test.example.com
    example.com
    
    then dev.example.com is created as external, while test.example.com and example.com are created as internal.
  4. Update any other settings you want to configure. Otherwise, click OK to restart Splunk UBA.

Normalize device names

Normalize device names so that Splunk UBA accurately identifies devices and reduces the number of unique devices created in Splunk UBA when processing events. Events can refer to the same device in different ways: one event may refer to a network router in your environment as router1, while another event may refer to the same router as router1.example.com. Without normalization, two separate device identifiers are created for the same device. By normalizing device names (domains), Splunk UBA can identify a device referred to by different names and create a single device, such as router1.

Normalization must not be applied to different devices with the same host name. For example, router1.example.com and router1.sf.splunk.com are two different devices despite having the same device name. Normalization is configured or deactivated for such cases.

By default, all device names are normalized (truncated) to their host (short) name only, so as an example, host.example.com is normalized to host. No configuration change is needed to enable device name normalization.

To normalize a portion of your domains:

  1. In Splunk UBA, select Manage > Settings.
  2. Select User, Device & Domain.
  3. Deselect the checkbox in Normalize all domains.
  4. In the Domains to be normalized field, specify the AD domains you want to normalize. If specifying multiple domains, use a separate line for each domain. For example:
    This screenshot shows the Settings dialog with User, Device & Domain selected. The "Normalize all domains" checkbox is deselected. The "Domains the be normalized" field is populated with the following domains, each on a separate line: example.com, sf.splunk.com.
    In this example, only device names created from domains ending in example.com and sf.splunk.com will be normalized, according to the longest matching suffix.
  5. Update any other settings you want to configure. Otherwise, click OK to restart Splunk UBA.

Exclude IP scanner activity from creating unnecessary devices in Splunk UBA

Perform the following tasks to exclude IP scanner activity from creating unnecessary unresolved devices in your environment.

  1. In Splunk UBA, select Manage > Settings.
  2. Select User, Device & Domain.
  3. In the Scanner IP address and/or hostnames field, define the host names and domains you want to exclude from being created as devices, as shown in the following example:
    This screenshot shows the Settings dialog with Scanner IP address and/or hostnames field populated with several values, described in the text immediately following this procedure.
  4. Update any other settings you want to configure. Otherwise, click OK to restart Splunk UBA.

You can specify the following types of values:

  • A complete IP address
  • A host name
  • A fully qualified domain name (FQDN)
  • A regular expression. If needed, use the asterisk (*) as a wildcard character.

The following table describes the values provided in the example:

Value Description
10.10.1.15 Excludes the host with the IP address 10.10.1.15 from being created as a device.
scanner5 Excludes the host with the short name of scanner5 from being created as a device.
scanner5.scannerdomain.com Excludes the host with the FQDN scanner5.scannerdomain.com from being created as a device.
*.scannerdomain.com Excludes all hosts with scannerdomain.com as part of the FQDN from being created as devices.
scanner*.scannerdomain.com Excludes all hosts with scanner as the first part of their host name followed by scannerdomain.com from being created as devices.
192.168.25.* Excludes all hosts with 192.168.25. as the first part of their IP address (equivalent to 192.168.25.0/24 from being created as devices.

There is no limit to the number of values that can be specified in the field.

Configure deny list IP address property in UBA for IP address validation and DNS resolution to prevent SSRF attacks

Set the denylistip.cidr.ranges property to restrict selected IP addresses from connecting with the Splunk platform. These IP addresses can be internal addresses or CIDR ranges. This setting restricts the connection from UBA to the Splunk platform while adding data sources. If data sources were already configured, then the setting stops fetching events. When setting up Splunk Authentication under Manage > Settings > Authentication, this setting also validates the endpoint against the restricted ranges.

The property denylistip.cidr.ranges has a default value of 127.0.0.1/8,169.254.169.254/32 and is commented. Uncomment the property to restrict local host IP and Cloud metadata endpoint and prevent an SSRF attack on internal services.

Value of denylistip.cidr.ranges Private IP range to restrict when adding a new Splunk platform data source Description
169.254.169.254/32,

127.0.0.1/8

169.254.169.254

127.0.0.0 > 127.255.255.255

Restricts local host IP and Cloud metadata endpoint.
10.0.0.0/8 10.0.0.0 > 10.255.255.255 Restricts Class A IP addresses.
172.16.0.0/12 172.16.0.0 > 172.31.255.255 Restricts Class B IP addresses.
192.168.0.0/16 192.168.0.0 > 192.168.255.255 Restricts Class C IP addresses.
fc00:0:0:0:0:0:0:0/7 fc00:0000:0000:0000:0000:0000:0000:0000 > fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff Restricts IPv6 IP addresses falls range. Only use while setting IPv6 CIDR. Do not use compressed representation. For example: fc00::/7.

You can change the value of denylistip.cidr.ranges with CIDR ranges in comma separated manner. For example, CIDR_IP_RANGE1,CIDR_IP_RANGE2,CIDR_IP_RANGE3.

Perform the following steps to modify the Splunk UBA property and restrict internal IP addresses:

  1. Use the SSH protocol to login as the caspida user. For example, caspida@<VM-Hostname>.
  2. Run the command to stop caspida.
  3. Navigate to the /opt/caspida/conf directory.
  4. Edit the uba-default.properties file and configure the denylistip.cidr.ranges flag with the CIDR IP range.
  5. Save the changes.
  6. Run the command to start caspida.

When the data source is in running mode, and this property is altered to restrict an already configured datasource IP address, you might see an error in the health monitor of Host is in denylist. If you see this error, modify the property by altering the ranges or mentioning the IP addresses which need to be restricted.

Hide user and device attribution in Splunk UBA

User and device attribution shows the relationship between a user and associated devices, like a corporate laptop or mobile phone. User and device attribution is displayed by default in the device and user detail pages.

If you want to hide user and device attribution in Splunk UBA due to concerns about system performance, perform the following tasks:

  1. In Splunk UBA, select Manage > Settings.
  2. Select User, Device & Domain.
  3. Deselect the checkbox in the View user and device attribution in UI field.
    This screenshot shows the Settings window with User, Device & Domain selected. The checkbox in the View user and device attribution in UI field not selected.
  4. Update any other settings you want to configure. Otherwise, click OK to restart Splunk UBA.

Verify that the HR data filter is enabled

By default, an HR data filter is enabled and Splunk UBA only ingests data related to users in your HR data. This means that only events for which the Splunk UBA Identity Resolution module can identify a human user are examined for anomalies. Splunk UBA ignores any events for which accounts are not able to be resolved to a human user. If this configuration is disabled, then all events are processed for anomaly detection.

The HR data filter is a global filter and takes precedence over existing event filters. Do not disable this filter unless directed to do so by Customer Support.

See Why Splunk UBA requires HR data for more information about the importance of HR data.

To verify that the HR data filter is enabled:

  1. In Splunk UBA, select Manage > Settings.
  2. Select User, Device & Domain.
  3. Verify that the checkbox in the Enable HR data filter field is selected.
    This screenshot shows the Settings window with User, Device & Domain selected. The checkbox in the Enable HR data filter field is selected.

Run Splunk UBA as a non-root user

If you want to run Splunk UBA as a non-root user on the server, such as caspida or other non-root user, perform the following configuration changes. You must change the port that Splunk UBA uses to be a port above 1024.

  1. In Splunk UBA, select Manage > Settings.
  2. Select Other System Configuration.
  3. In the HTTPS Port field, define the new port that you want to use to access Splunk UBA. For example, to use port 9443:
    This screenshot shows the Settings dialog with Other System Configuration selected. The "HTTP Port" field is populated with the number 9443.
  4. Update any other settings you want to configure. Otherwise, click OK to restart Splunk UBA.
  5. Make firewall changes so that you can access Splunk UBA.
    System Procedure
    Splunk UBA running on Ubuntu:
    1. Log in to the Splunk UBA management server as the caspida user using SSH.
    2. Run the following commands, replacing the <port_number> with the port number that you want to use.
      sudo ufw allow <port_number>/tcp
      sudo ufw reload
    Splunk UBA running on supported Linux 6.x systems:
    1. Log in to the Splunk UBA management server as the caspida user using SSH.
    2. Run the following commands, replacing the <port_number> with the port number that you want to use.
      sudo iptables -A INPUT -p tcp --dport <port_number> -j ACCEPT
      sudo service iptables save
    Splunk UBA running on supported Linux 7.x systems:
    1. Log in to the Splunk UBA management server as the caspida user using SSH.
    2. Run the following commands, replacing the <port_number> with the port number that you want to use.
      sudo firewall-cmd --permanent --zone=public --add-port=9443/tcp
      sudo firewall-cmd --reload
  6. Restart Splunk UBA and the resource monitor service. Run the following commands:
    sudo service caspida-ui stop
    sudo service caspida-ui start
    sudo service caspida-resourcesmonitor stop
    sudo service caspida-resourcesmonitor start
    

Deploy configuration changes to other servers in a distributed deployment

Clicking OK in the Settings window will distribute configuration changes to the other servers in your deployment.

However, there may be other cases when distributing configuration changes throughout the cluster is necessary, such as making changes to the EntityValidations.json file. To distribute configuration changes to the other servers in your deployment outside of the Settings window, perform the following tasks:

  1. Log in to the management server of Splunk UBA as the caspida user using SSH.
  2. Run the following command to sync the configuration changes across your deployment.
    /opt/caspida/bin/Caspida sync-cluster /etc/caspida/local/conf
Last modified on 30 June, 2023
Verify a successful upgrade of Splunk UBA   License Splunk UBA

This documentation applies to the following versions of Splunk® User Behavior Analytics: 5.2.0, 5.2.1


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters