• Search
  • Dashboards
  • Browse
    • Sourcetype

      • _audit
      • _internal
      • access_combined
      • apache
      • audittrail
      • citrix:netscaler:syslog
      • Cron
      • crowdstrike
      • Dashboards
      • datamodels
      • DBConnect
      • Enterprise Security
      • eval
      • F5
      • Fun Stuff & Helpful Hints
      • Hack
      • Hygiene
      • IIS
      • Juniper
      • Linux Performance
      • linux_secure
      • Malware
      • Monitoring
      • Networking
      • opensense
      • opsec
      • osx_secure
      • Perfmon:Available Memory
      • Perfmon:CPU Load
      • Perfmon:Free Disk Space
      • Perfmon:Network Interface
      • postfix_syslog
      • Qualys
      • REST
      • RFQ – Request For Query
      • splunkd
      • Tenable
      • Uncategorized
      • Unix:Uptime
      • WinEventLog:Application
      • WinEventLog:Security
      • WinEventLog:System
      • WinRegistry
      • WMI:Uptime
    • Tags

      6.1.2 admin apache audit audittrail authentication Cisco Diagnostics failed logon Firewall IIS index indexes internal license License usage Linux linux audit Login Logon malware Network Perfmon Performance qualys REST Security sourcetype splunk splunkd splunk on splunk Tenable Tenable Security Center troubleshoot troubleshooting tstats Universal Forwarder users Vulnerabilities Web Traffic Windows Windows Audit Windows Security _audit _internal
  • Post New Query
  • Our Blog
  • Splunk Jobs
  • Search
  • Dashboards
  • Browse
    • Sourcetype

      • _audit
      • _internal
      • access_combined
      • apache
      • audittrail
      • citrix:netscaler:syslog
      • Cron
      • crowdstrike
      • Dashboards
      • datamodels
      • DBConnect
      • Enterprise Security
      • eval
      • F5
      • Fun Stuff & Helpful Hints
      • Hack
      • Hygiene
      • IIS
      • Juniper
      • Linux Performance
      • linux_secure
      • Malware
      • Monitoring
      • Networking
      • opensense
      • opsec
      • osx_secure
      • Perfmon:Available Memory
      • Perfmon:CPU Load
      • Perfmon:Free Disk Space
      • Perfmon:Network Interface
      • postfix_syslog
      • Qualys
      • REST
      • RFQ – Request For Query
      • splunkd
      • Tenable
      • Uncategorized
      • Unix:Uptime
      • WinEventLog:Application
      • WinEventLog:Security
      • WinEventLog:System
      • WinRegistry
      • WMI:Uptime
    • Tags

      6.1.2 admin apache audit audittrail authentication Cisco Diagnostics failed logon Firewall IIS index indexes internal license License usage Linux linux audit Login Logon malware Network Perfmon Performance qualys REST Security sourcetype splunk splunkd splunk on splunk Tenable Tenable Security Center troubleshoot troubleshooting tstats Universal Forwarder users Vulnerabilities Web Traffic Windows Windows Audit Windows Security _audit _internal
  • Post New Query
  • Our Blog
  • Splunk Jobs

Members

Profile picture of MaryamSaniee

MaryamSaniee

@maryamsaniee Active 2 years, 9 months ago
  • Activity
  • Profile
  • Posts
  • Personal
  • Mentions
  • Favorites
  • Profile picture of MaryamSaniee
    2 years, 9 months ago

    MaryamSaniee wrote a new post

    Use this splunk search to get datails about alert actions
    | rest /services/saved/searches splunk_server=local count=0
    |table title,actions

  • Profile picture of MaryamSaniee
    2 years, 9 months ago

    MaryamSaniee wrote a new post

    (in reflected attacks a lotof external benign src’s send a lotof packets toward our servers, because our server’s IP spoofed before in request packets and were sent by attacker toward trusted servers and those […]

  • Profile picture of MaryamSaniee
    2 years, 9 months ago

    MaryamSaniee wrote a new post

    Use this splunk search to show Alert’s cron_schedule details:
    | rest /services/saved/searches splunk_server=local count=0
    | search “cron_schedule”=”*/*”
    |table title,cron_schedule,author

  • Profile picture of MaryamSaniee
    2 years, 10 months ago

    MaryamSaniee wrote a new post

    | tstats `summariesonly` count min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Filesystem where Filesystem.action=deleted Filesystem.file_path = “/etc/ssl/certs/*” Filesystem.file_path IN […]

  • Profile picture of MaryamSaniee
    2 years, 10 months ago

    MaryamSaniee wrote a new post

    index=* sourcetype=”juniper:firewall”  src!=”192.168.*”
    | bin _time span=5m
    | stats dc(dest_port) as distinct_port by src,dest,_time
    |where distinct_port >1000

  • Profile picture of MaryamSaniee
    2 years, 10 months ago

    MaryamSaniee wrote a new post

    index=*
    ((((EventCode=”4688″ OR EventCode=”1″) AND  ((CommandLine=”*reg*” CommandLine=”*add*” CommandLine=”*/d*”) OR (CommandLine=”*Set-ItemProperty*” CommandLine=”*-value*”)) AND (CommandLine=”*00000000*” OR […]

  • Profile picture of MaryamSaniee
    2 years, 11 months ago

    MaryamSaniee commented on the post, RFQ (Request For Query) – Port Scan

    In reply to: rashid47010 wrote a new post I am looking for the query[timechartl] for example 50 port scan attempts with in a second against list of organization public facing IP address. View

    Or another way (better way without timechart command):
    for example list of organization public facing IP address is in range 123.6.0.0/16:
    |index=firewall sourcetype=”juniper:firewall” src!=192.168.* AND dest=123.6.0.0/24
    |bin _time span=1s
    |stats dc(dest_port) as dest_port_count by src,dest,_time
    |where dest_port_count >50

  • Profile picture of MaryamSaniee
    2 years, 11 months ago

    MaryamSaniee commented on the post, RFQ (Request For Query) – Port Scan

    In reply to: rashid47010 wrote a new post I am looking for the query[timechartl] for example 50 port scan attempts with in a second against list of organization public facing IP address. View

    for example list of organization public facing IP address is in range 123.6.0.0/16:
    |index=firewall sourcetype=”juniper:firewall” dest=123.6.0.0/24
    |timechart span=1s dc(dest_port) as dest_port_count by src
    |where dest_port_count >50

  • Profile picture of MaryamSaniee
    2 years, 11 months ago

    MaryamSaniee became a registered member

  • Profile picture of MaryamSaniee
    2 years, 11 months ago

    MaryamSaniee became a registered member

  • Home
  • Log In
  • Register
  • About GoSplunk
  • GoSplunk FAQs
  • Contact the GoSplunk Team
  • Splunk Website
  • Splunk Documentation
  • Splunk Answers

GoSplunk is not affiliated with Splunk Inc. in any way.

© 2019 GoSplunk
  • Privacy Policy
  • Terms and Conditions
  • Forgot Password?
sponsored