Dashboards
Splunk Dashboards
IPS High Risk Alert Not Blocked. Below is an example using Palo Alto Networks (PAN) IPS
index=pan sourcetype="pan:threat" ",threat," (critical OR high) (severity=critical OR severity=high) action!="blocked" action!="dropped" | bucket span=1h _time | stats values(signature) as signature mode(dest) as dest values(dest_port) as dest_port values(file_name) as file_name values(file_hash) as file_hash count by _time, src, severity, action | eval signature=mvjoin(signature," , ") | eval dest_port=mvjoin(dest_port," , ") | eval file_name=mvjoin(file_name," , ") | eval file_hash=mvjoin(file_hash," , ")DOS- Firewall Large number of DENIED Connections by Firewall
| tstats summariesonly=1 allow_old_summaries=1 count from datamodel=Network_Traffic.All_Traffic where All_Traffic.action="blocked" sourcetype=* AND host=* by All_Traffic.dvc host _time span=1h | rename All_Traffic.dvc AS dvc | eval dvc=if(dvc="unknown",host,dvc) | timechart span=1h sum(count) by dvcDetect Many Unauthorized Access Attempts
| `Load_Sample_Log_Data(Windows Logons with Failure Codes)` | search Failure_Reason=* Status=0xC000015BData Exfiltration - Suspicious Destinations
| tstats summariesonly=1 allow_old_summaries=1 sum(All_Traffic.bytes) as bytes dc(All_Traffic.src) as "Unique Sources" from datamodel=Network_Traffic.All_Traffic where host=* by _time span=1h All_Traffic.dest
| rename All_Traffic.* as *
| eval MBytes=round(bytes/1024/1024,2)
| eventstats dc(_time) as Frequency by dest
| eval Risk=round(MBytes/(pow(Frequency,Frequency))/'Unique Sources')
| sort - Risk
| head 250
| iplocation dest
| fillnull value="" Country
| table _time, Risk, dest, "Unique Sources", MBytes, CountryDetects when the number of successful Windows logon events are more than the daily average for a user account
Unusual Traffic by Volume
Suspiciously High Process Creation
Network Traffic from Rare Countries
Failed Login Attempts from a Single Source
Frequency of Rare Windows Events
Detection of SQL Injection
Top Accessed Internal Systems
Anomaly in Number of Connections to a Host
Unique Domains Requested by Host
Suspicious Executables Downloaded
Unusual Increase in Network Traffic
Unexpected System Changes
Unknown Processes Running on Critical Servers
Unusual Database Activities
Failed Connections to Important Services
High Traffic on Non-Standard Ports
Connections to Blacklisted IPs
Multiple VPN Logins from Same User but Different Locations
File Access Patterns
Attempts to Access Unusual URLs
Outgoing Traffic To Blacklisted Domains
Unique Connections by Non-Standard Ports
Spike in Error Logs
Longest Running User Sessions
Suspicious Database Transactions
Unknown USB Device Connections
Multiple Failed SSH Attempts
Most Common Firewall Deny Events
Processes Consuming High CPU
Rarely Accessed File Shares
DNS Tunneling Detection
Malware Detection Based on User Agent Strings
File Changes on Critical Systems
Abnormal Account Lockouts
Excessive Data Sent to External IPs
Unusual Server Reboot
Suspicious PowerShell Commands
Multiple File Changes by a User
Inbound Connections from TOR Network
Unusual Print Activities
User Account Anomalies
Unusual Command Execution
Outbound Traffic to High-Risk Countries
Large Number of Failed Database Queries
Unusual System Service Behavior
Uncommon Firewall Rule Modifications
Large Number of Login Failures from Single IP
Suspicious File Access Patterns
Abnormal Process Behavior
Outliers in Network Bandwidth Usage
Last updated