Dashboards

Splunk Dashboards

IPS High Risk Alert Not Blocked. Below is an example using Palo Alto Networks (PAN) IPS

index=pan sourcetype="pan:threat" ",threat," (critical OR high) (severity=critical OR severity=high) action!="blocked" action!="dropped" | bucket span=1h _time | stats values(signature) as signature mode(dest) as dest values(dest_port) as dest_port values(file_name) as file_name values(file_hash) as file_hash count by _time, src, severity, action | eval signature=mvjoin(signature," , ") | eval dest_port=mvjoin(dest_port," , ") | eval file_name=mvjoin(file_name," , ") | eval file_hash=mvjoin(file_hash," , ")

DOS- Firewall Large number of DENIED Connections by Firewall

| tstats summariesonly=1 allow_old_summaries=1 count from datamodel=Network_Traffic.All_Traffic where All_Traffic.action="blocked" sourcetype=* AND host=* by All_Traffic.dvc host _time span=1h | rename All_Traffic.dvc AS dvc | eval dvc=if(dvc="unknown",host,dvc) | timechart span=1h sum(count) by dvc

Detect Many Unauthorized Access Attempts

| `Load_Sample_Log_Data(Windows Logons with Failure Codes)` | search Failure_Reason=* Status=0xC000015B

Data Exfiltration - Suspicious Destinations

| tstats summariesonly=1 allow_old_summaries=1 sum(All_Traffic.bytes) as bytes dc(All_Traffic.src) as "Unique Sources" from datamodel=Network_Traffic.All_Traffic where host=* by _time span=1h All_Traffic.dest
| rename All_Traffic.* as *
| eval MBytes=round(bytes/1024/1024,2)
| eventstats dc(_time) as Frequency by dest
| eval Risk=round(MBytes/(pow(Frequency,Frequency))/'Unique Sources')
| sort - Risk
| head 250
| iplocation dest
| fillnull value="" Country
| table _time, Risk, dest, "Unique Sources", MBytes, Country

Detects when the number of successful Windows logon events are more than the daily average for a user account

Unusual Traffic by Volume

Suspiciously High Process Creation

Network Traffic from Rare Countries

Failed Login Attempts from a Single Source

Frequency of Rare Windows Events

Detection of SQL Injection

Top Accessed Internal Systems

Anomaly in Number of Connections to a Host

Unique Domains Requested by Host

Suspicious Executables Downloaded

Unusual Increase in Network Traffic

Unexpected System Changes

Unknown Processes Running on Critical Servers

Unusual Database Activities

Failed Connections to Important Services

High Traffic on Non-Standard Ports

Connections to Blacklisted IPs

Multiple VPN Logins from Same User but Different Locations

File Access Patterns

Attempts to Access Unusual URLs

Outgoing Traffic To Blacklisted Domains

Unique Connections by Non-Standard Ports

Spike in Error Logs

Longest Running User Sessions

Suspicious Database Transactions

Unknown USB Device Connections

Multiple Failed SSH Attempts

Most Common Firewall Deny Events

Processes Consuming High CPU

Rarely Accessed File Shares

DNS Tunneling Detection

Malware Detection Based on User Agent Strings

File Changes on Critical Systems

Abnormal Account Lockouts

Excessive Data Sent to External IPs

Unusual Server Reboot

Suspicious PowerShell Commands

Multiple File Changes by a User

Inbound Connections from TOR Network

Unusual Print Activities

User Account Anomalies

Unusual Command Execution

Outbound Traffic to High-Risk Countries

Large Number of Failed Database Queries

Unusual System Service Behavior

Uncommon Firewall Rule Modifications

Large Number of Login Failures from Single IP

Suspicious File Access Patterns

Abnormal Process Behavior

Outliers in Network Bandwidth Usage

Last updated