< Return to Video

Splunk Enterprise Security Free Training | Correlation Searches

  • 0:00 - 0:11
    [Music]
  • 0:11 - 0:15
    Alright, welcome to my enterprise security
  • 0:15 - 0:17
    video playlist. This time we're going to
  • 0:17 - 0:20
    be covering correlation searches. This is
  • 0:20 - 0:23
    a fancy word for a safe search that
  • 0:23 - 0:26
    creates an alert. That's really what it
  • 0:26 - 0:29
    comes down to. They call them notables—
  • 0:29 - 0:31
    there's a lot of terminology involved—
  • 0:31 - 0:33
    but the ultimate concept is a
  • 0:33 - 0:36
    correlation search is a search that
  • 0:36 - 0:39
    fires off at predefined periods of time,
  • 0:39 - 0:41
    maybe every five minutes, every hour,
  • 0:41 - 0:43
    searches back across your logs for
  • 0:43 - 0:45
    certain behaviors, and if it sees it, it
  • 0:45 - 0:48
    creates a...it creates an alert. You can
  • 0:48 - 0:51
    make it create a notable. Technically, it
  • 0:51 - 0:52
    doesn't have to create a notable, and
  • 0:52 - 0:55
    I'll explain how that works, but it's
  • 0:55 - 0:57
    really just a safe search. So let's go
  • 0:57 - 0:58
    break right into enterprise security, and
  • 0:58 - 1:00
    let's talk about that.
  • 1:00 - 1:02
    So I come into enterprise security. We're
  • 1:02 - 1:04
    going to show what is already outcomes
  • 1:04 - 1:07
    out of the box. So if
    I go 'configure', I'm
  • 1:07 - 1:10
    in my Enterprise security
    and I come into...
  • 1:10 - 1:14
    'content', and I go to
    'content management',
  • 1:14 - 1:16
    these are all the knowledge objects that
  • 1:16 - 1:19
    come with enterprise security, and I'm
  • 1:19 - 1:23
    going to flip this to a
    correlation search.
  • 1:25 - 1:28
    I click that...
  • 1:28 - 1:30
    we can see that it's going to come back
  • 1:30 - 1:33
    with lots and lots of results, 58 pages
  • 1:33 - 1:39
    plus of them and multiple to a page. You
  • 1:39 - 1:41
    can read this, so I'm just going to go
  • 1:41 - 1:44
    into the very first one. And this is
  • 1:44 - 1:46
    'abnormally high number of endpoint
  • 1:46 - 1:50
    changes by a user'. If I go and open this
  • 1:50 - 1:52
    up a little bit...
  • 1:52 - 1:54
    'detects an abnormally high number of
  • 1:54 - 1:55
    endpoint changes by user account as it
  • 1:55 - 1:58
    relate to restarts, audits, file system,
  • 1:58 - 2:00
    user, registry, notifications".
  • 2:00 - 2:01
    If I go into this...
  • 2:02 - 2:04
    I'm actually going to be able to see
  • 2:04 - 2:07
    the query. I'm not going to go explain it
  • 2:07 - 2:08
    because I can already tell you, it's
  • 2:08 - 2:09
    probably going to be written with lots
  • 2:09 - 2:13
    of data models and macros, but out of the
  • 2:13 - 2:15
    box, you can see: here's the query. And
  • 2:15 - 2:17
    it's basically...it's going to look at
  • 2:17 - 2:19
    your data model. You'll hear me talk
  • 2:19 - 2:21
    about data models. I've discussed data
  • 2:21 - 2:23
    model, but this is going to be the
  • 2:23 - 2:25
    endpoint data model, and it's going to be
  • 2:25 - 2:28
    looking at file systems for changes by the
  • 2:28 - 2:29
    user, it's going to do a bunch of other
  • 2:29 - 2:30
    things that ultimately it's going to
  • 2:30 - 2:33
    come back and say...if you meet a certain
  • 2:33 - 2:35
    criteria, and you can see that it's
  • 2:35 - 2:36
    actually using the machine learning
  • 2:36 - 2:39
    toolkit, so down here it's actually
  • 2:39 - 2:41
    building a threshold saying, what is the
  • 2:41 - 2:44
    normal amount of use of changes, and is
  • 2:44 - 2:46
    it jumping out of that at normal level.
  • 2:46 - 2:50
    It's really cool, put some really cool
  • 2:50 - 2:52
    analytics out there for you. You can just
  • 2:52 - 2:55
    use what they've got. What I love is I
  • 2:55 - 2:57
    don't want to...I hear, oh
  • 2:57 - 3:00
    well aren't correlation searches
  • 3:00 - 3:03
    attached to now frameworks? Well, you can
  • 3:03 - 3:05
    see the very first ones.
    Sometimes they
  • 3:05 - 3:07
    are. But here, these are frameworks. I've
  • 3:07 - 3:09
    heard this in my own work,
    oh, well they're
  • 3:09 - 3:12
    all mapped to the miter. Well,
  • 3:12 - 3:14
    are they? I'll just grab the very first
  • 3:14 - 3:17
    one, and...there's no miter technique
  • 3:17 - 3:20
    mapped. What should it be? Well, there's a
  • 3:20 - 3:23
    lot of things that could cause a miter
  • 3:23 - 3:26
    technique to...uh...if there's endpoint
  • 3:26 - 3:27
    changes, it could be many different types
  • 3:27 - 3:30
    of tact. Then I'll have it mapped. You
  • 3:30 - 3:31
    could come in here and you could map it,
  • 3:31 - 3:34
    we'll discuss that later, but point is, we
  • 3:34 - 3:36
    come down here...
  • 3:36 - 3:38
    make that go away, that's all...
  • 3:38 - 3:40
    we can see that it's looking back 1,450
  • 3:40 - 3:44
    minutes, and the latest time is zero. This
  • 3:44 - 3:48
    runs at five after the hour, that's how I
  • 3:48 - 3:51
    read that, five after the hour.
  • 3:51 - 3:53
    It's...if the results are greater than
  • 3:53 - 3:57
    zero, it groups by user and change type,
  • 3:57 - 4:00
    and we see that it creates...it does not
  • 4:00 - 4:02
    create a notable, it actually just
  • 4:02 - 4:04
    provides a risk analysis. And we'll
  • 4:04 - 4:06
    discuss risk analysis when we talk about
  • 4:06 - 4:09
    RBA. But the point is, you can make it do
  • 4:09 - 4:10
    a bunch of adaptive responses.
  • 4:10 - 4:12
    My job here is not to help you
  • 4:12 - 4:14
    understand every correlation search that
  • 4:14 - 4:16
    comes out of the box, I'm here to discuss
  • 4:16 - 4:17
    the part that most people don't know how
  • 4:17 - 4:20
    to do: create your own. So I've shown you
  • 4:20 - 4:23
    that you can go look through...there's
  • 4:23 - 4:26
    the documentation on Splunk, says 1400
  • 4:26 - 4:29
    plus, I don't know how they define what a
  • 4:29 - 4:31
    correlation search is. I'm going to tell
  • 4:31 - 4:35
    you that it's a lot. There's a
  • 4:35 - 4:38
    lot of them. And by default,
  • 4:38 - 4:41
    enterprise security is smart. They do
  • 4:41 - 4:43
    not come enabled. If I look at the
  • 4:43 - 4:46
    enabled correlation searches,
  • 4:46 - 4:49
    this is mine that I was using as I
  • 4:49 - 4:50
    started to help understand
  • 4:50 - 4:51
    enterprise security,
  • 4:51 - 4:53
    and these two were turned on
  • 4:53 - 4:55
    and this is for risk-based approach.
  • 4:55 - 4:58
    Other than that, there are no correlation
  • 4:58 - 5:00
    searches that come out of the box. Why?
  • 5:00 - 5:02
    Well, one, they don't want to turn
  • 5:02 - 5:03
    something on that doesn't fit your data
  • 5:03 - 5:06
    set; two, often you have
    to tweak them, the
  • 5:06 - 5:08
    correlation search is great, but it's not
  • 5:08 - 5:09
    always going to be perfect for your
  • 5:09 - 5:11
    environment, and so as a general rule,
  • 5:11 - 5:12
    they're there as a guidance. Use them
  • 5:12 - 5:15
    when they make sense,
    turn one on, test it,
  • 5:15 - 5:17
    see how it works.
    If it doesn't, modify it,
  • 5:17 - 5:19
    and typically you'll just clone the
  • 5:19 - 5:21
    correlation search and build your own.
  • 5:21 - 5:23
    Anyway, enough talking about that, let's
  • 5:23 - 5:25
    talk about actually building my own
  • 5:25 - 5:28
    correlation search. So I'm in 'configure
  • 5:28 - 5:30
    content' and I went to
    'content management'.
  • 5:30 - 5:32
    If I do 'create new content', that's how
  • 5:32 - 5:35
    I'm going to build one. And so we're
  • 5:35 - 5:36
    going to create a new content,
  • 5:36 - 5:39
    we're going to make a correlation search.
  • 5:39 - 5:43
    This is the way that I
    do correlation searches.
  • 5:43 - 5:44
    That doesn't mean it's the way
  • 5:44 - 5:46
    that it has to be done,
    but it's the way it works for me.
  • 5:46 - 5:48
    I'm going to call this, I
  • 5:48 - 5:49
    would hopefully have a much better name
  • 5:49 - 5:52
    for this, but I'm going to do 'YouTube
  • 5:52 - 5:56
    Correlation Search'.
  • 6:01 - 6:03
    Horrible name, because someone who comes
  • 6:03 - 6:05
    across this will have no idea what it's
  • 6:05 - 6:07
    for, but for me, when I need to purge
  • 6:07 - 6:08
    stuff from my system, it's really easy
  • 6:08 - 6:10
    and it stands out. So I'm going to put it
  • 6:10 - 6:12
    that way. Then here in my description, I'm
  • 6:12 - 6:15
    going to go...
  • 6:15 - 6:19
    'Grab one event from network logs'.
  • 6:21 - 6:22
    I'm not actually going to build
  • 6:22 - 6:24
    something that I'm looking for.
  • 6:24 - 6:25
    That's not the point of this video.
  • 6:25 - 6:28
    I'm just showing how
    to build one, and I want
  • 6:28 - 6:31
    them to always fire, so I'm going to
  • 6:31 - 6:33
    fudge the numbers so that I always
  • 6:33 - 6:35
    get what I want. And so the first thing I
  • 6:35 - 6:37
    do is I don't try to build a search
  • 6:37 - 6:39
    through here. You can use a guided.
  • 6:39 - 6:41
    Guided's cool, it'll allow you it'll pick
  • 6:41 - 6:43
    data models, you can pick fields from it,
  • 6:43 - 6:46
    so if I enable the guided mode, you'll
  • 6:46 - 6:47
    see the data, it'll say alright, what
  • 6:47 - 6:50
    data model do you want to look at?
  • 6:50 - 6:52
    I might come down to 'network traffic'...
  • 6:52 - 6:55
    and what data set do I want to use...
  • 6:55 - 6:59
    'all traffic'. Do I want
    to use 'summaries only'?
  • 6:59 - 7:01
    I'll discuss summaries only later
  • 7:01 - 7:04
    this is not the place for it. Time range.
  • 7:04 - 7:08
    And there is your basic query. I can run
  • 7:08 - 7:10
    the search and see how it looks.
  • 7:10 - 7:13
    Then I'm going to hit
  • 7:14 - 7:19
    'filter', and filter would be like
  • 7:19 - 7:22
    All.Traffic...
  • 7:23 - 7:29
    AllTraffic.destIP...
  • 7:29 - 7:31
    oh.
  • 7:31 - 7:34
    it's a boolean. Where...
  • 7:35 - 7:37
    and I actually don't know how to make
  • 7:37 - 7:40
    this work. All_Traffic...
  • 7:43 - 7:45
    I'd have to go look this up. Well that's
  • 7:45 - 7:46
    not very good...helpful
    there. The point is,
  • 7:46 - 7:48
    I'm not actually going through the
  • 7:48 - 7:50
    guided search tour. I'm going to stay
  • 7:50 - 7:52
    right here with a manual query where I
  • 7:52 - 7:54
    can write it. It does have guided, again,
  • 7:54 - 7:56
    you got to understand exactly what
  • 7:56 - 7:57
    you're pulling. Guided is nice if you
  • 7:57 - 8:00
    know, follow the docs. I'm not here for
  • 8:00 - 8:02
    following the docs, I'm here to take a
  • 8:02 - 8:04
    query. This is my home network. I'm going
  • 8:04 - 8:06
    to look at the correlate logs. I'm going
  • 8:06 - 8:07
    to look at my correlate conn logs. I'm
  • 8:07 - 8:10
    going to say...where source IP is
  • 8:10 - 8:13
    192.1680.*. That is only so I make
  • 8:13 - 8:15
    sure that I'm looking at a specific
  • 8:15 - 8:18
    subnet section of my network. This is
  • 8:18 - 8:21
    primarily my network designed for doing
  • 8:21 - 8:24
    Splunk videos, and so this isn't my...
  • 8:24 - 8:25
    this is part of my home network, but it's
  • 8:25 - 8:28
    a subnet on my network that I use for
  • 8:28 - 8:31
    testing, pen testing, setup of systems
  • 8:31 - 8:33
    that I tear up and pick up and tear down,
  • 8:33 - 8:35
    and so I just want to know what they're
  • 8:35 - 8:37
    doing. And so I wanted the source IP
  • 8:37 - 8:39
    Maybe you don't want the source IP.
  • 8:39 - 8:40
    All I really cared about though, is I just
  • 8:40 - 8:42
    wanted this, because ultimately, later
  • 8:42 - 8:44
    down, I'm going to do inventory, and I'm
  • 8:44 - 8:46
    going to have a very simple inventory of
  • 8:46 - 8:48
    that subnet, and so I only want IPs that
  • 8:48 - 8:51
    at least one piece of the data
  • 8:51 - 8:53
    ties to my inventory. And so, as you can
  • 8:53 - 8:56
    see, this here has nothing to do with my
  • 8:56 - 8:58
    network, but this one does. And I'm going
  • 8:58 - 9:00
    to do a head 1, because I don't
  • 9:00 - 9:03
    want lots and lots of results.
  • 9:03 - 9:05
    Basically, I want a query
  • 9:05 - 9:07
    and I'm always going to return one
  • 9:07 - 9:10
    result...and that's what I built.
  • 9:10 - 9:12
    This isn't bad. This isn't actually a
  • 9:12 - 9:14
    known bad, I just wanted data to come
  • 9:14 - 9:16
    back, so then I can put other stuff on it.
  • 9:16 - 9:19
    I'm doing this as a demo for you guys to
  • 9:19 - 9:21
    understand how
  • 9:21 - 9:23
    to build a query. You would want to build
  • 9:23 - 9:25
    a query that actually is looking for
  • 9:25 - 9:27
    something malicious. Right now, I just
  • 9:27 - 9:30
    want a query to return a result, so that
  • 9:30 - 9:32
    I can...when I do my next video about
  • 9:32 - 9:35
    triage and the triage system, there are
  • 9:35 - 9:37
    actually tickets coming in. If I write a
  • 9:37 - 9:39
    query that's looking for bad, well, that
  • 9:39 - 9:41
    bad better be occurring on my network or
  • 9:41 - 9:43
    it's not going to fire. And so it's a lot
  • 9:43 - 9:44
    harder to troubleshoot if the thing is
  • 9:44 - 9:46
    working if you're building queries right,
  • 9:46 - 9:48
    If you build something that isn't...
  • 9:48 - 9:50
    you hope to not actually
    see on your network.
  • 9:50 - 9:53
    So I actually hope to see
    correlate conn logs.
  • 9:53 - 9:54
    I sure hope so. That means my
  • 9:54 - 9:56
    network has traffic. Anyway, and I'm just
  • 9:56 - 9:58
    going to put the head 1, because I only
  • 9:58 - 10:00
    want it to create one alert. If I let it
  • 10:00 - 10:02
    come back, it's every event that comes
  • 10:02 - 10:05
    back in here would be a notable alert.
  • 10:05 - 10:08
    I don't want my triage
    system getting inundated.
  • 10:08 - 10:10
    So I'm just going to do this head 1.
  • 10:10 - 10:12
    Now I'm going to map it. I'm going to go
  • 10:12 - 10:15
    to miter, and I'm going to
  • 10:15 - 10:18
    put in some
  • 10:18 - 10:20
    tickets. So I'm going to go 'T1143'. I
  • 10:20 - 10:22
    actually can't remember what all these
  • 10:22 - 10:23
    mean off the top of my head. You can go
  • 10:23 - 10:26
    look them up. I'm going to say this, and
  • 10:26 - 10:29
    this has note, no bases whatsoever, but
  • 10:29 - 10:31
    again, these videos are
  • 10:31 - 10:33
    going to build on themselves. And so I'm
  • 10:33 - 10:35
    building these miter attacks so when I
  • 10:35 - 10:37
    go to the RBA section of this video
  • 10:37 - 10:40
    playlist, you'll see how it maps all the
  • 10:40 - 10:42
    different techniques together. And so I'm
  • 10:42 - 10:45
    going to put this down here,
  • 10:45 - 10:49
    and actually, because
    I want this to work on
  • 10:49 - 10:51
    my system, I'm going to actually do...
  • 10:51 - 10:54
    I want it always to be 0.128,
  • 10:54 - 10:57
    that way I'm only going to get alerts
  • 10:57 - 10:59
    that are relating to this system.
  • 10:59 - 11:02
    That means my risk-based
    approach will cross
  • 11:02 - 11:04
    the threshold. That actually makes a lot
  • 11:04 - 11:06
    more sense for me. I'll explain that when
  • 11:06 - 11:09
    we actually get to RBA, but basically, I'm
  • 11:09 - 11:12
    going to give me...
    give me an alert every time
  • 11:12 - 11:15
    0.128 is the source of network traffic.
  • 11:15 - 11:18
    And that should fire off
    quite frequently.
  • 11:19 - 11:21
    Ignore the picture up in the top.
  • 11:21 - 11:24
    We're just going to move on.
    Head 1.
  • 11:24 - 11:26
    My videos are done rendering.
    Anyway, so I'm going
  • 11:26 - 11:29
    to map it to these TTPs. Again, this is
  • 11:29 - 11:31
    all for demo purposes, so I just pick
  • 11:31 - 11:36
    some TTPs, and I can come down here and
  • 11:36 - 11:39
    I can put a confidence score,
    an impact score,
  • 11:39 - 11:41
    contacts, analytics, we're just gonna
  • 11:41 - 11:42
    leave that alone for now.
  • 11:42 - 11:44
    I can create my own framework
  • 11:44 - 11:45
    And now here it's going to say
  • 11:45 - 11:47
    how far back do I want to look? Do I
  • 11:47 - 11:48
    want to look back 24 hours?
  • 11:48 - 11:50
    I could, but I know how often
  • 11:50 - 11:51
    my logs are firing. I'm going
  • 11:51 - 11:53
    to look back one hour. Doesn't really
  • 11:53 - 11:55
    matter, because I'm just grabbing head 1.
  • 11:55 - 11:59
    And...I have...I probably get
  • 11:59 - 12:02
    hundreds of events every...probably
  • 12:02 - 12:04
    thousands of events every hour
  • 12:04 - 12:06
    on this particular subnet. And so it's
  • 12:06 - 12:08
    not going to be a problem getting data.
  • 12:08 - 12:09
    I'm going to go look back one hour to
  • 12:09 - 12:12
    now. And how often do I want it to run?
  • 12:12 - 12:13
    You know what? I'm going to let it run
  • 12:13 - 12:16
    every five minutes. And that's going to
  • 12:16 - 12:18
    be important so that I actually have
  • 12:18 - 12:21
    events. And that'll work.
  • 12:21 - 12:23
    I'm going to come down here,
    and I'm going to say do I
  • 12:23 - 12:25
    want it to run as real time or
  • 12:25 - 12:29
    continuous. We'll just
    leave it at its default.
  • 12:29 - 12:31
    What's my scheduling window? Again,
  • 12:31 - 12:33
    these are...I'm not going over these, this
  • 12:33 - 12:36
    is just basically how you want to run
  • 12:36 - 12:38
    your times. I'm going to run this
  • 12:38 - 12:39
    every five minutes. Schedule priorities
  • 12:39 - 12:41
    in case there's conflicts. Hopefully with
  • 12:41 - 12:43
    your enterprise security, you actually do
  • 12:43 - 12:46
    not overload your system so these become
  • 12:46 - 12:47
    a big deal.
  • 12:47 - 12:49
    Trigger conditions, number of results
  • 12:49 - 12:50
    greater than zero, that's always going to
  • 12:50 - 12:52
    be the case because I'm getting back one.
  • 12:52 - 12:54
    But if I was doing this, if I want to do
  • 12:54 - 12:56
    thresholds I could make it...the thing has
  • 12:56 - 12:58
    to occur at least 10 times, or 15 times,
  • 12:58 - 13:01
    or whatever. Then windows durations
  • 13:01 - 13:04
    filled to group by...that's it. That's all
  • 13:04 - 13:07
    I want to deal with. Really, the only
  • 13:07 - 13:09
    places I put around with this is I wrote
  • 13:09 - 13:11
    a query in the most basic format to get
  • 13:11 - 13:13
    your correlation searches going. Pick a
  • 13:13 - 13:16
    search. I would tie it to an annotation
  • 13:16 - 13:19
    but you don't have to not required you
  • 13:19 - 13:20
    come down here pick your time window
  • 13:20 - 13:22
    these three boxes how far back do you
  • 13:22 - 13:24
    want to look latest time earliest time
  • 13:24 - 13:26
    and your cron schedule and then you
  • 13:26 - 13:28
    really don't have to touch anything else
  • 13:28 - 13:32
    except this add adaptive response I'm
  • 13:32 - 13:33
    going to come and modify this in a
  • 13:33 - 13:36
    minute there is when we talk about RBA
  • 13:36 - 13:38
    I'm going to put a risk analysis for the
  • 13:38 - 13:40
    sake of keeping this simple I am only
  • 13:40 - 13:41
    going to do
  • 13:41 - 13:44
    notables for now so I'm going to come in
  • 13:44 - 13:45
    here and I'm going to click a notable
  • 13:45 - 13:47
    and notable is an alert that goes to
  • 13:47 - 13:49
    your triage system
  • 13:49 - 13:52
    gonna go YouTube
  • 13:52 - 13:55
    notable give a description
  • 13:55 - 13:58
    I can actually use
  • 13:58 - 14:00
    um foreign
  • 14:00 - 14:02
    variable substitution so I'm going to do
  • 14:02 - 14:06
    alert for dollar sign Source IP
  • 14:06 - 14:08
    I need to make sure that field comes
  • 14:08 - 14:11
    back and this does have a source IP so I
  • 14:11 - 14:13
    can use it and you just call it like you
  • 14:13 - 14:15
    do in with the dollar sign on both sides
  • 14:15 - 14:17
    of a variable and that'll be dynamic and
  • 14:17 - 14:20
    so my description will come back with
  • 14:20 - 14:23
    this and just because I
  • 14:23 - 14:25
    want to what if I do yeah we'll just
  • 14:25 - 14:26
    leave it at that
  • 14:26 - 14:29
    YouTube notable security domain there
  • 14:29 - 14:32
    are a bunch of domains this is dealing
  • 14:32 - 14:34
    with access areas that would be
  • 14:34 - 14:36
    authentication endpoint a lot of your
  • 14:36 - 14:39
    host logs Network logs threat identity
  • 14:39 - 14:41
    and audit and so those are the six areas
  • 14:41 - 14:44
    splunkcast as security domains we'll
  • 14:44 - 14:47
    just leave it as a we'll put as a
  • 14:47 - 14:48
    network
  • 14:48 - 14:50
    in the network domain I'm going to put
  • 14:50 - 14:53
    the severity
  • 14:54 - 14:56
    as low
  • 14:56 - 15:00
    and default owner I can put in these I
  • 15:00 - 15:02
    can leave it unassigned
  • 15:02 - 15:03
    I'm going to put it as unassigned to
  • 15:03 - 15:05
    start with again you don't have to
  • 15:05 - 15:07
    default status I'm going to put it as
  • 15:07 - 15:09
    unassigned
  • 15:09 - 15:12
    and I could put a drill down search in
  • 15:12 - 15:15
    there and let's do that
  • 15:15 - 15:18
    we're going to take this very same query
  • 15:18 - 15:20
    just to keep things really simple one of
  • 15:20 - 15:22
    the very first drill Downs I want to put
  • 15:22 - 15:24
    in there
  • 15:24 - 15:26
    is the actual query
  • 15:26 - 15:29
    that created this log
  • 15:29 - 15:31
    but in this case I'm not going to put
  • 15:31 - 15:33
    head 1 I'm going to put I'm going to
  • 15:33 - 15:34
    take the head out
  • 15:34 - 15:36
    oh it looks like I've lost the 128 on
  • 15:36 - 15:39
    there 128.
  • 15:39 - 15:41
    make sure 128 is up here
  • 15:41 - 15:45
    yeah it is okay and I can choose the
  • 15:45 - 15:46
    drill down search will be
  • 15:46 - 15:49
    C
  • 15:49 - 15:54
    what caused alert
  • 15:55 - 15:57
    there are other ways of doing this I'll
  • 15:57 - 15:58
    show but I'm just I'm just going to
  • 15:58 - 16:00
    create a few ad drill down searches and
  • 16:00 - 16:02
    here we're going to just do
  • 16:02 - 16:05
    um
  • 16:05 - 16:08
    Y is
  • 16:08 - 16:10
    this
  • 16:10 - 16:14
    drill down exist
  • 16:15 - 16:16
    I just want to show I can go search
  • 16:16 - 16:18
    anything
  • 16:18 - 16:21
    index equals internal
  • 16:21 - 16:23
    why would you be looking at your
  • 16:23 - 16:26
    internal logs it doesn't really matter
  • 16:26 - 16:28
    um
  • 16:28 - 16:30
    well actually let's just do this I'm
  • 16:30 - 16:33
    going to put in dollar sign Source IP
  • 16:33 - 16:35
    so I'm basically looking in my internal
  • 16:35 - 16:37
    logs and I'm going to see if I find that
  • 16:37 - 16:40
    IP address popping up it it's just kind
  • 16:40 - 16:42
    of an interesting way you can add
  • 16:42 - 16:46
    additional searches to your information
  • 16:46 - 16:46
    um
  • 16:46 - 16:48
    so I'm going to be searching my internal
  • 16:48 - 16:50
    logs for the source IP
  • 16:50 - 16:53
    and I hope you saw this earliest offset
  • 16:53 - 16:56
    latest Offset you can change this or you
  • 16:56 - 16:58
    can you can let it just go by its
  • 16:58 - 17:00
    default or you can say for here I'm
  • 17:00 - 17:01
    going to go
  • 17:01 - 17:05
    plus this is a earliest for example one
  • 17:05 - 17:06
    hour
  • 17:06 - 17:08
    and I'm going to leave the other one as
  • 17:08 - 17:11
    zero
  • 17:11 - 17:12
    does that make sense so I hope this
  • 17:12 - 17:15
    makes this helps I can change my time
  • 17:15 - 17:17
    it's basically going to look in this
  • 17:17 - 17:22
    window one hour back of based off of
  • 17:23 - 17:25
    um
  • 17:25 - 17:28
    the the time this event occurred
  • 17:28 - 17:29
    so this might actually look a little bit
  • 17:29 - 17:30
    in the future this can look a little bit
  • 17:30 - 17:32
    in the future it's going to use time in
  • 17:32 - 17:35
    the back so let's go
  • 17:36 - 17:38
    we're going to go one hour one way this
  • 17:38 - 17:40
    is going to go one hour and in the
  • 17:40 - 17:43
    future and one hour in the past
  • 17:43 - 17:46
    sounds good I'm going to leave my
  • 17:46 - 17:48
    investigation profile alone and these
  • 17:48 - 17:51
    are I uh extractions and these what it's
  • 17:51 - 17:52
    going to do is it's going to it's going
  • 17:52 - 17:56
    to identify identities these are users
  • 17:56 - 17:57
    and stuff like that on your network
  • 17:57 - 18:00
    assets would be like IPS and machines
  • 18:00 - 18:03
    and files and URLs that it might have
  • 18:03 - 18:06
    found I'm going to we got assets here
  • 18:06 - 18:09
    Source test
  • 18:09 - 18:10
    um does my lock do my logs contain
  • 18:10 - 18:12
    source and test
  • 18:12 - 18:15
    well let's go look had one do I actually
  • 18:15 - 18:18
    have a source and a desk here
  • 18:18 - 18:21
    I have a source IP but no source so I
  • 18:21 - 18:23
    don't have the field it's looking for to
  • 18:23 - 18:25
    be able to identify it so what I need to
  • 18:25 - 18:27
    do is I need to come in here and I'm
  • 18:27 - 18:28
    going to go
  • 18:28 - 18:31
    source IP
  • 18:31 - 18:34
    except it's on identity
  • 18:34 - 18:36
    the identity it's an asset so I'm going
  • 18:36 - 18:37
    to come in here and I'm going to go
  • 18:37 - 18:40
    Source IP
  • 18:40 - 18:44
    and just because it's we might we might
  • 18:44 - 18:46
    want to identify the uh the other
  • 18:46 - 18:48
    machine in question we're going to put
  • 18:48 - 18:50
    desktop in there as well so I'm going to
  • 18:50 - 18:52
    have my source IP and my destination IP
  • 18:52 - 18:54
    they're going to be assets that are
  • 18:54 - 18:56
    extracted and that's all I'm going to do
  • 18:56 - 18:58
    I just want to make sure that the
  • 18:58 - 19:00
    anything that might be identifiable in
  • 19:00 - 19:02
    these queries not these queries the
  • 19:02 - 19:04
    query up here let's call them out and I
  • 19:04 - 19:06
    hope all this will make more sense as
  • 19:06 - 19:07
    you actually see the stuff come back
  • 19:07 - 19:09
    there's just a lot of capabilities here
  • 19:09 - 19:13
    I can write steps if I want to I can set
  • 19:13 - 19:15
    things up to uh for example send an
  • 19:15 - 19:18
    email stream capture if you have uh
  • 19:18 - 19:20
    Splunk stream nbstat and it's look up
  • 19:20 - 19:22
    you can make your system do a lot of
  • 19:22 - 19:24
    things like I could have Splunk go ping
  • 19:24 - 19:26
    an IP address you know what
  • 19:26 - 19:28
    um in a little bit I'll actually show me
  • 19:28 - 19:30
    doing that I can have it do a risk
  • 19:30 - 19:32
    analysis run a scripts and a uba send a
  • 19:32 - 19:34
    split mobile Splunk mobile is really
  • 19:34 - 19:37
    cool now it's being sent to my phone add
  • 19:37 - 19:39
    thread intelligence from it web hooks
  • 19:39 - 19:41
    whatever you have a lots of capabilities
  • 19:41 - 19:44
    don't need to do it the the minimum you
  • 19:44 - 19:45
    need for a notable
  • 19:45 - 19:48
    title description
  • 19:48 - 19:50
    you don't even need these drill Downs
  • 19:50 - 19:52
    you can let this be set as default
  • 19:52 - 19:54
    probably should pick a security domain
  • 19:54 - 19:58
    and literally that's it make sure it's a
  • 19:58 - 20:00
    lot more helpful if you can identify
  • 20:00 - 20:01
    your stuff coming back as identities and
  • 20:01 - 20:03
    sources and I'm going to show you that
  • 20:03 - 20:06
    in the next video with workbenches and
  • 20:06 - 20:08
    stuff like that but for the sake of this
  • 20:08 - 20:09
    don't worry about it
  • 20:09 - 20:11
    um just know that it's it's good if you
  • 20:11 - 20:13
    can call it out but if you don't you're
  • 20:13 - 20:15
    it's not like the query will break
  • 20:15 - 20:18
    I'm going to hit save
  • 20:18 - 20:20
    and I should have a correlation search
  • 20:20 - 20:22
    done now I'm going to have to wait I
  • 20:22 - 20:25
    probably just missed my window it's
  • 20:25 - 20:26
    supposed to be kicking off five minutes
  • 20:26 - 20:28
    after the hour
  • 20:28 - 20:31
    so I can almost guarantee that if I come
  • 20:31 - 20:34
    to incident review I will not find an
  • 20:34 - 20:35
    alert
  • 20:35 - 20:39
    called YouTube notable
  • 20:39 - 20:41
    I'm gonna have to wait till five more
  • 20:41 - 20:43
    minutes to go by but let's go ahead and
  • 20:43 - 20:45
    check that so I can come down I can
  • 20:45 - 20:47
    refresh the page here or I can refresh
  • 20:47 - 20:50
    the page here but either way that is not
  • 20:50 - 20:52
    the purpose of this video is to look at
  • 20:52 - 20:54
    the incidents coming in mine was to talk
  • 20:54 - 20:56
    about correlation searches and how to
  • 20:56 - 20:58
    make my own I have set up a correlation
  • 20:58 - 21:01
    search and so I've accomplished my task
  • 21:01 - 21:03
    I'm gonna I'm gonna come see it here
  • 21:03 - 21:05
    with a configure
  • 21:05 - 21:07
    content
  • 21:07 - 21:11
    configure content content management my
  • 21:11 - 21:14
    new correlation search is in here we can
  • 21:14 - 21:16
    see that when I go all
  • 21:16 - 21:18
    correlation search and when you create
  • 21:18 - 21:21
    them by default they are enabled
  • 21:21 - 21:24
    so if I come in here and I enable
  • 21:24 - 21:26
    I can see YouTube correlation search for
  • 21:26 - 21:27
    line Creations if I want to make any
  • 21:27 - 21:30
    changes to it
  • 21:30 - 21:32
    I just hit search now that's interesting
  • 21:32 - 21:33
    that it doesn't say that it's actually
  • 21:33 - 21:36
    scheduled
  • 21:41 - 21:43
    all right well probably because it
  • 21:43 - 21:45
    hasn't run the very first time once it
  • 21:45 - 21:47
    runs I should see
  • 21:47 - 21:50
    here the next schedule time but it's
  • 21:50 - 21:51
    really easy just keep it under the
  • 21:51 - 21:54
    enabled
  • 21:55 - 21:58
    and correlation searches
  • 21:58 - 21:59
    so
  • 21:59 - 22:02
    yep there it is now I've got a time for
  • 22:02 - 22:03
    the next scheduled time stored in the
  • 22:03 - 22:05
    Enterprise Security app what have we
  • 22:05 - 22:07
    covered we've talked about correlation
  • 22:07 - 22:09
    searches what they are they're saved
  • 22:09 - 22:12
    searches that can be used to create
  • 22:12 - 22:16
    notables notables fill out tickets that
  • 22:16 - 22:18
    you will go into a ticket triaging
  • 22:18 - 22:20
    system which we will cover in the next
  • 22:20 - 22:22
    video in this playlist please look at
  • 22:22 - 22:23
    the link below notice that this is a
  • 22:23 - 22:25
    playlist go ahead and join the playlist
  • 22:25 - 22:27
    and watch the videos this is meant to be
  • 22:27 - 22:30
    a comprehensive training to help you
  • 22:30 - 22:32
    understand Enterprise security
  • 22:32 - 22:32
    um
  • 22:32 - 22:35
    click that link we have now create I've
  • 22:35 - 22:36
    shown you how to see the correlation
  • 22:36 - 22:38
    search that come out of the box and I've
  • 22:38 - 22:40
    shown you how to create your own from
  • 22:40 - 22:42
    scratch I hope this has been helpful I
  • 22:42 - 22:44
    hope this helps you move from being a
  • 22:44 - 22:48
    lame analyst to a Splunk ninja that
  • 22:48 - 22:49
    you'll keep following particularly this
  • 22:49 - 22:51
    playlist watch the videos in it and that
  • 22:51 - 22:53
    they're helpful anyway hope to see you
  • 22:53 - 22:55
    around
Title:
Splunk Enterprise Security Free Training | Correlation Searches
Description:

more » « less
Video Language:
English
Duration:
22:55

English subtitles

Revisions Compare revisions