< Return to Video

Splunk Enterprise Security Free Training | Correlation Searches

  • 0:00 - 0:11
    [Music]
  • 0:11 - 0:15
    Alright, welcome to my enterprise security
  • 0:15 - 0:17
    video playlist. This time we're going to
  • 0:17 - 0:20
    be covering correlation searches. This is
  • 0:20 - 0:23
    a fancy word for a safe search that
  • 0:23 - 0:26
    creates an alert. That's really what it
  • 0:26 - 0:29
    comes down to. They call them notables—
  • 0:29 - 0:31
    there's a lot of terminology involved—
  • 0:31 - 0:33
    but the ultimate concept is a
  • 0:33 - 0:36
    correlation search is a search that
  • 0:36 - 0:39
    fires off at predefined periods of time,
  • 0:39 - 0:41
    maybe every five minutes, every hour,
  • 0:41 - 0:43
    searches back across your logs for
  • 0:43 - 0:45
    certain behaviors, and if it sees it, it
  • 0:45 - 0:48
    creates a...it creates an alert. You can
  • 0:48 - 0:51
    make it create a notable. Technically, it
  • 0:51 - 0:52
    doesn't have to create a notable, and
  • 0:52 - 0:55
    I'll explain how that works, but it's
  • 0:55 - 0:57
    really just a safe search. So let's go
  • 0:57 - 0:58
    break right into enterprise security, and
  • 0:58 - 1:00
    let's talk about that.
  • 1:00 - 1:02
    So I come into enterprise security. We're
  • 1:02 - 1:04
    going to show what is already outcomes
  • 1:04 - 1:07
    out of the box. So if
    I go 'configure', I'm
  • 1:07 - 1:10
    in my Enterprise security
    and I come into...
  • 1:10 - 1:14
    'content', and I go to
    'content management',
  • 1:14 - 1:16
    these are all the knowledge objects that
  • 1:16 - 1:19
    come with enterprise security, and I'm
  • 1:19 - 1:23
    going to flip this to a
    correlation search.
  • 1:25 - 1:28
    I click that...
  • 1:28 - 1:30
    we can see that it's going to come back
  • 1:30 - 1:33
    with lots and lots of results, 58 pages
  • 1:33 - 1:39
    plus of them and multiple to a page. You
  • 1:39 - 1:41
    can read this, so I'm just going to go
  • 1:41 - 1:44
    into the very first one. And this is
  • 1:44 - 1:46
    'abnormally high number of endpoint
  • 1:46 - 1:50
    changes by a user'. If I go and open this
  • 1:50 - 1:52
    up a little bit...
  • 1:52 - 1:54
    'detects an abnormally high number of
  • 1:54 - 1:55
    endpoint changes by user account as it
  • 1:55 - 1:58
    relate to restarts, audits, file system,
  • 1:58 - 2:00
    user, registry, notifications".
  • 2:00 - 2:01
    If I go into this...
  • 2:02 - 2:04
    I'm actually going to be able to see
  • 2:04 - 2:07
    the query. I'm not going to go explain it
  • 2:07 - 2:08
    because I can already tell you, it's
  • 2:08 - 2:09
    probably going to be written with lots
  • 2:09 - 2:13
    of data models and macros, but out of the
  • 2:13 - 2:15
    box, you can see: here's the query. And
  • 2:15 - 2:17
    it's basically...it's going to look at
  • 2:17 - 2:19
    your data model. You'll hear me talk
  • 2:19 - 2:21
    about data models. I've discussed data
  • 2:21 - 2:23
    model, but this is going to be the
  • 2:23 - 2:25
    endpoint data model, and it's going to be
  • 2:25 - 2:28
    looking at file systems for changes by the
  • 2:28 - 2:29
    user, it's going to do a bunch of other
  • 2:29 - 2:30
    things that ultimately it's going to
  • 2:30 - 2:33
    come back and say...if you meet a certain
  • 2:33 - 2:35
    criteria, and you can see that it's
  • 2:35 - 2:36
    actually using the machine learning
  • 2:36 - 2:39
    toolkit, so down here it's actually
  • 2:39 - 2:41
    building a threshold saying, what is the
  • 2:41 - 2:44
    normal amount of use of changes, and is
  • 2:44 - 2:46
    it jumping out of that at normal level.
  • 2:46 - 2:50
    It's really cool, put some really cool
  • 2:50 - 2:52
    analytics out there for you. You can just
  • 2:52 - 2:55
    use what they've got. What I love is I
  • 2:55 - 2:57
    don't want to...I hear, oh
  • 2:57 - 3:00
    well aren't correlation searches
  • 3:00 - 3:03
    attached to now frameworks? Well, you can
  • 3:03 - 3:05
    see the very first ones.
    Sometimes they
  • 3:05 - 3:07
    are. But here, these are frameworks. I've
  • 3:07 - 3:09
    heard this in my own work,
    oh, well they're
  • 3:09 - 3:12
    all mapped to the miter. Well,
  • 3:12 - 3:14
    are they? I'll just grab the very first
  • 3:14 - 3:17
    one, and...there's no miter technique
  • 3:17 - 3:20
    mapped. What should it be? Well, there's a
  • 3:20 - 3:23
    lot of things that could cause a miter
  • 3:23 - 3:26
    technique to...uh...if there's endpoint
  • 3:26 - 3:27
    changes, it could be many different types
  • 3:27 - 3:30
    of tact. Then I'll have it mapped. You
  • 3:30 - 3:31
    could come in here and you could map it,
  • 3:31 - 3:34
    we'll discuss that later, but point is, we
  • 3:34 - 3:36
    come down here...
  • 3:36 - 3:38
    make that go away, that's all...
  • 3:38 - 3:40
    we can see that it's looking back 1,450
  • 3:40 - 3:44
    minutes, and the latest time is zero. This
  • 3:44 - 3:48
    runs at five after the hour, that's how I
  • 3:48 - 3:51
    read that, five after the hour.
  • 3:51 - 3:53
    It's...if the results are greater than
  • 3:53 - 3:57
    zero, it groups by user and change type,
  • 3:57 - 4:00
    and we see that it creates...it does not
  • 4:00 - 4:02
    create a notable, it actually just
  • 4:02 - 4:04
    provides a risk analysis. And we'll
  • 4:04 - 4:06
    discuss risk analysis when we talk about
  • 4:06 - 4:09
    RBA. But the point is, you can make it do
  • 4:09 - 4:10
    a bunch of adaptive responses.
  • 4:10 - 4:12
    My job here is not to help you
  • 4:12 - 4:14
    understand every correlation search that
  • 4:14 - 4:16
    comes out of the box, I'm here to discuss
  • 4:16 - 4:17
    the part that most people don't know how
  • 4:17 - 4:20
    to do: create your own. So I've shown you
  • 4:20 - 4:23
    that you can go look through...there's
  • 4:23 - 4:26
    the documentation on Splunk, says 1400
  • 4:26 - 4:29
    plus, I don't know how they define what a
  • 4:29 - 4:31
    correlation search is. I'm going to tell
  • 4:31 - 4:35
    you that it's a lot. There's a
  • 4:35 - 4:38
    lot of them. And by default,
  • 4:38 - 4:41
    enterprise security is smart. They do
  • 4:41 - 4:43
    not come enabled. If I look at the
  • 4:43 - 4:46
    enabled correlation searches,
  • 4:46 - 4:49
    this is mine that I was using as I
  • 4:49 - 4:50
    started to help understand
  • 4:50 - 4:51
    enterprise security,
  • 4:51 - 4:53
    and these two were turned on
  • 4:53 - 4:55
    and this is for risk-based approach.
  • 4:55 - 4:58
    Other than that, there are no correlation
  • 4:58 - 5:00
    searches that come out of the box. Why?
  • 5:00 - 5:02
    Well, one, they don't want to turn
  • 5:02 - 5:03
    something on that doesn't fit your data
  • 5:03 - 5:06
    set; two, often you have
    to tweak them, the
  • 5:06 - 5:08
    correlation search is great, but it's not
  • 5:08 - 5:09
    always going to be perfect for your
  • 5:09 - 5:11
    environment, and so as a general rule,
  • 5:11 - 5:12
    they're there as a guidance. Use them
  • 5:12 - 5:15
    when they make sense,
    turn one on, test it,
  • 5:15 - 5:17
    see how it works.
    If it doesn't, modify it,
  • 5:17 - 5:19
    and typically you'll just clone the
  • 5:19 - 5:21
    correlation search and build your own.
  • 5:21 - 5:23
    Anyway, enough talking about that, let's
  • 5:23 - 5:25
    talk about actually building my own
  • 5:25 - 5:28
    correlation search. So I'm in 'configure
  • 5:28 - 5:30
    content' and I went to
    'content management'.
  • 5:30 - 5:32
    If I do 'create new content', that's how
  • 5:32 - 5:35
    I'm going to build one. And so we're
  • 5:35 - 5:36
    going to create a new content,
  • 5:36 - 5:39
    we're going to make a correlation search.
  • 5:39 - 5:43
    This is the way that I
    do correlation searches.
  • 5:43 - 5:44
    That doesn't mean it's the way
  • 5:44 - 5:46
    that it has to be done,
    but it's the way it works for me.
  • 5:46 - 5:48
    I'm going to call this, I
  • 5:48 - 5:49
    would hopefully have a much better name
  • 5:49 - 5:52
    for this, but I'm going to do 'YouTube
  • 5:52 - 5:56
    Correlation Search'.
  • 6:01 - 6:03
    Horrible name, because someone who comes
  • 6:03 - 6:05
    across this will have no idea what it's
  • 6:05 - 6:07
    for, but for me, when I need to purge
  • 6:07 - 6:08
    stuff from my system, it's really easy
  • 6:08 - 6:10
    and it stands out. So I'm going to put it
  • 6:10 - 6:12
    that way. Then here in my description, I'm
  • 6:12 - 6:15
    going to go...
  • 6:15 - 6:19
    'Grab one event from network logs'.
  • 6:21 - 6:22
    I'm not actually going to build
  • 6:22 - 6:24
    something that I'm looking for.
  • 6:24 - 6:25
    That's not the point of this video.
  • 6:25 - 6:28
    I'm just showing how
    to build one, and I want
  • 6:28 - 6:31
    them to always fire, so I'm going to
  • 6:31 - 6:33
    fudge the numbers so that I always
  • 6:33 - 6:35
    get what I want. And so the first thing I
  • 6:35 - 6:37
    do is I don't try to build a search
  • 6:37 - 6:39
    through here. You can use a guided.
  • 6:39 - 6:41
    Guided's cool, it'll allow you it'll pick
  • 6:41 - 6:43
    data models, you can pick fields from it,
  • 6:43 - 6:46
    so if I enable the guided mode, you'll
  • 6:46 - 6:47
    see the data, it'll say alright, what
  • 6:47 - 6:50
    data model do you want to look at?
  • 6:50 - 6:52
    I might come down to 'network traffic'...
  • 6:52 - 6:55
    and what data set do I want to use...
  • 6:55 - 6:59
    'all traffic'. Do I want
    to use 'summaries only'?
  • 6:59 - 7:01
    I'll discuss summaries only later
  • 7:01 - 7:04
    this is not the place for it. Time range.
  • 7:04 - 7:08
    And there is your basic query. I can run
  • 7:08 - 7:10
    the search and see how it looks.
  • 7:10 - 7:13
    Then I'm going to hit
  • 7:14 - 7:19
    'filter', and filter would be like
  • 7:19 - 7:22
    All.Traffic...
  • 7:23 - 7:29
    AllTraffic.destIP...
  • 7:29 - 7:31
    oh.
  • 7:31 - 7:34
    it's a boolean. Where...
  • 7:35 - 7:37
    and I actually don't know how to make
  • 7:37 - 7:40
    this work. All_Traffic...
  • 7:43 - 7:45
    I'd have to go look this up. Well that's
  • 7:45 - 7:46
    not very good...helpful
    there. The point is,
  • 7:46 - 7:48
    I'm not actually going through the
  • 7:48 - 7:50
    guided search tour. I'm going to stay
  • 7:50 - 7:52
    right here with a manual query where I
  • 7:52 - 7:54
    can write it. It does have guided, again,
  • 7:54 - 7:56
    you got to understand exactly what
  • 7:56 - 7:57
    you're pulling. Guided is nice if you
  • 7:57 - 8:00
    know, follow the docs. I'm not here for
  • 8:00 - 8:02
    following the docs, I'm here to take a
  • 8:02 - 8:04
    query. This is my home network. I'm going
  • 8:04 - 8:06
    to look at the correlate logs. I'm going
  • 8:06 - 8:07
    to look at my correlate conn logs. I'm
  • 8:07 - 8:10
    going to say...where source IP is
  • 8:10 - 8:13
    192.1680.*. That is only so I make
  • 8:13 - 8:15
    sure that I'm looking at a specific
  • 8:15 - 8:18
    subnet section of my network. This is
  • 8:18 - 8:21
    primarily my network designed for doing
  • 8:21 - 8:24
    Splunk videos, and so this isn't my...
  • 8:24 - 8:25
    this is part of my home network, but it's
  • 8:25 - 8:28
    a subnet on my network that I use for
  • 8:28 - 8:31
    testing, pen testing, setup of systems
  • 8:31 - 8:33
    that I tear up and pick up and tear down,
  • 8:33 - 8:35
    and so I just want to know what they're
  • 8:35 - 8:37
    doing. And so I wanted the source IP
  • 8:37 - 8:39
    Maybe you don't want the source IP.
  • 8:39 - 8:40
    All I really cared about though, is I just
  • 8:40 - 8:42
    wanted this, because ultimately, later
  • 8:42 - 8:44
    down, I'm going to do inventory, and I'm
  • 8:44 - 8:46
    going to have a very simple inventory of
  • 8:46 - 8:48
    that subnet, and so I only want IPs that
  • 8:48 - 8:51
    at least one piece of the data
  • 8:51 - 8:53
    ties to my inventory. And so, as you can
  • 8:53 - 8:56
    see, this here has nothing to do with my
  • 8:56 - 8:58
    network, but this one does. And I'm going
  • 8:58 - 9:00
    to do a head 1, because I don't
  • 9:00 - 9:03
    want lots and lots of results.
  • 9:03 - 9:05
    Basically, I want a query
  • 9:05 - 9:07
    and I'm always going to return one
  • 9:07 - 9:10
    result...and that's what I built.
  • 9:10 - 9:12
    This isn't bad. This isn't actually a
  • 9:12 - 9:14
    known bad, I just wanted data to come
  • 9:14 - 9:16
    back, so then I can put other stuff on it.
  • 9:16 - 9:19
    I'm doing this as a demo for you guys to
  • 9:19 - 9:21
    understand how
  • 9:21 - 9:23
    to build a query. You would want to build
  • 9:23 - 9:25
    a query that actually is looking for
  • 9:25 - 9:27
    something malicious. Right now, I just
  • 9:27 - 9:30
    want a query to return a result, so that
  • 9:30 - 9:32
    I can...when I do my next video about
  • 9:32 - 9:35
    triage and the triage system, there are
  • 9:35 - 9:37
    actually tickets coming in. If I write a
  • 9:37 - 9:39
    query that's looking for bad, well, that
  • 9:39 - 9:41
    bad better be occurring on my network or
  • 9:41 - 9:43
    it's not going to fire. And so it's a lot
  • 9:43 - 9:44
    harder to troubleshoot if the thing is
  • 9:44 - 9:46
    working if you're building queries right,
  • 9:46 - 9:48
    If you build something that isn't...
  • 9:48 - 9:50
    you hope to not actually
    see on your network.
  • 9:50 - 9:53
    So I actually hope to see
    correlate conn logs.
  • 9:53 - 9:54
    I sure hope so. That means my
  • 9:54 - 9:56
    network has traffic. Anyway, and I'm just
  • 9:56 - 9:58
    going to put the head 1, because I only
  • 9:58 - 10:00
    want it to create one alert. If I let it
  • 10:00 - 10:02
    come back, it's every event that comes
  • 10:02 - 10:05
    back in here would be a notable alert.
  • 10:05 - 10:08
    I don't want my triage
    system getting inundated.
  • 10:08 - 10:10
    So I'm just going to do this head 1.
  • 10:10 - 10:12
    Now I'm going to map it. I'm going to go
  • 10:12 - 10:15
    to miter, and I'm going to
  • 10:15 - 10:18
    put in some
  • 10:18 - 10:20
    tickets. So I'm going to go 'T1143'. I
  • 10:20 - 10:22
    actually can't remember what all these
  • 10:22 - 10:23
    mean off the top of my head. You can go
  • 10:23 - 10:26
    look them up. I'm going to say this, and
  • 10:26 - 10:29
    this has note, no bases whatsoever, but
  • 10:29 - 10:31
    again, these videos are
  • 10:31 - 10:33
    going to build on themselves. And so I'm
  • 10:33 - 10:35
    building these miter attacks so when I
  • 10:35 - 10:37
    go to the RBA section of this video
  • 10:37 - 10:40
    playlist, you'll see how it maps all the
  • 10:40 - 10:42
    different techniques together. And so I'm
  • 10:42 - 10:45
    going to put this down here,
  • 10:45 - 10:49
    and actually, because
    I want this to work on
  • 10:49 - 10:51
    my system, I'm going to actually do...
  • 10:51 - 10:54
    I want it always to be 0.128,
  • 10:54 - 10:57
    that way I'm only going to get alerts
  • 10:57 - 10:59
    that are relating to this system.
  • 10:59 - 11:02
    That means my risk-based
    approach will cross
  • 11:02 - 11:04
    the threshold. That actually makes a lot
  • 11:04 - 11:06
    more sense for me. I'll explain that when
  • 11:06 - 11:09
    we actually get to RBA, but basically, I'm
  • 11:09 - 11:12
    going to give me...
    give me an alert every time
  • 11:12 - 11:15
    0.128 is the source of network traffic.
  • 11:15 - 11:18
    And that should fire off
    quite frequently.
  • 11:19 - 11:21
    Ignore the picture up in the top.
  • 11:21 - 11:24
    We're just going to move on.
    Head 1.
  • 11:24 - 11:26
    My videos are done rendering.
    Anyway, so I'm going
  • 11:26 - 11:29
    to map it to these TTPs. Again, this is
  • 11:29 - 11:31
    all for demo purposes, so I just pick
  • 11:31 - 11:36
    some TTPs, and I can come down here and
  • 11:36 - 11:39
    I can put a confidence score,
    an impact score,
  • 11:39 - 11:41
    contacts, analytics, we're just gonna
  • 11:41 - 11:42
    leave that alone for now.
  • 11:42 - 11:44
    I can create my own framework
  • 11:44 - 11:45
    And now here it's going to say
  • 11:45 - 11:47
    how far back do I want to look? Do I
  • 11:47 - 11:48
    want to look back 24 hours?
  • 11:48 - 11:50
    I could, but I know how often
  • 11:50 - 11:51
    my logs are firing. I'm going
  • 11:51 - 11:53
    to look back one hour. Doesn't really
  • 11:53 - 11:55
    matter, because I'm just grabbing head 1.
  • 11:55 - 11:59
    And...I have...I probably get
  • 11:59 - 12:02
    hundreds of events every...probably
  • 12:02 - 12:04
    thousands of events every hour
  • 12:04 - 12:06
    on this particular subnet. And so it's
  • 12:06 - 12:08
    not going to be a problem getting data.
  • 12:08 - 12:09
    I'm going to go look back one hour to
  • 12:09 - 12:12
    now. And how often do I want it to run?
  • 12:12 - 12:13
    You know what? I'm going to let it run
  • 12:13 - 12:16
    every five minutes. And that's going to
  • 12:16 - 12:18
    be important so that I actually have
  • 12:18 - 12:21
    events. And that'll work.
  • 12:21 - 12:23
    I'm going to come down here,
    and I'm going to say do I
  • 12:23 - 12:25
    want it to run as real time or
  • 12:25 - 12:29
    continuous. We'll just
    leave it at its default.
  • 12:29 - 12:31
    What's my scheduling window? Again,
  • 12:31 - 12:33
    these are...I'm not going over these, this
  • 12:33 - 12:36
    is just basically how you want to run
  • 12:36 - 12:38
    your times. I'm going to run this
  • 12:38 - 12:39
    every five minutes. Schedule priorities
  • 12:39 - 12:41
    in case there's conflicts. Hopefully with
  • 12:41 - 12:43
    your enterprise security, you actually do
  • 12:43 - 12:46
    not overload your system so these become
  • 12:46 - 12:47
    a big deal.
  • 12:47 - 12:49
    Trigger conditions, number of results
  • 12:49 - 12:50
    greater than zero, that's always going to
  • 12:50 - 12:52
    be the case because I'm getting back one.
  • 12:52 - 12:54
    But if I was doing this, if I want to do
  • 12:54 - 12:56
    thresholds I could make it...the thing has
  • 12:56 - 12:58
    to occur at least 10 times, or 15 times,
  • 12:58 - 13:01
    or whatever. Then windows durations
  • 13:01 - 13:04
    filled to group by...that's it. That's all
  • 13:04 - 13:07
    I want to deal with. Really, the only
  • 13:07 - 13:09
    places I put around with this is I wrote
  • 13:09 - 13:11
    a query in the most basic format to get
  • 13:11 - 13:13
    your correlation searches going. Pick a
  • 13:13 - 13:16
    search. I would tie it to an annotation,
  • 13:16 - 13:18
    but you don't have to, not required.
  • 13:18 - 13:20
    You come down, here pick your time window,
  • 13:20 - 13:22
    these three boxes, how far back do you
  • 13:22 - 13:24
    want to look, latest time, earliest time,
  • 13:24 - 13:26
    and your cron schedule, and then you
  • 13:26 - 13:28
    really don't have to touch anything else,
  • 13:28 - 13:32
    except this 'add adaptive response'. I'm
  • 13:32 - 13:33
    going to come and modify this in a
  • 13:33 - 13:36
    minute. There is, when we talk about RBA,
  • 13:36 - 13:38
    I'm going to put a risk analysis. For the
  • 13:38 - 13:40
    sake of keeping this simple, I am only
  • 13:40 - 13:41
    going to do
  • 13:41 - 13:44
    notables for now. So I'm going to come in
  • 13:44 - 13:45
    here and I'm going to click a notable.
  • 13:45 - 13:47
    A notable is an alert that goes to
  • 13:47 - 13:49
    your triage system.
  • 13:49 - 13:52
    Gonna go...'YouTube
  • 13:52 - 13:55
    notable'. Give it a description.
  • 13:55 - 13:58
    I can actually use...
  • 14:00 - 14:02
    variable substitution, so I'm going to do
  • 14:02 - 14:06
    'Alert for $src_Ip'.
  • 14:06 - 14:08
    I need to make sure that field comes
  • 14:08 - 14:11
    back, and this does have a source IP, so I
  • 14:11 - 14:13
    can use it, and you just call it like you
  • 14:13 - 14:15
    do in with the dollar sign on both sides
  • 14:15 - 14:17
    of a variable, and that'll be dynamic. And
  • 14:17 - 14:20
    so my description will come back with
  • 14:20 - 14:23
    this. And just because I
  • 14:23 - 14:25
    want to, what if I...yeah, we'll just
  • 14:25 - 14:26
    leave it at that.
  • 14:26 - 14:29
    YouTube notable security domain. There
  • 14:29 - 14:31
    are a bunch of domains. This is dealing
  • 14:31 - 14:34
    with access areas, that would be
  • 14:34 - 14:36
    authentication, endpoint, a lot of your
  • 14:36 - 14:39
    host logs, network logs, threat, identity,
  • 14:39 - 14:41
    and audit. And so those are the six areas
  • 14:41 - 14:44
    Splunk has as security domains. We'll
  • 14:44 - 14:48
    just leave it as a...
    we'll put as a network.
  • 14:48 - 14:50
    In the network domain, I'm going to put
  • 14:50 - 14:53
    the severity
  • 14:54 - 14:56
    as low.
  • 14:56 - 14:59
    And default owner, I can put in these,
  • 14:59 - 15:02
    I can leave it unassigned.
  • 15:02 - 15:04
    I'm going to put it as
    unassigned to start with.
  • 15:04 - 15:05
    Again, you don't have to.
  • 15:05 - 15:09
    Default status, I'm going to
    put it as unassigned.
  • 15:09 - 15:11
    And I could put a drill down search in
  • 15:11 - 15:15
    there, and let's do that.
  • 15:15 - 15:18
    We're going to take this very same query.
  • 15:18 - 15:20
    Just to keep things really simple, one of
  • 15:20 - 15:24
    the very first drill downs
    I want to put in there
  • 15:24 - 15:26
    is the actual query
  • 15:26 - 15:29
    that created this log.
  • 15:29 - 15:31
    But in this case, I'm not going to put
  • 15:31 - 15:33
    head 1, I'm going to put...I'm going to
  • 15:33 - 15:34
    take the head out.
  • 15:34 - 15:36
    Oh, it looks like I've lost the 128 on
  • 15:36 - 15:39
    there. 128.
  • 15:39 - 15:41
    Make sure 128 is up here.
  • 15:41 - 15:44
    Yeah, it is. Okay, and I can choose...
  • 15:44 - 15:46
    the drill down search will be
  • 15:46 - 15:49
    'See...
  • 15:49 - 15:54
    what caused alert'.
  • 15:55 - 15:57
    There are other ways of doing this I'll
  • 15:57 - 15:58
    show, but I'm just going to
  • 15:58 - 16:00
    create a few add drill down searches.
  • 16:00 - 16:02
    And here, we're going to just do
  • 16:05 - 16:08
    'why does
  • 16:08 - 16:10
    this
  • 16:10 - 16:14
    drilldown exist'.
  • 16:15 - 16:18
    I just want to show
    I can go search anything.
  • 16:18 - 16:21
    'Index equals internal'.
  • 16:21 - 16:23
    Why would you be looking at your
  • 16:23 - 16:26
    internal logs? It doesn't really matter.
  • 16:28 - 16:30
    Well, actually, let's just do this.
  • 16:30 - 16:33
    I'm going to put in '$src_ip$'.
  • 16:33 - 16:35
    So I'm basically looking in my internal
  • 16:35 - 16:37
    logs, and I'm going to see if I find that
  • 16:37 - 16:40
    IP address popping up. It's just kind
  • 16:40 - 16:42
    of an interesting way you can add
  • 16:42 - 16:46
    additional searches to your information.
  • 16:46 - 16:48
    So I'm going to be searching my internal
  • 16:48 - 16:50
    logs for the source IP.
  • 16:50 - 16:53
    And I hope you saw this earliest offset,
  • 16:53 - 16:56
    latest offset. You can change this, or you
  • 16:56 - 16:58
    can you can let it just go by its
  • 16:58 - 17:00
    default. Or you can say, for here I'm
  • 17:00 - 17:01
    going to go
  • 17:01 - 17:06
    plus, this is a earliest,
    for example, one hour
  • 17:06 - 17:11
    and I'm going to leave
    the other one as zero.
  • 17:11 - 17:12
    Does that make sense? So I hope
  • 17:12 - 17:15
    this helps. I can change my time.
  • 17:15 - 17:16
    It's basically going to look in this
  • 17:16 - 17:22
    window one hour back, based off of
  • 17:25 - 17:28
    the time this event occurred.
  • 17:28 - 17:29
    So this might actually look a little bit
  • 17:29 - 17:30
    in the future, this is
    gonna look a little bit
  • 17:30 - 17:31
    in the future.
  • 17:31 - 17:32
    It's going to use time in the back.
  • 17:32 - 17:35
    So let's go...
  • 17:36 - 17:37
    we're going to go one hour....
  • 17:37 - 17:40
    this is going to go one hour in the
  • 17:40 - 17:43
    future and one hour in the past.
  • 17:43 - 17:46
    Sounds good. I'm going to leave my
  • 17:46 - 17:48
    investigation profile alone. And these
  • 17:48 - 17:51
    are...extractions, and what it's
  • 17:51 - 17:52
    going to do is it's going to
  • 17:52 - 17:56
    identify identities, these are users
  • 17:56 - 17:57
    and stuff like that on your network.
  • 17:57 - 18:00
    Assets would be like IPs, and machines,
  • 18:00 - 18:03
    and files, and URLs that it might have
  • 18:03 - 18:06
    found. I'm going to...we got assets here.
  • 18:06 - 18:09
    Source dest.
  • 18:09 - 18:10
    Does my log, do my logs contain
  • 18:10 - 18:12
    source and dest?
  • 18:12 - 18:15
    Well, let's go look. Had one, do I actually
  • 18:15 - 18:18
    have a source and a dest here?
  • 18:18 - 18:21
    I have a source IP, but no source.
  • 18:21 - 18:23
    So I don't have the
    field it's looking for to
  • 18:23 - 18:25
    be able to identify it. So what I need to
  • 18:25 - 18:28
    do is I need to come in here,
    and I'm going to go
  • 18:28 - 18:31
    '$src_ip$',
  • 18:31 - 18:34
    except it's on identity.
  • 18:34 - 18:36
    The identity...it's an asset so I'm going,
  • 18:36 - 18:37
    to come in here and I'm going to go
  • 18:37 - 18:40
    'source IP'.
  • 18:40 - 18:43
    And just because we might
  • 18:43 - 18:46
    want to identify the other
  • 18:46 - 18:47
    machine in question.
  • 18:47 - 18:49
    We're going to put dest
    IP in there as well.
  • 18:49 - 18:51
    So I'm going to have my source IP
  • 18:51 - 18:52
    and my destination IP.
  • 18:52 - 18:54
    They're going to be assets that are
  • 18:54 - 18:56
    extracted. And that's all I'm going to do.
  • 18:56 - 18:58
    I just want to make sure that
  • 18:58 - 19:00
    anything that might be identifiable in
  • 19:00 - 19:01
    these queries...not these queries,
  • 19:01 - 19:04
    the query up here. Let's call them out.
  • 19:04 - 19:06
    And I hope all this
    will make more sense as
  • 19:06 - 19:07
    you actually see the stuff come back.
  • 19:07 - 19:09
    There's just a lot of capabilities here.
  • 19:09 - 19:13
    I can write steps if I want to, I can set
  • 19:13 - 19:15
    things up to, for example, send an
  • 19:15 - 19:18
    email, stream capture if you have
  • 19:18 - 19:20
    Splunk Stream, nbstat and it's...
  • 19:20 - 19:22
    You can make your system do a lot of
  • 19:22 - 19:24
    things. Like, I could have Splunk go ping
  • 19:24 - 19:26
    an IP address. You know what?
  • 19:26 - 19:28
    In a little bit, I'll actually show me
  • 19:28 - 19:30
    doing that. I can have it do a risk
  • 19:30 - 19:32
    analysis, run a scripts,
    send a UBA, send a
  • 19:32 - 19:34
    Splunk mobile. Splunk mobile is really
  • 19:34 - 19:37
    cool. Now it's being sent to my phone. Add
  • 19:37 - 19:39
    thread intelligence from it, web hooks,
  • 19:39 - 19:41
    whatever. You have a lots of capabilities,
  • 19:41 - 19:44
    don't need to do it. The minimum you
  • 19:44 - 19:45
    need for a notable:
  • 19:45 - 19:48
    title, description,
  • 19:48 - 19:50
    you don't even need these drilldowns,
  • 19:50 - 19:52
    you can let this be set as default,
  • 19:52 - 19:54
    probably should pick a security domain,
  • 19:54 - 19:58
    and literally, that's it.
    Make sure...it's a
  • 19:58 - 19:59
    lot more helpful if you can identify
  • 19:59 - 20:01
    your stuff coming back as identities and
  • 20:01 - 20:03
    sources. And I'm going to show you that
  • 20:03 - 20:06
    in the next video with workbenches and
  • 20:06 - 20:08
    stuff like that, but for the sake of this,
  • 20:08 - 20:09
    don't worry about it.
  • 20:09 - 20:11
    Just know that it's it's good if you
  • 20:11 - 20:13
    can call it out, but if you don't,
  • 20:13 - 20:15
    it's not like the query will break.
  • 20:15 - 20:18
    I'm going to hit save,
  • 20:18 - 20:21
    and I should have a
    correlation search done.
  • 20:21 - 20:22
    Now I'm going to have to wait.
  • 20:22 - 20:25
    I probably just missed my window. It's
  • 20:25 - 20:28
    supposed to be kicking off
    five minutes after the hour,
  • 20:28 - 20:31
    so I can almost guarantee that if I come
  • 20:31 - 20:35
    to incident review,
    I will not find an alert
  • 20:35 - 20:39
    called 'YouTube notable'.
  • 20:39 - 20:41
    I'm gonna have to wait 'til five more
  • 20:41 - 20:43
    minutes go by, but let's go ahead and
  • 20:43 - 20:45
    check that. So I can come down, I can
  • 20:45 - 20:47
    refresh the page here, or I can refresh
  • 20:47 - 20:50
    the page here. But either way, that is not
  • 20:50 - 20:52
    the purpose of this video is to look at
  • 20:52 - 20:54
    the incidents coming in. Mine was to talk
  • 20:54 - 20:56
    about correlation searches and how to
  • 20:56 - 20:58
    make my own. I have set up a correlation
  • 20:58 - 21:01
    search, and so I've accomplished my task.
  • 21:01 - 21:03
    I'm gonna come see it here
  • 21:03 - 21:07
    with a configure content.
  • 21:07 - 21:10
    Configure content, content management.
  • 21:10 - 21:13
    My new correlation search is in here.
  • 21:13 - 21:17
    We can see that when I go
    'all correlation search'...
  • 21:17 - 21:19
    And when you create them, by default,
  • 21:19 - 21:21
    they are enabled.
  • 21:21 - 21:24
    So if I come in here and I enable,
  • 21:24 - 21:27
    I can see 'YouTube correlation search'
    for Lame Creations.
  • 21:27 - 21:30
    If I want to make any changes to it,
  • 21:30 - 21:32
    I just hit search. Now, that's interesting
  • 21:32 - 21:36
    that it doesn't say that
    it's actually scheduled.
  • 21:41 - 21:43
    Alright, well, probably because it
  • 21:43 - 21:45
    hasn't run the very first time. Once it
  • 21:45 - 21:47
    runs, I should see
  • 21:47 - 21:49
    here the next schedule time.
  • 21:49 - 21:51
    But it's really easy,
  • 21:51 - 21:54
    just keep it under the enabled
  • 21:55 - 21:58
    and correlation searches.
  • 21:58 - 22:00
    So...yep, there it is.
  • 22:00 - 22:03
    Now I've got a time for
    the next scheduled time.
  • 22:03 - 22:04
    stored in the Enterprise Security app.
  • 22:04 - 22:06
    What have we covered?
  • 22:06 - 22:08
    We've talked about correlation searches,
  • 22:08 - 22:09
    what they are, they're safe
  • 22:09 - 22:12
    searches that can be used to create
  • 22:12 - 22:15
    notables. Notables fill out tickets that
  • 22:15 - 22:18
    will go into a ticket triaging
  • 22:18 - 22:20
    system, which we will cover in the next
  • 22:20 - 22:22
    video in this playlist. Please look at
  • 22:22 - 22:23
    the link below, notice that this is a
  • 22:23 - 22:25
    playlist. Go ahead and join the playlist
  • 22:25 - 22:27
    and watch the videos. This is meant to be
  • 22:27 - 22:29
    a comprehensive training to help you
  • 22:29 - 22:32
    understand enterprise security.
  • 22:32 - 22:35
    Click that link. We have now....I've
  • 22:35 - 22:36
    shown you how to see the correlation
  • 22:36 - 22:38
    search that come out of the box, and I've
  • 22:38 - 22:40
    shown you how to create your own from
  • 22:40 - 22:42
    scratch. I hope this has been helpful, I
  • 22:42 - 22:44
    hope this helps you move from being a
  • 22:44 - 22:47
    lame analyst to a Splunk Ninja, that
  • 22:47 - 22:49
    you'll keep following, particularly this
  • 22:49 - 22:51
    playlist, watch the videos in it, and that
  • 22:51 - 22:52
    they're helpful.
  • 22:52 - 22:55
    Anyway, hope to see you around.
Title:
Splunk Enterprise Security Free Training | Correlation Searches
Description:

more » « less
Video Language:
English
Duration:
22:55

English subtitles

Revisions Compare revisions