Splunk Alerts and Dashboards - serate-actual/sec350final GitHub Wiki
Failed/Successful Logins
- Use this search
source="wineventlog:security" EventCode=4625 OR EventCode=4624
- 4624s are successful logins, and 4625s are unsuccessful logins.
- Create a pivot table
- Add the Host field. This is important to distinguish between the hosts
- Select the Bar chart
- Set the Color field to be dependent upon the EventCode
- Set the Y axis to be dependent upon the count of events
- Add this to the Overview dashboards created in previous tutorials'
- For increased precision, add another pivot table with the same data, but insert it as a table
Editing config files on log01
- Create a search for
host="log01" type="PATH" name="/etc/sudoers.d*" OR name="/etc/ssh*" OR name="/etc/sudoers"
- Create a pivot table
- Create a line graph visualization, and set the color to be changed by the name field, allowing you to pinpoint the lifecycle of each file.
Alteration of ImportantFiles.txt chart
- Do a field extraction on a log with sourcetype="ImportantFilesVandalism"
- Extract the whole body of the log, which should just be the text which was added
- Create a pivot table for the search
sourcetype="ImportantFilesVandalism"
- Create a "Single Value" dashboard, and set the value to NewText
- Select the Latest option for the value
- Save this to your
Adding Alert Reports to the dashboard
- Add the alert reports for the following alerts to your dashboard
- /etc/ssh altered
- ImportantFiles.txt on USR01 was altered