Open robojockjb opened 1 year ago
The scheduled search, naturally, would be in savedsearches.conf. For the current version of the app it appears the search that populates the index is in the last stanza. The search is disabled by the default. You can enable the search in savedsearches.conf by flipping the enableSched spec value from 0 to 1. Otherwise, you can do so in the UI. Either way, once the scheduled search is enabled you should expect events in the index, if the index exists, in approx. 15 minutes.
As above ,I changed the enableSched from 0 to 1, however, there is no data on dashboard of "about the app":
Although I reboot PC of restart splunk, there is no data in threathunting index as follows: The data of threathunting is from index=windows, is it right?
Also, I changed register of ID 1103 from Appinit_dlls=0 to Appinit_dlls=1, As expected, there is a EventCode=13 in search, however, remaining no data in threathunting overview:
In your second screenshot it shows that the splunk add-on for sysmon is not installed on your splunk search head. Please install that app on your search head as searches/dashboards all throughout Threathunting app key off enriched fields from both the Sysmon and Windows apps.
In your fifth screenshot it is apparent that sysmon events are not rendering as xml. Perhaps there are still local changes that need to be removed from your endpoint. Please run the following command and share output to help asses whether there are conflicting configuration specifications on your forwarder:
.\
no use to install sysmon add on app:
I use local splunk without forward,the the command is as follows: C:\Program Files\Splunk\bin>splunk cmd btool inputs list --debug C:\Program Files\Splunk\bin>splunk cmd btool inputs list --debug C:\Program Files\Splunk\etc\system\default\inputs.conf [SSL] C:\Program Files\Splunk\etc\system\default\inputs.conf _rcvbuf = 1572864 C:\Program Files\Splunk\etc\system\default\inputs.conf allowSslRenegotiation = true C:\Program Files\Splunk\etc\system\default\inputs.conf certLogMaxCacheEntries = 10000 C:\Program Files\Splunk\etc\system\default\inputs.conf certLogRepeatFrequency = 1d C:\Program Files\Splunk\etc\system\default\inputs.conf cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256 C:\Program Files\Splunk\etc\system\default\inputs.conf ecdhCurves = prime256v1, secp384r1, secp521r1 C:\Program Files\Splunk\etc\system\default\inputs.conf evt_dc_name = C:\Program Files\Splunk\etc\system\default\inputs.conf evt_dns_name = C:\Program Files\Splunk\etc\system\default\inputs.conf evt_resolve_ad_obj = 0 C:\Program Files\Splunk\etc\system\default\inputs.conf host = $decideOnStartup C:\Program Files\Splunk\etc\system\default\inputs.conf index = default C:\Program Files\Splunk\etc\system\default\inputs.conf logCertificateData = true C:\Program Files\Splunk\etc\system\default\inputs.conf sslQuietShutdown = false C:\Program Files\Splunk\etc\system\default\inputs.conf sslVersions = tls1.2 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf [WinEventLog://Application] C:\Program Files\Splunk\etc\apps\search\local\inputs.conf checkpointInterval = 5 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf current_only = 0 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf disabled = 0 C:\Program Files\Splunk\etc\system\default\inputs.conf evt_dc_name = C:\Program Files\Splunk\etc\system\default\inputs.conf evt_dns_name = C:\Program Files\Splunk\etc\system\default\inputs.conf evt_resolve_ad_obj = 0 host = $decideOnStartup C:\Program Files\Splunk\etc\apps\search\local\inputs.conf index = windows C:\Program Files\Splunk\etc\system\default\inputs.conf interval = 60 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf start_from = oldest C:\Program Files\Splunk\etc\apps\search\local\inputs.conf [WinEventLog://ForwardedEvents] C:\Program Files\Splunk\etc\apps\search\local\inputs.conf checkpointInterval = 5 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf current_only = 0 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf disabled = 0 C:\Program Files\Splunk\etc\system\default\inputs.conf evt_dc_name = C:\Program Files\Splunk\etc\system\default\inputs.conf evt_dns_name = C:\Program Files\Splunk\etc\system\default\inputs.conf evt_resolve_ad_obj = 0 host = $decideOnStartup C:\Program Files\Splunk\etc\apps\search\local\inputs.conf index = windows C:\Program Files\Splunk\etc\system\default\inputs.conf interval = 60 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf start_from = oldest C:\Program Files\Splunk\etc\apps\search\local\inputs.conf [WinEventLog://Microsoft-Windows-Sysmon/Operational] C:\Program Files\Splunk\etc\apps\search\local\inputs.conf checkpointInterval = 5 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf current_only = 0 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf disabled = 0 C:\Program Files\Splunk\etc\system\default\inputs.conf evt_dc_name = C:\Program Files\Splunk\etc\system\default\inputs.conf evt_dns_name = C:\Program Files\Splunk\etc\system\default\inputs.conf evt_resolve_ad_obj = 0 host = $decideOnStartup C:\Program Files\Splunk\etc\apps\search\local\inputs.conf index = windows C:\Program Files\Splunk\etc\system\default\inputs.conf interval = 60 C:\Program Files\Splunk\etc\apps\Splunk_TA_microsoft_sysmon\default\inputs.conf renderXml = 1 C:\Program Files\Splunk\etc\apps\Splunk_TA_microsoft_sysmon\default\inputs.conf source = XmlWinEventLog:Microsoft-Windows-Sysmon/Operational C:\Program Files\Splunk\etc\apps\search\local\inputs.conf start_from = oldest C:\Program Files\Splunk\etc\apps\search\local\inputs.conf [WinEventLog://Security] C:\Program Files\Splunk\etc\apps\search\local\inputs.conf checkpointInterval = 5 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf current_only = 0 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf disabled = 0 C:\Program Files\Splunk\etc\system\default\inputs.conf evt_dc_name = C:\Program Files\Splunk\etc\system\default\inputs.conf evt_dns_name = C:\Program Files\Splunk\etc\system\default\inputs.conf evt_resolve_ad_obj = 0 host = $decideOnStartup C:\Program Files\Splunk\etc\apps\search\local\inputs.conf index = windows C:\Program Files\Splunk\etc\system\default\inputs.conf interval = 60 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf start_from = oldest C:\Program Files\Splunk\etc\apps\search\local\inputs.conf [WinEventLog://Setup] C:\Program Files\Splunk\etc\apps\search\local\inputs.conf checkpointInterval = 5 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf current_only = 0 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf disabled = 0 C:\Program Files\Splunk\etc\system\default\inputs.conf evt_dc_name = C:\Program Files\Splunk\etc\system\default\inputs.conf evt_dns_name = C:\Program Files\Splunk\etc\system\default\inputs.conf evt_resolve_ad_obj = 0 host = $decideOnStartup C:\Program Files\Splunk\etc\apps\search\local\inputs.conf index = windows C:\Program Files\Splunk\etc\system\default\inputs.conf interval = 60 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf start_from = oldest C:\Program Files\Splunk\etc\apps\search\local\inputs.conf [WinEventLog://System] C:\Program Files\Splunk\etc\apps\search\local\inputs.conf checkpointInterval = 5 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf current_only = 0 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf disabled = 0 C:\Program Files\Splunk\etc\system\default\inputs.conf evt_dc_name = C:\Program Files\Splunk\etc\system\default\inputs.conf evt_dns_name = C:\Program Files\Splunk\etc\system\default\inputs.conf evt_resolve_ad_obj = 0 host = $decideOnStartup C:\Program Files\Splunk\etc\apps\search\local\inputs.conf index = windows C:\Program Files\Splunk\etc\system\default\inputs.conf interval = 60 C:\Program Files\Splunk\etc\apps\search\local\inputs.conf start_from = oldest C:\Program Files\Splunk\etc\apps\Splunk_TA_microsoft_sysmon\default\inputs.conf [WinEventLog://WEC-Sysmon] C:\Program Files\Splunk\etc\apps\Splunk_TA_microsoft_sysmon\default\inputs.conf disabled = true C:\Program Files\Splunk\etc\system\default\inputs.conf evt_dc_name = C:\Program Files\Splunk\etc\system\default\inputs.conf evt_dns_name = C:\Program Files\Splunk\etc\system\default\inputs.conf evt_resolve_ad_obj = 0 C:\Program Files\Splunk\etc\apps\Splunk_TA_microsoft_sysmon\default\inputs.conf host = WinEventLogForwardHost index = default C:\Program Files\Splunk\etc\system\default\inputs.conf interval = 60 C:\Program Files\Splunk\etc\apps\Splunk_TA_microsoft_sysmon\default\inputs.conf renderXml = 1 C:\Program Files\Splunk\etc\apps\Splunk_TA_microsoft_sysmon\default\inputs.conf source = XmlWinEventLog:Microsoft-Windows-Sysmon/Operational C:\Program Files\Splunk\etc\apps\Splunk_TA_microsoft_sysmon\default\inputs.conf sourcetype = XmlWinEventLog:WEC-Sysmon C:\Program Files\Splunk\etc\system\default\inputs.conf [batch://C:\Program Files\Splunk\var\run\splunk\search_telemetry*search_telemetry.json] C:\Program Files\Splunk\etc\system\default\inputs.conf _rcvbuf = 1572864 C:\Program Files\Splunk\etc\system\default\inputs.conf crcSalt =
This btool output is from an install of splunk server. Is your splunk server windows-based having sysmon installed and configured? If so, cool. -Resultant config for sysmon inputs looks good enough but here's how I would express those settings instead. Please also share output of the following command line statement: sysmon.exe -c
remove this entry - C:\Program Files\Splunk\etc\apps\search\local\inputs.conf [WinEventLog://Microsoft-Windows-Sysmon/Operational] remove this entry - C:\Program Files\Splunk\etc\apps\search\local\inputs.conf index = windows add this entry - C:\Program Files\Splunk\etc\apps\Splunk_TA_microsoft_sysmon\local\inputs.conf [WinEventLog://Microsoft-Windows-Sysmon/Operational] add this entry - C:\Program Files\Splunk\etc\apps\Splunk_TA_microsoft_sysmon\local\inputs.conf index = windows
Edited
I reinstall the splunk. As above, there is no threathunting_file_summary.
I add index for threathunting app with windows、threathunting and threathunting_file_summary. Restart the splunk, nothing changed, remains no threathunting_file_summary, no activity on overview of threathunting app.
I changed the inputs.conf from path C:\Program Files\Splunk\etc\apps\Splunk_TA_microsoft_sysmon\default And then copy the inputs.conf to ..\local\
restart the splunk again. Via the index, I can see the logs from index=windows, but threathunting and threathunting is 0, and "about the app" remains no threathunting_file_summary option.
I changed the register via ID 1103 about Appinit_dlls something. Via search , I can see the log: However, there is no data and activity:
Your events are still not formatted as xml. With events not formatted as xml it is no surprise dashboards are all rendering zeros.
I mentioned earlier that you should not make modifications to configuration files in the default folder provided in vendor apps. Instead, your custom entries for sysmon inputs should be in local.
The inputs.conf in default for sysmon should look exactly like this:
WinEventLog://Microsoft-Windows-Sysmon/Operational] disabled = false renderXml = 1 source = XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
The screenshot you provided showing defaullt\inputs.conf had two sections in it for sysmon.. The second section had an incorrrect renderXml value as well as an incorrect source value. That whole second section should be removed.
The inputs.conf in local folder for sysmon should look like this:
[WinEventLog://Microsoft-Windows-Sysmon/Operational] index = windows
Still not work sir.
1.C:\Program Files\Splunk\etc\apps\Splunk_TA_microsoft_sysmon\default\inputs.conf
[WinEventLog://Microsoft-Windows-Sysmon/Operational] disabled = false renderXml = 1 source = XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
[WinEventLog://WEC-Sysmon] disabled = true renderXml = 1 source = XmlWinEventLog:Microsoft-Windows-Sysmon/Operational sourcetype = XmlWinEventLog:WEC-Sysmon host = WinEventLogForwardHost
2.C:\Program Files\Splunk\etc\apps\Splunk_TA_microsoft_sysmon\local\inputs.conf
[WinEventLog://Microsoft-Windows-Sysmon/Operational] index=windows
3.indexes I added three indexes:windows、threathunting and threathunting_file_summary
4.macros
5.enableSched C:\Program Files\Splunk\etc\apps\ThreatHunting\default\savedsearches.conf As above, I changed value of enableSched from 0 to 1.
7.reason:threathunting_file_summay is empty In fact, in index=windows, there is logs, however, no data of index=threathunting and no data of index=threathunting_file_summary.
Is it related to the warning?
no, still related to the structure of your events
the event displayed in your screenshot still has non-xml structure. the source field in the event does not have the xml prefix which should be preserved from your input by now. the sourcetype field in the event does not have xmlwinevent log which should there as a result of correct source field and transforms from splunk app for windows.
please share output of cmdline: .\splunk\cmd btool inputs list -- debug
please share output of cmdline: sysmon.exe -c
please share output of splunk search: sysmon
| head 1
note: sysmon should be surrounded by backticks in search.
I feel confused,I give up for now. Thanks for your reply.
By the way, the link https://www.linkedin.com/pulse/attckized-splunk-kirtar-oza-cissp-cisa-ms-/ is out of service, Could you update it and give another link(for example,just in the github repo).
In fact , what confused me hardly is that I have activity and data but can not show on the dashboard, what is the design of background, via savedsearches、threathunting_file_summary?
no, still related to the structure of your events
You are wrong. I resign the owners of alert above, and then, I have activity and datas on dashboard, but remains 0(So shit..)
Maybe, the most reliable reason is that, the savedsearches cannot identify the log above. If so, that will be a waste of time.
Good idea on taking break to build perspective.
threathunting_file_summary index is empty. Everything else works fine. It may be that a search is populating it, but I cannot find the search.