Incident Response splunk filters
List All Indexes
| eventcount summarize=false index=*
| stats count by index
| rest /services/data/indexes
| table titleIdentify Available Sourcetypes
| metadata type=sourcetypes
| table sourcetype, totalCount
| metadata type=sources
| table source totalCount firstTime lastTimeExplore the Fields in Your Data
| eventcount summarize=false index=*
| fields *
| stats count by sourcetype
Search for Specific Event Types (e.g., Security Logs):
index=windows sourcetype=WinEventLog:Security
| stats count by EventCode
index="botsv1" sourcetype=WinEventLog
| stats count by EventCode,source
| rename count as total_count
| sort - total_count
Check for Sysmon Logs:
index=sysmon sourcetype=XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
| stats count by EventCodeList Data Sources by Host:
SPL Basic Structure
1. dc(field)
dc(field)2. sum(field)
sum(field)3. iplocation
iplocation4. dedup
4. dedup5. eval
5. eval6. timechart count BY <field>
timechart count BY <field>7. rename
7. rename Network Connections
Identifying Brute Force Attacks
Detecting File Uploads
LOGON activity
Detect Changes to High-Value Accounts
Privilege Escalation Detection
Monitoring Malicious File Execution
Scheduled Task
Persistence Registry Detection
PowerShell Detection
Lateral Movement & Pivot Detection
Golden Ticket Attack Detection
Kerberoasting Attack Detection
Last updated