I'm working on a use case to detect unusual increases in interactive logins to Windows machines, indicating potential lateral movement (MITRE T1021). To achieve this, I’m using a tstats search on the authentication data model, leveraging standard deviation to calculate dynamic thresholds by user and asset. If these thresholds are breached, an alert is triggered. 🚨
Here’s a more detailed look at the SPL I’m using:
| tstats summariesonly=true dc(Authentication.dest) as device_count from datamodel=Authentication where Authentication.action=success AND source=WinEventLog:Security AND NOT Authentication.user IN ("DWM-*" "UMFD-*") by _time span=1d Authentication.user
| eventstats avg(device_count) as avg_devices stdev(device_count) as stdev_devices by Authentication.user
| eval threshold=avg_devices + 2.5*stdev_devices
| where device_count > threshold AND stdev_devices > 1
This approach helps in identifying potential security threats by dynamically adjusting thresholds based on user and asset behavior.
Interested in the SPL or need it for another SIEM system? Drop a comment or DM me! 💬
#Splunk #SIEM #InfoSec #MITRE #CyberSecurity #TechTuesday #ThreatDetection