You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: This analytic uses the 3-sigma approach to detect a distributed password spray attack. Utilising the authentication datamodel this detection is affective for all CIM mapped authication events.
11
+
search: '| tstats `security_content_summariesonly` dc(Authentication.user) AS unique_accounts dc(Authentication.src) as unique_src count(Authentication.user) as total_failures from datamodel=Authentication.Authentication where Authentication.action="failure" by Authentication.action, Authentication.signature_id, sourcetype, _time span=2m
12
+
| `drop_dm_object_name("Authentication")`
13
+
```fill out time buckets for 0-count events during entire search length```
``` Create aggregation field & apply to all null events```
20
+
| eval counter=sourcetype+"__"+signature_id
21
+
| eventstats values(counter) as fnscounter | eval counter=coalesce(counter,fnscounter)
22
+
``` 3-sigma detection logic ```
23
+
| eventstats avg(unique_accounts) as comp_avg_user , stdev(unique_accounts) as comp_std_user avg(unique_src) as comp_avg_src , stdev(unique_src) as comp_std_src by counter
how_to_implement: Ensure in-scope authentication data is CIM mapped and the src field is populated with the source device. Also ensure fill_nullvalue is set within the macro security_content_summariesonly.
33
+
known_false_positives: It is common to see a spike of legitimate failed authentication events on monday mornings.
0 commit comments