Skip to content

Commit a980709

Browse files
committed
Modified macro name for clarity, updated how to implements with details
1 parent fe60627 commit a980709

7 files changed

+30
-13
lines changed

detections/endpoint/detect_remote_access_software_usage_file.yml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,15 +21,18 @@ search: '| tstats `security_content_summariesonly` count, min(_time) as firstTim
2121
| `security_content_ctime(lastTime)` | `drop_dm_object_name(Filesystem)` | lookup
2222
remote_access_software remote_utility AS file_name OUTPUT isutility, description
2323
as signature, comment_reference as desc, category | search isutility = TRUE
24-
| `remote_access_software_usage_exception_filter` | `detect_remote_access_software_usage_file_filter`'
24+
| `remote_access_software_usage_exceptions` | `detect_remote_access_software_usage_file_filter`'
2525
how_to_implement: The detection is based on data that originates from Endpoint Detection
2626
and Response (EDR) agents. These agents are designed to provide security-related
2727
telemetry from the endpoints where the agent is installed. To implement this search,
2828
you must ingest logs that contain the file path, file name, and the user that created
2929
the file. These logs must be processed using the appropriate Splunk Technology Add-ons
3030
that are specific to the EDR product. The logs must also be mapped to the `Filesystem`
3131
node of the `Endpoint` data model. Use the Splunk Common Information Model (CIM)
32-
to normalize the field names and speed up the data modeling process.
32+
to normalize the field names and speed up the data modeling process. The "exceptions"
33+
macro leverages both an Assets and Identities lookup, as well as a KVStore collection
34+
called "remote_software_exceptions" that lets you track and maintain device-based
35+
exceptions for this set of detections.
3336
known_false_positives: Known or approved applications used by the organization or
3437
usage of built-in functions. Known false positives can be added to the
3538
remote_access_software_usage_exception.csv lookup to globally suppress these

detections/endpoint/detect_remote_access_software_usage_fileinfo.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,12 @@ search: '`sysmon` EventCode=1 | stats count min(_time) as firstTime max(_time) a
2020
lastTime, values(Company) as Company values(Product) as Product by dest, user, parent_process_name,
2121
process_name, process | lookup remote_access_software remote_utility_fileinfo AS
2222
Product OUTPUT isutility, description as signature, comment_reference as desc, category
23-
| search isutility = True | `remote_access_software_usage_exception_filter` | `detect_remote_access_software_usage_fileinfo_filter`'
23+
| search isutility = True | `remote_access_software_usage_exceptions` | `detect_remote_access_software_usage_fileinfo_filter`'
2424
how_to_implement: This analytic relies on Sysmon to be properly installed and utilized
2525
in the environment. Ensure that proper logging is setup for Sysmon and data is being
26-
ingested into Splunk.
26+
ingested into Splunk. The "exceptions" macro leverages both an Assets and Identities
27+
lookup, as well as a KVStore collection named "remote_software_exceptions"
28+
that lets you track and maintain device-based exceptions for this set of detections.
2729
known_false_positives: Known or approved applications used by the organization or
2830
usage of built-in functions. Known false positives can be added to the remote_access_software_usage_exception.csv
2931
lookup to globally suppress these situations across all remote access content

detections/endpoint/detect_remote_access_software_usage_process.yml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
2323
Processes.process_name Processes.process | `security_content_ctime(firstTime)` |
2424
`security_content_ctime(lastTime)` | `drop_dm_object_name(Processes)` | lookup remote_access_software
2525
remote_utility AS process_name OUTPUT isutility, description as signature, comment_reference
26-
as desc, category | search isutility = True | `remote_access_software_usage_exception_filter` | `detect_remote_access_software_usage_process_filter`'
26+
as desc, category | search isutility = True | `remote_access_software_usage_exceptions` | `detect_remote_access_software_usage_process_filter`'
2727
how_to_implement: The detection is based on data that originates from Endpoint Detection
2828
and Response (EDR) agents. These agents are designed to provide security-related
2929
telemetry from the endpoints where the agent is installed. To implement this search,
@@ -32,7 +32,10 @@ how_to_implement: The detection is based on data that originates from Endpoint D
3232
be processed using the appropriate Splunk Technology Add-ons that are specific to
3333
the EDR product. The logs must also be mapped to the `Processes` node of the `Endpoint`
3434
data model. Use the Splunk Common Information Model (CIM) to normalize the field
35-
names and speed up the data modeling process.
35+
names and speed up the data modeling process. The "exceptions" macro leverages
36+
both an Assets and Identities lookup, as well as a KVStore collection called
37+
"remote_software_exceptions" that lets you track and maintain device-
38+
based exceptions for this set of detections.
3639
known_false_positives: It is possible that legitimate remote access software is used
3740
within the environment. Ensure that the lookup is reviewed and updated with any
3841
additional remote access software that is used within the environment.

detections/network/detect_remote_access_software_usage_dns.yml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,12 +13,15 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1313
DNS.query | `drop_dm_object_name("DNS")` | `security_content_ctime(firstTime)` |
1414
`security_content_ctime(lastTime)` | lookup remote_access_software remote_domain
1515
AS query OUTPUT isutility, description as signature, comment_reference as desc,
16-
category | eval dest = query | search isutility = True | `remote_access_software_usage_exception_filter` | `detect_remote_access_software_usage_dns_filter`'
16+
category | eval dest = query | search isutility = True | `remote_access_software_usage_exceptions` | `detect_remote_access_software_usage_dns_filter`'
1717
how_to_implement: To implement this search, you must ingest logs that contain the
1818
DNS query and the source of the query. These logs must be processed using the appropriate
1919
Splunk Technology Add-ons that are specific to the DNS logs. The logs must also
2020
be mapped to the `Network_Resolution` data model. Use the Splunk Common Information
21-
Model (CIM) to normalize the field names and speed up the data modeling process.
21+
Model (CIM) to normalize the field names and speed up the data modeling process. The
22+
"exceptions" macro leverages both an Assets and Identities lookup,
23+
as well as a KVStore collection called "remote_software_exceptions" that lets
24+
you track and maintain device-based exceptions for this set of detections.
2225
known_false_positives: It is possible that legitimate remote access software is used
2326
within the environment. Ensure that the lookup is reviewed and updated with any
2427
additional remote access software that is used within the environment.

detections/network/detect_remote_access_software_usage_traffic.yml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,14 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
2020
datamodel=Network_Traffic by All_Traffic.src All_Traffic.dest, All_Traffic.app |
2121
`drop_dm_object_name("All_Traffic")` | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
2222
| lookup remote_access_software remote_appid AS app OUTPUT isutility, description
23-
as signature, comment_reference as desc, category | search isutility = True | `remote_access_software_usage_exception_filter` | `detect_remote_access_software_usage_traffic_filter`'
23+
as signature, comment_reference as desc, category | search isutility = True | `remote_access_software_usage_exceptions` | `detect_remote_access_software_usage_traffic_filter`'
2424
how_to_implement: The following analytic was developed with Palo Alto traffic logs.
2525
Ensure that the logs are being ingested into Splunk and mapped to the Network_Traffic
2626
data model. Use the Splunk Common Information Model (CIM) to normalize the field
27-
names and speed up the data modeling process.
27+
names and speed up the data modeling process. The "exceptions" macro leverages
28+
both an Assets and Identities lookup, as well as a KVStore collection called
29+
"remote_software_exceptions" that lets you track and maintain device-
30+
based exceptions for this set of detections.
2831
known_false_positives: It is possible that legitimate remote access software is used
2932
within the environment. Ensure that the lookup is reviewed and updated with any
3033
additional remote access software that is used within the environment.

detections/web/detect_remote_access_software_usage_url.yml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,12 +20,15 @@ search: '| tstats count min(_time) as firstTime max(_time) as lastTime latest(We
2020
Web.src Web.category Web.url_domain | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
2121
| `drop_dm_object_name("Web")` | lookup remote_access_software remote_domain AS
2222
url_domain OUTPUT isutility, description as signature, comment_reference as desc,
23-
category | search isutility = True | `remote_access_software_usage_exception_filter` | `detect_remote_access_software_usage_url_filter`'
23+
category | search isutility = True | `remote_access_software_usage_exceptions` | `detect_remote_access_software_usage_url_filter`'
2424
how_to_implement: The detection is based on data that originates from network logs.
2525
These logs must be processed using the appropriate Splunk Technology Add-ons that
2626
are specific to the network logs. The logs must also be mapped to the `Web` data
2727
model. Use the Splunk Common Information Model (CIM) to normalize the field names
28-
and speed up the data modeling process.
28+
and speed up the data modeling process. The "exceptions" macro leverages
29+
both an Assets and Identities lookup, as well as a KVStore collection called
30+
"remote_software_exceptions" that lets you track and maintain device-
31+
based exceptions for this set of detections.
2932
known_false_positives: It is possible that legitimate remote access software is used
3033
within the environment. Ensure that the lookup is reviewed and updated with any
3134
additional remote access software that is used within the environment.

macros/remote_access_software_usage_exception_filter.yml renamed to macros/remote_access_software_usage_exceptions.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,4 @@ definition: 'eval exception_asset = CASE(isnotnull(src),src,isnotnull(dest),dest
66
| search NOT (rmm_exception = TRUE AND rmm_exception_end IN ("FALSE","UNLIMITED"))
77
| fields - asset_temp_field,exception_asset'
88
description: Macro used with remote access monitoring content to define exception lookup and usage. Returns filtered results based on contents of remote_access_software_usage_exception.csv
9-
name: remote_access_software_usage_exception_filter
9+
name: remote_access_software_usage_exceptions

0 commit comments

Comments
 (0)