-
Notifications
You must be signed in to change notification settings - Fork 377
/
Copy pathget_authentication_logs_for_endpoint.json
54 lines (54 loc) · 1.45 KB
/
get_authentication_logs_for_endpoint.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
{
"creation_date": "2017-04-10",
"data_metadata": {
"data_models": [
"Authentication"
],
"data_source": [
"Authentication"
],
"providing_technologies": [
"Microsoft Windows",
"Linux",
"macOS"
]
},
"description": "This search returns all users that have attempted to access a particular endpoint.",
"entities": [
"dest"
],
"how_to_implement": "To successfully implement this search you need to be ingesting authentication logs from your various systems and populating the Authentication data model.",
"id": "bc91a8cf-35e7-4bb2-8140-e756cc06fd76",
"investigate": {
"splunk": {
"fields_required": [
"dest"
],
"schedule": {
"cron_schedule": "",
"earliest_time": "43200",
"latest_time": "1"
},
"search": "| tstats count from datamodel=Authentication where Authentication.dest={dest} by _time, Authentication.dest, Authentication.user, Authentication.app, Authentication.action | `drop_dm_object_name(\"Authentication\")`"
}
},
"maintainers": [
{
"company": "Splunk",
"email": "bpatel@splunk.com",
"name": "Bhavin Patel"
}
],
"modification_date": "2017-11-01",
"name": "Get Authentication Logs For Endpoint",
"original_authors": [
{
"company": "Splunk",
"email": "bpatel@splunk.com",
"name": "Bhavin Patel"
}
],
"spec_version": 2,
"type": "splunk",
"version": "1.0"
}