Introduction to Splunk Apps
What are Splunk Applications?
Splunk apps are packages that extend the capabilities of Splunk Enterprise or Splunk Cloud.
They manage specific types of operational data and are tailored for different technologies and use cases.
Apps act as pre-built knowledge packages, offering features such as:
Custom data inputs
Custom visualizations
Dashboards
Alerts
Reports
Benefits of Splunk Apps
Enable multiple workspaces within a single Splunk instance.
Cater to different user roles and use cases.
Available for download on Splunkbase.
Many are designed for Security Information and Event Management (SIEM), helping detect and respond to security threats.
Facilitate data ingestion, analysis, and visualization for security investigations.
Considerations When Using Splunk Apps
Data Volume & Hardware Requirements: Some apps require significant system resources.
Licensing: Premium apps may require additional licenses.
Increased License Usage: Additional data inputs can lead to higher license consumption.
Sysmon App for Splunk - Installation & Usage
Developed by: Mike Haag
Steps to Install & Configure
Sign Up on Splunkbase
Create a free account on Splunkbase.
Log into Splunkbase
Use the credentials to access available apps.
Download Sysmon App for Splunk
Navigate to the app page and download it.
Add the Application to Your Search Head
Install the app within your Splunk instance.
Adjust the App’s Macros
Ensure that events load correctly by modifying the app macros.
Access the Sysmon App in Splunk
Locate it under the Apps column on the Splunk home page.
Navigate to the File Activity Tab
Open the File Activity section within the app.
Set Time Picker to "All Time" & Submit
Adjust the time filter and submit the search.
Fix Missing Results in "Top Systems" Section
Click Edit (upper right corner) and modify the search query.
Replace the missing Computer field with ComputerName.
Click Apply to generate results successfully.
Key Takeaways
Splunk Apps enhance data management and analysis capabilities.
Splunkbase is the primary source for downloading and installing apps.
The Sysmon App for Splunk helps monitor system activities but requires proper configuration.
Understanding field names (e.g., Computer vs. ComputerName) is crucial for accurate data visualization.
Tasks
Task1
Access the Sysmon App for Splunk and go to the "Reports" tab. Fix the search associated with the "Net - net view" report and provide the complete executed command as your answer. Answer format: net view /Domain:_.local
I didnt understand the question and how to even get to the answe, i found it on reddit.
Answr: net view /DOMAIN:uniwaldo.local
Task2
Access the Sysmon App for Splunk, go to the "Network Activity" tab, and choose "Network Connections". Fix the search and provide the number of connections that SharpHound.exe has initiated as your answer.
Edit the search to this: Use a wildcard for the image that created the event, open the search that gets outputed and count the number of occurances.
Answer: 6
Last updated