@@ -16,25 +16,20 @@ search: |
1616 values(All_Traffic.app) as app
1717 values(sourcetype) as sourcetype count
1818 from datamodel=Network_Traffic where
19- All_Traffic.action IN ("allowed", "allow") AND
20- (All_Traffic.dest_port=139 OR All_Traffic.dest_port=445 OR All_Traffic.app="smb")
21- AND All_Traffic.src_ip IN (
22- "10.0.0.0/8","172.16.0.0/12","192.168.0.0/16"
23- )
24- AND NOT All_Traffic.dest_ip IN (
25- "10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16", "100.64.0.0/10",
26- "127.0.0.0/8", "169.254.0.0/16", "192.0.0.0/24", "192.0.0.0/29", "192.0.0.8/32",
27- "192.0.0.9/32", "192.0.0.10/32", "192.0.0.170/32", "192.0.0.171/32", "192.0.2.0/24",
28- "192.31.196.0/24", "192.52.193.0/24", "192.88.99.0/24", "224.0.0.0/4", "192.175.48.0/24",
29- "198.18.0.0/15", "198.51.100.0/24", "203.0.113.0/24", "240.0.0.0/4", "::1"
30- )
19+ All_Traffic.action IN ("allowed", "allow")
20+ AND (All_Traffic.dest_port=139 OR All_Traffic.dest_port=445 OR All_Traffic.app="smb")
21+ AND All_Traffic.src_ip IN `non_public_ip_blocks`
22+ AND All_Traffic.src IN `non_public_ip_blocks`
23+ AND NOT All_Traffic.dest_ip IN `non_public_ip_blocks`
24+ AND NOT All_Traffic.dest IN `non_public_ip_blocks`
3125 by All_Traffic.action All_Traffic.app All_Traffic.bytes All_Traffic.bytes_in All_Traffic.bytes_out
3226 All_Traffic.dest All_Traffic.dest_ip All_Traffic.dest_port All_Traffic.dvc All_Traffic.protocol
3327 All_Traffic.protocol_version All_Traffic.src All_Traffic.src_ip All_Traffic.src_port
3428 All_Traffic.transport All_Traffic.user All_Traffic.vendor_product All_Traffic.rule
3529 | `drop_dm_object_name("All_Traffic")`
3630 | `security_content_ctime(start_time)`
3731 | `security_content_ctime(end_time)`
32+ | rename dest as dest_ip
3833 | iplocation dest_ip
3934 | `detect_outbound_smb_traffic_filter`
4035how_to_implement : This search requires you to be ingesting your network traffic and populating the Network_Traffic data model.
7873 - data : https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/cisco_secure_firewall_threat_defense/connection_event/connection_events.log
7974 source : not_applicable
8075 sourcetype : cisco:sfw:estreamer
76+ - name : Cisco Secure Firewall True Positive Test
77+ attack_data :
78+ - data : https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/cisco_secure_access/firewall/smb.log
79+ source : not_applicable
80+ sourcetype : cisco:sfw:estreamer
0 commit comments