Skip to content

Commit 5efc962

Browse files
committed
updating spl
1 parent c58213d commit 5efc962

File tree

2 files changed

+8
-87
lines changed

2 files changed

+8
-87
lines changed

detections/network/cisco_configuration_archive_logging_analysis.yml

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,22 +9,19 @@ description: This analytic provides comprehensive monitoring of configuration ch
99
data_source:
1010
- Cisco IOS Logs
1111
search: '| tstats `security_content_summariesonly` count values(All_Changes.command) as commands min(_time) as firstTime max(_time) as lastTime from datamodel=Change.All_Changes
12-
where sourcetype="cisco:ios"
13-
AND (
12+
where (
1413
(All_Changes.command="*username*privilege 15*") OR
1514
(All_Changes.command="*username*password*") OR
1615
(All_Changes.command="*USER TABLE MODIFIED*") OR
1716
(All_Changes.command="*tftp-server*") OR
1817
(All_Changes.command="*snmp-server community*")
19-
)
20-
by All_Changes.dvc All_Changes.user All_Changes.session_id
21-
| `drop_dm_object_name("All_Changes")`
22-
| rename dvc as dest
23-
| stats count dc(commands) as commands min(firstTime) as firstTime max(lastTime) as lastTime by dest user session_id
24-
| where commands > 2
25-
| `security_content_ctime(firstTime)`
26-
| `security_content_ctime(lastTime)`
27-
| `cisco_configuration_archive_logging_analysis_filter`'
18+
)
19+
by All_Changes.dvc All_Changes.user
20+
| `drop_dm_object_name("All_Changes")`
21+
| rename dvc as dest
22+
| `security_content_ctime(firstTime)`
23+
| `security_content_ctime(lastTime)`
24+
| `cisco_configuration_archive_logging_analysis_filter`'
2825
how_to_implement: To implement this search, you need to be ingesting Cisco IOS logs with the sourcetype "cisco:ios" and have these logs mapped to the Change datamodel. Ensure that your Cisco IOS devices are configured to send logs to your Splunk environment, with configuration archive logging enabled. On Cisco devices, enable archive logging with the commands "archive" and "log config" in global configuration mode. Configure command logging with "archive log config logging enable" and ensure that the appropriate logging levels are set with "logging trap informational". The detection looks for patterns of suspicious configuration changes across sessions, focusing on account creation, SNMP modifications, and TFTP server configurations.
2926
known_false_positives: Legitimate configuration changes during routine maintenance or device setup may trigger this detection, especially when multiple related changes are made in a single session. Network administrators often make several configuration changes in sequence during maintenance windows. To reduce false positives, consider implementing a baseline of expected administrative activities, including approved administrative usernames and scheduled maintenance windows. The detection includes a threshold (count > 2) to filter out isolated configuration changes, but this threshold may need to be adjusted based on your environment's normal activity patterns.
3027
references:

detections/network/cisco_configuration_file_exfiltration_attempts.yml

Lines changed: 0 additions & 76 deletions
This file was deleted.

0 commit comments

Comments
 (0)