Using Splunk Enterprise Security Flashcards

1
Q

ES use cases

A

Malware protection
Insider threat
User behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who uses ES

A

Security analysts
SOC staff
Security execs/managers
Security auditors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How ES Works

A

Raw events are indexed
Data model summary searches run (normalization is applied, key/value pairs stored in DM TSIDX)
Data is available for ES
ES background searches process data
ES searches for threats and anomalies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data models

A

Normalize data

ES depends heavily on accelerated data models

Use | tstats searches with summariesonly = true to search accelerated data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happened when a correlation search detects any Indicators of Compromise (IOC)

A

ES creates an alert called a notable event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How notable event is called when it’s assigned to an analyst

A

incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What index is used by Correlation searches

A

Notable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ES roles

A

ES User - ess_user - Runs real-time searches and views all ES dashboards

ES Analyst - ess_analyst - Owns notable events and performs notable event status changes

ES Admin - ess_admin - Configures ES system- wide, including adding ES users, managing correlation searches, and adding new data sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Urgency of notable event is a combination of two factors

A

Severity
Priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What happens when more than one asset or identity is involved in a single notable event

A

one with the highest priority determines the urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

expand an event until the search is complete

A

Not possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Send to UBA adaptive response action

A

UBA must be installed on the ES search head for this Response Action to be available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Manual notable event creation

A

useful when you have source event data that has not (yet) been identified by ES as suspicious, and you want to create a notable event that will identify the issue and allow you to track it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Suppressing Notable Events

A

useful if you are getting false positives from a host or a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who allowed to create and suppress notable events

A

ES Admin must give the ess_analyst and ess_user roles the Edit Notable Event Suppressions permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Managing Notable Event Suppressions

A

Configure > Incident Management > Notable Event Suppressions

17
Q

How to modify the risk score that is assigned to an object

A

Edit the Risk Analysis Response Action in a correlation search

By creating a Risk Factor under Content Management

18
Q

Who can add ad-hoc risk scores for objects

A

ES Admins and ES Analysts

19
Q

What is Risk Rule

A

The Risk Analysis adaptive response action, if configured in a correlation search

20
Q

A Risk Rule feeds results into which index

A

risk

21
Q

Who creates Risk Notables

A

Risk Incident Rules

22
Q

What are Risk Incident Rules

A

risk” correlation searches that run against the risk index

23
Q

two out-of-the-box Risk Incident Rules

A

ATT&CK Tactic Threshold Exceeded for Object Over Previous 7 days

Risk Threshold Exceeded for Object Over 24 Hour Period