All Apps and Add-ons

Filter brute force logins from Geographically Improbable Access

bmorgenthaler
Path Finder

In InfoSec App's Access Anomalies dashboard, the Geographically Improbable Access panel shows results from failed brute force logins. So for example I have a large number of common account names (admin, test, server, etc.) that do not exist in our environment and have failed logins into our perimeter systems showing up. Can this panel be configured to ONLY show known improbably access from successful logins and/or known users?

Tags (1)
1 Solution

igifrin_splunk
Splunk Employee
Splunk Employee

Thanks for pointing this out @bmorgenthaler. Yes, the Geographically Improbable Access table and the corresponding map should show only successful logins. This is now fixed and the fix will be available in the next version to be published on Splunkbase.

In the meantime, if anyone wants to update the searches manually, the first part of the search (before the second pipe) can be replaced with the following string that has where Authenication.action=success:

| tstats summariesonly=true allow_old_summaries=true values(Authentication.app) as app from datamodel=Authentication.Authentication where Authentication.action=success by Authentication.user, Authentication.src _time span=1s

View solution in original post

0 Karma

igifrin_splunk
Splunk Employee
Splunk Employee

Thanks for pointing this out @bmorgenthaler. Yes, the Geographically Improbable Access table and the corresponding map should show only successful logins. This is now fixed and the fix will be available in the next version to be published on Splunkbase.

In the meantime, if anyone wants to update the searches manually, the first part of the search (before the second pipe) can be replaced with the following string that has where Authenication.action=success:

| tstats summariesonly=true allow_old_summaries=true values(Authentication.app) as app from datamodel=Authentication.Authentication where Authentication.action=success by Authentication.user, Authentication.src _time span=1s
0 Karma
Get Updates on the Splunk Community!

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...