- Malware_Detecting
- Critical_Folder_Access
- Windows_Update_Fail
- Brute_Force
© Splunk Inc.
source="WinEventLog:Microsoft-Windows-Windows Defender/Operational" (signature="Trojan*" OR signature="Virus*" OR signature="Worm*")
| stats dc(host) as Host
source="WinEventLog:Microsoft-Windows-Windows Defender/Operational" (signature="Trojan*" OR signature="Virus*" OR signature="Worm*")
| stats count by host user signature
source="WinEventLog:Microsoft-Windows-Windows Defender/Operational" (signature="Trojan*" OR signature="Virus*" OR signature="Worm*")
| stats count as Total_Malware
index="main" source="WinEventLog:Microsoft-Windows-Windows Defender/Operational" category=update
| search status!=success
| stats latest(date) as date, latest(status) as status, latest(Product_Version) as Product_Version by host category
| table date host category status Product_Version
index="main" source="WinEventLog:Microsoft-Windows-Windows Defender/Operational" category=update
| stats latest(date) as date, latest(status) as status, latest(Product_Version) as Product_Version by host category
| table date host category status Product_Version
© Splunk Inc.
\Windows\System32\config\
| bin span=1d _time
| stats count by host _time
| rename host AS "Host", count AS "Access Count"
\Windows\System32\config\
| stats count by host user CommandLine
| sort -count
| rename host AS "Host", user AS "User", CommandLine AS "Command Used", count AS "Access Count"
\Windows\System32\config\
| timechart span=1d count by host
© Splunk Inc.
source="WinEventLog:System" "Windows Update"
| search (Message=error OR Message=fail)
| stats count by host
source="WinEventLog:System" "Windows Update"
| search (Message=error OR Message=fail)
| stats count by host, Message
| chart sum(count) by host
source="WinEventLog:System" "Windows Update"
| search (Message=error OR Message=fail)
| stats count by host, Message
source="WinEventLog:System" "Windows Update"
| search (Message=error OR Message=fail)
| stats count by host
| sort -count
source="WinEventLog:System" "Windows Update"
| search (Message=error OR Message=fail)
| stats count by host, Message
| sort -count
source="WinEventLog:System" "Windows Update"
| search (Message=error OR Message=fail)
| stats count by host, Message
© Splunk Inc.
source=* (EventCode=4625 OR EventCode=4624)
| eval action=if(EventCode=4625, "failure", "success")
| bin span=1d _time
| stats count(eval(action="failure")) as Failure_Count, count(eval(action="success")) as Success_Count by host, _time
| where Failure_Count > 100 AND Success_Count > 0
| stats count by host _time
source=* (EventCode=4625 OR EventCode=4624)
| eval action=if(EventCode=4625, "failure", "success")
| bin span=1d _time
| stats count(eval(action="failure")) as Failure_Count, count(eval(action="success")) as Success_Count by host, _time
| where Failure_Count > 100 AND Success_Count > 0
| stats count by host _time Failure_Count Success_Count
| table _time host Failure_Count Success_Count
| sort -_time
This content has been prepared for personal learning purposes related to the installation of Splunk software. All screenshots and software are the property of Splunk Inc. This page is not intended for commercial use.