splunksummit 2015 - es hands on workshop

153
Your very own ES Sandbox! Simon O’Brien Sales Engineer/Security SME, Splunk [email protected]

Upload: splunk

Post on 06-Jan-2017

209 views

Category:

Data & Analytics


8 download

TRANSCRIPT

Page 1: SplunkSummit 2015 - ES Hands On Workshop

Your  very  own  ES  Sandbox!

Simon  O’BrienSales  Engineer/Security  SME,  Splunk

[email protected]

Page 2: SplunkSummit 2015 - ES Hands On Workshop

2

DisclaimerDuring  the  course  of  this  presentation,  we  may  make  forward  looking  statements  regarding  future  

events  or  the  expected  performance  of  the  company.  We  caution  you  that  such  statements  reflect  our  current  expectations  and  estimates  based  on  factors  currently  known  to  us  and  that  actual  events  or  results  could  differ  materially.  For  important  factors  that  may  cause  actual  results  to  differ  from  those  

contained  in  our  forward-­‐looking  statements,  please  review  our  filings  with  the  SEC.  The  forward-­‐looking  statements  made  in  the  this  presentation  are  being  made  as  of  the  time  and  date  of  its  live  presentation.  If  reviewed  after  its  live  presentation,  this  presentation  may  not  contain  current  or  accurate  information.  

We  do  not  assume  any  obligation  to  update  any  forward  looking  statements  we  may  make.  

In  addition,  any  information  about  our  roadmap  outlines  our  general  product  direction  and  is  subject  to  change  at  any  time  without  notice.   It  is  for  informational  purposes  only  and  shall  not,  be  incorporated  into  any  contract  or  other  commitment.  Splunk  undertakes  no  obligation  either  to  develop  the  features  

or  functionality  described  or  to  include  any  such  feature  or  functionality   in  a  future  release.

Page 3: SplunkSummit 2015 - ES Hands On Workshop

3

About  Me

1.5  Years

Page 4: SplunkSummit 2015 - ES Hands On Workshop

4

What’s  a  sandbox?

Page 5: SplunkSummit 2015 - ES Hands On Workshop

5

What’s  a  sandbox?• A  100% free,  fully  featured  15  day  trial  of  Splunk  products:  Cloud,  Light,  or  ES

• Hosted  in  AWS• Authenticates  off  of  your  Splunk  account• Has  sample  data  for  you  to  play  with• Supports  onboard  of  your  own  data

Today’s  session:  A  hands-­‐on  activity  with  your  very  own  Enterprise  Security  sandbox!

Page 6: SplunkSummit 2015 - ES Hands On Workshop

6

Page 7: SplunkSummit 2015 - ES Hands On Workshop

Let’s  create  a  sandbox

Page 8: SplunkSummit 2015 - ES Hands On Workshop

8

Page 9: SplunkSummit 2015 - ES Hands On Workshop

9

Page 10: SplunkSummit 2015 - ES Hands On Workshop

10

Page 11: SplunkSummit 2015 - ES Hands On Workshop

11

Page 12: SplunkSummit 2015 - ES Hands On Workshop

12

Page 13: SplunkSummit 2015 - ES Hands On Workshop

13

Page 14: SplunkSummit 2015 - ES Hands On Workshop

14

Page 15: SplunkSummit 2015 - ES Hands On Workshop

15

Let’s  fix  a  few  things!

Page 16: SplunkSummit 2015 - ES Hands On Workshop

16

Let’s  fix  a  few  things!

• Choose  a  timezone• Correlation  search  enablement• Scheduled  search  enablement

Page 17: SplunkSummit 2015 - ES Hands On Workshop

17

Click  Here

Page 18: SplunkSummit 2015 - ES Hands On Workshop

18

Pick  “Hobart”,  and  save

Page 19: SplunkSummit 2015 - ES Hands On Workshop

19

Page 20: SplunkSummit 2015 - ES Hands On Workshop

20

Click  Here

Page 21: SplunkSummit 2015 - ES Hands On Workshop

21

Click  Here

Page 22: SplunkSummit 2015 - ES Hands On Workshop

22

Click  Here

Page 23: SplunkSummit 2015 - ES Hands On Workshop

23

Type  “High”  to  filter

Page 24: SplunkSummit 2015 - ES Hands On Workshop

24

Click  “Enable”  for  “High  or  Critical  Priority  Host  with  

Malware  Detected”

Page 25: SplunkSummit 2015 - ES Hands On Workshop

25

Click  Here

Page 26: SplunkSummit 2015 - ES Hands On Workshop

26

Page 27: SplunkSummit 2015 - ES Hands On Workshop

27

Click  Here

Page 28: SplunkSummit 2015 - ES Hands On Workshop

28

Search  for  “30m”

Page 29: SplunkSummit 2015 - ES Hands On Workshop

29

Enable  the  two  disabled  rules

Page 30: SplunkSummit 2015 - ES Hands On Workshop

30

Page 31: SplunkSummit 2015 - ES Hands On Workshop

What’s  ES  anyway?

Page 32: SplunkSummit 2015 - ES Hands On Workshop

Machine  data  contains  a  definitive  record  of  all  interactions

Splunk  is  a  very  effective  platform  to  collect,  store,  and  analyze  all  of  that  data

Human Machine

Machine Machine

Page 33: SplunkSummit 2015 - ES Hands On Workshop

MainframeData

VMware

Platform  for  Machine  Data

Splunk  Solutions  >  Easy  to  Adopt

Exchange PCISecurity

RelationalDatabases

MobileForwarders Syslog  /  TCP  /  Other

Sensors  &  Control  Systems

Across  Data  Sources,  Use  Cases  &  Consumption  Models

Wire  Data

Mobile  Intel

Splunk  Premium  Apps Rich  Ecosystem  of  Apps

MINT

Page 34: SplunkSummit 2015 - ES Hands On Workshop

Rapid  Ascent  in  the  Gartner  SIEM  Magic  Quadrant*

*Gartner,  Inc.,  SIEM  Magic  Quadrant  2011-­‐2015.  Gartner  does  not  endorse  any  vendor,  product  or  service  depicted  in  its  research  publication  and  not  advise  technology  users  to  select  only  those  vendors  with  the  highest  ratings  or  other  designation.  Gartner  research  publications  consist  of   the  opinions  of   Gartner’s  research  organization  and  should  not  be  construed  as  statements  of  fact.  Gartner  disclaims  all  warranties,  express  or  implied,  with  respect  to  this  research,  including  any  warranties  of  merchantability  or  fitness  for  a  particular  purpose.  

2015 Leader  and  the  only  vendor  toimprove  its  visionary  position

2014    Leader  2013    Leader2012    Challenger2011    Niche  Player

2015

Page 35: SplunkSummit 2015 - ES Hands On Workshop

35

AppServers

Network

Threat Intelligence

Firewall

Web Proxy

Internal Network Security

Endpoints

Splunk  as  the  Security  Nerve  Center

Page 36: SplunkSummit 2015 - ES Hands On Workshop

ES  Fast  Facts● Current  version:  3.3,  4.0  just  recently  announced!  ● Two  releases  per  year● Content  comes  from  industry  experts,  market  analysis,  but  most  

importantly  YOU● The  best  of  Splunk  carries  through  to  ES  – flexible,  scalable,  fast,  

and  customizable● ES  has  its  own  development  team,  dedicated  support,  services  

practice,  and  training  courses

4.0  not   in  sandbox…yet

Page 37: SplunkSummit 2015 - ES Hands On Workshop

37

WARNING:  It’s  really  rich!

You  can’t  eat  all  of  ES  in  one  sitting,  so  we  won’t.

Page 38: SplunkSummit 2015 - ES Hands On Workshop

Security  Posture

Page 39: SplunkSummit 2015 - ES Hands On Workshop

39

Security  Posture

How  do  you  start  and  end  your  day?

Page 40: SplunkSummit 2015 - ES Hands On Workshop

Key  Security  Indicators

Sparklines

Editable

Page 41: SplunkSummit 2015 - ES Hands On Workshop

HOW  DO  WE  GET  DATA  IN?

Page 42: SplunkSummit 2015 - ES Hands On Workshop

Data  comes  from…

You  can  actually  do  this  in  the  sandbox,   if  you  want.

Page 43: SplunkSummit 2015 - ES Hands On Workshop

Data  Ingest  +  Common  Information  Model● You’ve  got  a  bunch  of  systems…● How  to  bring  in:● Network  AV● Windows  +  OS  X  AV● PCI-­‐zone  Linux  AV● Network  Sandboxing● APT  Protection

● CIM  =  Data  Normalization

Page 44: SplunkSummit 2015 - ES Hands On Workshop

NORMALIZATION?!?

Page 45: SplunkSummit 2015 - ES Hands On Workshop

NORMALIZATION?!?

Relax.  This  is

therefore,  CIM  gets  applied  at  SEARCH  TIME.

Page 46: SplunkSummit 2015 - ES Hands On Workshop

Data  Normalization  is  Mandatory  for  your  SOC

“The  organization  consuming  the  data  must  develop  and  consistently  

use  a  standard  format  for  log  normalization.”  – Jeff  Bollinger  et.  

al.,  Cisco  CSIRT

Your  fields  don’t  match?  Good  luck  creating  investigative  queries

Page 47: SplunkSummit 2015 - ES Hands On Workshop
Page 48: SplunkSummit 2015 - ES Hands On Workshop

Free.  Supported.  Fully  documented.

Page 49: SplunkSummit 2015 - ES Hands On Workshop

Lots  of  apps  support   CIM.

Page 50: SplunkSummit 2015 - ES Hands On Workshop

CIM  Compliant!

Page 51: SplunkSummit 2015 - ES Hands On Workshop

Click  “Data  models”  under  

settings

Page 52: SplunkSummit 2015 - ES Hands On Workshop

Click  “>”  next  to  Malware

Page 53: SplunkSummit 2015 - ES Hands On Workshop

Data  Models  are  Accelerated

Page 54: SplunkSummit 2015 - ES Hands On Workshop

Let’s  Pivot!

Click  MalwarePivot  allows  non-­‐technical  interaction  with  data  models.

Page 55: SplunkSummit 2015 - ES Hands On Workshop

Let’s  Pivot!

Click  Malware  Attacks

Change  to  “Last  24  hours”

Total  #  attacks

1

2

Page 56: SplunkSummit 2015 - ES Hands On Workshop

Let’s  Pivot!

Click  Area  Chart

Page 57: SplunkSummit 2015 - ES Hands On Workshop

Let’s  Pivot!

Click  Color

Page 58: SplunkSummit 2015 - ES Hands On Workshop

Let’s  Pivot!

SCROLL  and  find  Signature,  and  click

Page 59: SplunkSummit 2015 - ES Hands On Workshop

Let’s  Pivot!

You  can  save  as  reports  and  dash  

panels…  

Page 60: SplunkSummit 2015 - ES Hands On Workshop

Let’s  Pivot!

Page 61: SplunkSummit 2015 - ES Hands On Workshop

Let’s  Pivot!

Click  “Malware  Attacks”  and  then  

Edit  Object

Page 62: SplunkSummit 2015 - ES Hands On Workshop

Data  Models  map  to  CIM-­‐compliant  tagged  data

SCROLL  to  see  more

Fields  relevant  to  Malware  data  source

Appropriate  tags

Page 63: SplunkSummit 2015 - ES Hands On Workshop

So  what?

Click  to  return  to  Enterprise  Security

Page 64: SplunkSummit 2015 - ES Hands On Workshop

So  what?

Security  Domains,  then  Endpoint,  then  Malware  

Center

Page 65: SplunkSummit 2015 - ES Hands On Workshop

KSI  specific  to  malware

Page 66: SplunkSummit 2015 - ES Hands On Workshop

Let’s  drill  into  two  examples

Click  “Hacktool.Rootkit”  bar

Page 67: SplunkSummit 2015 - ES Hands On Workshop

Normalized  fields  to  CIM  from  Symantec

Page 68: SplunkSummit 2015 - ES Hands On Workshop

Click  browser  back  button…

We  know  about  this.

Page 69: SplunkSummit 2015 - ES Hands On Workshop

Second  example

Click  “Mal/Packer”  bar

Page 70: SplunkSummit 2015 - ES Hands On Workshop

Normalized  fields  to  CIM  from  Sophos

Page 71: SplunkSummit 2015 - ES Hands On Workshop

Where  are  my  gaps  in  coverage?

Click  Audit  and  then  “Content  Profile”  – takes  

about  30s

Page 72: SplunkSummit 2015 - ES Hands On Workshop

Which  models  could  I  be  using,  but   I’m  not?

Page 73: SplunkSummit 2015 - ES Hands On Workshop

QUESTIONS  ON  CIM/DATA  MODELS?

Page 74: SplunkSummit 2015 - ES Hands On Workshop

THREAT  INTELLIGENCE

Page 75: SplunkSummit 2015 - ES Hands On Workshop

75Attack  Map

The  Challenge:• Industry  says  Threat  Intel  is  

key  to  APT  Protection• Management  wants  all  

threat  intel  checked  against  every  system,  constantly

• Don’t   forget  to  keep  your  15+  threat  feeds  updated

The  Solution:

Page 76: SplunkSummit 2015 - ES Hands On Workshop

Verizon  2015  DBIR

“…the  percentage  of  indicators  unique  to  only  one  (outbound  

destination)  feed…is  north  of  97%  for  the  feeds  we  have  sampled…”

Threat  list  aggregation  =  more  complete  intelligence

Page 77: SplunkSummit 2015 - ES Hands On Workshop

77

Under  Advanced  Threat  click  “Threat  Activity”

Page 78: SplunkSummit 2015 - ES Hands On Workshop

78

SCROLL

KSIs  specific  to  threat

Page 79: SplunkSummit 2015 - ES Hands On Workshop

79

Threat  categories

Threat  specifics

Page 80: SplunkSummit 2015 - ES Hands On Workshop

80

Click  Configure,  “Data  Enrichment”  and  then  “Threat  Intelligence  

Downloads”

Page 81: SplunkSummit 2015 - ES Hands On Workshop

81

Various  community  threat  lists

Local  ones  too

TAXII  support

Page 82: SplunkSummit 2015 - ES Hands On Workshop

82

Click  “Malware  Domains”

Page 83: SplunkSummit 2015 - ES Hands On Workshop

83

Various  community  threat  lists

Local  ones  too

TAXII  support

Weight  used  for  risk  scoring

Interval

SCROLL  for  additional  config

Page 84: SplunkSummit 2015 - ES Hands On Workshop

84

Various  community  threat  lists

Local  ones  too

TAXII  support

Hit  “back”  button  twice

Page 85: SplunkSummit 2015 - ES Hands On Workshop

QUESTIONS  ON  THREAT  INTEL?

Page 86: SplunkSummit 2015 - ES Hands On Workshop

MORE  ADVANCED  THREAT

Page 87: SplunkSummit 2015 - ES Hands On Workshop

87

STIX/TAXII  feed

Browse  through  the  tabs…

Investigate  on  your  own  time:  Advanced  Threat  capabilities  worth  your  while…and  all  areas  

under  Security  Domains

Page 88: SplunkSummit 2015 - ES Hands On Workshop

ADDITIONAL  REPORTS

Page 89: SplunkSummit 2015 - ES Hands On Workshop

89

Auditors  /  Management  /  Compliance  Says…● Can  you  show  me  <Typical  Report>?

● Reporting  is  easy  in  Splunk● But  we  have  more  than  300  standard  reports  too

Page 90: SplunkSummit 2015 - ES Hands On Workshop

90

Click  “Reports”  under  Search

Page 91: SplunkSummit 2015 - ES Hands On Workshop

91

Almost  330  reports  to  use/customize

Page 92: SplunkSummit 2015 - ES Hands On Workshop

INCIDENT  RESPONSE  WORKFLOW

Page 93: SplunkSummit 2015 - ES Hands On Workshop

93

Click  “High  or  Critical  Priority  Host  with  Malware  Detected”

Page 94: SplunkSummit 2015 - ES Hands On Workshop

94

Checkbox  Select  the  Critical  Event

Highly  filterable  and  tag-­‐able

Page 95: SplunkSummit 2015 - ES Hands On Workshop

95

Click  “Edit  All  Selected”

Page 96: SplunkSummit 2015 - ES Hands On Workshop

96

Fill  out  Status/Owner/Comment,  

Click  Save

Would  contain  all  of  your  users

Page 97: SplunkSummit 2015 - ES Hands On Workshop

97

Confirm  that  event  updates

Click  “>”  under  Actions  to  see  what  you  can  do  with  

the  event

Page 98: SplunkSummit 2015 - ES Hands On Workshop

98

Click  “>”  to  view  more  details  on  the  event

Page 99: SplunkSummit 2015 - ES Hands On Workshop

99

Last  comment  and  link  to  review  all  activity

Every  field  “pivot-­‐able”

Page 100: SplunkSummit 2015 - ES Hands On Workshop

100

Automatic  attribution  for  asset  data

Page 101: SplunkSummit 2015 - ES Hands On Workshop

101

Pivot   internally  within  ES,  or  externally.  Customizable.

Drill  to  Asset  Investigator

Page 102: SplunkSummit 2015 - ES Hands On Workshop

102

Asset  data  

Customizable  Swimlanes

Selectable  Time

Page 103: SplunkSummit 2015 - ES Hands On Workshop

103

Hold  down  CTRL  or  CMD  and  click  multiple  bars  

aligned  vertically

Page 104: SplunkSummit 2015 - ES Hands On Workshop

104

Summarized  info  from  “candlesticks”  selected

Drill  to  search,  make  a  notable  event,  share  a  link

Page 105: SplunkSummit 2015 - ES Hands On Workshop

105

Select  one  or  two  red  “Malware  Attacks”  bars

Page 106: SplunkSummit 2015 - ES Hands On Workshop

106

Drill  to  search

Page 107: SplunkSummit 2015 - ES Hands On Workshop

107

Raw  log  data  in  the  Search  interface  is  only  a  click  away.

Page 108: SplunkSummit 2015 - ES Hands On Workshop

108

“Browser  Tab”  back  to  Incident  Review

Page 109: SplunkSummit 2015 - ES Hands On Workshop

109

Edit  the  event  again  and  add  some  more  comments…

Page 110: SplunkSummit 2015 - ES Hands On Workshop

110

Feel  free  to  add  whatever  you  wish  here…click  save

Page 111: SplunkSummit 2015 - ES Hands On Workshop

111

View  the  review  activity  for  the  event

Page 112: SplunkSummit 2015 - ES Hands On Workshop

112

Page 113: SplunkSummit 2015 - ES Hands On Workshop

113

Click  on  “Incident  Review  Audit”  under  Audit

Many  aspects  of  ES  are  audited  within  the  product

Page 114: SplunkSummit 2015 - ES Hands On Workshop

114

More  users  will  make  this  more  interesting…

Page 115: SplunkSummit 2015 - ES Hands On Workshop

115

Click  on  Identity  Investigator  

Page 116: SplunkSummit 2015 - ES Hands On Workshop

116

Type  “htrapper”  in  search  and  click  search

Set  to  “Last  24  hours”

2

1

Page 117: SplunkSummit 2015 - ES Hands On Workshop

117

Information  about  this  identity

Page 118: SplunkSummit 2015 - ES Hands On Workshop

QUESTIONS  ABOUT  INCIDENT  RESPONSE?

Page 119: SplunkSummit 2015 - ES Hands On Workshop

LOOKUPS  AND  CORRELATION  SEARCHES

Page 120: SplunkSummit 2015 - ES Hands On Workshop

120

Select  “Data  Enrichment”,  “Lists  and  Lookups”  under  

Configure

Page 121: SplunkSummit 2015 - ES Hands On Workshop

121

Many  lookups  to  provide  additional  context  to  your  data

Page 122: SplunkSummit 2015 - ES Hands On Workshop

122

Click  on  “Demonstration  Identities”

Page 123: SplunkSummit 2015 - ES Hands On Workshop

123

We  want  to  add  “naughtyuser”  to  this  list  because  it  is  showing  up  in  our  data.

SCROLL

Page 124: SplunkSummit 2015 - ES Hands On Workshop

124

Select  last  row,  right  click,  and  choose  “Insert  row  

below.”

Add  whatever  you  want,  but  make  sure  the  first  column  says  “naughtyuser”

When  done  click  save

Extra  credit:  Check  your  work  in  Identity  Center

2

1

Page 125: SplunkSummit 2015 - ES Hands On Workshop

125

Click  on  “General”,  “Custom  Searches”  under  

Configure  

Page 126: SplunkSummit 2015 - ES Hands On Workshop

126

Click  “New”

Page 127: SplunkSummit 2015 - ES Hands On Workshop

127

Click  “Correlation  Search”

Page 128: SplunkSummit 2015 - ES Hands On Workshop

128

Fill  in  Search  Name,  App  Context,  and  Description

Page 129: SplunkSummit 2015 - ES Hands On Workshop

129

Click  “Edit  search  in  guided  mode”

You  could  simply  type  a  Splunk  search  in  here  if  you  wanted.

Page 130: SplunkSummit 2015 - ES Hands On Workshop

130

Click  “Next”

Page 131: SplunkSummit 2015 - ES Hands On Workshop

131

Select  “Data  Model”,  “Authentication”,  

“Failed_Authentication”  and  click  Next

Page 132: SplunkSummit 2015 - ES Hands On Workshop

132

Select  “Last  60  minutes”  and  click  Next

Page 133: SplunkSummit 2015 - ES Hands On Workshop

133

Observe  search  and  click  NextOptional:  You  can  “Run  search”  at  this  point  and  see  the  events  that  will  return.

Page 134: SplunkSummit 2015 - ES Hands On Workshop

134

Click  “Add  a  new  aggregate”

Page 135: SplunkSummit 2015 - ES Hands On Workshop

135

Choose  “count”  and  then  alias  it  as  “failedlogincount”  and  

click  Next

Page 136: SplunkSummit 2015 - ES Hands On Workshop

136

Click  Next

Page 137: SplunkSummit 2015 - ES Hands On Workshop

137

SCROLL  to  select  “Authentication.user”  and  click  

Next

Page 138: SplunkSummit 2015 - ES Hands On Workshop

138

Type  “user”  in  the  Alias  field  and  click  Next

Page 139: SplunkSummit 2015 - ES Hands On Workshop

139

Lets  match  on  “failedlogincount”  being  

greater  than  1000

Page 140: SplunkSummit 2015 - ES Hands On Workshop

140

Click  “run  search”  to  test  the  search.

Page 141: SplunkSummit 2015 - ES Hands On Workshop

141

This  should  create  two  notable  events…so   let’s  make  sure  that  happens.

Make  sure  this  is  over  60  minutes,  not  “all  time”.

Page 142: SplunkSummit 2015 - ES Hands On Workshop

142

Fill  in  “cron”  style  schedule  –every  5  minutes

Page 143: SplunkSummit 2015 - ES Hands On Workshop

143

Put  “86400”  as  the  window  duration.  Put  “user”  as  the  field  

to  throttle  by.

Page 144: SplunkSummit 2015 - ES Hands On Workshop

144

Check  the  “notable  event”  box  and  fill  in  the  fields  as  shown.  Note  the  “$”  signs  around  the  variables!

Page 145: SplunkSummit 2015 - ES Hands On Workshop

145

Let’s  assign  risk  to  the  user.  Check  the  box  and  fill  in  the  

three  fields  as  shown.

Page 146: SplunkSummit 2015 - ES Hands On Workshop

146

Save  the  search  and  go  back  to  Incident  Review.  

Page 147: SplunkSummit 2015 - ES Hands On Workshop

147

Put  “86400”  as  the  window  duration.  Put  “user”  as  the  field  

to  throttle  by.

As  long  as  you  have  waited  5  minutes you  should  have  new  notable  events!

Page 148: SplunkSummit 2015 - ES Hands On Workshop

148

Expand  your  new  event

Variable  substitution  working

Page 149: SplunkSummit 2015 - ES Hands On Workshop

149

Launch  Identity  Investigator  against  “naughtyuser”

Page 150: SplunkSummit 2015 - ES Hands On Workshop

150

Data  you  added  to  the  lookup

Notable  Events  and  Risk

Bonus:  Go  find  “naughtyuser”  in  Risk  Analysis  dashboard…

Page 151: SplunkSummit 2015 - ES Hands On Workshop

Final  Questions?

Page 152: SplunkSummit 2015 - ES Hands On Workshop

152

Next  Steps…• Play  in  your  ES  Sandbox  for  15  days• Explore  some  of  the  areas  we  didn’t  get  to  cover  today

• Ask  questions  of  your  sales  team• Once  ES  4.0  releases,  help  yourself  to  another  sandbox  to  see  the  new  features

• TELL  YOUR  FRIENDS!

Page 153: SplunkSummit 2015 - ES Hands On Workshop

THANKYOU!

[email protected]