Identify the relevant use case for your detection in Splunk Enterprise Security

Follow these steps to identify the relevant security use case to trigger a specific detection in Splunk Enterprise Security:

Step 1: Plan the use case for a detection

Create a detection to address a security use case or problem that you want to solve. For example, suspicious power shell commands or endpoint detection or response (EDR) alerts. Similarly, if you want to know when vulnerability scanners scan your network, or a high number of devices are infected with the same strain of malware, you can create a detection to detect that behavior and alert you. Use a detection to identify patterns in your data that can indicate a security risk.

Following are some potential use cases:

  • Identify when high-risk users log in to machines infected with malware.
  • Identify vulnerability scanning behavior in your network.
  • Validate that your access control deprovisioning process is working as expected by monitoring inactive and expired account activity.
  • Look for compromised accounts by identifying geographically impossible logins.

Step 2: Define the use case for the search

Step 3: Find the data to fit the use case

After you determine the security use case that you want your detection to address, use the following list to determine which data sources are relevant to the use case.

  • Determine what data you need to address the use case.
  • Determine which data models and data model objects contain that data in the Splunk app for CIM.
  • Make sure that the data is in the data model.

In this case, the Excessive Failed Logins detection looks for data related to logins, so it uses the Authentication data model as the data source. By using a data model rather than searching a specific source type directly, the detection can search a wide variety of data sources related to authentication, such as operating systems, applications, without needing to be changed. Relying on data models in detections allows you to write one detection for multiple types of data.