[Under development] App that analyzes AD logs

2019/08/14

We introduced our proxy App at an event held in April this year. This Proxy App makes it easy to use proxy log statistical/analytic knowledge in Splunk, such as:

  • Immediate visualization of web usage
  • Providing necessary analytical research methods
  • Customizable dashboards and reports

And from the event questionnaire, we received many opinions that "I want an app for Active Directory logs", next to the proxy app.

In the general pattern of incident investigation, I think that it is often carried out in the order of "identifying the terminal identifying the target communication confirming the process executed on the terminal reporting the incident".

  • [Under development] App that analyzes AD logs

By looking at the proxy log, you can see what kind of communication was performed with the outside and on which terminal. However, we do not know what the external attacker executed on the terminal. So one way to find out what has been done on the terminal is to look at the AD logs.

Splunk can aggregate the logs required for each investigation phase and prepare detection rules (searches) according to the phase. In order to make it easier for customers to conduct this series of incident investigations, we are exploring whether it is possible to provide an investigation method for AD logs in the form of an "App".

Here's a snippet of an AD App I'm currently working on.

<Sample 1: Visualization of AD events>

  • Sample 1: Visualization of AD Events

<Sample 2 domain user login history investigation>

  • Sample 2: Domain user login history investigation

<Sample 3: AD server operation audit>

  • Sample 3: AD server operation audit

What do you think.

ぜひAD Appについてご意見をいただければと思います!

Inquiry/Document request

In charge of Macnica Splunk Co., Ltd.

Mon-Fri 8:45-17:30