Skip to main content

Navigate the Threat Hunting App for Splunk

The Netwrix Threat Hunting App for Splunk contains only one dashboard called Threat Hunting.

ribbon

  • The Timeframe interval is identified in the upper-left corner of each dashboard and uses the default Splunk search features. The drop-down menu provides additional options. To search within a different interval, choose a new option from the menu.

  • The Threat Type drop-down menu contains several predefined options: Perpetrator Hunting, Sensitive Data Hunting, and Privilege Creep/Escalation. The textbox changes based on the selection as follows:

    • Perpetrator Hunting – Perpetrator Name (A Perpetrator is any security principal that is making a change)
    • Sensitive Data Hunting – File Name
    • Privilege Creep/Escalation – Account Name
  • The Day of Week checklist provides the option to choose which days of the week will be filtered out when looking for threats. By default, all of the days are checked. When a day is unchecked, Splunk will filter out events that occurred on that day.

  • The Time of Day checklist provides the option to choose which times of day will be filtered out when looking for threats. By default, all of the times of day are checked. When a day is unchecked, Splunk will filter out events that occurred on that day.

Click Submit to refresh the card data and reload the page with the current parameters (Timeframe, search term, Day of Week, and Time of Day).