
Replay any dataset to Splunk Enterprise by using our replay.py tool or the UI. Initial Confidence and Impact is set by the analytic author. The Risk Score is calculated by the following formula: Risk Score = (Impact * Confidence/100). User $user_arn$ has concurrent sessions from more than one unique IP address $src_ip$ in the span of 5 minutes. AWS Identity and Access Management Account.Filter as needed and/or customize the threshold to fit your environment. Below the filters bar, you see the details of logged sessions (such as SPS Session Count. Known False PositivesĪ user with concurrent sessions from different Ips may also represent the legitimate use of more than one device. Login to the Splunk Enterprise online administration page. This search works with AWS CloudTrail logs.
#Splunk login from session install#
You must install Splunk AWS Add on and Splunk App for AWS. List of fields required to use this analytic. It allows the user to filter out any results (false positives) without editing the SPL. | `aws_concurrent_sessions_from_different_ips_filter`Īws_concurrent_sessions_from_different_ips_filter is a empty macro by default. | stats values(userAgent) values(eventName) values(src_ip) as src_ip dc(src_ip) as distinct_ip_count by _time user_arn `cloudtrail` eventName = DescribeEventAggregates src_ip!="AWS Internal" Product: Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud

As users may behave differently across organizations, security teams should test and customize this detection to fit their environments. The presence of this event occurring from two different IP addresses is highly unlikely. The Splunk Threat Research team leveraged this event name to identify 2 concurrent sessions. When a user navigates the AWS Console after authentication, the API call with the event name DescribeEventAggregates is registered in the AWS CloudTrail logs. Step 6: Verify user’s logon session time Here, you can see that VDOC\Administrator account had logged in (ID 4624) on at 10:42 PM with a Logon ID of 0x144ac2. This behavior could represent a session hijacking attack whereby an adversary has extracted cookies from a victims browser and is using them from a different location to access corporate online resources. Look for session start time and look up for the next session stop time with the same Logon ID and then you can calculate user’s total session time.

My other team members are able to login in without any problem, this problem is happening only for me alone. The following analytic identifies an AWS IAM account with concurrent sessions coming from more than one unique IP address within the span of 5 minutes. When I am trying to login to my Search Head I am getting the below error under the login page of Splunk : Your session has expired. AWS Concurrent Sessions From Different Ips
