1 hour 27 minutes
to navigate to this lab, go to www dot cyber dot i t.
Click browse, then click the link for cyber score Labs
scrolled through the labs until you find the creating seem reports with ***. Lab
Hi and welcome to creating steam reports with ***.
The objectives for this quarter started Import sis Log information into ***. Import local registry information in this one.
Ingrate, Multiple compliance reports. In ***
scenario, Your organization was told to stand up a seam and have no money in their budget. You decided to set ups. Plug and create a few reports to test and determine the feasibility of using *** in your organization.
Go ahead and log into the Windows seven machine using the user name, administrator and password password.
From here, you'll go ahead and double click on the Kiwi sis long console. It might take a couple minutes to open. It's usually pretty slow on this, but
once it does open, we're going to go ahead and verify that the system is being received
and you'll see messages that have been received.
You should check for the I P addresses 192.168 dot 0.2, which is the Windows 2012 server
in 1 90 that 168.0 dot card for which is the sense firewall.
If you get an error message that says
the options switched to or whatever, you can go ahead and click. Retry and I will usually read
So go ahead and open Splunk Enterprise.
Once you get to the dashboard, go ahead and click. Add data
and click on the monitor option.
So from here, we're going to go ahead and point *** to a directory where it can monitor an import log files on a continuous basis. Gordon. Click on files and directories,
and then you're going to navigate T E sis log de logs and hit select
Go ahead and hit next at the top of the screen except the default settings and quick review.
Quick, I'm start searching and go ahead and check out the dashboard that it gives to you.
So now we're gonna go ahead and import local log files in the Splunk so you're going to navigate back to the ad data section, which is on the dashboard. Click add data
and then click on the monitor option. We're going to use the local log files from the Windows system,
select local event logs, and Adam is a log source. And then you're gonna add some specific logs to this, um, analytic application forwarded events, Internet Explorer, key management service security, set up system and Windows Power Show.
Make sure that you specify what logs any, depending on the organizational standards and scope of the scam in real life.
Once you've accepted these logs, go ahead and accept all the defaults and go ahead and click. Start searching,
and then we can go ahead and take a look at the results and note of any differences between the skin and the previous.
Now, we're gonna go ahead and build a window event report in the toolbar, the top could the abdomen you insert in reporting
and in the search bar type event, click on the magnifying glass to the right and make sure that you're all put his rate
next ringer of selected fields and click on source type,
and then we're gonna go up to the search bar and type in event code equals 10001 And don't forget your quotation marks.
Once we have our results, we're gonna go up to save as and click on reports
and then go. I haven't give Give the report the title restarts and click, Steve.
Now you can click view and go ahead and view the report.
From here, we'll add the report to the dashboard
so we'll go to the top. Right? Hit. Quick, quick. Add to dashboard. You don't want to make sure that we're creating a new dashboard entitled the dashboard Windows events.
Make sure the dashboard permissions are shared an APP and the panel title should be Windows events, and the panel should be powered by the report itself.
Once all of this is done, hit Save
the dashboard on view your final report.
Next, we're gonna go ahead and create a report from the event generated from the firewall. Open up the search area and ***.
We're gonna go ahead and put the firewall I p address in the search bar, which is 192.168 dot 0.254 Then click the magnifying glass.
We want to search further. So after this I p, we're gonna go ahead and type match com a block into the search bar and click search again.
Next, we're gonna create a report. We're gonna call it a fire wall blocks and add it to the dashboard
again. We'll make a new dashboard.
Dashboard will be named firewall blocks. Permission shared an app, and then the panel title should be firewall. And then we can click. Steve,
either report in the dashboard.
Thanks for tuning into this lab and we'll see you in the next lesson.
Advanced Cyber Threat Intelligence
Do you want to take your cyber threat intelligence skills to the next level so ...
5 CEU/CPE Hours Available
Certificate of Completion Offered
Kali Linux Fundamentals
If you’re interested in penetration testing and ethical hacking, then this Kali Linux course is ...
1 CEU/CPE Hours Available
Certificate of Completion Offered