How To Use Office 365 Salesforce and Box With Splunk Enterprise and Splunk Enterprise Security
How To Use Office 365 Salesforce and Box With Splunk Enterprise and Splunk Enterprise Security
The forward-looking statements made in this presentation are being made as of the time and date of its live
presentation. If reviewed after its live presentation, this presentation may not contain current or accurate
information. We do not assume any obligation to update any forward looking statements we may make. In
addition, any information about our roadmap outlines our general product direction and is subject to change
at any time without notice. It is for informational purposes only and shall not be incorporated into any contract
or other commitment. Splunk undertakes no obligation either to develop the features or functionality
described or to include any such feature or functionality in a future release.
Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in
the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. © 2017 Splunk Inc. All rights reserved.
This image cannot currently be displayed.
Agenda
Section subtitle goes here
Agenda
▶ Chinmay Kulkarni
• Engineering @ Splunk
• @chinmaymk
▶ I mostly write bugs features.
POLL
SaaS Adoption Trends
▶ Office 365, Salesforce.com, Box, AWS are the top SaaS apps used by
Enterprises (Source: Okta)
▶ SaaS tools - limited visibility into user activity
▶ By 2018, the 60% of enterprises that implement cloud visibility and control tools
will experience one-third fewer security failures (Source: Gartner)
▶ By 2018, 40% of Office 365 deployments will rely on 3rd party tools to fill in gaps
in security and compliance (Source: Gartner)
8
Secure both Cloud and On-Premises Apps
On-premises
Apps Use
Asset/Workflow DIY ✓
Action/remediation DIY ✓
Threat Intelligence DIY ✓
DIY – Do It Yourself
Splunk ES v4.7: Insight from SaaS Services
environment
Mapping to Splunk Enterprise Security
12
Mapping to Splunk Enterprise Security
Service CIM Correlation Searches Dashboards
Box Change Analysis Account Deleted access_anomalies
Inventory Brute Force Access Behavior: Detected and Detected Over One Day access_center
Authentication Cleartext Password At Rest Detected access_search
Concurrent Login Attempts Detected access_tracker
Default Account: Activity Detected and At Rest Detected account_management
Excessive Failed Logins default_accounts
Geographically Improbable Access Detected endpoint_changes
High or Critical Priority Individual Logging into Infected Machine network_changes
Insecure Or Cleartext Authentication Detected system_center
Short-lived Account Detected user_activity
Anomalous Audit Trail Activity Detected
Abnormally High Number of Endpoint Changes By User
Network Device Rebooted and Network Change Detected
Same Error On Many Servers Detected
13
Scenario – Meta slide
SharePoint is
the future.
No Problemo
So SharePoint
So SharePoint
So SharePoint
Correlation Searches
Yeah..We’re
moving to box.
Home Mailbox Office
Acceptance
Acceptance
Abstraction!
Data Models!
Common Information Model
▶ Collection of data models
▶ Normalization layer, speed benefits
▶ Batteries included:
• Network
• Authentication
• Change
• Create your own!
How To Map To CIM
▶ props.conf
▶ tags.conf
docs.splunk.com/Documentation/CIM/latest/User/Overview
Enterprise Security ♥ CIM
▶ Powers all correlation searches
▶ Dashboards use data model drilldowns
▶ Batteries included:
• Network
• Authentication
• Change
• Create your own!
This image cannot currently be displayed.
Splunk Demo
Data Exfiltration
O365
Thank You
Don't forget to rate this session in the
.conf2017 mobile app
Join the Pony Poll
ponypoll.com/***