The ADTimeline script generates a timeline based on Active Directory replication metadata for objects considered of interest. Replication metadata gives you the time at which each replicated attribute for a given object was last changed. As a result, the timeline of modifications is partial. In order to be able to process this data with Splunk run the ADTimeline PowerShell script against your Active Directory domain as described on the project homepage.
After processing the ADTimeline script you should have two or three files to import in Splunk (%DOMAINFQDN% is the Active Directory fully qualified domain name):
The app's "Getting started" page will give you the instructions for the import process.
Once the data indexed, the dashboards generated by the app will help the DFIR analyst to spot some Active Directory persistence mechanisms, misconfigurations, brute force attacks, security audit logging bypass, mail exfiltration… It will also help the analyst to characterize changes made in the Active Directory a long time ago if you do not have sufficient security eventlog history.
The four dashboards available for the DFIR analyst are:
Minor display bug corrected
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.