Hi Splunkers,
I'm very much interested in Splunk ML and would like to know how to apply those algorithms to windows event logs to do some user behaviour analytics like the users behaving differently than normal user, suspicious account deletions/creations(shouldn't be normal activity),endpoint requesting more Kerberos to Domain controller.
These are just examples. We have Alerts created but seeing lot of normal activity and causing so many alerts. Would like to use machine learning to differentiate normal and abnormal.
Your thoughts will be appreciated.
Hey..
Did you tried any project using ML in Windows eventlogs, could you please share some ideas.
Gana