Between Two Alerts: Easy VPN Security Monitoring with Splunk Enterprise Security

Welcome to the new world, my friends. Now that working from home is our new reality, we've found that many of our customers are taking a much closer look at the technology that binds us all together and allows us to access corporate resources: the humble VPN. In the spirit of enablement, I’ve put together a quick list of dashboards that can help add that extra bit of visibility for our faithful Splunk Enterprise Security customers. Also, be sure to check out the additional posts my colleagues have shared about keeping your infrastructure secure in this new environment we all live in.

VPNs transmit sensitive information over both public and private networks. That extension of the corporate network is a tasty vector because it’s much more accessible for attackers. Hackers no longer have to breach the perimeter itself to find sensitive data, but rather, exploiting even just one remote access flaw could be sufficient to breach a system. VPNs often don’t contain the layers of security found in perimeter defenses, yet provide access from outside the network. If 2FA (two factor authentication) isn’t in place, credential stuffing is a very real way to break in.

Some of the largest breaches in history involved the VPN. Heartland, Target and Home Depot all come to mind, not just from an attack perspective, but also from a vulnerability perspective. So first things first, let’s make sure that VPN and perimeter of yours is up to date. Let’s start with leveraging that vulnerability assessment tool that’s been laying around, and scan the VPN and any perimeter related devices. Then, we can take a peek via the Vulnerability Center dashboard.


OR, if you want to be more specific, you can target specific CVEs or specific hosts via the Vulnerability Search dashboard.


Once you’ve identified the perimeter and VPN vulnerabilities it’s time to get to patching!

Next up, time to track your volume of VPN connections. Tracking VPN connections over time is a great way to identify any spikes that may pop up. You’ll probably see a big spike at the usual start of the business day, but if it’s in the middle of the night, it might be worth peeking at.



To do that, I’d peek at the Access Center. Now, your authentication events may come directly from the VPN itself, or from your Active Directory events. Either way, they should be populating the Authentication data model. When looking for Credential Stuffing, look for a spike of failed authentications coming from a single IP. If password spraying is the attack method, you may see a single auth attempt per account. Then, I’d pivot, looking for successful authentications via that same IP. That’s generally where a password did match, and the bad guy got in. Sorry about that. Moving on.


Oftentimes, when an attacker is logging into a valid user account, they’ll do so during business hours to disguise the traffic in the mass of other traffic. Time to look for a user account logging in from multiple geographies where, short of having an FTL drive, it’s impossible to be in two places at nearly the same time. The Access Anomalies dashboard is the perfect built-in tool for that very use case.


But hopefully, it doesn’t get to that. I recommend taking a more preventative approach. It’s always a good idea to peek at the Access Tracker dashboard. There you can see brand new logins, and completely inactive accounts. This is where it is important that your Assets and Identities within Enterprise Security up to date!

It doesn’t hurt to verify that first time logins are for brand new employees, and any old accounts are disabled, not that your Active Directory isn’t absolutely pristine. ☺

Lastly, if those new accounts look a little funny, it doesn’t hurt to jump into the Account Management dashboard and take a peek at WHO might be creating new accounts, modifying permissions, or deleting accounts (especially within a short window). Bad guys will also want to escalate privs, and you’d have some visibility into that right there!


It’s a whole new world we’re living in, at least for now. This little tutorial will help you stay on top of your security game while in the world of Splunk Enterprise Security. Just because we’re forced to shut-in doesn’t mean we shouldn’t keep the bad guys shut-out.

If you want to watch this in action, tune into our Between Two Alerts webinar episode, "Easy VPN Security Monitoring With Splunk Enterprise Security."

Cheers!
Dimitri McKay

This blog is part of Splunk's always-on digital series, Between Two Alerts*. Click here to see more from the series.*

----------------------------------------------------
Thanks!
Dimitri McKay

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.