<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Is it possible to create notable events in Splunk Cloud or is it only native to Enterprise Security? in Splunk Cloud Platform</title>
    <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Is-it-possible-to-create-notable-events-in-Splunk-Cloud-or-is-it/m-p/654930#M2453</link>
    <description>&lt;P&gt;Is it possible to create notable events in Splunk Cloud or is it only native to Enterprise Security?&amp;nbsp; The detection rule below is creating actions=risk, notable and assigning some parameters in the notable event. Is it possible to implement this rule as it is with actions notable events in Splunk Cloud or is it only possible in Enterprise Security? I know the alert can be created in Splunk Cloud with its alerting feature, but I am wondering if we need to modify the actions part of the detection rule if notable events do not exist in Splunk Cloud. Thank you.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;DIV class=""&gt;&lt;SPAN class=""&gt;[&lt;/SPAN&gt;Possible Remote Administration Tools Detected &lt;SPAN class=""&gt;(&lt;/SPAN&gt;via office365)&lt;SPAN class=""&gt;]&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class=""&gt;alert.severity = 3&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;SPAN class=""&gt;description = Remote administration tool is software that helps the administrator or attacker to receive full control of the targeted device.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class=""&gt;cron_schedule = &lt;SPAN class=""&gt;0 &lt;/SPAN&gt;* * * *&lt;/DIV&gt;
&lt;DIV class=""&gt;disabled = 1&lt;/DIV&gt;
&lt;DIV class=""&gt;is_scheduled = 1&lt;/DIV&gt;
&lt;DIV class=""&gt;is_visible = 1&lt;/DIV&gt;
&lt;DIV class=""&gt;dispatch.earliest_time = -60m@m&lt;/DIV&gt;
&lt;DIV class=""&gt;dispatch.latest_time = now&lt;BR /&gt;&lt;SPAN&gt;search = index=* &lt;/SPAN&gt;&lt;SPAN class=""&gt;((&lt;/SPAN&gt;&lt;SPAN&gt;Operation="FileUploaded" OR Operation="FileAccessed" OR Operation="FileDownloaded")&lt;/SPAN&gt;&lt;BR /&gt;
&lt;DIV class=""&gt;alert.suppress = 0&lt;/DIV&gt;
&lt;DIV class=""&gt;alert.track = 1&lt;/DIV&gt;
&lt;DIV class=""&gt;actions = risk,notable&lt;/DIV&gt;
&lt;DIV class=""&gt;action.risk = 1&lt;/DIV&gt;
&lt;DIV class=""&gt;action.risk.param._risk_object_type = user&lt;/DIV&gt;
&lt;DIV class=""&gt;action.risk.param._risk_score = 75&lt;/DIV&gt;
&lt;DIV class=""&gt;action.correlationsearch = 0&lt;/DIV&gt;
&lt;DIV class=""&gt;action.correlationsearch.enabled = 1&lt;/DIV&gt;
&lt;DIV class=""&gt;action.notable.param.rule_title = Possible Remote Administration Tools Detected &lt;SPAN class=""&gt;(&lt;/SPAN&gt;via office365)&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;SPAN class=""&gt;action.notable.param.rule_description = Remote administration tool is software that helps the administrator or attacker to receive full control of the targeted device.&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class=""&gt;action.correlationsearch.label = Possible Remote Administration Tools Detected &lt;SPAN class=""&gt;(&lt;/SPAN&gt;via office365)&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;SPAN class=""&gt;action.correlationsearch.annotations = {"mitre_attack"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;[&lt;/SPAN&gt;&lt;SPAN class=""&gt;"T1204"&lt;/SPAN&gt;&lt;SPAN class=""&gt;]}&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Mon, 21 Aug 2023 19:42:51 GMT</pubDate>
    <dc:creator>mike4860</dc:creator>
    <dc:date>2023-08-21T19:42:51Z</dc:date>
    <item>
      <title>Is it possible to create notable events in Splunk Cloud or is it only native to Enterprise Security?</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Is-it-possible-to-create-notable-events-in-Splunk-Cloud-or-is-it/m-p/654930#M2453</link>
      <description>&lt;P&gt;Is it possible to create notable events in Splunk Cloud or is it only native to Enterprise Security?&amp;nbsp; The detection rule below is creating actions=risk, notable and assigning some parameters in the notable event. Is it possible to implement this rule as it is with actions notable events in Splunk Cloud or is it only possible in Enterprise Security? I know the alert can be created in Splunk Cloud with its alerting feature, but I am wondering if we need to modify the actions part of the detection rule if notable events do not exist in Splunk Cloud. Thank you.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;DIV class=""&gt;&lt;SPAN class=""&gt;[&lt;/SPAN&gt;Possible Remote Administration Tools Detected &lt;SPAN class=""&gt;(&lt;/SPAN&gt;via office365)&lt;SPAN class=""&gt;]&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class=""&gt;alert.severity = 3&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;SPAN class=""&gt;description = Remote administration tool is software that helps the administrator or attacker to receive full control of the targeted device.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class=""&gt;cron_schedule = &lt;SPAN class=""&gt;0 &lt;/SPAN&gt;* * * *&lt;/DIV&gt;
&lt;DIV class=""&gt;disabled = 1&lt;/DIV&gt;
&lt;DIV class=""&gt;is_scheduled = 1&lt;/DIV&gt;
&lt;DIV class=""&gt;is_visible = 1&lt;/DIV&gt;
&lt;DIV class=""&gt;dispatch.earliest_time = -60m@m&lt;/DIV&gt;
&lt;DIV class=""&gt;dispatch.latest_time = now&lt;BR /&gt;&lt;SPAN&gt;search = index=* &lt;/SPAN&gt;&lt;SPAN class=""&gt;((&lt;/SPAN&gt;&lt;SPAN&gt;Operation="FileUploaded" OR Operation="FileAccessed" OR Operation="FileDownloaded")&lt;/SPAN&gt;&lt;BR /&gt;
&lt;DIV class=""&gt;alert.suppress = 0&lt;/DIV&gt;
&lt;DIV class=""&gt;alert.track = 1&lt;/DIV&gt;
&lt;DIV class=""&gt;actions = risk,notable&lt;/DIV&gt;
&lt;DIV class=""&gt;action.risk = 1&lt;/DIV&gt;
&lt;DIV class=""&gt;action.risk.param._risk_object_type = user&lt;/DIV&gt;
&lt;DIV class=""&gt;action.risk.param._risk_score = 75&lt;/DIV&gt;
&lt;DIV class=""&gt;action.correlationsearch = 0&lt;/DIV&gt;
&lt;DIV class=""&gt;action.correlationsearch.enabled = 1&lt;/DIV&gt;
&lt;DIV class=""&gt;action.notable.param.rule_title = Possible Remote Administration Tools Detected &lt;SPAN class=""&gt;(&lt;/SPAN&gt;via office365)&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;SPAN class=""&gt;action.notable.param.rule_description = Remote administration tool is software that helps the administrator or attacker to receive full control of the targeted device.&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class=""&gt;action.correlationsearch.label = Possible Remote Administration Tools Detected &lt;SPAN class=""&gt;(&lt;/SPAN&gt;via office365)&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;SPAN class=""&gt;action.correlationsearch.annotations = {"mitre_attack"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;[&lt;/SPAN&gt;&lt;SPAN class=""&gt;"T1204"&lt;/SPAN&gt;&lt;SPAN class=""&gt;]}&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 21 Aug 2023 19:42:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Is-it-possible-to-create-notable-events-in-Splunk-Cloud-or-is-it/m-p/654930#M2453</guid>
      <dc:creator>mike4860</dc:creator>
      <dc:date>2023-08-21T19:42:51Z</dc:date>
    </item>
    <item>
      <title>Re: Notable events in Splunk Cloud</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Is-it-possible-to-create-notable-events-in-Splunk-Cloud-or-is-it/m-p/654931#M2454</link>
      <description>&lt;P&gt;Notable Events and Correlation Searches are Splunk Enterprise Security (ES) features.&amp;nbsp; While you can create an index called "notable" in Splunk Cloud (or Splunk Enterprise), you can't get the full Notables experience without ES.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 19:47:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Is-it-possible-to-create-notable-events-in-Splunk-Cloud-or-is-it/m-p/654931#M2454</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-08-18T19:47:05Z</dc:date>
    </item>
  </channel>
</rss>

