<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Search for Alert Monitoring. in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671848#M11824</link>
    <description>&lt;P&gt;If you want the list of triggered alerts please try this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=_audit action=alert_fired ss_app=* 
| eval ttl=expiration-now() 
| search ttl&amp;gt;0 
| convert ctime(trigger_time) 
| table trigger_time ss_name severity 
| rename trigger_time as "Alert Time" ss_name as "Alert Name" severity as "Severity"&lt;/LI-CODE&gt;&lt;P&gt;if instead tu want the list of alerts in your environment, you could use:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;|rest/servicesNS/-/-/saved/searches 
| search alert.track=1 
| fields title description search disabled triggered_alert_count actions action.script.filename alert.severity cron_schedule&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Thu, 14 Dec 2023 07:42:05 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2023-12-14T07:42:05Z</dc:date>
    <item>
      <title>Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671844#M11823</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;Could anyone assist me in creating a correlation search to detect triggered alerts across all searches. This will enable us to monitor counts and automatically notify us if any situation escalates beyond control.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 07:24:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671844#M11823</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-12-14T07:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671848#M11824</link>
      <description>&lt;P&gt;If you want the list of triggered alerts please try this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=_audit action=alert_fired ss_app=* 
| eval ttl=expiration-now() 
| search ttl&amp;gt;0 
| convert ctime(trigger_time) 
| table trigger_time ss_name severity 
| rename trigger_time as "Alert Time" ss_name as "Alert Name" severity as "Severity"&lt;/LI-CODE&gt;&lt;P&gt;if instead tu want the list of alerts in your environment, you could use:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;|rest/servicesNS/-/-/saved/searches 
| search alert.track=1 
| fields title description search disabled triggered_alert_count actions action.script.filename alert.severity cron_schedule&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 07:42:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671848#M11824</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-12-14T07:42:05Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671866#M11825</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;How we can set the threshold for the second search like if any of the CS alerts more than 10 times it should trigger a notables !&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 08:58:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671866#M11825</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-12-14T08:58:55Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671868#M11826</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;the second search only lists the alerts not the triggered ones.&lt;/P&gt;&lt;P&gt;If you want the triggered alerts you have to use the first.&lt;/P&gt;&lt;P&gt;If you want to use a threshold, please try this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=_audit action=alert_fired ss_app=* 
| eval ttl=expiration-now() 
| search ttl&amp;gt;0 
| convert ctime(trigger_time) 
| stats count BY ss_name severity 
| where count&amp;gt;10&lt;/LI-CODE&gt;&lt;P&gt;If you're using Enterprise Security, you don't need to use a Correlation Search like this, but you could use the Risk Score for assets and identities, but it's too long to describe.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 09:04:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671868#M11826</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-12-14T09:04:25Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671870#M11827</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Can we use this CS in ES ?&lt;BR /&gt;Could you pls guide me how we could use the Risk Score for assets and identities?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 09:11:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671870#M11827</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-12-14T09:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671872#M11828</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;yes you can use it in cs, but you can also use Notables.&lt;/P&gt;&lt;P&gt;Anyway, as action when an alert is triggered, you can define a Risk Score to assign to an asset or to an identity instead to trigger an alert.&lt;/P&gt;&lt;P&gt;Then you can define a threshold for the risk score, so, you'll have a Notable when the risk score, for an asset or an identity exceeds the threshold.&lt;/P&gt;&lt;P&gt;See in the Actions from a Correlation Search the Risk Score and make some try, I cannot guide you more.&lt;/P&gt;&lt;P&gt;For more infos see at&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/ES/7.2.0/RBA/Analyzerisk" target="_blank"&gt;https://docs.splunk.com/Documentation/ES/7.2.0/RBA/Analyzerisk&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 09:18:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671872#M11828</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-12-14T09:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671873#M11829</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Why we are not seeing the alerts for the disabled CS using the above search ?&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 09:54:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671873#M11829</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-12-14T09:54:02Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671877#M11830</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;No, you have only to define the asset (or the identity) in the correlation search.&lt;/P&gt;&lt;P&gt;In other words, in the results of your CS you must have an asset (or the identity) and define this field for the risk score.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 09:52:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671877#M11830</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-12-14T09:52:14Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671878#M11831</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;the above search lists the triggered alerts, if an alert is disablen is also never triggered|&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 10:04:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671878#M11831</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-12-14T10:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671899#M11832</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Why the triggered alerts from the search&amp;nbsp; are not matching with the incident review alerts why so ?&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 13:40:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671899#M11832</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-12-14T13:40:21Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671901#M11833</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;they match with the correlation searches, but thei contain also other alerts outside ES and anyway don't matcj with disabled CS.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 14:01:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671901#M11833</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-12-14T14:01:41Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671902#M11834</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I had chosen to specify only ES and I haven't consider the disabled CS&amp;nbsp; but still, not all the alerts are showing up.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 14:09:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671902#M11834</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-12-14T14:09:02Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671906#M11835</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I don't know: the above search lists all the triggered alerts.&lt;/P&gt;&lt;P&gt;Otherwise you could run a search on the notable index and have the count for the triggered searches:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=notable
| stats count BY search_name
| where count&amp;gt;10&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 14:50:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671906#M11835</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-12-14T14:50:25Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671908#M11836</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Can we use it as a CS to trigger an alert when it exceeds the alert threshold ?&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 15:08:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671908#M11836</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-12-14T15:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671919#M11837</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;if you don't use the original CS, you don't have the notables for searching.&lt;/P&gt;&lt;P&gt;For this reason I hinted to use the risk score instead the notable as action.&lt;/P&gt;&lt;P&gt;You need someone that really knows ES to guide you or a training on ES using or administering.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 15:51:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671919#M11837</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-12-14T15:51:41Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671939#M11838</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I didn't get what is original CS mean is that with index notable or previous search ?&lt;BR /&gt;can you pls guide me or share me link to get master in ES!&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 16:46:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671939#M11838</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-12-14T16:46:01Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671947#M11839</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;this is the training:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.splunk.com/en_us/training/course-catalog.html?filters=filterGroup4SplunkEnterpriseSecurity" target="_blank" rel="noopener"&gt;https://www.splunk.com/en_us/training/course-catalog.html?filters=filterGroup4SplunkEnterpriseSecurity&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 17:09:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671947#M11839</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-12-14T17:09:03Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671950#M11840</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Its look like a paid course by any chance it there any link of free course ?&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 17:23:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671950#M11840</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-12-14T17:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671957#M11841</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;yes except the first, they are all paid courses.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 17:46:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671957#M11841</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-12-14T17:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Alert Monitoring.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671994#M11843</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;How to configure this search as a alert scheduling?&lt;BR /&gt;&lt;BR /&gt;threshold should be&amp;nbsp; 2 seconds....&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 07:57:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Search-for-Alert-Monitoring/m-p/671994#M11843</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-12-15T07:57:32Z</dc:date>
    </item>
  </channel>
</rss>

