<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Noteable Event Supression in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Noteable-Event-Supression/m-p/693682#M12021</link>
    <description>&lt;P&gt;Thanks, I wanted to avid that as I would need to updated a lot of correlation searches.&amp;nbsp; Any idea why this isn'g possible as the search looks like standard SPL?&lt;/P&gt;</description>
    <pubDate>Thu, 18 Jul 2024 07:58:07 GMT</pubDate>
    <dc:creator>Rhidian</dc:creator>
    <dc:date>2024-07-18T07:58:07Z</dc:date>
    <item>
      <title>Noteable Event Supression</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Noteable-Event-Supression/m-p/693609#M12017</link>
      <description>&lt;P&gt;Is it possible to use a lookup file in the Noteble Event supression say to look up a list of assets/enviroments that we do/don't want to know about?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 12:53:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Noteable-Event-Supression/m-p/693609#M12017</guid>
      <dc:creator>Rhidian</dc:creator>
      <dc:date>2024-07-17T12:53:46Z</dc:date>
    </item>
    <item>
      <title>Re: Noteable Event Supression</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Noteable-Event-Supression/m-p/693646#M12019</link>
      <description>&lt;P&gt;When you talk about Notable event suppression, I assume you are talking about the Notable Event Suppression action in the Incident Review.&lt;/P&gt;&lt;P&gt;If you want to whitelist/blacklist certain assets, then you should add the lookup logic to the correlation search that has caused the notable event in the first place.&lt;/P&gt;&lt;P&gt;You cannot add lookup logic to the event type search ES creates for the suppression logic.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 22:41:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Noteable-Event-Supression/m-p/693646#M12019</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2024-07-17T22:41:50Z</dc:date>
    </item>
    <item>
      <title>Re: Noteable Event Supression</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Noteable-Event-Supression/m-p/693650#M12020</link>
      <description>&lt;P&gt;Last month we were working on a Splunk ES Demo and i found out that we can not delete a notable.&lt;/P&gt;&lt;P&gt;either i have not understood the ES yet or the ES developers are really funny, lol !&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 01:40:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Noteable-Event-Supression/m-p/693650#M12020</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2024-07-18T01:40:59Z</dc:date>
    </item>
    <item>
      <title>Re: Noteable Event Supression</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Noteable-Event-Supression/m-p/693682#M12021</link>
      <description>&lt;P&gt;Thanks, I wanted to avid that as I would need to updated a lot of correlation searches.&amp;nbsp; Any idea why this isn'g possible as the search looks like standard SPL?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 07:58:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Noteable-Event-Supression/m-p/693682#M12021</guid>
      <dc:creator>Rhidian</dc:creator>
      <dc:date>2024-07-18T07:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: Noteable Event Supression</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Noteable-Event-Supression/m-p/693810#M12022</link>
      <description>&lt;P&gt;Unfortunately event type searches cannot contain any pipelines, so it has to be simply a raw search fragment&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 00:40:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Noteable-Event-Supression/m-p/693810#M12022</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2024-07-19T00:40:22Z</dc:date>
    </item>
  </channel>
</rss>

