<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk query for use case onboarded in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709682#M12267</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/275847"&gt;@Sankar&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Correlation Searches, in ES, write triggered alerts in the notable index.&lt;/P&gt;&lt;P&gt;You can see in this index and create a statistic for search_name:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=notable
| stats count BY search_name&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Fri, 24 Jan 2025 13:45:58 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2025-01-24T13:45:58Z</dc:date>
    <item>
      <title>Splunk query for use case onboarded</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709673#M12266</link>
      <description>&lt;P&gt;we have 100+ use cases onboarded into splunk ES. also we are receiving the alerts few of them but i want to know exact count how many use cases onboarded into the splunk in that how many triggered the alerts?&lt;/P&gt;&lt;P&gt;much appreciated any one guide.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 12:57:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709673#M12266</guid>
      <dc:creator>Sankar</dc:creator>
      <dc:date>2025-01-24T12:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query for use case onboarded</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709682#M12267</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/275847"&gt;@Sankar&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Correlation Searches, in ES, write triggered alerts in the notable index.&lt;/P&gt;&lt;P&gt;You can see in this index and create a statistic for search_name:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=notable
| stats count BY search_name&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 13:45:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709682#M12267</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-01-24T13:45:58Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query for use case onboarded</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709688#M12268</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;its working.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i want to filter each alert, based on Urgency like (High, Medium, Low, informational)&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I tried below query but its not working.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;| fields Title Urgency
| table Title Urgency&lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 15:07:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709688#M12268</guid>
      <dc:creator>Sankar</dc:creator>
      <dc:date>2025-01-24T15:07:10Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query for use case onboarded</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709702#M12269</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/275847"&gt;@Sankar&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;do you want to dispay urgency of each search or to filter results by urgency?&lt;/P&gt;&lt;P&gt;in the first case:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=notable
| stats values(urgency) As urgency count BY search_name&lt;/LI-CODE&gt;&lt;P&gt;in the second case (to have only notable with urgency=high):&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=notable urgency=high
| stats count BY search_name&lt;/LI-CODE&gt;&lt;P&gt;let me know if I can help you more, or, please, accept one answer for the other people of Community.&lt;/P&gt;&lt;P&gt;Ciao and happy splunking&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 15:03:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709702#M12269</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-01-24T15:03:59Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query for use case onboarded</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709721#M12272</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First case query its working. but urgency field i don't see any severity.&amp;nbsp;&lt;BR /&gt;all alerts urgency field is empty only. but in the rule we set under Adaptive response actions--&amp;gt; notable --&amp;gt;severity value. (Ex High, Medium, Low, informational)&lt;/P&gt;&lt;P&gt;we have 40+ indexes so i want to each alert for Search Name, Index, Urgency, count.&lt;BR /&gt;&lt;BR /&gt;hope you can able to share right info.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 16:31:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709721#M12272</guid>
      <dc:creator>Sankar</dc:creator>
      <dc:date>2025-01-24T16:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query for use case onboarded</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709724#M12273</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/275847"&gt;@Sankar&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Urgency depends on Priority (from the Correlation Search) and priority (from the Asset/Identity).&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gcusello_0-1737737457654.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/34239iBF1329EB7372EADE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="gcusello_0-1737737457654.png" alt="gcusello_0-1737737457654.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Didi you defined Priority in Asset and Identity Management?&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 16:51:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709724#M12273</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-01-24T16:51:11Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query for use case onboarded</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709725#M12274</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp; I understand your points. As a Splunk SME i have created the rules and urgency values has been set in correlation search.&lt;/P&gt;&lt;P&gt;but do we really need Asset/Identity management?&lt;BR /&gt;Ass/IM taking care by different teams.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have enabled use cases &amp;amp; its triggered alerts also, only thing is we are unable to see Urgency Field values. what is the best practice to view urgency filed?&lt;BR /&gt;&lt;BR /&gt;Thank you so much for responding my queries.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 17:58:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709725#M12274</guid>
      <dc:creator>Sankar</dc:creator>
      <dc:date>2025-01-24T17:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query for use case onboarded</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709764#M12275</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/275847"&gt;@Sankar&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;if you haven't Asset and Identity management you cannot define Priority but only urgency: use it in your reports.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jan 2025 15:01:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709764#M12275</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-01-25T15:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query for use case onboarded</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709931#M12280</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;do we have any reference guide from splunk? or servicenow?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2025 09:50:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709931#M12280</guid>
      <dc:creator>Sankar</dc:creator>
      <dc:date>2025-01-28T09:50:37Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query for use case onboarded</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709934#M12281</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/275847"&gt;@Sankar&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;only training on ES:&lt;/P&gt;&lt;P&gt;you must define a search to extract assets and identities from AD logs or from Servicenow.&lt;/P&gt;&lt;P&gt;these items must be formatted (field names) using the names that you can find in assets and identities management in ES.&lt;/P&gt;&lt;P&gt;When you created this search, you can schedule it adding the information about priority (e.g. Domain Controllers have a critical Priority, pcs of CEO and managers have a critical priority, if you are an eCommerce company, payment services are critical and so on based on your Business Impact Analysis.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2025 10:37:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-query-for-use-case-onboarded/m-p/709934#M12281</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-01-28T10:37:17Z</dc:date>
    </item>
  </channel>
</rss>

