<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Enterprise security app in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Enterprise-security-app/m-p/742420#M12441</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am currently working on configuring Splunk Enterprise Security app, I already have data flowing into Splunk Enterprise, but I'm not sure how to properly configure the data inputs for the app.&lt;/P&gt;&lt;P&gt;Could anyone guide me on how to configure the data sources in Enterprise Security app ? If there is any specific documentation on this, I would appreciate it if you could provide it.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Mar 2025 14:12:52 GMT</pubDate>
    <dc:creator>BRFZ</dc:creator>
    <dc:date>2025-03-21T14:12:52Z</dc:date>
    <item>
      <title>Enterprise security app</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Enterprise-security-app/m-p/742420#M12441</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am currently working on configuring Splunk Enterprise Security app, I already have data flowing into Splunk Enterprise, but I'm not sure how to properly configure the data inputs for the app.&lt;/P&gt;&lt;P&gt;Could anyone guide me on how to configure the data sources in Enterprise Security app ? If there is any specific documentation on this, I would appreciate it if you could provide it.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 14:12:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Enterprise-security-app/m-p/742420#M12441</guid>
      <dc:creator>BRFZ</dc:creator>
      <dc:date>2025-03-21T14:12:52Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise security app</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Enterprise-security-app/m-p/742421#M12442</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;Splunk Enterprise Security (ES) is a sort of extra layer to Splunk Enterprise, and it brings you more integrated possibilities :&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;More possibilities when it come to create Alerts (Called Notable in ES. [this name must have changed in version 8 though])&lt;/LI&gt;&lt;LI&gt;An Alert Managment system (Incident Review) which allows a team to watch alerts and investigate them&lt;/LI&gt;&lt;LI&gt;IOC detection and managment system&lt;/LI&gt;&lt;LI&gt;Tons of useful dashboards&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;All of that heavely relies on,&lt;/P&gt;&lt;P&gt;&lt;FONT size="5"&gt;Your &lt;STRONG&gt;data&lt;/STRONG&gt; :&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If the data you're already ingesting into Splunk Enterprise is &lt;STRONG&gt;CIM compliant&lt;/STRONG&gt;&lt;BR /&gt;Documentation : &lt;A href="https://docs.splunk.com/Documentation/CIM/6.0.2/User/Overview" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/CIM/6.0.2/User/Overview&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;How well this data is mapped to Splunk &lt;STRONG&gt;Datamodels&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Everything is well explained in this page : &lt;A href="https://docs.splunk.com/Documentation/ES/8.0.2/Install/DataSourcePlanning" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/ES/8.0.2/Install/DataSourcePlanning&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;Identities&lt;/STRONG&gt; (login accounts) and &lt;STRONG&gt;Assets&lt;/STRONG&gt; (hosts) :&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;You must give to Splunk ES a list of :&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;identities&lt;/STRONG&gt; of account names of the users of your organization&lt;/LI&gt;&lt;LI&gt;hostnames / IP adresses of the assets of your organization&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This process is explained on this page : &lt;A href="https://docs.splunk.com/Documentation/ES/8.0.2/Admin/VerifyAssetIdentityData" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/ES/8.0.2/Admin/VerifyAssetIdentityData&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Configuring ES to its full potential can take some time and energy but it worth it.&lt;/P&gt;&lt;P&gt;Best,&lt;BR /&gt;Ch.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 14:38:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Enterprise-security-app/m-p/742421#M12442</guid>
      <dc:creator>gargantua</dc:creator>
      <dc:date>2025-03-21T14:38:35Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise security app</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Enterprise-security-app/m-p/742426#M12443</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/266281"&gt;@BRFZ&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your data is landing in Splunk then the next thing you'll probably want to start looking at is ensuring that it is CIM compliant and then starting to enable/create Rules, based on your requirements.&lt;/P&gt;&lt;P&gt;To do this properly you want to make sure it is planned out well and have clear requirements, rather than enabling lots of Rules sporadically!&lt;/P&gt;&lt;P&gt;Some good resources to check out are:&lt;/P&gt;&lt;P&gt;Splunk Lantern -&amp;nbsp;&lt;A href="https://lantern.splunk.com/Security/Getting_Started/Getting_started_with_ES" target="_blank"&gt;https://lantern.splunk.com/Security/Getting_Started/Getting_started_with_ES&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Splunk Security Essentials -&amp;nbsp;&lt;A href="https://splunkbase.splunk.com/app/3435" target="_blank"&gt;https://splunkbase.splunk.com/app/3435&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Splunk ES 101 video -&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=Euas6lCK-LE" target="_blank"&gt;https://www.youtube.com/watch?v=Euas6lCK-LE&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Splunk ES Certified Admin training path -&amp;nbsp;&lt;A href="https://www.splunk.com/en_us/training/certification-track/splunk-es-certified-admin.html" target="_blank"&gt;https://www.splunk.com/en_us/training/certification-track/splunk-es-certified-admin.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Please let me know how you get on and consider adding karma to this or any other answer if it has helped.&lt;BR /&gt;Regards&lt;BR /&gt;&lt;BR /&gt;Will&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 15:34:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Enterprise-security-app/m-p/742426#M12443</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-03-21T15:34:56Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise security app</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Enterprise-security-app/m-p/742518#M12451</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/266281"&gt;@BRFZ&lt;/a&gt;&amp;nbsp; As&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/170906"&gt;@livehybrid&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253636"&gt;@gargantua&lt;/a&gt;&amp;nbsp;explained, those links and materials will help you to understand ES better at your own pace. Having said that, if you have already ingested your data sources on to Splunk ( on-prem or on to splunk cloud), your ES should be able to use those data.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ES comes with number of out of box dashboards and these rely on CIM compliance of your data source. Refer to&amp;nbsp; requirements &lt;A title="ES Dashboard CIM " href="https://docs.splunk.com/Documentation/ES/latest/Admin/DataModelReference" target="_self"&gt;here&lt;/A&gt;, if you plan to use any of these dashboards.&lt;/LI&gt;&lt;LI&gt;Suggest reviewing your use cases and see how you can make sure of the datamodels for improved searches and triage. If you want the search results to be available in the incident review screen for triage, analysis, you would need to create/configure your detections/rules/alerts as correlation searches.&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Mon, 24 Mar 2025 09:53:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Enterprise-security-app/m-p/742518#M12451</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2025-03-24T09:53:59Z</dc:date>
    </item>
  </channel>
</rss>

