<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to integrate SA-Investigator with ES in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-integrate-SA-Investigator-with-ES/m-p/751289#M12617</link>
    <description>&lt;P&gt;I needed to preface the view name with&amp;nbsp;/app/SplunkEnterpriseSecuritySuite/&lt;BR /&gt;&lt;BR /&gt;Sample:&lt;BR /&gt;&lt;SPAN&gt;Investigate Identity Artifacts - "/app/SplunkEnterpriseSecuritySuite/ident_by_name"&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Investigate Asset Artifacts - "/app/SplunkEnterpriseSecuritySuite/asset_artifacts"&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Investigate File/Process Artifacts - "/app/SplunkEnterpriseSecuritySuite/file_artifacts"&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 08 Aug 2025 16:47:17 GMT</pubDate>
    <dc:creator>computermathguy</dc:creator>
    <dc:date>2025-08-08T16:47:17Z</dc:date>
    <item>
      <title>How to integrate SA-Investigator with ES</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-integrate-SA-Investigator-with-ES/m-p/391917#M4243</link>
      <description>&lt;P&gt;Greetings--&lt;/P&gt;

&lt;P&gt;I installed SA-Investigator on our ESSearchHead, but I do not understand how to launch the App.&lt;BR /&gt;
It appears on the App Menu, but when I select it, I get the pony error page.&lt;/P&gt;

&lt;P&gt;I am able to investigate artifacts from ES &amp;gt; Incident Review &amp;gt; Selecting the Incident &amp;gt; Action Menu &amp;gt; Investigate Asset Artifacts&lt;/P&gt;

&lt;P&gt;but for the life of me, I can't seem to launch SA-Investigator directly to do searches... for example, I would like to utilize the File/Process Investigator&lt;/P&gt;

&lt;P&gt;Please advise.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Apr 2019 15:11:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-integrate-SA-Investigator-with-ES/m-p/391917#M4243</guid>
      <dc:creator>richardphung</dc:creator>
      <dc:date>2019-04-05T15:11:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to integrate SA-Investigator with ES</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-integrate-SA-Investigator-with-ES/m-p/391918#M4244</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;that app is an SA, which means it's a Supporting Add-on. Thus you won't find a UI to use. As the decription says:&lt;/P&gt;

&lt;P&gt;"SA-Investigator is an extension that integrates with Splunk Enterprise Security. It provides a set of views based on the asset, identity or file/process values. Tabs for individual data models like malware, network traffic, certificates are set up for easy viewing and allow the analyst to pivot between these views on a entities without having to open multiple dashboards and enter in criteria to start a search. Workflow actions that allow pivoting from Incident Review are also included." - so you'll find the content in ES.&lt;/P&gt;

&lt;P&gt;Skalli&lt;/P&gt;</description>
      <pubDate>Sun, 07 Apr 2019 18:56:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-integrate-SA-Investigator-with-ES/m-p/391918#M4244</guid>
      <dc:creator>skalliger</dc:creator>
      <dc:date>2019-04-07T18:56:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to integrate SA-Investigator with ES</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-integrate-SA-Investigator-with-ES/m-p/391919#M4245</link>
      <description>&lt;P&gt;To show the dashboards directly from the UI once you have the app installed.&lt;/P&gt;

&lt;P&gt;Configure -&amp;gt; General -&amp;gt; Navigation &lt;/P&gt;

&lt;P&gt;Create a new collection. Maybe call it "Investigators".&lt;/P&gt;

&lt;P&gt;Add new Views:&lt;BR /&gt;
 Investigate Identity Artifacts  - "ident_by_name"&lt;BR /&gt;
 Investigate Asset Artifacts - "asset_artifacts"&lt;BR /&gt;
 Investigate File/Process Artifacts - "file_artifacts"&lt;/P&gt;

&lt;P&gt;Drag new views to the collection panel.&lt;/P&gt;

&lt;P&gt;Save and refresh screen. It will be on the toolbar.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 00:55:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-integrate-SA-Investigator-with-ES/m-p/391919#M4245</guid>
      <dc:creator>jamesbrock</dc:creator>
      <dc:date>2020-09-30T00:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to integrate SA-Investigator with ES</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-integrate-SA-Investigator-with-ES/m-p/751289#M12617</link>
      <description>&lt;P&gt;I needed to preface the view name with&amp;nbsp;/app/SplunkEnterpriseSecuritySuite/&lt;BR /&gt;&lt;BR /&gt;Sample:&lt;BR /&gt;&lt;SPAN&gt;Investigate Identity Artifacts - "/app/SplunkEnterpriseSecuritySuite/ident_by_name"&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Investigate Asset Artifacts - "/app/SplunkEnterpriseSecuritySuite/asset_artifacts"&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Investigate File/Process Artifacts - "/app/SplunkEnterpriseSecuritySuite/file_artifacts"&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Aug 2025 16:47:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-integrate-SA-Investigator-with-ES/m-p/751289#M12617</guid>
      <dc:creator>computermathguy</dc:creator>
      <dc:date>2025-08-08T16:47:17Z</dc:date>
    </item>
  </channel>
</rss>

