<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Setting Multiple severity level for same Correlation  search in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Setting-Multiple-severity-level-for-same-Correlation-search/m-p/326750#M3033</link>
    <description>&lt;P&gt;Within the correlation search you may be able to use an  &lt;CODE&gt;eval&lt;/CODE&gt; command with something like a &lt;CODE&gt;case&lt;/CODE&gt; statement to do this.  However, if you have a list of IPs, I am hoping that there is a second column that has a descriptor like high severity ip and low severity ip.  That way the case statement could look for one of the other and assign an urgency based on that value.  I have not tested that, but something along those lines should work.  &lt;/P&gt;

&lt;P&gt;This example we forced an urgency in for reference: &lt;A href="https://answers.splunk.com/answers/495073/splunk-enterprise-security-is-there-a-way-to-force.html#answer-495107"&gt;https://answers.splunk.com/answers/495073/splunk-enterprise-security-is-there-a-way-to-force.html#answer-495107&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 08 Sep 2017 12:14:38 GMT</pubDate>
    <dc:creator>jstoner_splunk</dc:creator>
    <dc:date>2017-09-08T12:14:38Z</dc:date>
    <item>
      <title>Setting Multiple severity level for same Correlation  search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Setting-Multiple-severity-level-for-same-Correlation-search/m-p/326749#M3032</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;Is it possible to set two different severity level for same Correlation search.&lt;/P&gt;

&lt;P&gt;For Eg &lt;BR /&gt;
My search output list source that are communicating to blacklisted IPs&lt;BR /&gt;
I have set the severity level as high in notable event of the search. But i want to include one more severity level as "informational" for few IPs.&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2017 12:05:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Setting-Multiple-severity-level-for-same-Correlation-search/m-p/326749#M3032</guid>
      <dc:creator>Shradha_Venkata</dc:creator>
      <dc:date>2017-09-08T12:05:12Z</dc:date>
    </item>
    <item>
      <title>Re: Setting Multiple severity level for same Correlation  search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Setting-Multiple-severity-level-for-same-Correlation-search/m-p/326750#M3033</link>
      <description>&lt;P&gt;Within the correlation search you may be able to use an  &lt;CODE&gt;eval&lt;/CODE&gt; command with something like a &lt;CODE&gt;case&lt;/CODE&gt; statement to do this.  However, if you have a list of IPs, I am hoping that there is a second column that has a descriptor like high severity ip and low severity ip.  That way the case statement could look for one of the other and assign an urgency based on that value.  I have not tested that, but something along those lines should work.  &lt;/P&gt;

&lt;P&gt;This example we forced an urgency in for reference: &lt;A href="https://answers.splunk.com/answers/495073/splunk-enterprise-security-is-there-a-way-to-force.html#answer-495107"&gt;https://answers.splunk.com/answers/495073/splunk-enterprise-security-is-there-a-way-to-force.html#answer-495107&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2017 12:14:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Setting-Multiple-severity-level-for-same-Correlation-search/m-p/326750#M3033</guid>
      <dc:creator>jstoner_splunk</dc:creator>
      <dc:date>2017-09-08T12:14:38Z</dc:date>
    </item>
  </channel>
</rss>

