<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Whitelisting values for notable events in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Whitelisting-values-for-notable-events/m-p/342723#M3246</link>
    <description>&lt;P&gt;part of the benefit is that if the lookup is replicated to indexers it greatly helps performance.&lt;/P&gt;</description>
    <pubDate>Fri, 03 Nov 2017 17:18:59 GMT</pubDate>
    <dc:creator>starcher</dc:creator>
    <dc:date>2017-11-03T17:18:59Z</dc:date>
    <item>
      <title>Whitelisting values for notable events</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Whitelisting-values-for-notable-events/m-p/342721#M3244</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;

&lt;P&gt;I've just got Enterprise Security configured and im now trying to reduce the amount of false alarms created.  Im seeing a lot of low/medium urgency network notable events that I would class as normal expected network traffic.  For example i've got hundreds of 'Abnormally High Number of HTTP GET Request Events' however a lot of them are for legitimate traffic.  &lt;/P&gt;

&lt;P&gt;Is possible to say do not create notable events for this event when destination = download.windowsupdate.com (or ideally a list of whitelisted URL's)?&lt;/P&gt;

&lt;P&gt;Any help would be greatly appreciated!&lt;/P&gt;

&lt;P&gt;Cheers&lt;/P&gt;

&lt;P&gt;Sam&lt;/P&gt;</description>
      <pubDate>Fri, 03 Nov 2017 13:04:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Whitelisting-values-for-notable-events/m-p/342721#M3244</guid>
      <dc:creator>samhodgson</dc:creator>
      <dc:date>2017-11-03T13:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: Whitelisting values for notable events</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Whitelisting-values-for-notable-events/m-p/342722#M3245</link>
      <description>&lt;P&gt;I'm stealing this suggestion that @starcher made in the enterprise-security channel on Slack.&lt;/P&gt;

&lt;P&gt;You can make a lookup with the URLs that you want to ignore from the search, then use that lookup to drop them from the correlation search. This requires modifying the correlation search (I'd recommend making a new one from scratch, and disable the default one)&lt;/P&gt;

&lt;P&gt;So, for example, the destination field has the URLs you want dropped, leave the correlation search syntax as-is, then append the lookup at the end and dropping anything that doesn't match. Because it's a URL match, it might not be as fuzzy as you want it, but it's a start.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;| lookup mywhitelist destination OUTPUTNEW destination AS isFound | where isnull(isFound)&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Nov 2017 16:34:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Whitelisting-values-for-notable-events/m-p/342722#M3245</guid>
      <dc:creator>smoir_splunk</dc:creator>
      <dc:date>2017-11-03T16:34:38Z</dc:date>
    </item>
    <item>
      <title>Re: Whitelisting values for notable events</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Whitelisting-values-for-notable-events/m-p/342723#M3246</link>
      <description>&lt;P&gt;part of the benefit is that if the lookup is replicated to indexers it greatly helps performance.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Nov 2017 17:18:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Whitelisting-values-for-notable-events/m-p/342723#M3246</guid>
      <dc:creator>starcher</dc:creator>
      <dc:date>2017-11-03T17:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: Whitelisting values for notable events</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Whitelisting-values-for-notable-events/m-p/342724#M3247</link>
      <description>&lt;P&gt;Thanks this helps a lot &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 10:00:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Whitelisting-values-for-notable-events/m-p/342724#M3247</guid>
      <dc:creator>samhodgson</dc:creator>
      <dc:date>2017-11-07T10:00:17Z</dc:date>
    </item>
  </channel>
</rss>

