<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk ES Incident Review Suppression in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-ES-Incident-Review-Suppression/m-p/142807#M509</link>
    <description>&lt;P&gt;One associated default correlation search for which I cannot suppress notables is 'threat list activity detected'. thanks.&lt;/P&gt;</description>
    <pubDate>Fri, 18 Jul 2014 13:32:28 GMT</pubDate>
    <dc:creator>some_guy</dc:creator>
    <dc:date>2014-07-18T13:32:28Z</dc:date>
    <item>
      <title>Splunk ES Incident Review Suppression</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-ES-Incident-Review-Suppression/m-p/142805#M507</link>
      <description>&lt;P&gt;Having an issue within Splunk ES Incident Review. &lt;/P&gt;

&lt;P&gt;The option to suppress events from most correlation searches works fine. A handful of events &lt;BR /&gt;
do NOT offer the option to suppress. &lt;/P&gt;

&lt;P&gt;The offending non-suppressible events are a consequence of the same few correlation searches. No other commonalities exist, as far as I'm able to tell. My user context has full rights to the instance, so I'm stumped. &lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2014 13:51:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-ES-Incident-Review-Suppression/m-p/142805#M507</guid>
      <dc:creator>some_guy</dc:creator>
      <dc:date>2014-07-15T13:51:14Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk ES Incident Review Suppression</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-ES-Incident-Review-Suppression/m-p/142806#M508</link>
      <description>&lt;P&gt;Do you happen to know which correlation searches this happens with? It might be that they are missing the workflow actions to allow you to suppress them. I can verify if that is the case.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jul 2014 05:42:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-ES-Incident-Review-Suppression/m-p/142806#M508</guid>
      <dc:creator>LukeMurphey</dc:creator>
      <dc:date>2014-07-18T05:42:59Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk ES Incident Review Suppression</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-ES-Incident-Review-Suppression/m-p/142807#M509</link>
      <description>&lt;P&gt;One associated default correlation search for which I cannot suppress notables is 'threat list activity detected'. thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jul 2014 13:32:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-ES-Incident-Review-Suppression/m-p/142807#M509</guid>
      <dc:creator>some_guy</dc:creator>
      <dc:date>2014-07-18T13:32:28Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk ES Incident Review Suppression</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-ES-Incident-Review-Suppression/m-p/142808#M510</link>
      <description>&lt;P&gt;Did you ever figure this issue out?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Dec 2015 19:03:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-ES-Incident-Review-Suppression/m-p/142808#M510</guid>
      <dc:creator>AndySplunks</dc:creator>
      <dc:date>2015-12-22T19:03:18Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk ES Incident Review Suppression</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-ES-Incident-Review-Suppression/m-p/142809#M511</link>
      <description>&lt;P&gt;It appears this article may help you.  The section labeled "Suppress notable events from new correlation searches" appears to have the answer to your question.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/ES/2.4/Install/NotableEventSuppression"&gt;http://docs.splunk.com/Documentation/ES/2.4/Install/NotableEventSuppression&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Dec 2015 19:12:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-ES-Incident-Review-Suppression/m-p/142809#M511</guid>
      <dc:creator>AndySplunks</dc:creator>
      <dc:date>2015-12-22T19:12:02Z</dc:date>
    </item>
  </channel>
</rss>

