<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how to check severity of notable event in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/how-to-check-severity-of-notable-event/m-p/458789#M6552</link>
    <description>&lt;P&gt;If left to Splunk defaults, the severities should be calculated based on the severity assigned to the notable event, cross referenced with the priorities of affected assets and users.&lt;/P&gt;

&lt;P&gt;However, you can manually set a severity value by using a field called "severity", which Splunk will use as the severity value.  This can be useful for when you want to dynamically change the severity based on other factors, such as a CVE score on an IDS detection.&lt;/P&gt;

&lt;P&gt;e.g.&lt;/P&gt;

&lt;P&gt;...|eval severity=case(cvs_score&amp;gt;9, "critical", cvs_score&amp;gt;7, "high", cvs_score&amp;gt;4, "medium", cvs_score&amp;gt;0, "low", 1==1, "unknown")&lt;/P&gt;

&lt;P&gt;It is also worth noting that some IDS/IPS/AV systems use a severity field by default which overrides the ES calculated severity.  Where this is not desired, it is worth renaming the field in the logs to something like:&lt;/P&gt;

&lt;P&gt;...|rename severity as orig_severity&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 21:19:19 GMT</pubDate>
    <dc:creator>sheamus69</dc:creator>
    <dc:date>2020-09-29T21:19:19Z</dc:date>
    <item>
      <title>how to check severity of notable event</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/how-to-check-severity-of-notable-event/m-p/458786#M6549</link>
      <description>&lt;P&gt;I want to check the severity of notable events so that I can hardcode the value of urgency without using lookups.&lt;BR /&gt;
Is there a way to check urgency of notable events ?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Sep 2018 08:27:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/how-to-check-severity-of-notable-event/m-p/458786#M6549</guid>
      <dc:creator>snigdhasaxena</dc:creator>
      <dc:date>2018-09-17T08:27:02Z</dc:date>
    </item>
    <item>
      <title>Re: how to check severity of notable event</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/how-to-check-severity-of-notable-event/m-p/458787#M6550</link>
      <description>&lt;P&gt;Hi @snigdhasaxena,&lt;/P&gt;

&lt;P&gt;Please refer this document &lt;A href="http://docs.splunk.com/Documentation/ES/5.1.0/User/Howurgencyisassigned"&gt;http://docs.splunk.com/Documentation/ES/5.1.0/User/Howurgencyisassigned&lt;/A&gt;, you will get answer.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Sep 2018 12:15:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/how-to-check-severity-of-notable-event/m-p/458787#M6550</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2018-09-17T12:15:57Z</dc:date>
    </item>
    <item>
      <title>Re: how to check severity of notable event</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/how-to-check-severity-of-notable-event/m-p/458788#M6551</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;Thanks for responding but I want to see severity tagged to each notable event and not how it is assigned.&lt;BR /&gt;
Do we have any field which corresponds to severity values.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Sep 2018 13:01:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/how-to-check-severity-of-notable-event/m-p/458788#M6551</guid>
      <dc:creator>snigdhasaxena</dc:creator>
      <dc:date>2018-09-17T13:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: how to check severity of notable event</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/how-to-check-severity-of-notable-event/m-p/458789#M6552</link>
      <description>&lt;P&gt;If left to Splunk defaults, the severities should be calculated based on the severity assigned to the notable event, cross referenced with the priorities of affected assets and users.&lt;/P&gt;

&lt;P&gt;However, you can manually set a severity value by using a field called "severity", which Splunk will use as the severity value.  This can be useful for when you want to dynamically change the severity based on other factors, such as a CVE score on an IDS detection.&lt;/P&gt;

&lt;P&gt;e.g.&lt;/P&gt;

&lt;P&gt;...|eval severity=case(cvs_score&amp;gt;9, "critical", cvs_score&amp;gt;7, "high", cvs_score&amp;gt;4, "medium", cvs_score&amp;gt;0, "low", 1==1, "unknown")&lt;/P&gt;

&lt;P&gt;It is also worth noting that some IDS/IPS/AV systems use a severity field by default which overrides the ES calculated severity.  Where this is not desired, it is worth renaming the field in the logs to something like:&lt;/P&gt;

&lt;P&gt;...|rename severity as orig_severity&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 21:19:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/how-to-check-severity-of-notable-event/m-p/458789#M6552</guid>
      <dc:creator>sheamus69</dc:creator>
      <dc:date>2020-09-29T21:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: how to check severity of notable event</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/how-to-check-severity-of-notable-event/m-p/458790#M6553</link>
      <description>&lt;P&gt;Ok, if I am understanding your requirement correctly you would like to know &lt;CODE&gt;severity&lt;/CODE&gt; of all notable events and not &lt;CODE&gt;urgency&lt;/CODE&gt;. In this case while looking at ES structure when you create Correlation Search and add Adaptive Response as Notable, at that time you need select the severity and that severity will be assigned to all notable events generated by that Correlation search.&lt;/P&gt;

&lt;P&gt;When correlation search runs and if any events found and if you have selected Adaptive response as notable then all those output events of correlation search goes to &lt;CODE&gt;notable&lt;/CODE&gt; index and if you would like to know the &lt;CODE&gt;severity&lt;/CODE&gt; of those notable events in that case you can run below query.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=notable | lookup correlationsearches_lookup _key AS search_name OUTPUTNEW severity
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 17 Sep 2018 14:49:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/how-to-check-severity-of-notable-event/m-p/458790#M6553</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2018-09-17T14:49:50Z</dc:date>
    </item>
  </channel>
</rss>

