<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk generating multiple artifacts in phantom in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-generating-multiple-artifacts-in-phantom/m-p/483919#M7894</link>
    <description>&lt;P&gt;Thank you! So if I follow you, that's the action that occurs on the results of the savedsearch, right? Assuming I'm still with you, share with us how the search is defined?&lt;/P&gt;</description>
    <pubDate>Wed, 25 Sep 2019 16:30:44 GMT</pubDate>
    <dc:creator>sloshburch</dc:creator>
    <dc:date>2019-09-25T16:30:44Z</dc:date>
    <item>
      <title>Splunk generating multiple artifacts in phantom</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-generating-multiple-artifacts-in-phantom/m-p/483916#M7891</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;We're facing an issue when events are forwarded from splunk to phantom, multiple artifacts are being generated for each single event &lt;/P&gt;

&lt;P&gt;Noting that the configuration is done "by the book", what could be the reason behind that?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2019 11:32:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-generating-multiple-artifacts-in-phantom/m-p/483916#M7891</guid>
      <dc:creator>emkaxon</dc:creator>
      <dc:date>2019-09-19T11:32:38Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk generating multiple artifacts in phantom</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-generating-multiple-artifacts-in-phantom/m-p/483917#M7892</link>
      <description>&lt;P&gt;Would you clarify how you have things set up? Did you use &lt;A href="https://splunkbase.splunk.com/app/3411"&gt;Phantom App for Splunk&lt;/A&gt; and what &lt;A href="https://docs.splunk.com/Documentation/PhantomApp/latest/UserGuide"&gt;event forwarding methodology&lt;/A&gt; are you using?&lt;/P&gt;

&lt;P&gt;A good way to debug would be to disable all the event forwarders and turn them on one at a time to see which input (or inputs) are causing this.&lt;/P&gt;

&lt;P&gt;Also, share the search being used to generate the Splunk events that get sent.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 16:47:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-generating-multiple-artifacts-in-phantom/m-p/483917#M7892</guid>
      <dc:creator>sloshburch</dc:creator>
      <dc:date>2019-09-23T16:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk generating multiple artifacts in phantom</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-generating-multiple-artifacts-in-phantom/m-p/483918#M7893</link>
      <description>&lt;P&gt;We are now forwarding the events manually through the "Send to Phantom" adaptive responsive action. The event received in phantom generated 7 artifacts &lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2019 11:16:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-generating-multiple-artifacts-in-phantom/m-p/483918#M7893</guid>
      <dc:creator>emkaxon</dc:creator>
      <dc:date>2019-09-25T11:16:53Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk generating multiple artifacts in phantom</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-generating-multiple-artifacts-in-phantom/m-p/483919#M7894</link>
      <description>&lt;P&gt;Thank you! So if I follow you, that's the action that occurs on the results of the savedsearch, right? Assuming I'm still with you, share with us how the search is defined?&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2019 16:30:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-generating-multiple-artifacts-in-phantom/m-p/483919#M7894</guid>
      <dc:creator>sloshburch</dc:creator>
      <dc:date>2019-09-25T16:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk generating multiple artifacts in phantom</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-generating-multiple-artifacts-in-phantom/m-p/483920#M7895</link>
      <description>&lt;P&gt;The search consists of scanning for an ioc from carbon black, and when detected a notable event is generated  &lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2019 06:05:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-generating-multiple-artifacts-in-phantom/m-p/483920#M7895</guid>
      <dc:creator>emkaxon</dc:creator>
      <dc:date>2019-09-26T06:05:35Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk generating multiple artifacts in phantom</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-generating-multiple-artifacts-in-phantom/m-p/483921#M7896</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;

&lt;P&gt;The send to phantom action will extract artifacts from the splunk result for each row present. If you have multi-value fields in the result then it will extract one for each when using the "send to phantom" adaptive response action.&lt;/P&gt;

&lt;P&gt;Best practice is to use the event forwarding portion of the Phantom app, monitoring &lt;CODE&gt;notable&lt;/CODE&gt; and configuring the mapping of cef fields to control which fields are sent to Phantom. This also doesn't create multiple artifacts, you will have one with a string of all the multi-values joined together (which could require playbook actions to separate again)&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 15:04:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-generating-multiple-artifacts-in-phantom/m-p/483921#M7896</guid>
      <dc:creator>WalshyB</dc:creator>
      <dc:date>2019-10-07T15:04:11Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk generating multiple artifacts in phantom</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-generating-multiple-artifacts-in-phantom/m-p/590163#M10686</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="donbinhvn_0-1647940129515.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/18674iFD66074691AE11BE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="donbinhvn_0-1647940129515.png" alt="donbinhvn_0-1647940129515.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Look like new version of Splunk app allow us to group mv to a list.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2022 09:09:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-generating-multiple-artifacts-in-phantom/m-p/590163#M10686</guid>
      <dc:creator>donbinhvn</dc:creator>
      <dc:date>2022-03-22T09:09:18Z</dc:date>
    </item>
  </channel>
</rss>

