<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk App for Enterprise Security: How to add additional fields to events under &amp;quot;Incident Review&amp;quot;? in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181417#M840</link>
    <description>&lt;P&gt;Thanks @ekost &amp;amp; @jbrodsky, I have just configured a test instance with version 3.3.1 and this solution appears to be working correctly.&lt;/P&gt;

&lt;P&gt;In our current version the &lt;CODE&gt;log_review.conf&lt;/CODE&gt;file does not have the same contents (namely missing &lt;CODE&gt;table_attributes&lt;/CODE&gt; and &lt;CODE&gt;event_attributes&lt;/CODE&gt;)&lt;/P&gt;

&lt;P&gt;Looks like I will have to schedule in some upgrade work!&lt;/P&gt;

&lt;P&gt;Thanks for your help.&lt;/P&gt;

&lt;P&gt;Best,&lt;/P&gt;

&lt;P&gt;Matt&lt;/P&gt;</description>
    <pubDate>Sat, 22 Aug 2015 14:24:07 GMT</pubDate>
    <dc:creator>MHibbin</dc:creator>
    <dc:date>2015-08-22T14:24:07Z</dc:date>
    <item>
      <title>Splunk App for Enterprise Security: How to add additional fields to events under "Incident Review"?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181409#M832</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;We have a requirement to add some additional fields to events under "Incident Review" for IOCs (I have looked at some of the mappings in &lt;CODE&gt;notables2.html&lt;/CODE&gt;), however, they don't give us quite enough flexibility.&lt;/P&gt;

&lt;P&gt;How do I add these additional fields under the heading "Additional Fields" (e.g. &lt;CODE&gt;dest&lt;/CODE&gt; displays as "Destination")?&lt;/P&gt;

&lt;P&gt;I have had a look at the following however changing the HTML or &lt;CODE&gt;log_review.conf&lt;/CODE&gt; did not appear to make any difference:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://answers.splunk.com/answers/183891/configuring-additional-fields-for-a-notable-event.html?utm_source=typeahead&amp;amp;utm_medium=newquestion&amp;amp;utm_campaign=no_votes_sort_relev"&gt;http://answers.splunk.com/answers/183891/configuring-additional-fields-for-a-notable-event.html?utm_source=typeahead&amp;amp;utm_medium=newquestion&amp;amp;utm_campaign=no_votes_sort_relev&lt;/A&gt; &lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;MHibbin&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 15:47:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181409#M832</guid>
      <dc:creator>MHibbin</dc:creator>
      <dc:date>2015-08-19T15:47:47Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App for Enterprise Security: How to add additional fields to events under "Incident Review"?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181410#M833</link>
      <description>&lt;P&gt;Have you seen this portion of the documentation : &lt;A href="http://docs.splunk.com/Documentation/ES/3.3.1/User/IncidentReviewdashboard#Modify_the_Incident_Review_dashboard"&gt;http://docs.splunk.com/Documentation/ES/3.3.1/User/IncidentReviewdashboard#Modify_the_Incident_Review_dashboard&lt;/A&gt; ? &lt;/P&gt;

&lt;P&gt;It describes removing fields, but it should hold the same to adding fields, but I havent tried this yet. If you try, do let us know the results.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 15:58:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181410#M833</guid>
      <dc:creator>esix_splunk</dc:creator>
      <dc:date>2015-08-19T15:58:59Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App for Enterprise Security: How to add additional fields to events under "Incident Review"?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181411#M834</link>
      <description>&lt;P&gt;Thanks @esix,&lt;/P&gt;

&lt;P&gt;My log_review.conf file only has the following:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[notable_editing]
allow_urgency_override=true

[comment]
minimum_length=20
is_required=false
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I also used btool to identify any other instances, however, that was the only one.&lt;/P&gt;

&lt;P&gt;So don't really have much to go on.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 16:08:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181411#M834</guid>
      <dc:creator>MHibbin</dc:creator>
      <dc:date>2015-08-19T16:08:52Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App for Enterprise Security: How to add additional fields to events under "Incident Review"?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181412#M835</link>
      <description>&lt;P&gt;Can you verify what you're trying to accomplish? My interpretation is, you would like the correlation search to grab additional fields and provide/display them in a notable event. But your description could also be interpreted as adding a new event action from an existing field in a notable event. And @esix is offering another perspective.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2015 15:26:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181412#M835</guid>
      <dc:creator>ekost</dc:creator>
      <dc:date>2015-08-20T15:26:51Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App for Enterprise Security: How to add additional fields to events under "Incident Review"?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181413#M836</link>
      <description>&lt;P&gt;@ekost,&lt;/P&gt;

&lt;P&gt;My correlation search is generating all the fields required (i.e. I could add them to the title/description as variables), however I would like them to appear under "Additional Fields", where there is currently items such as:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Destination&lt;/LI&gt;
&lt;LI&gt;Destination Expected&lt;/LI&gt;
&lt;LI&gt;Destination Requires AntiVirus&lt;/LI&gt;
&lt;LI&gt;Process&lt;/LI&gt;
&lt;LI&gt;User&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Obviously these are fields that are referenced in the CIM; I would like to add ones, e.g:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;IOC Source&lt;/LI&gt;
&lt;LI&gt;IOC Description&lt;/LI&gt;
&lt;LI&gt;IOC Classification&lt;/LI&gt;
&lt;LI&gt;IOC Date&lt;/LI&gt;
&lt;LI&gt;Etc,&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;The intention is that I we can add these fields to the notables/events in Incident Review, so that the review is more streamlined and also so that we can create workflow actions on the IOC themselves (e.g. Open Source checks, checks on other systems internally, etc.) for each instance.&lt;/P&gt;

&lt;P&gt;We do have other use cases, not just IOC information.&lt;/P&gt;

&lt;P&gt;Hope this is a bit clearer.&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2015 15:47:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181413#M836</guid>
      <dc:creator>MHibbin</dc:creator>
      <dc:date>2015-08-20T15:47:11Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App for Enterprise Security: How to add additional fields to events under "Incident Review"?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181414#M837</link>
      <description>&lt;P&gt;I've verified that the advice of @jbrodsky is correct. The log_review.conf controls the fields displayed in Incident Review. If you wish to add fields, copy the entire &lt;CODE&gt;$SPLUNK_HOME/etc/apps/SA-ThreatIntelligence/default/log_review.conf&lt;/CODE&gt; to &lt;CODE&gt;SA-ThreatIntelligence/local&lt;/CODE&gt; and add the new fields under the stanza:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[incident_review]
event_attributes = 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;An example is available in: &lt;CODE&gt;SA-ThreatIntelligence/README/log_review.conf.example&lt;/CODE&gt;. You can verify the changes with: &lt;CODE&gt;splunk cmd btool log_review list —debug&lt;/CODE&gt;. Note: if you tack the new fields on to the bottom of the file, beware of leaving a trailing comma on the bottom/last field definition. That bit me while testing the changes.&lt;/P&gt;

&lt;P&gt;The default behavior is that the field name will not appear in the NE if the search results do not contain data for that field. If you don't see your new fields, test the output again with a field that appears in all results, such as index. Refresh the Incident Review dashboard after changing &lt;CODE&gt;log_review.conf&lt;/CODE&gt; for the changes to take effect. &lt;/P&gt;

&lt;P&gt;I hope that helps!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:03:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181414#M837</guid>
      <dc:creator>ekost</dc:creator>
      <dc:date>2020-09-29T07:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App for Enterprise Security: How to add additional fields to events under "Incident Review"?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181415#M838</link>
      <description>&lt;P&gt;So Matt, I'm late to the game, but you mention that changes to log_review.conf are not making any difference. Can you go through the more detailed example given by @ekost and let us know what the results are? I'm curious as to the output of btool...&lt;/P&gt;</description>
      <pubDate>Fri, 21 Aug 2015 19:38:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181415#M838</guid>
      <dc:creator>jbrodsky_splunk</dc:creator>
      <dc:date>2015-08-21T19:38:16Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App for Enterprise Security: How to add additional fields to events under "Incident Review"?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181416#M839</link>
      <description>&lt;P&gt;BTW: you can use an online JSON parser to verify that the fields are valid JSON. I generally use this one: &lt;A href="http://json.parser.online.fr/"&gt;http://json.parser.online.fr/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Aug 2015 20:14:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181416#M839</guid>
      <dc:creator>LukeMurphey</dc:creator>
      <dc:date>2015-08-21T20:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App for Enterprise Security: How to add additional fields to events under "Incident Review"?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181417#M840</link>
      <description>&lt;P&gt;Thanks @ekost &amp;amp; @jbrodsky, I have just configured a test instance with version 3.3.1 and this solution appears to be working correctly.&lt;/P&gt;

&lt;P&gt;In our current version the &lt;CODE&gt;log_review.conf&lt;/CODE&gt;file does not have the same contents (namely missing &lt;CODE&gt;table_attributes&lt;/CODE&gt; and &lt;CODE&gt;event_attributes&lt;/CODE&gt;)&lt;/P&gt;

&lt;P&gt;Looks like I will have to schedule in some upgrade work!&lt;/P&gt;

&lt;P&gt;Thanks for your help.&lt;/P&gt;

&lt;P&gt;Best,&lt;/P&gt;

&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Sat, 22 Aug 2015 14:24:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181417#M840</guid>
      <dc:creator>MHibbin</dc:creator>
      <dc:date>2015-08-22T14:24:07Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App for Enterprise Security: How to add additional fields to events under "Incident Review"?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181418#M841</link>
      <description>&lt;P&gt;That comma is very important . I encountered an issue where the commas were missing after "User Email"} :&lt;BR /&gt;
{"field": "user_email", "label": "User Email"}\ &lt;/P&gt;

&lt;P&gt;this caused the Incident Review - Event Attributes to be hidden and the add new entry button to disappear as well. It was not until those changes were made that it all worked out. &lt;/P&gt;

&lt;P&gt;{"field": "user_email", "label": "User Email"},\ &lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 20:06:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-App-for-Enterprise-Security-How-to-add-additional-fields/m-p/181418#M841</guid>
      <dc:creator>jrivas_splunk</dc:creator>
      <dc:date>2018-04-30T20:06:00Z</dc:date>
    </item>
  </channel>
</rss>

