<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How can we track changes made in correlation searches? in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-can-we-track-changes-made-in-correlation-searches/m-p/519850#M9268</link>
    <description>&lt;P&gt;I want to create a scheduled search that will track the &lt;STRONG&gt;changes made in content under Splunk Enterprise&lt;/STRONG&gt; security app. If someone &lt;STRONG&gt;modifies correlation searches&lt;/STRONG&gt; i want my query to capture it. Can this be achieved??&lt;/P&gt;
&lt;P&gt;Please help.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 17 Nov 2022 16:32:59 GMT</pubDate>
    <dc:creator>ManishVilla7</dc:creator>
    <dc:date>2022-11-17T16:32:59Z</dc:date>
    <item>
      <title>How can we track changes made in correlation searches?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-can-we-track-changes-made-in-correlation-searches/m-p/519850#M9268</link>
      <description>&lt;P&gt;I want to create a scheduled search that will track the &lt;STRONG&gt;changes made in content under Splunk Enterprise&lt;/STRONG&gt; security app. If someone &lt;STRONG&gt;modifies correlation searches&lt;/STRONG&gt; i want my query to capture it. Can this be achieved??&lt;/P&gt;
&lt;P&gt;Please help.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 16:32:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-can-we-track-changes-made-in-correlation-searches/m-p/519850#M9268</guid>
      <dc:creator>ManishVilla7</dc:creator>
      <dc:date>2022-11-17T16:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: How can we track changes made in Correlation searches??</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-can-we-track-changes-made-in-correlation-searches/m-p/519908#M9270</link>
      <description>&lt;P&gt;There's no good way to do that within Splunk.&amp;nbsp; The audit logs may tell that someone touched a CS, but it won't say what changes were made.&lt;/P&gt;&lt;P&gt;Consider tracking your .conf files in a source management tool like git so you not only know when a change is made, but can revert to a previous instance if necessary.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Sep 2020 12:45:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-can-we-track-changes-made-in-correlation-searches/m-p/519908#M9270</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-09-16T12:45:11Z</dc:date>
    </item>
    <item>
      <title>Re: How can we track changes made in Correlation searches??</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-can-we-track-changes-made-in-correlation-searches/m-p/519909#M9271</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;can we at-least get the info of who made the change, search name, time. I am not tracking the exact change made but who all made the changes.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Sep 2020 12:50:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-can-we-track-changes-made-in-correlation-searches/m-p/519909#M9271</guid>
      <dc:creator>ManishVilla7</dc:creator>
      <dc:date>2020-09-16T12:50:38Z</dc:date>
    </item>
    <item>
      <title>Re: How can we track changes made in Correlation searches??</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-can-we-track-changes-made-in-correlation-searches/m-p/519958#M9274</link>
      <description>&lt;P&gt;Start with this query.&amp;nbsp; Replace "&lt;FONT face="courier new,courier"&gt;&amp;lt;searchName&amp;gt;&lt;/FONT&gt;" with the URL-encoded name of the search you're interested in.&amp;nbsp; Or use "saved/searches" for a generic search.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=_internal "&amp;lt;searchName&amp;gt;" sourcetype=splunkd_ui_access source="*splunkd_ui_access.log" "POST"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Sep 2020 15:29:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-can-we-track-changes-made-in-correlation-searches/m-p/519958#M9274</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-09-16T15:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: How can we track changes made in Correlation searches??</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-can-we-track-changes-made-in-correlation-searches/m-p/520030#M9275</link>
      <description>&lt;P&gt;Possibly use the rest command combined with Rich's internal search: (taken&amp;nbsp; and edited from:&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/ES/6.3.0/Admin/Listcorrelationsearches" target="_blank"&gt;https://docs.splunk.com/Documentation/ES/6.3.0/Admin/Listcorrelationsearches&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;| rest splunk_server=local count=0 /servicesNS/-/SplunkEnterpriseSecuritySuite/saved/searches | where match('action.correlationsearch.enabled', "1|[Tt]|[Tt][Rr][Uu][Ee]") | where disabled=0 | eval actions=split(actions, ",")&amp;nbsp; | fields title, search, updated&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The Updated field represents when the correlation search was updated (changed) - I tested this on my own instance.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, you could keep a list of enabled searches with their update times in a lookup table using that rest search. Then in a new correlation search compare the current rest results with the historic lookup table and if the update times are different - there was a change.&lt;/P&gt;&lt;P&gt;Then in the drill down of the correlation search you could pass the name of the search as a token and update time (using maybe earliest= and latest= in the search SPL with that token) and search on the internal index via Rich's search or something similar to find the user who made the change.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Sep 2020 23:12:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-can-we-track-changes-made-in-correlation-searches/m-p/520030#M9275</guid>
      <dc:creator>Jhunter</dc:creator>
      <dc:date>2020-09-16T23:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: How can we track changes made in Correlation searches??</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-can-we-track-changes-made-in-correlation-searches/m-p/554212#M9951</link>
      <description>&lt;P&gt;I was searching for the same, then i developed this app for the community.&amp;nbsp;&lt;A href="https://splunkbase.splunk.com/app/4144/" target="_blank"&gt;https://splunkbase.splunk.com/app/4144/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jun 2021 07:26:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-can-we-track-changes-made-in-correlation-searches/m-p/554212#M9951</guid>
      <dc:creator>amitpanjawani</dc:creator>
      <dc:date>2021-06-03T07:26:32Z</dc:date>
    </item>
    <item>
      <title>Re: How can we track changes made in Correlation searches??</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-can-we-track-changes-made-in-correlation-searches/m-p/621278#M11167</link>
      <description>&lt;P&gt;Going through the audit logs I found this query helpful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;index=_audit action=create_saved_search actions=* app=* disabled=* info=* user=*&lt;BR /&gt;| table _time savedsearch user action actions app disabled info&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 16:29:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-can-we-track-changes-made-in-correlation-searches/m-p/621278#M11167</guid>
      <dc:creator>wabesman_OG</dc:creator>
      <dc:date>2022-11-17T16:29:10Z</dc:date>
    </item>
  </channel>
</rss>

