<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Refining Threat Activity Search in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Refining-Threat-Activity-Search/m-p/343078#M159723</link>
    <description>&lt;P&gt;Hi, Im heading down the same path, maybe trying to reduce the number of notables by not raising one for anything under X number of bytes.&lt;BR /&gt;
Did you get anywhere with your method? I'd be very interested.&lt;BR /&gt;
Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 12 Mar 2018 00:58:16 GMT</pubDate>
    <dc:creator>markhill1</dc:creator>
    <dc:date>2018-03-12T00:58:16Z</dc:date>
    <item>
      <title>Refining Threat Activity Search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Refining-Threat-Activity-Search/m-p/343077#M159722</link>
      <description>&lt;P&gt;So I am trying to refine my Threat Activity Detected Search to only show "Allowed" connections rather than any blocked messages. Has anyone tried this before because in the Threat Intelligence Framework its not showing anything regarding action. &lt;/P&gt;</description>
      <pubDate>Mon, 31 Jul 2017 12:15:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Refining-Threat-Activity-Search/m-p/343077#M159722</guid>
      <dc:creator>mtaylor78</dc:creator>
      <dc:date>2017-07-31T12:15:57Z</dc:date>
    </item>
    <item>
      <title>Re: Refining Threat Activity Search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Refining-Threat-Activity-Search/m-p/343078#M159723</link>
      <description>&lt;P&gt;Hi, Im heading down the same path, maybe trying to reduce the number of notables by not raising one for anything under X number of bytes.&lt;BR /&gt;
Did you get anywhere with your method? I'd be very interested.&lt;BR /&gt;
Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 12 Mar 2018 00:58:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Refining-Threat-Activity-Search/m-p/343078#M159723</guid>
      <dc:creator>markhill1</dc:creator>
      <dc:date>2018-03-12T00:58:16Z</dc:date>
    </item>
  </channel>
</rss>

