<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: help with inputintelligence command in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Help-with-inputintelligence-command/m-p/618093#M214821</link>
    <description>&lt;P&gt;Subsearches can only return max 10,000 results, so if inputintelligence is returning more rows than that, you will not restrict your main search correctly. You would probably have to use a lookup created from inputintelligence and do&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| lookup file domain as threat_match_value OUTPUT domain as found
| where isnull(found)&lt;/LI-CODE&gt;</description>
    <pubDate>Mon, 24 Oct 2022 00:50:54 GMT</pubDate>
    <dc:creator>bowesmana</dc:creator>
    <dc:date>2022-10-24T00:50:54Z</dc:date>
    <item>
      <title>Help with inputintelligence command?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Help-with-inputintelligence-command/m-p/618088#M214818</link>
      <description>&lt;P&gt;Below is my spl&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;|from datamodel:"Threat_Intelligence".""Threat_Activity"
|dedup threat_match_field,threat_match_value
|search NOT
[|inputintelligence cisco_top_million_sites
|rename domain as threat_match_value
|table threat_match_value]&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Explanation: basically from any threat activity detected, I want to remove false positives domains detected by using the&amp;nbsp;cisco_top_million_sites as a reference to exclude FP domains.&lt;/P&gt;
&lt;P&gt;However, the part where domains in threat_match_value is compared to domains in&amp;nbsp;cisco_top_million_sites&amp;nbsp; threat intel file, some domains are not getting excluded. Its mainly the content.dropboxapi.com domain which still appears in the results even though its in the threat intel file while other sub domains of the&amp;nbsp;dropboxapi.com are excluded.&lt;/P&gt;
&lt;P&gt;Can someone please help with fixing this ?&lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2022 13:16:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Help-with-inputintelligence-command/m-p/618088#M214818</guid>
      <dc:creator>dm1</dc:creator>
      <dc:date>2022-10-24T13:16:25Z</dc:date>
    </item>
    <item>
      <title>Re: help with inputintelligence command</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Help-with-inputintelligence-command/m-p/618093#M214821</link>
      <description>&lt;P&gt;Subsearches can only return max 10,000 results, so if inputintelligence is returning more rows than that, you will not restrict your main search correctly. You would probably have to use a lookup created from inputintelligence and do&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| lookup file domain as threat_match_value OUTPUT domain as found
| where isnull(found)&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 24 Oct 2022 00:50:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Help-with-inputintelligence-command/m-p/618093#M214821</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2022-10-24T00:50:54Z</dc:date>
    </item>
    <item>
      <title>Re: help with inputintelligence command</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Help-with-inputintelligence-command/m-p/618094#M214822</link>
      <description>&lt;P&gt;Thanks alot!!!&lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2022 01:24:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Help-with-inputintelligence-command/m-p/618094#M214822</guid>
      <dc:creator>dm1</dc:creator>
      <dc:date>2022-10-24T01:24:54Z</dc:date>
    </item>
  </channel>
</rss>

