Alerting

What is best practice for tuning processes?

Ring
New Member

chrome.exe and acrobat.exe are very noisy in our environment. I don't want to just exclude the process name because the actual process could be malicious. Was just wondering what best practice would be to make it less noisy. I was thinking of excluding the process name only if it matches the correct sha256 or is there a better way? 

Labels (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

Your question is very ambiguous. What logs are you talking about? How are you getting them? Do you want to limit the logs ingested or just filter out during search? And so on. And so on.

0 Karma

Ring
New Member

Our original Splunk engineer left so I was sort of put as the rule tuning guy for the time being and don't have that much experience yet. The alert itself is the Unusually Long Command Line rule and I'm trying to work with the correlation search so that it is not as noisy. I was just wondering if there is a best practice when trying to tune out excel.exe, acrobat.exe, chrome.exe, etc type of processes if that makes sense. 

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...

Network to App: Observability Unlocked [May & June Series]

In today’s digital landscape, your environment is no longer confined to the data center. It spans complex ...

SPL2 Deep Dives, AppDynamics Integrations, SAML Made Simple and Much More on Splunk ...

Splunk Lantern is Splunk’s customer success center that provides practical guidance from Splunk experts on key ...