Alerting

splunk enterprise security

trojan_81
Path Finder

Hi Splunk Experts,

Suppose I only have splunk cloud.  Is it NOT possible to set an alert based on a search that correlates events from multiple systems? Such as correlating an event across endpoint and network activity.  Is this where Enterprise Security is needed? Or is the answer that one can technically do it without Enterprise security but it would be tougher?

Would splunk enterprise have more out of the box correlations than just splunk cloud?

 

Labels (1)
Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

You do not need Enterprise Security to correlate events from multiple systems or sources.  Using ES would not necessarily make it easier.

Splunk Cloud and Splunk Enterprise have the same set of OOTB correlations.

---
If this reply helps you, Karma would be appreciated.
0 Karma

trojan_81
Path Finder

That helps greatly thank you.  With that in mind, what are a few reasons why you would want to implement ES  (assume you had the funds)?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Check out the Splunk Security Essentials and ES Content Update apps for some example use cases that are best (or only) implemented using ES.

Also, ES has built-in features that enrich the assets and identities in your data.

That's not to mention the support for investigations and other SIEM features.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...

.conf24 | Learning Tracks for Security, Observability, Platform, and Developers!

.conf24 is taking place at The Venetian in Las Vegas from June 11 - 14. Continue reading to learn about the ...

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...