All Apps and Add-ons

Modify/Add detection rules in Splunk Security Essentials

zzehour
New Member

Hello,

I would like to modify some use cases provided by default in SSE, i tried to do it via the gui but it doesn't work.
When browsing app files, i noticed that cases information is stored in multiple json files which i tried to modify but this didn't changed in the gui. Is there any way to do it ?

Also, i tried to add custom content, it is possible from the gui but i have many rules to add, is there any file (like savedsearch.conf for example) that enables loading all the rules and other components like the MITRE, description at once unstead of doing it one by one in the gui ?

Thank you

0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

One does not modify the queries SSE. They're just examples, anyway. Copy the queries into your own app and make your changes there.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

One does not modify the queries SSE. They're just examples, anyway. Copy the queries into your own app and make your changes there.

---
If this reply helps you, Karma would be appreciated.
0 Karma

fahmed11
Explorer

There are cases where Splunk Essentials is not able to find the data using the pre-configured Data Source Check queries. Are you saying that the solution to that is to replicate the whole application and make changes there? Maybe that's not exactly throwing the wheel away and starting all over again, but it seems pretty close.

0 Karma

zzehour
New Member

Thank you for the answer !

0 Karma
Get Updates on the Splunk Community!

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...