Knowledge Management

How can i set up a watch list ? or a active list ? or list ? or referance set ? like in other SIEMs in SPLUNK

nuro
New Member

I know that there is a concept of CSV lookup and external lookup and all, but those will create a new field and set a value if the value matches with those in watchlist. What is i need a new field creation and set a value if a partial match with watchlist happens. Can we use regex ?. Also is it possible to edit the file that is already added from the console itself.?

Tags (1)
0 Karma

woodcock
Esteemed Legend

Have you tried the getwatchlist app?
https://splunkbase.splunk.com/app/635/

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...