Security

Correlations

Vianapp
Engager

Good afternoon, I hope you are well. I am migrating my alert environment from TheHive to start using ES. I would like to know and learn if, in ES, when creating Correlations, I can configure a field in the notable event that analysts can edit. For example, when creating cases in TheHive, I include the desired field, and analysts set the value when they take the case for processing. Despite studying, I couldn't figure out how to implement this in a notable event so that analysts can provide inputs such as identifying the technology involved or deciding whether it should be forwarded. This would help me use it for auditing purposes later on. Is it possible to achieve this in ES?

Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Vianapp,

at first, Splunk isn't a DB where you can modify field values, Splunk is a log monitor where logs are indexed and not more updated.

You can modify the Correlation Searches adding all the fields you need from the events, but users cannot update them as in a DB.

In the Notable Events investigation, you can add notes, but not modifying field values, managed using lookups and Summary Indexes.

I hint to follow a training on ES before starting to use it: Splunk thinks different than the other systems.

Ciao.

Giuseppe

Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...