Splunk Enterprise Security

Adaptive Response - Log Event

Zerophage
New Member

Hello all,

I'm using a Correlation Search to create a Log Event as below:
hxxps://docs.splunk.com/Documentation/Splunk/7.2.6/Alert/LogEvents

Whilst it works, I can't figure out how to get more information into the "Event text" other than free text. I would like to include some data from the original correlation search.

The idea is it would trigger on a port scanning correlation for example and create "Port scan from x.x.x.x". Then there would be another search that picks up that event and correlates it with vuln scanning, etc.

0 Karma
Get Updates on the Splunk Community!

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...