Splunk Enterprise Security

Assign multiple risk objects in Risk Analysis

vamshikn72
Explorer

How to assign multiple risk object fields and object types in Risk analysis response action. I know it's possible from search using appendpipe and sendalert but we want this to be added from the response action.

Example as below:

Risk Score - 20

Risk Object Field - user, ip, host

Risk Object Type - System, user

vamshikn72_0-1619547260431.png

 

0 Karma
1 Solution

bowesmana
SplunkTrust
SplunkTrust

In your correlation search create a fields risk_object and risk_object_type containing your values and have one row per risk entry you want to create. You can also give each row a different risk score if you want to. This example shows how you can use those fields.

| makeresults
| fields - _time
| eval risk_object=split("vamshikn72:user,10.10.13.11:system,machine1:system", ",")
| mvexpand risk_object
| rex field=risk_object "(?<risk_object>[^:]*):(?<risk_object_type>.*)"
| eval risk_score=20

In the configuration dialog, just leave the risk object and type fields blank. If you include a score field in the row, it will use that instead.

View solution in original post

0 Karma

MaverickT
Communicator

The easyest way is to upgrade your Enterprise Security to 6.4, which has the option to add multiple risk analysis to the same result.

 

MaverickT_0-1619763085817.png

 

vamshikn72
Explorer

Thanks @MaverickT. We came to know about this later and asked our admins to upgrade.

0 Karma

bowesmana
SplunkTrust
SplunkTrust

In your correlation search create a fields risk_object and risk_object_type containing your values and have one row per risk entry you want to create. You can also give each row a different risk score if you want to. This example shows how you can use those fields.

| makeresults
| fields - _time
| eval risk_object=split("vamshikn72:user,10.10.13.11:system,machine1:system", ",")
| mvexpand risk_object
| rex field=risk_object "(?<risk_object>[^:]*):(?<risk_object_type>.*)"
| eval risk_score=20

In the configuration dialog, just leave the risk object and type fields blank. If you include a score field in the row, it will use that instead.

0 Karma

vamshikn72
Explorer

Hi @bowesmana, Passing blank values in the response action and adding scores to the eval helped me a lot. Thanks for your quick help.

Search example I used:

| makeresults
| eval field_user="noob", field_ip="8.8.8.8", field_host="machine"
| eval risk_object=if(isnotnull(field_host),field_host,null()),risk_object_type=if(isnotnull(field_host),"system",null())
| appendpipe
[| eval risk_object=if(isnotnull(field_user),field_user,null()),risk_object_type=if(isnotnull(field_user),"user",null())]
| appendpipe
[| eval risk_object=if(isnotnull(field_ip),field_ip,null()),risk_object_type=if(isnotnull(field_ip),"system",null())]
| eval risk_score=20
| fields - _time field_user field_ip field_host

Get Updates on the Splunk Community!

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...

Cloud Platform & Enterprise: Classic Dashboard Export Feature Deprecation

As of Splunk Cloud Platform 9.3.2408 and Splunk Enterprise 9.4, classic dashboard export features are now ...