Splunk Enterprise Security

Correlation Rules in ES App

garima_chauhan
Path Finder

Hi,

I am using Splunk v 5.0.5 with ES App 2.4.1. There are some correlation rules whose results show only timestamp as an event. When I click on create a report, a count field comes up but as such there is no other information. Some such correlation rules are Watchlisted Events,Personally Identifiable Information Detected.
Please suggest as to what exactly is happening when these searches run.

0 Karma
1 Solution

jcoates_splunk
Splunk Employee
Splunk Employee

hi,

that usually indicates a customized search that isn't using the get_event_id | map_notable_fields macros -- http://docs.splunk.com/Documentation/ES/2.4.1/Install/ModifyCorrelationSearches#Create_a_correlation...

alternatively, you might be false positive matching against events that just don't make any sense.

View solution in original post

jcoates_splunk
Splunk Employee
Splunk Employee

hi,

that usually indicates a customized search that isn't using the get_event_id | map_notable_fields macros -- http://docs.splunk.com/Documentation/ES/2.4.1/Install/ModifyCorrelationSearches#Create_a_correlation...

alternatively, you might be false positive matching against events that just don't make any sense.

Get Updates on the Splunk Community!

Exporting Splunk Apps

Join us on Monday, October 21 at 11 am PT | 2 pm ET!With the app export functionality, app developers and ...

Cisco Use Cases, ITSI Best Practices, and More New Articles from Splunk Lantern

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Build Your First SPL2 App!

Watch the recording now!.Do you want to SPL™, too? SPL2, Splunk's next-generation data search and preparation ...