Splunk Enterprise Security

ES Search query

So76
Explorer

Hey, has anyone created a search that merges an ipadd from threat intel and ipadd from azure so it'll trigger an alert if there's a match. Don't know if it's possible. Thanks, will appreciate any help or advise. I am new to ES

 

Labels (1)

ro_mc
Path Finder

Good news! The threat intelligence framework does all the hard work for you.

The following link provides an overview of the process, but the main point is that there's a correlation search called "Threat Activity Detected".

https://dev.splunk.com/enterprise/docs/devtools/enterprisesecurity/threatintelligenceframework/

To configure alerts based on threat intelligence, open Splunk Enterprise Security, click on Content Management, and select a Type of "correlation search". Locate the "Threat Activity Detected" correlation search and enable the search.

By default, the search will run at 10 minutes past each hour and look for threats over the last 65 minutes. Once detected, threat matches will not be reported for another 24 hours.

0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog
Get Updates on the Splunk Community!

CX Day is Coming!

Customer Experience (CX) Day is on October 7th!! We're so excited to bring back another day full of wonderful ...

Strengthen Your Future: A Look Back at Splunk 10 Innovations and .conf25 Highlights!

The Big One: Splunk 10 is Here!  The moment many of you have been waiting for has arrived! We are thrilled to ...

Now Offering the AI Assistant Usage Dashboard in Cloud Monitoring Console

Today, we’re excited to announce the release of a brand new AI assistant usage dashboard in Cloud Monitoring ...