Splunk Enterprise Security

ES - Threat Activity Search add Host field

Path Finder

When matching against threat intel the notable events only shows the source and destination of the matched event. Is there a way to make the correlation search only find specific events with a specific host and show the host in the notable event?

For example, showing the source, destination and that it occured on firewall 2.

0 Karma
1 Solution

SplunkTrust
SplunkTrust

I assume if you use a datamodel (e.g Network_Traffic), you can use the 'dvc' value which should indicate the firewall/host on which the event was noticed.

View solution in original post

SplunkTrust
SplunkTrust

I assume if you use a datamodel (e.g Network_Traffic), you can use the 'dvc' value which should indicate the firewall/host on which the event was noticed.

View solution in original post

State of Splunk Careers

Access the Splunk Careers Report to see real data that shows how Splunk mastery increases your value and job satisfaction.

Find out what your skills are worth!