Splunk Enterprise Security

ES - Threat Activity Search add Host field

mmoermans
Path Finder

When matching against threat intel the notable events only shows the source and destination of the matched event. Is there a way to make the correlation search only find specific events with a specific host and show the host in the notable event?

For example, showing the source, destination and that it occured on firewall 2.

0 Karma
1 Solution

lakshman239
Influencer

I assume if you use a datamodel (e.g Network_Traffic), you can use the 'dvc' value which should indicate the firewall/host on which the event was noticed.

View solution in original post

lakshman239
Influencer

I assume if you use a datamodel (e.g Network_Traffic), you can use the 'dvc' value which should indicate the firewall/host on which the event was noticed.

First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...