Splunk Enterprise Security

ESS - Creating notable event filters

mtanadsk
Explorer

Hi,

I'd like to create a filter for a notable event but the field that I'm trying to filter against doesn't show up in the notable index for a particular correlation search. How would one go about making this possible?

For example, in the correlation search: "Network - SANS Block List Activity - Rule", I'd like to filter out any of this activity that gets blocked at the firewall, but still have the ability to report on it outside the notable events/incident review dashboard, using the notable index of course. i.e. for all results found in the the SANS Block List correlation search, if the action equals deny or blocked, mark the event as filtered. The problem that I'm running into is that the firewall event 'Action=' is not available as a field in the notable index for that search. I can also apply this methodology as a false-positive tuning tactic that can be applied to many other correlation searches as well, so knowing how to do this effectively could help trim out a lot of noise on the Notable Events and Incident Review dashboard. Of course, I welcome any guidance on other ways this can be handled as well.

thanks,

-mike

0 Karma

jcoates_splunk
Splunk Employee
Splunk Employee

After some more discovery, this concept has been established as an FAQ

0 Karma

jcoates_splunk
Splunk Employee
Splunk Employee

Hi Mike,

As you've noted the action's not in the index; there's some options we're considering here but it's not a one-size-fits-all answer yet. Ping me an email at jcoates @splunk.com and we can discuss in more detail what you're seeing.

Thanks,
Jack

0 Karma
Did you miss .conf21 Virtual?

Good news! The event's keynotes and many of its breakout sessions are now available online, and still totally FREE!