Splunk Enterprise Security

Easy notables search - top owners and top alerts per owner

conma293
New Member

Not sure why this is so hard...

 

Wana go back say 7/30/90 days and stats count number of alerts per analyst. Ie who closed out the top or top true positives etc

 

Then want the ability to drill in and do stats count on any specific analysts for what those alerts were by rule/alert/notable name... To see what they were mainly dealing with

 

Why is this so hard...

Labels (1)
0 Karma

lkutch_splunk
Splunk Employee
Splunk Employee

Sounds like you could use the Incident Review Audit Dashboard:
https://docs.splunk.com/Documentation/ES/6.6.0/User/Audit#Incident_Review_Audit

or the Investigation Overview Dashboard:
https://docs.splunk.com/Documentation/ES/6.6.0/User/Audit#Investigation_Overview

Let me know if that helps.

 

 

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

What Is Splunk? Here’s What You Can Do with Splunk

Hey Splunk Community, we know you know Splunk. You likely leverage its unparalleled ability to ingest, index, ...

Level Up Your .conf25: Splunk Arcade Comes to Boston

With .conf25 right around the corner in Boston, there’s a lot to look forward to — inspiring keynotes, ...

Manual Instrumentation with Splunk Observability Cloud: How to Instrument Frontend ...

Although it might seem daunting, as we’ve seen in this series, manual instrumentation can be straightforward ...