Splunk Enterprise Security

Enterprise Security incident urgency showing "informational" when I set correlation rule notable to "high"?

ravida
Explorer

Hi folks,

I created a correlation search that looks for administrators setting passwords to never expire, which then creates a notable event for incident review. I tried setting the severity to both "high" and "critical", but when the notable is created the urgency field shows up only as "informational".

When I test the rule, I did it against on accounts that show up as both "high" and "critical" priority in the Identity Investigator, data I enrich via Active Directory.

I checked the lookup table for urgency_lookup and it is as you would expect, nothing is different than the default that would make it calculate to informational. What may I be missing?

 

Thanks!

0 Karma
1 Solution

meetmshah
SplunkTrust
SplunkTrust

Hello @ravida, If you have already checked urgency_lookup along with severity and priority of the assets/identities - there is nothing much to check. Except

  • Validate you are looking over and updating the correct correlation search
  • New notables are generated if you have updated priority / severity (Existing urgency would not be updated)

View solution in original post

meetmshah
SplunkTrust
SplunkTrust

Hello @ravida, If you have already checked urgency_lookup along with severity and priority of the assets/identities - there is nothing much to check. Except

  • Validate you are looking over and updating the correct correlation search
  • New notables are generated if you have updated priority / severity (Existing urgency would not be updated)

meetmshah
SplunkTrust
SplunkTrust

Hello, Just checking through if the issue was resolved or if you have any further questions?

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Word Search

This challenge was first posted on Slack #puzzles channelThis puzzle is based on a letter grid containing ...

[Puzzles] Solve, Learn, Repeat: Advent of Code - Day 4

Advent of CodeIn order to participate in these challenges, you will need to register with the Advent of Code ...

GA: S3 Promote for Historical Data Ingestion in Splunk Cloud

Ingest Historical S3 Data On-Demand: Announcing the General Availability of S3 Promote We’re excited to share ...