Splunk Enterprise Security

How can I change Threat intelligence setting the default time that the removal process runs for threat sources?

creiglow
Explorer

In the documentation at https://docs.splunk.com/Documentation/ES/7.0.2/Admin/Changethreatintel under 

Review the logic for retention
the document states, "The threat retention input runs every 24 hours by default"

If it runs every 24 hours by default, how do you change that behavior?

What process/search/whatever runs the threat retention input?  Where is it defined?  Can it be run manually?

Thanks,
--Keith

Labels (1)
0 Karma

lblystone
Splunk Employee
Splunk Employee

Threat retention is based on the source. So assuming you have the latest version of ES the easiest way is to... Navigate to the ES app > click "Configure" > Click" Data Enrichment" > Click "Threat Intelligence Management". Then find the input you want to change with the "Advanced Edit" button. This has a setting of "Maximum age" which is what you would modify to change the retention or the "Interval" to change how frequently (in seconds) the input runs to bring in new or update old indicators. 

Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

New This Month - Observability Updates Give Extended Visibility and Improve User ...

This month is a collection of special news! From Magic Quadrant updates to AppDynamics integrations to ...

Intro to Splunk Synthetic Monitoring

In our last post, we mentioned that the 3 key pieces of observability – metrics, logs, and traces – provide ...