Splunk Enterprise Security

How can I change Threat intelligence setting the default time that the removal process runs for threat sources?

creiglow
Explorer

In the documentation at https://docs.splunk.com/Documentation/ES/7.0.2/Admin/Changethreatintel under 

Review the logic for retention
the document states, "The threat retention input runs every 24 hours by default"

If it runs every 24 hours by default, how do you change that behavior?

What process/search/whatever runs the threat retention input?  Where is it defined?  Can it be run manually?

Thanks,
--Keith

Labels (1)
0 Karma

lblystone
Splunk Employee
Splunk Employee

Threat retention is based on the source. So assuming you have the latest version of ES the easiest way is to... Navigate to the ES app > click "Configure" > Click" Data Enrichment" > Click "Threat Intelligence Management". Then find the input you want to change with the "Advanced Edit" button. This has a setting of "Maximum age" which is what you would modify to change the retention or the "Interval" to change how frequently (in seconds) the input runs to bring in new or update old indicators. 

Get Updates on the Splunk Community!

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...