Splunk Enterprise Security

How can I change Threat intelligence setting the default time that the removal process runs for threat sources?

creiglow
Explorer

In the documentation at https://docs.splunk.com/Documentation/ES/7.0.2/Admin/Changethreatintel under 

Review the logic for retention
the document states, "The threat retention input runs every 24 hours by default"

If it runs every 24 hours by default, how do you change that behavior?

What process/search/whatever runs the threat retention input?  Where is it defined?  Can it be run manually?

Thanks,
--Keith

Labels (1)
0 Karma

lblystone
Splunk Employee
Splunk Employee

Threat retention is based on the source. So assuming you have the latest version of ES the easiest way is to... Navigate to the ES app > click "Configure" > Click" Data Enrichment" > Click "Threat Intelligence Management". Then find the input you want to change with the "Advanced Edit" button. This has a setting of "Maximum age" which is what you would modify to change the retention or the "Interval" to change how frequently (in seconds) the input runs to bring in new or update old indicators. 

Get Updates on the Splunk Community!

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...

Updated Data Management and AWS GDI Inventory in Splunk Observability

We’re making some changes to Data Management and Infrastructure Inventory for AWS. The Data Management page, ...

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...