Splunk Enterprise Security

How can I change Threat intelligence setting the default time that the removal process runs for threat sources?

creiglow
Explorer

In the documentation at https://docs.splunk.com/Documentation/ES/7.0.2/Admin/Changethreatintel under 

Review the logic for retention
the document states, "The threat retention input runs every 24 hours by default"

If it runs every 24 hours by default, how do you change that behavior?

What process/search/whatever runs the threat retention input?  Where is it defined?  Can it be run manually?

Thanks,
--Keith

Labels (1)
0 Karma

lblystone
Splunk Employee
Splunk Employee

Threat retention is based on the source. So assuming you have the latest version of ES the easiest way is to... Navigate to the ES app > click "Configure" > Click" Data Enrichment" > Click "Threat Intelligence Management". Then find the input you want to change with the "Advanced Edit" button. This has a setting of "Maximum age" which is what you would modify to change the retention or the "Interval" to change how frequently (in seconds) the input runs to bring in new or update old indicators. 

Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...