Splunk Enterprise Security

How can I change Threat intelligence setting the default time that the removal process runs for threat sources?

creiglow
Explorer

In the documentation at https://docs.splunk.com/Documentation/ES/7.0.2/Admin/Changethreatintel under 

Review the logic for retention
the document states, "The threat retention input runs every 24 hours by default"

If it runs every 24 hours by default, how do you change that behavior?

What process/search/whatever runs the threat retention input?  Where is it defined?  Can it be run manually?

Thanks,
--Keith

Labels (1)
0 Karma

lblystone
Splunk Employee
Splunk Employee

Threat retention is based on the source. So assuming you have the latest version of ES the easiest way is to... Navigate to the ES app > click "Configure" > Click" Data Enrichment" > Click "Threat Intelligence Management". Then find the input you want to change with the "Advanced Edit" button. This has a setting of "Maximum age" which is what you would modify to change the retention or the "Interval" to change how frequently (in seconds) the input runs to bring in new or update old indicators. 

First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...