Splunk Enterprise Security

How can I test for high or critical notable events?

Skins
Path Finder

I have read this article which describes searching for high or critical notable events.

https://answers.splunk.com/answers/432018/splunk-enterprise-security-how-to-set-up-alerts-wh.html

notable | where urgency="high" OR urgency="critical" | table _time source src dest user | eval computer=coalesce(src,dest)

Now i need a simple way to create a critical notable event to test.

How best to achieve this ?

gratzi

0 Karma

smoir_splunk
Splunk Employee
Splunk Employee

You can also create a manual notable event in the UI. https://docs.splunk.com/Documentation/ES/4.7.2/Admin/Createnotablesmanually

0 Karma

aholzel
Communicator

I had to do something like this today try the following:

| makeresults 
| eval user="skins", urgency="critical" 
| sendalert notable
Get Updates on the Splunk Community!

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Deprecation of Splunk Observability Kubernetes “Classic Navigator” UI starting ...

Access to Splunk Observability Kubernetes “Classic Navigator” UI will no longer be available starting January ...

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...