Splunk Enterprise Security

How do I make the correlation search generate notable event

xnx_1012
Explorer

Hi,

Based on my understanding, from the Splunk Guide, https://docs.splunk.com/Documentation/ES/6.6.0/Admin/Configurecorrelationsearches, I just need to add the notable under adaptive response. I did

xnx_1012_0-1631592737278.png

 

However, I try to fail log in, the notable events shown in the Incident Review dashboard, is 0.

But when I run the spl, I embedded in my correlation search, the SPL  can fetch all the fail logged ins that I tried

0 Karma

NS2017
Loves-to-Learn

Just want to understand how you are setting your throttling?

0 Karma

xnx_1012
Explorer

Hello,

 

I did something like this

xnx_1012_0-1631760359238.png

and can I ask if I have an event that has
Time: 3pm

Device: Firewall

Source_IP : 8.8.8.8

Destination: 1.1.1.1

User: user1

Error_message: Error

and this keep happening over and over again in 1 hour time range with the same value. The throttle would help to prevent it right? But if it is different value then it would be a notable, am I right

0 Karma

NS2017
Loves-to-Learn

Hi

In this case all events would be throttled for 4 hours based on the fields you choose. After changing the Throttling did you see any Notable event generate? if not Other thing you can review what time range you are selecting for your search to run. Hope this help

 

0 Karma

xnx_1012
Explorer

Hello, yes, when I made it 7 minutes, the event is there however, I see it like generating the same event again.

0 Karma

NS2017
Loves-to-Learn

So if you make windows duration 7 min then it only throttle for 7 min and then generate event after that. you have to adjust your time range and throttling windows according to your events frequency. 

0 Karma

xnx_1012
Explorer

Hello so I can generate the event, however it is the same event  that has been generated previously

xnx_1012_0-1631776097320.png

SAME EVENTS

xnx_1012_1-1631776206614.png

xnx_1012_2-1631776398679.png

 

 

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...