Splunk Enterprise Security

How to handle Defender Incidents/Alerts with ES Notables

lyonheart14
New Member

What is best practice when ingfesting Defender XDR Incidents and/or Alerts and using them for notables in Splunk ES? It seems like the Defender data is dynamic, so changes to Incident status and the Incident/Alert relationships may pose a challenge for being reflected as notables or in the ES Incident queue.

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...