Splunk Enterprise Security

How to handle Defender Incidents/Alerts with ES Notables

lyonheart14
New Member

What is best practice when ingfesting Defender XDR Incidents and/or Alerts and using them for notables in Splunk ES? It seems like the Defender data is dynamic, so changes to Incident status and the Incident/Alert relationships may pose a challenge for being reflected as notables or in the ES Incident queue.

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

 Ready to master Kubernetes and cloud monitoring like the pros? Join Splunk’s Growth Engineering team for an ...

Update Your SOAR Apps for Python 3.13: What Community Developers Need to Know

To Community SOAR App Developers - we're reaching out with an important update regarding Python 3.9's ...

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...