Splunk Enterprise Security

How to make Splunk ES override urgency changes?

Dworsnop
Path Finder

Hi all,

I have a correlation search that passes alerts from another system into ES and I need to prevent the urgency of the alert from being changed by ES.

Essentially I (think I) need ES to ignore the priority of any asset or identity associated with the incident so that the urgency doesn't change.

Cany anyone offer any advice on how to do this?

Thanks very much  🙂

Edit: I should add, I didn't create the original correlation search and I don't have much experience in this area, hence the question. Thanks again!

Labels (2)
0 Karma
1 Solution

Dworsnop
Path Finder

Thanks for the signposting @starcher 

Presumably I'm on the right lines here... "Severity defined in the search syntax results in an event where severity takes precedence over the severity defined in the notable event adaptive response action."

Therefore all I need to do is add " | eval severity="high" " to the end of my correlation search?

View solution in original post

0 Karma

starcher
Influencer

That is correct. 

starcher
Influencer

Dworsnop
Path Finder

Thanks for the signposting @starcher 

Presumably I'm on the right lines here... "Severity defined in the search syntax results in an event where severity takes precedence over the severity defined in the notable event adaptive response action."

Therefore all I need to do is add " | eval severity="high" " to the end of my correlation search?

0 Karma
Get Updates on the Splunk Community!

Optimize Cloud Monitoring

  TECH TALKS Optimize Cloud Monitoring Tuesday, August 13, 2024  |  11:00AM–12:00PM PST   Register to ...

What's New in Splunk Cloud Platform 9.2.2403?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.2.2403! Analysts can ...

Stay Connected: Your Guide to July and August Tech Talks, Office Hours, and Webinars!

Dive into our sizzling summer lineup for July and August Community Office Hours and Tech Talks. Scroll down to ...