Splunk Enterprise Security

How to make Splunk ES override urgency changes?

Dworsnop
Path Finder

Hi all,

I have a correlation search that passes alerts from another system into ES and I need to prevent the urgency of the alert from being changed by ES.

Essentially I (think I) need ES to ignore the priority of any asset or identity associated with the incident so that the urgency doesn't change.

Cany anyone offer any advice on how to do this?

Thanks very much  🙂

Edit: I should add, I didn't create the original correlation search and I don't have much experience in this area, hence the question. Thanks again!

Labels (2)
0 Karma
1 Solution

Dworsnop
Path Finder

Thanks for the signposting @starcher 

Presumably I'm on the right lines here... "Severity defined in the search syntax results in an event where severity takes precedence over the severity defined in the notable event adaptive response action."

Therefore all I need to do is add " | eval severity="high" " to the end of my correlation search?

View solution in original post

0 Karma

starcher
Influencer

That is correct. 

starcher
Influencer

Dworsnop
Path Finder

Thanks for the signposting @starcher 

Presumably I'm on the right lines here... "Severity defined in the search syntax results in an event where severity takes precedence over the severity defined in the notable event adaptive response action."

Therefore all I need to do is add " | eval severity="high" " to the end of my correlation search?

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...