Splunk Enterprise Security

How to make Splunk ES override urgency changes?

Dworsnop
Path Finder

Hi all,

I have a correlation search that passes alerts from another system into ES and I need to prevent the urgency of the alert from being changed by ES.

Essentially I (think I) need ES to ignore the priority of any asset or identity associated with the incident so that the urgency doesn't change.

Cany anyone offer any advice on how to do this?

Thanks very much  🙂

Edit: I should add, I didn't create the original correlation search and I don't have much experience in this area, hence the question. Thanks again!

Labels (2)
0 Karma
1 Solution

Dworsnop
Path Finder

Thanks for the signposting @starcher 

Presumably I'm on the right lines here... "Severity defined in the search syntax results in an event where severity takes precedence over the severity defined in the notable event adaptive response action."

Therefore all I need to do is add " | eval severity="high" " to the end of my correlation search?

View solution in original post

0 Karma

starcher
Influencer

That is correct. 

starcher
Influencer

Dworsnop
Path Finder

Thanks for the signposting @starcher 

Presumably I'm on the right lines here... "Severity defined in the search syntax results in an event where severity takes precedence over the severity defined in the notable event adaptive response action."

Therefore all I need to do is add " | eval severity="high" " to the end of my correlation search?

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...