Splunk Enterprise Security

How to make Splunk ES override urgency changes?

Dworsnop
Path Finder

Hi all,

I have a correlation search that passes alerts from another system into ES and I need to prevent the urgency of the alert from being changed by ES.

Essentially I (think I) need ES to ignore the priority of any asset or identity associated with the incident so that the urgency doesn't change.

Cany anyone offer any advice on how to do this?

Thanks very much  🙂

Edit: I should add, I didn't create the original correlation search and I don't have much experience in this area, hence the question. Thanks again!

Labels (2)
0 Karma
1 Solution

Dworsnop
Path Finder

Thanks for the signposting @starcher 

Presumably I'm on the right lines here... "Severity defined in the search syntax results in an event where severity takes precedence over the severity defined in the notable event adaptive response action."

Therefore all I need to do is add " | eval severity="high" " to the end of my correlation search?

View solution in original post

0 Karma

starcher
Influencer

That is correct. 

starcher
Influencer

Dworsnop
Path Finder

Thanks for the signposting @starcher 

Presumably I'm on the right lines here... "Severity defined in the search syntax results in an event where severity takes precedence over the severity defined in the notable event adaptive response action."

Therefore all I need to do is add " | eval severity="high" " to the end of my correlation search?

0 Karma
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...