Splunk Enterprise Security

How to set Urgency in a correlation search based on failure count?

stefan1988
Path Finder

The urgency in a correlation search is calculated by the corr. search severity + the asset/identity priority.

Is it possible to calculate the urgency based on the count of failures?

I'm Using Enterprise Security 4.5.1 and I saw you can set Risk Modifiers under "Add New Response Action", but I couldn't find any option to set the urgency based on a field value (i.e. a count of failures).

Many thanks.

Kind regards,
Stefan

0 Karma
1 Solution

smoir_splunk
Splunk Employee
Splunk Employee

You'd want to change the severity of the correlation search according to the number of failures.

For example, you could append something like this to the end of the correlation search

 | eval severity=case(failure>100,"critical",failure>50,"high",...

Then the urgency calculations will take that severity into account, and be adjusted accordingly.

View solution in original post

smoir_splunk
Splunk Employee
Splunk Employee

You'd want to change the severity of the correlation search according to the number of failures.

For example, you could append something like this to the end of the correlation search

 | eval severity=case(failure>100,"critical",failure>50,"high",...

Then the urgency calculations will take that severity into account, and be adjusted accordingly.

Get Updates on the Splunk Community!

Modern way of developing distributed application using OTel

Recently, I had the opportunity to work on a complex microservice using Spring boot and Quarkus to develop a ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had 3 releases of new security content via the Enterprise Security ...

Archived Metrics Now Available for APAC and EMEA realms

We’re excited to announce the launch of Archived Metrics in Splunk Infrastructure Monitoring for our customers ...