Splunk Enterprise Security

How to set Urgency in a correlation search based on failure count?

stefan1988
Path Finder

The urgency in a correlation search is calculated by the corr. search severity + the asset/identity priority.

Is it possible to calculate the urgency based on the count of failures?

I'm Using Enterprise Security 4.5.1 and I saw you can set Risk Modifiers under "Add New Response Action", but I couldn't find any option to set the urgency based on a field value (i.e. a count of failures).

Many thanks.

Kind regards,
Stefan

0 Karma
1 Solution

smoir_splunk
Splunk Employee
Splunk Employee

You'd want to change the severity of the correlation search according to the number of failures.

For example, you could append something like this to the end of the correlation search

 | eval severity=case(failure>100,"critical",failure>50,"high",...

Then the urgency calculations will take that severity into account, and be adjusted accordingly.

View solution in original post

smoir_splunk
Splunk Employee
Splunk Employee

You'd want to change the severity of the correlation search according to the number of failures.

For example, you could append something like this to the end of the correlation search

 | eval severity=case(failure>100,"critical",failure>50,"high",...

Then the urgency calculations will take that severity into account, and be adjusted accordingly.

Get Updates on the Splunk Community!

Say goodbye to manually analyzing phishing and malware threats with Splunk Attack ...

In today’s evolving threat landscape, we understand you’re constantly bombarded with phishing and malware ...

AppDynamics is now part of Splunk Ideas

Hello Splunkers, We have exciting news for you! AppDynamics has been added to the Splunk Ideas Portal. Which ...

Advanced Splunk Data Management Strategies

Join us on Wednesday, May 14, 2025, at 11 AM PDT / 2 PM EDT for an exclusive Tech Talk that delves into ...