Splunk Enterprise Security

Identifying Triggered Notables in CS without Incident Dashboard Access

AL3Z
Builder

Hi,

I would like to know about the triggered notable events from CS without accessing the incident review dashboard, as we are experiencing a significant number of notables being triggered consistently. How can we identify the source of noise from a specific correlation search?

 
Thanks in advance 
 
Labels (1)
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @AL3Z,

You can check directly from notable index, but using notable macro is much easier.

`notable` | timechart count by rule_name
If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma
Get Updates on the Splunk Community!

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

  Ready to master Kubernetes and cloud monitoring like the pros?Join Splunk’s Growth Engineering team for an ...

Wrapping Up Cybersecurity Awareness Month

October might be wrapping up, but for Splunk Education, cybersecurity awareness never goes out of season. ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

🗣 You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...