Splunk Enterprise Security

Noteable Event Supression

Rhidian
Path Finder

Is it possible to use a lookup file in the Noteble Event supression say to look up a list of assets/enviroments that we do/don't want to know about?

 

Labels (2)
Tags (1)
0 Karma
1 Solution

bowesmana
SplunkTrust
SplunkTrust

When you talk about Notable event suppression, I assume you are talking about the Notable Event Suppression action in the Incident Review.

If you want to whitelist/blacklist certain assets, then you should add the lookup logic to the correlation search that has caused the notable event in the first place.

You cannot add lookup logic to the event type search ES creates for the suppression logic.

View solution in original post

0 Karma

inventsekar
SplunkTrust
SplunkTrust

Last month we were working on a Splunk ES Demo and i found out that we can not delete a notable.

either i have not understood the ES yet or the ES developers are really funny, lol ! 

thanks and best regards,
Sekar

PS - If this or any post helped you in any way, pls consider upvoting, thanks for reading !
0 Karma

bowesmana
SplunkTrust
SplunkTrust

When you talk about Notable event suppression, I assume you are talking about the Notable Event Suppression action in the Incident Review.

If you want to whitelist/blacklist certain assets, then you should add the lookup logic to the correlation search that has caused the notable event in the first place.

You cannot add lookup logic to the event type search ES creates for the suppression logic.

0 Karma

Rhidian
Path Finder

Thanks, I wanted to avid that as I would need to updated a lot of correlation searches.  Any idea why this isn'g possible as the search looks like standard SPL?

0 Karma

bowesmana
SplunkTrust
SplunkTrust

Unfortunately event type searches cannot contain any pipelines, so it has to be simply a raw search fragment

 

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...