Splunk Enterprise Security

Reduce notable events

lucanzano
Loves-to-Learn Everything

Hello, we have created many custom correlation searches in our client's deployed instance. Right now they are creating too many notable events even with the "window limitation". Can somebody help?

Labels (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Consider disabling less-useful correlation searches, especially information and low-priority events.  Re-enable them when the NE volume is under control

Tune the CSs so they only trigger when there is an event requiring attention.

Fix the problems that are triggering the NEs.

---
If this reply helps you, Karma would be appreciated.
0 Karma

lucanzano
Loves-to-Learn Everything

@richgalloway wrote:

Tune the CSs so they only trigger when there is an event requiring attention.


How do I do it?

Thank you for the answer

0 Karma

richgalloway
SplunkTrust
SplunkTrust

It depends on the searches.  Generally speaking, adjust thresholds within the search before triggering a notable event.  For example, instead of triggering when a single interesting event is found, trigger when 3 or more are found within some period of time.

---
If this reply helps you, Karma would be appreciated.
0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...