Splunk Enterprise Security

Splunk Enterprise Security: How to remove a notable event from the "Security Posture" dashboard after investigation?

mgrosholz
Path Finder

I have a notable event seen in Splunk Enterprise Security's Security Posture dashboard.

I have reviewed it and determined it to be a false positive.
I want to remove it from view on the Security Posture dashboard.

Is there any way to do this?

Azeemering
Builder

What you could try is index=notable rule_title="your_notable_event_title" | delete

apcsplunk
Explorer

This worked for me 🙂

index=notable search_name="*your notable title*" | delete 
0 Karma

supreetsingh
New Member

Click the Edit-> Edit Panels in the Security Posture Dashboard.
Under the Top Notable Events, click the search report and select Notable-Top Events and select Open in Search. Add status_group="New" to this search:

| `es_notable_events` | search timeDiff_type=current status_group="New" | stats sparkline(sum(count),30m) as sparkline,sum(count) as count by rule_name | sort 100 - count

Click Save, Save Dashboard. click Done
The Security Posture Dashboard will only show New Notable events

0 Karma

esix_splunk
Splunk Employee
Splunk Employee

In the current form, there is no easy way to delete a notable event. The basic idea here is that event your false positives, you want to categorize. So you could create a new class for false positives and classify these notables into this.

See here : http://docs.splunk.com/Documentation/ES/4.1.1/User/NotableEvents

If you're really looking to delete the events, you'll need to look at the incident_review and notables macros, and where they are pulling the data from. In the latest versions of ES, notables are stored between KVStore, lookup files, and summary indexes..

0 Karma

mgrosholz
Path Finder

I don't want to make all the alerts false positives. Just the specific event that was investigated.

Would grouping them into a new class push all like events there? Or just that event?

Also, deleting the events, as you mentioned above, would delete all the notable events of the same kind; correct?

0 Karma

esix_splunk
Splunk Employee
Splunk Employee

You can go through the events singularly, and either mark them as false / true, or delete them.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...